diff --git a/intern/docker_omada/templates/docker-compose.yml b/intern/docker_omada/templates/docker-compose.yml index fc280b3c2b78c638b3535929ef5ac0a7730041e0..82de50c20bee7c1d0f3cc50c54b88d61f693500c 100644 --- a/intern/docker_omada/templates/docker-compose.yml +++ b/intern/docker_omada/templates/docker-compose.yml @@ -5,15 +5,18 @@ services: image: mbentley/omada-controller:latest restart: always ports: - - {{ omada_port_http }}:8088 - - {{ omada_port_https }}:8043 - - {{ omada_portal_https }}:8843 + - "{{ omada_port_http }}:{{ omada_port_http }}" + - "{{ omada_port_https }}:{{ omada_port_https }}" + - "{{ omada_portal_https }}:{{ omada_portal_https }}" - 27001:27001/udp + - 27002:27002 - 29810:29810/udp - 29811:29811 - 29812:29812 - 29813:29813 - 29814:29814 + - 29815:29815 + - 29816:29816 sysctls: - net.ipv4.ip_unprivileged_port_start=0 volumes: @@ -34,6 +37,8 @@ services: PORT_DISCOVERY: 29810 PORT_MANAGER_V1: 29811 PORT_MANAGER_V2: 29814 + PORT_TRANSFER_V2: 29815 + PORT_RTTY: 29816 PORT_UPGRADE_V1: 29813 SHOW_SERVER_LOGS: "true" SHOW_MONGODB_LOGS: "false" diff --git a/intern/docker_pihole/templates/docker-compose.yml b/intern/docker_pihole/templates/docker-compose.yml new file mode 100644 index 0000000000000000000000000000000000000000..4d83bd9b79dd8ed4d924540cdb6202ac4f2f6c3d --- /dev/null +++ b/intern/docker_pihole/templates/docker-compose.yml @@ -0,0 +1,30 @@ +services: + app: + image: pihole/pihole:latest + restart: always + ports: + - "53:53/tcp" + - "53:53/udp" + volumes: + - "{{ basedir }}/etc:/etc/pihole" + - "{{ basedir }}/dnsmasq:/etc/dnsmasq.d" + - "/dev/null:/var/log/pihole.log" + - "/dev/null:/var/log/pihole-FTL.log" + hostname: pihole + environment: + TZ: 'Europe/Berlin' + TAIL_FTL_LOG: 0 + FTLCONF_LOCAL_IPV4: '{{ int_ip4 }}' + WEBPASSWORD: '{{ admin_password }}' + labels: + - traefik.enable=true + - traefik.http.routers.{{ servicename }}.entrypoints=websecure + - traefik.http.routers.{{ servicename }}.rule=Host(`{{ domain }}`) + - traefik.http.services.{{ servicename }}.loadBalancer.server.port=80 + networks: + - default + - web + +networks: + web: + external: true \ No newline at end of file diff --git a/testserver/docker_matrix/templates/rest_auth_provider.py b/testserver/docker_matrix/templates/rest_auth_provider.py deleted file mode 100644 index 5f6f583a51c7691df6bdc6ae177a86778bac2640..0000000000000000000000000000000000000000 --- a/testserver/docker_matrix/templates/rest_auth_provider.py +++ /dev/null @@ -1,217 +0,0 @@ -# -*- coding: utf-8 -*- -# -# REST endpoint Authentication module for Matrix synapse -# Copyright (C) 2017 Kamax Sarl -# -# https://www.kamax.io/ -# -# This program is free software: you can redistribute it and/or modify -# it under the terms of the GNU Affero General Public License as -# published by the Free Software Foundation, either version 3 of the -# License, or (at your option) any later version. -# -# This program is distributed in the hope that it will be useful, -# but WITHOUT ANY WARRANTY; without even the implied warranty of -# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the -# GNU Affero General Public License for more details. -# -# You should have received a copy of the GNU Affero General Public License -# along with this program. If not, see <http://www.gnu.org/licenses/>. -# - -import logging -from twisted.internet import defer -import requests -import json -import time - -logger = logging.getLogger(__name__) - - -class RestAuthProvider(object): - - def __init__(self, config, account_handler): - self.account_handler = account_handler - - if not config.endpoint: - raise RuntimeError('Missing endpoint config') - - self.endpoint = config.endpoint - self.regLower = config.regLower - self.config = config - - logger.info('Endpoint: %s', self.endpoint) - logger.info('Enforce lowercase username during registration: %s', self.regLower) - - @defer.inlineCallbacks - def check_password(self, user_id, password): - logger.info("Got password check for " + user_id) - data = {'user': {'id': user_id, 'password': password}} - r = requests.post(self.endpoint + '/_matrix-internal/identity/v1/check_credentials', json=data) - r.raise_for_status() - r = r.json() - if not r["auth"]: - reason = "Invalid JSON data returned from REST endpoint" - logger.warning(reason) - raise RuntimeError(reason) - - auth = r["auth"] - if not auth["success"]: - logger.info("User not authenticated") - defer.returnValue(False) - - localpart = user_id.split(":", 1)[0][1:] - logger.info("User %s authenticated", user_id) - - registration = False - if not (yield self.account_handler.check_user_exists(user_id)): - logger.info("User %s does not exist yet, creating...", user_id) - - if localpart != localpart.lower() and self.regLower: - logger.info('User %s was cannot be created due to username lowercase policy', localpart) - defer.returnValue(False) - - user_id, access_token = (yield self.account_handler.register(localpart=localpart)) - registration = True - logger.info("Registration based on REST data was successful for %s", user_id) - else: - logger.info("User %s already exists, registration skipped", user_id) - - if auth["profile"]: - logger.info("Handling profile data") - profile = auth["profile"] - - # fixme: temporary fix - try: - store = yield self.account_handler._hs.get_profile_handler().store # for synapse >= 1.9.0 - except AttributeError: - store = yield self.account_handler.hs.get_profile_handler().store # for synapse < 1.9.0 - - if "display_name" in profile and ((registration and self.config.setNameOnRegister) or (self.config.setNameOnLogin)): - display_name = profile["display_name"] - logger.info("Setting display name to '%s' based on profile data", display_name) - yield store.set_profile_displayname(localpart, display_name) - else: - logger.info("Display name was not set because it was not given or policy restricted it") - - if (self.config.updateThreepid): - if "three_pids" in profile: - logger.info("Handling 3PIDs") - - external_3pids = [] - for threepid in profile["three_pids"]: - medium = threepid["medium"].lower() - address = threepid["address"].lower() - external_3pids.append({"medium": medium, "address": address}) - logger.info("Looking for 3PID %s:%s in user profile", medium, address) - - validated_at = time_msec() - if not (yield store.get_user_id_by_threepid(medium, address)): - logger.info("3PID is not present, adding") - yield store.user_add_threepid( - user_id, - medium, - address, - validated_at, - validated_at - ) - else: - logger.info("3PID is present, skipping") - - if (self.config.replaceThreepid): - for threepid in (yield store.user_get_threepids(user_id)): - medium = threepid["medium"].lower() - address = threepid["address"].lower() - if {"medium": medium, "address": address} not in external_3pids: - logger.info("3PID is not present in external datastore, deleting") - yield store.user_delete_threepid( - user_id, - medium, - address - ) - - else: - logger.info("3PIDs were not updated due to policy") - else: - logger.info("No profile data") - - defer.returnValue(True) - - @staticmethod - def parse_config(config): - # verify config sanity - _require_keys(config, ["endpoint"]) - - class _RestConfig(object): - endpoint = '' - regLower = True - setNameOnRegister = True - setNameOnLogin = False - updateThreepid = True - replaceThreepid = False - - rest_config = _RestConfig() - rest_config.endpoint = config["endpoint"] - - try: - rest_config.regLower = config['policy']['registration']['username']['enforceLowercase'] - except TypeError: - # we don't care - pass - except KeyError: - # we don't care - pass - - try: - rest_config.setNameOnRegister = config['policy']['registration']['profile']['name'] - except TypeError: - # we don't care - pass - except KeyError: - # we don't care - pass - - try: - rest_config.setNameOnLogin = config['policy']['login']['profile']['name'] - except TypeError: - # we don't care - pass - except KeyError: - # we don't care - pass - - try: - rest_config.updateThreepid = config['policy']['all']['threepid']['update'] - except TypeError: - # we don't care - pass - except KeyError: - # we don't care - pass - - try: - rest_config.replaceThreepid = config['policy']['all']['threepid']['replace'] - except TypeError: - # we don't care - pass - except KeyError: - # we don't care - pass - - return rest_config - - -def _require_keys(config, required): - missing = [key for key in required if key not in config] - if missing: - raise Exception( - "REST Auth enabled but missing required config values: {}".format( - ", ".join(missing) - ) - ) - - -def time_msec(): - """Get the current timestamp in milliseconds - """ - return int(time.time() * 1000) diff --git a/testserver/docker_matrix/templates/synapse-data/homeserver.yaml b/testserver/docker_matrix/templates/synapse-data/homeserver.yaml index 7415de8c4f12868621649784372a85f7077d222a..dfe3b835e821eacf72696adbc52d06cb4d116a70 100644 --- a/testserver/docker_matrix/templates/synapse-data/homeserver.yaml +++ b/testserver/docker_matrix/templates/synapse-data/homeserver.yaml @@ -65,21 +65,21 @@ thumbnail_sizes: url_preview_enabled: true url_preview_ip_range_blacklist: - - '127.0.0.0/8' - - '10.0.0.0/8' - - '172.16.0.0/12' - - '192.168.0.0/16' - - '100.64.0.0/10' - - '192.0.0.0/24' - - '169.254.0.0/16' - - '198.18.0.0/15' - - '192.0.2.0/24' - - '198.51.100.0/24' - - '203.0.113.0/24' - - '224.0.0.0/4' - - '::1/128' - - 'fe80::/10' - - 'fc00::/7' + - '127.0.0.0/8' + - '10.0.0.0/8' + - '172.16.0.0/12' + - '192.168.0.0/16' + - '100.64.0.0/10' + - '192.0.0.0/24' + - '169.254.0.0/16' + - '198.18.0.0/15' + - '192.0.2.0/24' + - '198.51.100.0/24' + - '203.0.113.0/24' + - '224.0.0.0/4' + - '::1/128' + - 'fe80::/10' + - 'fc00::/7' max_spider_size: 10M @@ -104,6 +104,7 @@ oidc_providers: user_mapping_provider: config: subject_claim: "preferred_username" + subject_template: "{% raw %}{{ user.preferred_username }}{% endraw %}" localpart_template: "{% raw %}{{ user.preferred_username }}{% endraw %}" display_name_template: "{% raw %}{{ user.name }}{% endraw %}" email_template: "{% raw %}{{ user.email }}{% endraw %}"