2018-02-03 12:18:36 -07:00
|
|
|
#!/usr/local/bin/python
|
|
|
|
|
|
|
|
import jinja2
|
|
|
|
import os
|
|
|
|
import sys
|
2018-02-04 03:14:06 -07:00
|
|
|
import subprocess
|
2018-02-05 15:13:27 -07:00
|
|
|
import glob
|
2018-09-19 05:48:41 -06:00
|
|
|
import codecs
|
2018-02-03 12:18:36 -07:00
|
|
|
|
2018-02-08 12:41:41 -07:00
|
|
|
# Utility functions
|
2019-06-20 03:32:02 -06:00
|
|
|
convert = lambda src, dst, environ: open(dst, "w").write(
|
|
|
|
jinja2.Template(open(src).read()).render(**environ)
|
|
|
|
)
|
|
|
|
|
2018-02-03 12:18:36 -07:00
|
|
|
|
2018-02-08 12:41:41 -07:00
|
|
|
def check_arguments(environ, args):
|
|
|
|
for argument in args:
|
|
|
|
if argument not in environ:
|
|
|
|
print("Environment variable %s is mandatory, exiting." % argument)
|
|
|
|
sys.exit(2)
|
2018-02-03 12:18:36 -07:00
|
|
|
|
2019-06-20 03:32:02 -06:00
|
|
|
|
2018-02-08 12:41:41 -07:00
|
|
|
def generate_secrets(environ, secrets):
|
2018-02-09 16:05:03 -07:00
|
|
|
for name, secret in secrets.items():
|
2018-02-08 12:41:41 -07:00
|
|
|
if secret not in environ:
|
2018-02-09 16:05:03 -07:00
|
|
|
filename = "/data/%s.%s.key" % (environ["SYNAPSE_SERVER_NAME"], name)
|
|
|
|
if os.path.exists(filename):
|
2019-06-20 03:32:02 -06:00
|
|
|
with open(filename) as handle:
|
|
|
|
value = handle.read()
|
2018-02-09 16:05:03 -07:00
|
|
|
else:
|
|
|
|
print("Generating a random secret for {}".format(name))
|
2018-09-19 05:48:41 -06:00
|
|
|
value = codecs.encode(os.urandom(32), "hex").decode()
|
2019-06-20 03:32:02 -06:00
|
|
|
with open(filename, "w") as handle:
|
|
|
|
handle.write(value)
|
2018-02-09 16:05:03 -07:00
|
|
|
environ[secret] = value
|
2018-02-04 03:40:20 -07:00
|
|
|
|
2019-06-20 03:32:02 -06:00
|
|
|
|
2018-02-08 12:41:41 -07:00
|
|
|
# Prepare the configuration
|
|
|
|
mode = sys.argv[1] if len(sys.argv) > 1 else None
|
|
|
|
environ = os.environ.copy()
|
|
|
|
ownership = "{}:{}".format(environ.get("UID", 991), environ.get("GID", 991))
|
|
|
|
args = ["python", "-m", "synapse.app.homeserver"]
|
2018-02-05 15:13:27 -07:00
|
|
|
|
2018-02-04 03:14:06 -07:00
|
|
|
# In generate mode, generate a configuration, missing keys, then exit
|
|
|
|
if mode == "generate":
|
2019-06-20 03:32:02 -06:00
|
|
|
check_arguments(
|
|
|
|
environ, ("SYNAPSE_SERVER_NAME", "SYNAPSE_REPORT_STATS", "SYNAPSE_CONFIG_PATH")
|
|
|
|
)
|
2018-02-08 12:41:41 -07:00
|
|
|
args += [
|
2019-06-20 03:32:02 -06:00
|
|
|
"--server-name",
|
|
|
|
environ["SYNAPSE_SERVER_NAME"],
|
|
|
|
"--report-stats",
|
|
|
|
environ["SYNAPSE_REPORT_STATS"],
|
|
|
|
"--config-path",
|
|
|
|
environ["SYNAPSE_CONFIG_PATH"],
|
|
|
