Serge Bazanski | 60076c7 | 2020-11-03 19:17:25 +0100 | [diff] [blame] | 1 | # Matrix server (synapse). |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 2 | # This needs a secret provisioned, create with: |
Serge Bazanski | 60076c7 | 2020-11-03 19:17:25 +0100 | [diff] [blame] | 3 | # ns=matrix |
| 4 | # kubectl -n $ns create secret generic synapse --from-literal=postgres_password=$(pwgen 24 1) --from-literal=macaroon_secret_key=$(pwgen 32 1) --from-literal=registration_shared_secret=$(pwgen 32 1) |
| 5 | # kubectl -n $ns create secret generic oauth2-cas-proxy --from-literal=oauth2_secret=... |
Serge Bazanski | de62751 | 2020-08-24 21:17:55 +0000 | [diff] [blame] | 6 | # |
| 7 | # Sequencing appservices is fun. The appservice needs to run first (for |
| 8 | # instance, via a bootstrap job), and on startup it will spit out a |
| 9 | # registration file. This registration file then needs to be fed to synapse - |
| 10 | # this is done via specialy named secrets (appservice-X-registration, for X key |
| 11 | # in the appservices object). |
| 12 | # |
| 13 | # For appservice-irc instances, you can use this oneliner magic to get the |
| 14 | # registration YAML from logs. |
Piotr Dobrowolski | 3ea979d | 2019-05-23 16:11:52 +0200 | [diff] [blame] | 15 | # kubectl -n matrix create secret generic appservice-irc-freenode-registration --from-file=registration.yaml=<(kubectl logs -n matrix $(kubectl get pods -n matrix --selector=job-name=appservice-irc-freenode-bootstrap --output=jsonpath='{.items[*].metadata.name}') | tail -n +4 | sed -r 's/(.*aliases:.*)/ group_id: "+freenode:hackerspace.pl"\n\1/') |
Serge Bazanski | de62751 | 2020-08-24 21:17:55 +0000 | [diff] [blame] | 16 | # |
| 17 | # For appservice-telegram instances, you can use this oneliner magic: |
| 18 | # kubectl -n matrix create secret generic appservice-telegram-prod-registration --from-file=registration.yaml=<(kubectl -n matrix logs job/appservice-telegram-prod-bootstrap | grep -A 100 SNIPSNIP | grep -v SNIPSNIP) |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 19 | |
Serge Bazanski | 60076c7 | 2020-11-03 19:17:25 +0100 | [diff] [blame] | 20 | local kube = import "../../../kube/kube.libsonnet"; |
| 21 | local postgres = import "../../../kube/postgres.libsonnet"; |
Serge Bazanski | cdba291 | 2020-08-24 19:11:10 +0000 | [diff] [blame] | 22 | |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 23 | { |
| 24 | local app = self, |
| 25 | local cfg = app.cfg, |
| 26 | cfg:: { |
Serge Bazanski | 60076c7 | 2020-11-03 19:17:25 +0100 | [diff] [blame] | 27 | namespace: error "cfg.namespace must be set", |
| 28 | # webDomain is the domain name at which element will run |
| 29 | webDomain: error "cfg.webDomain must be set", |
| 30 | # serverName is the server part of the MXID this homeserver will cover |
| 31 | serverName: error "cfg.serverName must be set", |
Serge Bazanski | de62751 | 2020-08-24 21:17:55 +0000 | [diff] [blame] | 32 | storageClassName: "waw-hdd-redundant-3", |
Piotr Dobrowolski | fef4c12 | 2019-05-16 21:05:02 +0200 | [diff] [blame] | 33 | |
Serge Bazanski | ace32c0 | 2020-11-03 22:04:06 +0100 | [diff] [blame^] | 34 | images: { |
| 35 | synapse: "matrixdotorg/synapse:v1.19.2", |
| 36 | riot: "vectorim/riot-web:v1.7.7", |
| 37 | casProxy: "registry.k0.hswaw.net/q3k/oauth2-cas-proxy:0.1.4", |
| 38 | appserviceIRC: "matrixdotorg/matrix-appservice-irc:release-0.17.1", |
| 39 | # That's v0.8.2 - we just don't trust that host to not re-tag images. |
| 40 | appserviceTelegram: "dock.mau.dev/tulir/mautrix-telegram@sha256:9e68eaa80c9e4a75d9a09ec92dc4898b12d48390e01efa4de40ce882a6f7e330", |
| 41 | }, |
| 42 | |
| 43 | cas: { |
