From 73db1dd0772a4cd8fceedee001e72f78a9e1e3c0 Mon Sep 17 00:00:00 2001 From: julian Date: Sun, 27 Aug 2023 20:02:53 +0200 Subject: [PATCH] Introduce onlyoffice --- .../chaosknoten/host_vars/onlyoffice.yaml | 12 ++++++ inventories/chaosknoten/hosts.yaml | 7 ++++ .../nginx/onlyoffice.hamburg.ccc.de.conf | 37 +++++++++++++++++++ .../nginx/acme_challenge.conf | 1 + .../public-reverse-proxy/nginx/nginx.conf | 1 + .../configs/onlyoffice/compose.yaml.j2 | 17 +++++++++ 6 files changed, 75 insertions(+) create mode 100644 inventories/chaosknoten/host_vars/onlyoffice.yaml create mode 100644 playbooks/files/chaosknoten/configs/onlyoffice/nginx/onlyoffice.hamburg.ccc.de.conf create mode 100644 playbooks/templates/chaosknoten/configs/onlyoffice/compose.yaml.j2 diff --git a/inventories/chaosknoten/host_vars/onlyoffice.yaml b/inventories/chaosknoten/host_vars/onlyoffice.yaml new file mode 100644 index 0000000..6b9858e --- /dev/null +++ b/inventories/chaosknoten/host_vars/onlyoffice.yaml @@ -0,0 +1,12 @@ +nginx__version_spec: "" +nginx__configurations: + - name: onlyoffice.hamburg.ccc.de + content: "{{ lookup('ansible.builtin.file', 'chaosknoten/configs/onlyoffice/nginx/onlyoffice.hamburg.ccc.de.conf') }}" + +certbot__version_spec: "" +certbot__acme_account_email_address: j+letsencrypt-ccchh@jsts.xyz +certbot__certificate_domains: + - "onlyoffice.hamburg.ccc.de" + +docker_compose__compose_file_content: "{{ lookup('ansible.builtin.template', 'chaosknoten/configs/onlyoffice/compose.yaml.j2') }}" +docker_compose__configuration_files: [ ] diff --git a/inventories/chaosknoten/hosts.yaml b/inventories/chaosknoten/hosts.yaml index bab9b69..7bffbcc 100644 --- a/inventories/chaosknoten/hosts.yaml +++ b/inventories/chaosknoten/hosts.yaml @@ -6,6 +6,7 @@ all: keycloak: engelsystem: wiki: + onlyoffice: debian_12: hosts: cloud: @@ -33,11 +34,16 @@ all: ansible_host: wiki-intern.hamburg.ccc.de ansible_user: chaos ansible_ssh_common_args: -J ssh://public-reverse-proxy.hamburg.ccc.de:42666 + onlyoffice: + ansible_host: onlyoffice-intern.hamburg.ccc.de + ansible_user: chaos + ansible_ssh_common_args: -J ssh://public-reverse-proxy.hamburg.ccc.de:42666 docker_compose_hosts: hosts: pad: keycloak: engelsystem: + onlyoffice: nextcloud_hosts: hosts: cloud: @@ -48,6 +54,7 @@ all: keycloak: engelsystem: wiki: + onlyoffice: public_reverse_proxy_hosts: hosts: public-reverse-proxy: diff --git a/playbooks/files/chaosknoten/configs/onlyoffice/nginx/onlyoffice.hamburg.ccc.de.conf b/playbooks/files/chaosknoten/configs/onlyoffice/nginx/onlyoffice.hamburg.ccc.de.conf new file mode 100644 index 0000000..2471525 --- /dev/null +++ b/playbooks/files/chaosknoten/configs/onlyoffice/nginx/onlyoffice.hamburg.ccc.de.conf @@ -0,0 +1,37 @@ +# partly generated 2022-01-08, Mozilla Guideline v5.6, nginx 1.17.7, OpenSSL 1.1.1k, intermediate configuration +# https://ssl-config.mozilla.org/#server=nginx&version=1.17.7&config=intermediate&openssl=1.1.1k&guideline=5.6 +server { + # Listen on a custom port for the proxy protocol. + listen 8443 ssl http2 proxy_protocol; + # Make use of the ngx_http_realip_module to set the $remote_addr and + # $remote_port to the client address and client port, when using