|
"--generate-config",
|
2018-02-08 12:41:41 -07:00
|
|
|
]
|
|
|
|
os.execv("/usr/local/bin/python", args)
|
2018-02-05 14:57:35 -07:00
|
|
|
|
2018-02-04 03:14:06 -07:00
|
|
|
# In normal mode, generate missing keys if any, then run synapse
|
|
|
|
else:
|
2018-02-08 12:41:41 -07:00
|
|
|
if "SYNAPSE_CONFIG_PATH" in environ:
|
2019-02-05 06:42:21 -07:00
|
|
|
config_path = environ["SYNAPSE_CONFIG_PATH"]
|
2018-02-08 12:41:41 -07:00
|
|
|
else:
|
2018-02-09 16:05:03 -07:00
|
|
|
check_arguments(environ, ("SYNAPSE_SERVER_NAME", "SYNAPSE_REPORT_STATS"))
|
2019-06-20 03:32:02 -06:00
|
|
|
generate_secrets(
|
|
|
|
environ,
|
|
|
|
{
|
|
|
|
"registration": "SYNAPSE_REGISTRATION_SHARED_SECRET",
|
|
|
|
"macaroon": "SYNAPSE_MACAROON_SECRET_KEY",
|
|
|
|
},
|
|
|
|
)
|
2018-02-08 12:41:41 -07:00
|
|
|
environ["SYNAPSE_APPSERVICES"] = glob.glob("/data/appservices/*.yaml")
|
2019-06-20 03:32:02 -06:00
|
|
|
if not os.path.exists("/compiled"):
|
|
|
|
os.mkdir("/compiled")
|
2019-02-05 06:42:21 -07:00
|
|
|
|
|
|
|
config_path = "/compiled/homeserver.yaml"
|
2019-06-20 03:32:02 -06:00
|
|
|
|
2019-04-25 07:47:22 -06:00
|
|
|
# Convert SYNAPSE_NO_TLS to boolean if exists
|
|
|
|
if "SYNAPSE_NO_TLS" in environ:
|
|
|
|
tlsanswerstring = str.lower(environ["SYNAPSE_NO_TLS"])
|
|
|
|
if tlsanswerstring in ("true", "on", "1", "yes"):
|
|
|
|
environ["SYNAPSE_NO_TLS"] = True
|
|
|
|
else:
|
|
|
|
if tlsanswerstring in ("false", "off", "0", "no"):
|
|
|
|
environ["SYNAPSE_NO_TLS"] = False
|
|
|
|
else:
|
2019-06-20 03:32:02 -06:00
|
|
|
print(
|
|
|
|
'Environment variable "SYNAPSE_NO_TLS" found but value "'
|
|
|
|
+ tlsanswerstring
|
|
|
|
+ '" unrecognized; exiting.'
|
|
|
|
)
|
2019-04-25 07:47:22 -06:00
|
|
|
sys.exit(2)
|
2019-02-05 06:42:21 -07:00
|
|
|
|
|
|
|
convert("/conf/homeserver.yaml", config_path, environ)
|
2018-02-08 16:23:19 -07:00
|
|
|
convert("/conf/log.config", "/compiled/log.config", environ)
|
2018-02-08 12:41:41 -07:00
|
|
|
subprocess.check_output(["chown", "-R", ownership, "/data"])
|
2019-02-05 06:42:21 -07:00
|
|
|
|
|
|
|
args += [
|
2019-06-20 03:32:02 -06:00
|
|
|
"--config-path",
|
|
|
|
config_path,
|
2019-02-05 06:42:21 -07:00
|
|
|
# tell synapse to put any generated keys in /data rather than /compiled
|
2019-06-20 03:32:02 -06:00
|
|
|
"--keys-directory",
|
|
|
|
"/data",
|
2019-02-05 06:42:21 -07:00
|
|
|
]
|
|
|
|
|
2018-02-05 14:57:35 -07:00
|
|
|
# Generate missing keys and start synapse
|
2018-02-04 03:14:06 -07:00
|
|
|
subprocess.check_output(args + ["--generate-keys"])
|
2018-02-08 11:50:04 -07:00
|
|
|
os.execv("/sbin/su-exec", ["su-exec", ownership] + args)
|