| 44 | # whether to enable the CAS proxy (ie. connect to hswaw sso via OAuth) |
| 45 | enable: false, |
| 46 | }, |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 47 | }, |
| 48 | |
| 49 | metadata(component):: { |
Piotr Dobrowolski | 4b4231d | 2019-05-15 11:41:21 +0200 | [diff] [blame] | 50 | namespace: cfg.namespace, |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 51 | labels: { |
| 52 | "app.kubernetes.io/name": "matrix", |
| 53 | "app.kubernetes.io/managed-by": "kubecfg", |
| 54 | "app.kubernetes.io/component": component, |
| 55 | }, |
| 56 | }, |
| 57 | |
Piotr Dobrowolski | 4b4231d | 2019-05-15 11:41:21 +0200 | [diff] [blame] | 58 | namespace: kube.Namespace(cfg.namespace), |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 59 | |
Serge Bazanski | c0c037a | 2020-08-23 01:24:03 +0000 | [diff] [blame] | 60 | postgres3: postgres { |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 61 | cfg+: { |
| 62 | namespace: cfg.namespace, |
| 63 | appName: "synapse", |
| 64 | database: "synapse", |
| 65 | username: "synapse", |
Serge Bazanski | c0c037a | 2020-08-23 01:24:03 +0000 | [diff] [blame] | 66 | prefix: "waw3-", |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 67 | password: { secretKeyRef: { name: "synapse", key: "postgres_password" } }, |
Serge Bazanski | de62751 | 2020-08-24 21:17:55 +0000 | [diff] [blame] | 68 | storageClassName: cfg.storageClassName, |
Serge Bazanski | c0c037a | 2020-08-23 01:24:03 +0000 | [diff] [blame] | 69 | storageSize: "100Gi", |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 70 | }, |
| 71 | }, |
| 72 | |
Serge Bazanski | c0c037a | 2020-08-23 01:24:03 +0000 | [diff] [blame] | 73 | dataVolume: kube.PersistentVolumeClaim("synapse-data-waw3") { |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 74 | metadata+: app.metadata("synapse-data"), |
| 75 | spec+: { |
Serge Bazanski | de62751 | 2020-08-24 21:17:55 +0000 | [diff] [blame] | 76 | storageClassName: cfg.storageClassName, |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 77 | accessModes: [ "ReadWriteOnce" ], |
| 78 | resources: { |
| 79 | requests: { |
| 80 | storage: "50Gi", |
| 81 | }, |
| 82 | }, |
| 83 | }, |
| 84 | }, |
Piotr Dobrowolski | ffbb47c | 2019-05-16 12:18:39 +0200 | [diff] [blame] | 85 | |
Serge Bazanski | ace32c0 | 2020-11-03 22:04:06 +0100 | [diff] [blame^] | 86 | // homeserver.yaml that will be used to run synapse (in synapseConfig ConfigMap). |
| 87 | // This is based off of //app/matrix/lib/synapse/homeserver.yaml with some fields overriden per |
| 88 | // deployment. |
| 89 | // Note this is a templated yaml - {{}}/{%%} style. This templatization is consumed by the Docker |
| 90 | // container startup magic. |
| 91 | homeserverYaml:: (std.native("parseYaml"))(importstr "synapse/homeserver.yaml")[0] { |
| 92 | server_name: cfg.serverName, |
| 93 | public_baseurl: "https://%s" % [cfg.webDomain], |
| 94 | signing_key_path: "/data/%s.signing.key" % [cfg.serverName], |
| 95 | cas_config+: if cfg.cas.enable then { |
| 96 | enabled: true, |
| 97 | server_url: "https://%s/_cas" % [cfg.webDomain], |
| 98 | service_url: "https://%s" % [cfg.webDomain], |
| 99 | } else {}, |
| 100 | app_service_config_files: [ |
| 101 | "/data/appservices/%s.yaml" % [k] |
| 102 | for k in std.objectFields(app.appservices) |
| 103 | ], |
| 104 | }, |
| 105 | |
Piotr Dobrowolski | c39fb04 | 2019-05-17 09:13:56 +0200 | [diff] [blame] | 106 | synapseConfig: kube.ConfigMap("synapse") { |
| 107 | metadata+: app.metadata("synapse"), |
| 108 | data: { |
Serge Bazanski | ace32c0 | 2020-11-03 22:04:06 +0100 | [diff] [blame^] | 109 | "homeserver.yaml": std.manifestYamlDoc(app.homeserverYaml), |
