blob: 8d341c43b2fc67f96e28cfb0b70aa0df3cefcb09 [file] [log] [blame]
Piotr Dobrowolskibabcb802021-01-31 18:57:21 +01001local matrix = import "lib/matrix-ng.libsonnet";
Serge Bazanski60076c72020-11-03 19:17:25 +01002local irc = import "lib/appservice-irc.libsonnet";
3local telegram = import "lib/appservice-telegram.libsonnet";
4
5matrix {
6 local app = self,
7 local cfg = app.cfg,
8 cfg+:: {
9 namespace: "matrix",
10 webDomain: "matrix.hackerspace.pl",
11 serverName: "hackerspace.pl",
Piotr Dobrowolskibabcb802021-01-31 18:57:21 +010012 oidc+: {
Serge Bazanskiace32c02020-11-03 22:04:06 +010013 enable: true,
Piotr Dobrowolskibabcb802021-01-31 18:57:21 +010014 config+: {
15 allow_existing_users: true,
16 issuer: "https://sso.hackerspace.pl",
17 client_id: "matrix",
18 client_secret: { secretKeyRef: { name: "oauth2-cas-proxy", key: "oauth2_secret" } },
19 user_profile_method: "userinfo_endpoint",
20 client_auth_method: "client_secret_post",
Serge Bazanski8483d372020-11-10 22:07:30 +010021 },
Serge Bazanskiace32c02020-11-03 22:04:06 +010022 },
Piotr Dobrowolski8b9c8f92021-09-15 21:27:42 +020023 mediaRepo+: {
24 enable: true,
Piotr Dobrowolski21c8cd62021-09-16 13:07:54 +020025 route: true,
Piotr Dobrowolski8b9c8f92021-09-15 21:27:42 +020026 s3+: {
27 endpoint: std.strReplace((import "secrets/plain/media-repo-matrix-ceph.json").Endpoint, "http://", ""),
28 accessKey: (import "secrets/plain/media-repo-matrix-ceph.json").AccessKey,
29 secretKey: (import "secrets/plain/media-repo-matrix-ceph.json").SecretKey,
30 bucketName: "media-repo-matrix",
31 region: "eu",
32 },
33 db+: {
34 password: std.strReplace(importstr "secrets/plain/media-repo-matrix-postgres", "\n", ""),
35 },
36 },
Serge Bazanski60076c72020-11-03 19:17:25 +010037 },
38
Piotr Dobrowolski95da3d52021-02-06 11:55:34 +010039 riot+: {
40 config+: {
41 showLabsSettings: true,
42 },
43 },
44
Piotr Dobrowolski2e191ea2021-09-14 19:59:37 +020045 synapse+: {
Piotr Dobrowolski77af94d2021-09-16 22:17:58 +020046 genericWorker+: {
47 deployment+: {
48 spec+: {
49 replicas: 4,
50 },
51 },
52 },
53
54 // Synapse media worker has been replaced by matrix-media-repo deployment
Piotr Dobrowolski2e191ea2021-09-14 19:59:37 +020055 mediaWorker+: {
56 deployment+: {
57 spec+: {
Piotr Dobrowolski21c8cd62021-09-16 13:07:54 +020058 replicas: 0,
Piotr Dobrowolski2e191ea2021-09-14 19:59:37 +020059 },
60 },
61 },
62 },
63
Serge Bazanskied421912021-06-30 12:16:01 +000064 // Bump up storage to 200Gi from default 100Gi, use different name. The
65 // new name corresponds to a manually migrated and sized-up PVC that
66 // contains data from the original waw3-postgres PVC.