proxy + # protocol. + # First set our proxy protocol proxy as trusted. + set_real_ip_from 172.31.17.140; + # Then tell the realip_module to get the addreses from the proxy protocol + # header. + real_ip_header proxy_protocol; + + server_name onlyoffice.hamburg.ccc.de; + + ssl_certificate /etc/letsencrypt/live/onlyoffice.hamburg.ccc.de/fullchain.pem; + ssl_certificate_key /etc/letsencrypt/live/onlyoffice.hamburg.ccc.de/privkey.pem; + # verify chain of trust of OCSP response using Root CA and Intermediate certs + ssl_trusted_certificate /etc/letsencrypt/live/onlyoffice.hamburg.ccc.de/chain.pem; + + # replace with the IP address of your resolver + resolver 1.1.1.1; + + location / { + proxy_set_header Host $host; + # This is https in any case. + proxy_set_header X-Forwarded-Proto https; + proxy_set_header X-Real-IP $remote_addr; + proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; + + # HSTS (ngx_http_headers_module is required) (63072000 seconds) + add_header Strict-Transport-Security "max-age=63072000" always; + + proxy_pass http://127.0.0.1:8080/; + } +} diff --git a/playbooks/files/chaosknoten/configs/public-reverse-proxy/nginx/acme_challenge.conf b/playbooks/files/chaosknoten/configs/public-reverse-proxy/nginx/acme_challenge.conf index f9be7cd..7296f24 100644 --- a/playbooks/files/chaosknoten/configs/public-reverse-proxy/nginx/acme_challenge.conf +++ b/playbooks/files/chaosknoten/configs/public-reverse-proxy/nginx/acme_challenge.conf @@ -5,6 +5,7 @@ map $host $upstream_acme_challenge_host { keycloak-admin.hamburg.ccc.de 172.31.17.144:31820; aes.ccchh.net 172.31.17.145:31820; wiki.ccchh.net 172.31.17.146:31820; + onlyoffice.hamburg.ccc.de 172.31.17.147:31820; default ""; } diff --git a/playbooks/files/chaosknoten/configs/public-reverse-proxy/nginx/nginx.conf b/playbooks/files/chaosknoten/configs/public-reverse-proxy/nginx/nginx.conf index 7c1117c..a35a8fa 100644 --- a/playbooks/files/chaosknoten/configs/public-reverse-proxy/nginx/nginx.conf +++ b/playbooks/files/chaosknoten/configs/public-reverse-proxy/nginx/nginx.conf @@ -24,6 +24,7 @@ stream { keycloak-admin.hamburg.ccc.de 172.31.17.144:8444; aes.ccchh.net 172.31.17.145:8443; wiki.ccchh.net 172.31.17.146:8443; + onlyoffice.hamburg.ccc.de 172.31.17.147:8443; } server { diff --git a/playbooks/templates/chaosknoten/configs/onlyoffice/compose.yaml.j2 b/playbooks/templates/chaosknoten/configs/onlyoffice/compose.yaml.j2 new file mode 100644 index 0000000..91c26a3 --- /dev/null +++ b/playbooks/templates/chaosknoten/configs/onlyoffice/compose.yaml.j2 @@ -0,0 +1,17 @@ +## Links & Resources +# +# https://helpcenter.onlyoffice.com/installation/docs-community-install-docker.aspx + +services: + onlyoffice: + image: onlyoffice/documentserver:latest + restart: unless-stopped + volumes: + - "./onlyoffice/DocumentServer/logs:/var/log/onlyoffice" + - "./onlyoffice/DocumentServer/data:/var/www/onlyoffice/Data" + - "./onlyoffice/DocumentServer/lib:/var/lib/onlyoffice" + - "./onlyoffice/DocumentServer/db:/var/lib/postgresql" + ports: + - "8080:80" + environment: + JWT_SECRET: {{ lookup("community.general.passwordstore", "noc/vm-secrets/chaosknoten/onlyoffice/JWT_SECRET", create=false, missing="error") }}