Serge Bazanski | 60076c7 | 2020-11-03 19:17:25 +0100 | [diff] [blame] | 110 | "log.config": importstr "synapse/log.config", |
Piotr Dobrowolski | c39fb04 | 2019-05-17 09:13:56 +0200 | [diff] [blame] | 111 | }, |
| 112 | }, |
| 113 | |
Serge Bazanski | ace32c0 | 2020-11-03 22:04:06 +0100 | [diff] [blame^] | 114 | casDeployment: if cfg.cas.enable then kube.Deployment("oauth2-cas-proxy") { |
Piotr Dobrowolski | c39fb04 | 2019-05-17 09:13:56 +0200 | [diff] [blame] | 115 | metadata+: app.metadata("oauth2-cas-proxy"), |
| 116 | spec+: { |
| 117 | replicas: 1, |
| 118 | template+: { |
| 119 | spec+: { |
| 120 | containers_: { |
| 121 | proxy: kube.Container("oauth2-cas-proxy") { |
Serge Bazanski | ace32c0 | 2020-11-03 22:04:06 +0100 | [diff] [blame^] | 122 | image: cfg.images.casProxy, |
Piotr Dobrowolski | c39fb04 | 2019-05-17 09:13:56 +0200 | [diff] [blame] | 123 | ports_: { |
| 124 | http: { containerPort: 5000 }, |
| 125 | }, |
| 126 | env_: { |
Serge Bazanski | 60076c7 | 2020-11-03 19:17:25 +0100 | [diff] [blame] | 127 | BASE_URL: "https://%s" % [cfg.webDomain], |
| 128 | SERVICE_URL: "https://%s" % [cfg.webDomain], |
Piotr Dobrowolski | c39fb04 | 2019-05-17 09:13:56 +0200 | [diff] [blame] | 129 | OAUTH2_CLIENT: "matrix", |
| 130 | OAUTH2_SECRET: { secretKeyRef: { name: "oauth2-cas-proxy", key: "oauth2_secret" } }, |
| 131 | }, |
| 132 | }, |
| 133 | }, |
| 134 | }, |
| 135 | }, |
| 136 | }, |
| 137 | }, |
| 138 | |
Serge Bazanski | ace32c0 | 2020-11-03 22:04:06 +0100 | [diff] [blame^] | 139 | casSvc: if cfg.cas.enable then kube.Service("oauth2-cas-proxy") { |
Piotr Dobrowolski | c39fb04 | 2019-05-17 09:13:56 +0200 | [diff] [blame] | 140 | metadata+: app.metadata("oauth2-cas-proxy"), |
| 141 | target_pod:: app.casDeployment.spec.template, |
| 142 | }, |
| 143 | |
Piotr Dobrowolski | fef4c12 | 2019-05-16 21:05:02 +0200 | [diff] [blame] | 144 | synapseDeployment: kube.Deployment("synapse") { |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 145 | metadata+: app.metadata("synapse"), |
| 146 | spec+: { |
| 147 | replicas: 1, |
| 148 | template+: { |
| 149 | spec+: { |
| 150 | volumes_: { |
| 151 | data: kube.PersistentVolumeClaimVolume(app.dataVolume), |
Piotr Dobrowolski | 8ebfc1d | 2020-03-03 21:01:18 +0100 | [diff] [blame] | 152 | config_template: kube.ConfigMapVolume(app.synapseConfig), |
Piotr Dobrowolski | fef4c12 | 2019-05-16 21:05:02 +0200 | [diff] [blame] | 153 | } + { |
| 154 | [k]: { secret: { secretName: "appservice-%s-registration" % [k] } } |
| 155 | for k in std.objectFields(app.appservices) |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 156 | }, |
| 157 | containers_: { |
| 158 | web: kube.Container("synapse") { |
Serge Bazanski | ace32c0 | 2020-11-03 22:04:06 +0100 | [diff] [blame^] | 159 | image: cfg.images.synapse, |
Piotr Dobrowolski | 8ebfc1d | 2020-03-03 21:01:18 +0100 | [diff] [blame] | 160 | command: ["/bin/sh", "-c", "/start.py migrate_config && exec /start.py"], |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 161 | ports_: { |
| 162 | http: { containerPort: 8008 }, |
Serge Bazanski | 1230ac3 | 2020-09-12 22:09:46 +0000 | [diff] [blame] | 163 | metrics: { containerPort: 9092 }, |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 164 | }, |
| 165 | env_: { |
Piotr Dobrowolski | 8ebfc1d | 2020-03-03 21:01:18 +0100 | [diff] [blame] | 166 | SYNAPSE_CONFIG_DIR: "/config", |
Piotr Dobrowolski | eabbe8a | 2019-08-11 19:49:08 +0200 | [diff] [blame] | 167 | SYNAPSE_CONFIG_PATH: "/config/homeserver.yaml", |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 168 | |
Piotr Dobrowolski | 8ebfc1d | 2020-03-03 21:01:18 +0100 | [diff] [blame] | 169 | # These values are not used in a template, but |