67 postgres3+: {
68 volumeClaim+: {
69 metadata+: {
70 name: "waw3-postgres-2",
71 },
72 spec+: {
73 resources+: {
74 requests+: {
75 storage: "200Gi",
76 },
77 },
78 },
79 },
80 },
81
Serge Bazanski60076c72020-11-03 19:17:25 +010082 appservices: {
83 "irc-freenode": irc.AppServiceIrc("freenode") {
84 cfg+: {
Serge Bazanskiace32c02020-11-03 22:04:06 +010085 image: cfg.images.appserviceIRC,
Serge Bazanski61f978a2021-01-22 16:26:07 +010086 storageClassName: "waw-hdd-redundant-3",
Serge Bazanski60076c72020-11-03 19:17:25 +010087 metadata: app.metadata("appservice-irc-freenode"),
88 // TODO(q3k): add labels to blessed nodes
89 nodeSelector: {
Piotr Dobrowolski356dd6d2021-01-31 18:09:49 +010090 "kubernetes.io/hostname": "bc01n02.hswaw.net",
Serge Bazanski60076c72020-11-03 19:17:25 +010091 },
Serge Bazanskie7f14472021-05-19 16:07:30 +000092 bootstrapJob: false,
Serge Bazanski60076c72020-11-03 19:17:25 +010093 config+: {
94 homeserver+: {
95 url: "https://%s" % [cfg.webDomain],
96 domain: "%s" % [cfg.serverName],
97 },
98 ircService+: {
Serge Bazanski6be8b2e2021-05-19 16:32:20 +000099 permissions: {
100 "@q3k:hackerspace.pl": "admin",
101 "@informatic:hackerspace.pl": "admin",
102 },
Serge Bazanskib387f572021-05-24 13:53:18 +0200103 ident: {
104 enabled: true,
105 port: 1113,
106 },
Serge Bazanski60076c72020-11-03 19:17:25 +0100107 servers+: {
Serge Bazanski77112242021-05-26 19:42:47 +0000108 local servers = self,
Serge Bazanski60076c72020-11-03 19:17:25 +0100109 "irc.freenode.net"+: {
Serge Bazanski1431d1d2021-06-06 12:50:37 +0000110 mappings+: {},
Serge Bazanski60076c72020-11-03 19:17:25 +0100111 ircClients+: {
112 maxClients: 150,
113 },
114 },
Serge Bazanski77112242021-05-26 19:42:47 +0000115 "irc.libera.chat": servers["irc.freenode.net"] {
Serge Bazanski1431d1d2021-06-06 12:50:37 +0000116 mappings+: import "secrets/plain/appservice-irc-libera-mappings.jsonnet",
Serge Bazanski77112242021-05-26 19:42:47 +0000117 ircClients+: {
Serge Bazanski1431d1d2021-06-06 12:50:37 +0000118 maxClients: 150,
Serge Bazanski77112242021-05-26 19:42:47 +0000119 },
120 name: "Libera Chat",
121 networkId: "libera",
122 dynamicChannels+: {
123 groupId: "+libera:hackerspace.pl",
124 aliasTemplate: "#libera_$CHANNEL",
125 },
126 matrixClients+: {
127 userTemplate:"@libera_$NICK",
128 },
129 },
Serge Bazanski60076c72020-11-03 19:17:25 +0100130 },
131 },
132 },
Piotr Dobrowolski37fbff72021-02-13 20:17:33 +0100133 passwordEncryptionKeySecret: "appservice-irc-password-encryption-key",
Serge Bazanski60076c72020-11-03 19:17:25 +0100134 },
135 },
136 "telegram-prod": telegram.AppServiceTelegram("prod") {
137 cfg+: {
Serge Bazanskiace32c02020-11-03 22:04:06 +0100138 image: cfg.images.appserviceTelegram,
Serge Bazanski60076c72020-11-03 19:17:25 +0100139 storageClassName: cfg.storageClassName,
140 metadata: app.metadata("appservice-telegram-prod"),
Serge Bazanskie7f14472021-05-19 16:07:30 +0000141 bootstrapJob: false,
Serge Bazanski60076c72020-11-03 19:17:25 +0100142
143 config+: {
144 homeserver+: {
145 address: "https://%s" % [cfg.webDomain],
146 domain: cfg.serverName,
147 },
148 appservice+: {
149 id: "telegram",
150 },
151 telegram+: {
152 api_id: (std.split(importstr "secrets/plain/appservice-telegram-prod-api-id", "\n"))[0],
153 api_hash: (std.split(importstr "secrets/plain/appservice-telegram-prod-api-hash", "\n"))[0],
154 bot_token: (std.split(importstr "secrets/plain/appservice-telegram-prod-token", "\n"))[0],
155 },
156 bridge+: {
157 permissions+: {
158 "hackerspace.pl": "puppeting",
159 "@q3k:hackerspace.pl": "admin",
160 },
161 },
162 },
163 },
164 },
165 },
166}