| 170 | # are required by /start.py migrate_config |
Serge Bazanski | 60076c7 | 2020-11-03 19:17:25 +0100 | [diff] [blame] | 171 | SYNAPSE_SERVER_NAME: cfg.serverName, |
Piotr Dobrowolski | 8ebfc1d | 2020-03-03 21:01:18 +0100 | [diff] [blame] | 172 | SYNAPSE_REPORT_STATS: "no", |
| 173 | |
| 174 | SYNAPSE_MACAROON_SECRET_KEY: { secretKeyRef: { name: "synapse", key: "macaroon_secret_key" } }, |
| 175 | SYNAPSE_REGISTRATION_SHARED_SECRET: { secretKeyRef: { name: "synapse", key: "registration_shared_secret" } }, |
| 176 | POSTGRES_PASSWORD: { secretKeyRef: { name: "synapse", key: "postgres_password" } }, |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 177 | }, |
| 178 | volumeMounts_: { |
| 179 | data: { mountPath: "/data" }, |
Piotr Dobrowolski | 8ebfc1d | 2020-03-03 21:01:18 +0100 | [diff] [blame] | 180 | config_template: { |
| 181 | mountPath: "/conf/homeserver.yaml", |
| 182 | subPath: "homeserver.yaml", |
Piotr Dobrowolski | c39fb04 | 2019-05-17 09:13:56 +0200 | [diff] [blame] | 183 | }, |
Piotr Dobrowolski | fef4c12 | 2019-05-16 21:05:02 +0200 | [diff] [blame] | 184 | } + { |
| 185 | [k]: { mountPath: "/appservices/%s" % [k] } |
| 186 | for k in std.objectFields(app.appservices) |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 187 | }, |
| 188 | }, |
| 189 | }, |
| 190 | }, |
| 191 | }, |
| 192 | }, |
| 193 | }, |
| 194 | |
Piotr Dobrowolski | fef4c12 | 2019-05-16 21:05:02 +0200 | [diff] [blame] | 195 | synapseSvc: kube.Service("synapse") { |
Piotr Dobrowolski | ffbb47c | 2019-05-16 12:18:39 +0200 | [diff] [blame] | 196 | metadata+: app.metadata("synapse"), |
Piotr Dobrowolski | fef4c12 | 2019-05-16 21:05:02 +0200 | [diff] [blame] | 197 | target_pod:: app.synapseDeployment.spec.template, |
Piotr Dobrowolski | ffbb47c | 2019-05-16 12:18:39 +0200 | [diff] [blame] | 198 | }, |
| 199 | |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 200 | riotConfig: kube.ConfigMap("riot-web-config") { |
| 201 | metadata+: app.metadata("riot-web-config"), |
| 202 | data: { |
| 203 | "config.json": std.manifestJsonEx({ |
Serge Bazanski | 60076c7 | 2020-11-03 19:17:25 +0100 | [diff] [blame] | 204 | "default_hs_url": "https://%s" % [cfg.webDomain], |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 205 | "disable_custom_urls": false, |
| 206 | "disable_guests": false, |
| 207 | "disable_login_language_selector": false, |
Piotr Dobrowolski | 4b4231d | 2019-05-15 11:41:21 +0200 | [diff] [blame] | 208 | "disable_3pid_login": true, |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 209 | "brand": "Riot", |
| 210 | "integrations_ui_url": "https://scalar.vector.im/", |
| 211 | "integrations_rest_url": "https://scalar.vector.im/api", |
| 212 | "integrations_jitsi_widget_url": "https://scalar.vector.im/api/widgets/jitsi.html", |
Piotr Dobrowolski | 4b4231d | 2019-05-15 11:41:21 +0200 | [diff] [blame] | 213 | |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 214 | "bug_report_endpoint_url": "https://riot.im/bugreports/submit", |
| 215 | "features": { |
| 216 | "feature_groups": "labs", |
| 217 | "feature_pinning": "labs", |
| 218 | "feature_reactions": "labs" |
| 219 | }, |
| 220 | "default_federate": true, |
| 221 | "default_theme": "light", |
| 222 | "roomDirectory": { |
| 223 | "servers": [ |
Serge Bazanski | 60076c7 | 2020-11-03 19:17:25 +0100 | [diff] [blame] | 224 | cfg.serverName, |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 225 | ] |
| 226 | }, |
| 227 | "welcomeUserId": "@riot-bot:matrix.org", |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 228 | "enable_presence_by_hs_url": { |
| 229 | "https://matrix.org": false |
| 230 | } |
| 231 | }, ""), |
| 232 | }, |
| 233 | }, |
| 234 | |
| 235 | riotDeployment: kube.Deployment("riot-web") { |
| 236 | metadata+: app.metadata("riot-web"), |
| 237 | spec+: { |
| 238 | replicas: 1, |
| 239 | template+: { |
| 240 | spec+: { |
| 241 | volumes_: { |
| 242 | config: kube.ConfigMapVolume(app.riotConfig), |
| 243 | }, |
| 244 | containers_: { |
Piotr Dobrowolski | fef4c12 | 2019-05-16 21:05:02 +0200 | [diff] [blame] | 245 | web: kube.Container("riot-web") { |
Serge Bazanski | ace32c0 | 2020-11-03 22:04:06 +0100 | [diff] [blame^] | 246 | image: cfg.images.riot, |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 247 | ports_: { |
| 248 | http: { containerPort: 80 }, |
| 249 | }, |
| 250 | volumeMounts_: { |
| 251 | config: { |
Piotr Dobrowolski | aca7e28 | 2020-03-21 22:14:38 +0100 | [diff] [blame] | 252 | mountPath: "/app/config.json", |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 253 | subPath: "config.json", |
| 254 | }, |
| 255 | }, |
| 256 | }, |
| 257 | }, |
| 258 | }, |
| 259 | }, |
| 260 | }, |
| 261 | }, |
| 262 | |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 263 | riotSvc: kube.Service("riot-web") { |
| 264 | metadata+: app.metadata("riot-web"), |
| 265 | target_pod:: app.riotDeployment.spec.template, |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 266 | }, |
| 267 | |
Serge Bazanski | de62751 | 2020-08-24 21:17:55 +0000 | [diff] [blame] | 268 | // Any appservice you add here will require an appservice-X-registration |
| 269 | // secret containing a registration.yaml file. Adding something to this |
| 270 | // dictionary will cause Synapse to not start until that secret is |
| 271 | // available - so change things carefully! |
| 272 | // If bootstrapping a new appservice, just keep it out of this dictionary |
| 273 | // until it spits you a registration YAML and you feed that to a secret. |
Serge Bazanski | 60076c7 | 2020-11-03 19:17:25 +0100 | [diff] [blame] | 274 | appservices: {}, |
Piotr Dobrowolski | fef4c12 | 2019-05-16 21:05:02 +0200 | [diff] [blame] | 275 | |
| 276 | ingress: kube.Ingress("matrix") { |
| 277 | metadata+: app.metadata("matrix") { |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 278 | annotations+: { |
| 279 | "kubernetes.io/tls-acme": "true", |
| 280 | "certmanager.k8s.io/cluster-issuer": "letsencrypt-prod", |
| 281 | "nginx.ingress.kubernetes.io/proxy-body-size": "0", |
| 282 | }, |
| 283 | }, |
| 284 | spec+: { |
| 285 | tls: [ |
| 286 | { |
Serge Bazanski | 60076c7 | 2020-11-03 19:17:25 +0100 | [diff] [blame] | 287 | hosts: [cfg.webDomain], |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 288 | secretName: "synapse-tls", |
| 289 | }, |
| 290 | ], |
| 291 | rules: [ |
| 292 | { |
Serge Bazanski | 60076c7 | 2020-11-03 19:17:25 +0100 | [diff] [blame] | 293 | host: cfg.webDomain, |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 294 | http: { |
| 295 | paths: [ |
| 296 | { path: "/", backend: app.riotSvc.name_port }, |
Piotr Dobrowolski | fef4c12 | 2019-05-16 21:05:02 +0200 | [diff] [blame] | 297 | { path: "/_matrix", backend: app.synapseSvc.name_port }, |
Serge Bazanski | ace32c0 | 2020-11-03 22:04:06 +0100 | [diff] [blame^] | 298 | ] + (if cfg.cas.enable then [ |
Piotr Dobrowolski | c39fb04 | 2019-05-17 09:13:56 +0200 | [diff] [blame] | 299 | { path: "/_cas", backend: app.casSvc.name_port }, |
Serge Bazanski | ace32c0 | 2020-11-03 22:04:06 +0100 | [diff] [blame^] | 300 | ] else []) |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 301 | }, |
| 302 | } |
| 303 | ], |
| 304 | }, |
| 305 | }, |
Piotr Dobrowolski | fef4c12 | 2019-05-16 21:05:02 +0200 | [diff] [blame] | 306 | |
Piotr Dobrowolski | a222691 | 2019-05-14 18:49:29 +0200 | [diff] [blame] | 307 | } |