add nextcloud + fmt

This commit is contained in:
Florian Maury 2025-01-26 17:56:16 +01:00 committed by Florian
parent 1b9eeb1288
commit ca1c3d8347
44 changed files with 3335 additions and 1897 deletions

106
main.tf
View file

@ -2,7 +2,7 @@ terraform {
required_providers { required_providers {
proxmox = { proxmox = {
source = "bpg/proxmox" source = "bpg/proxmox"
version = "~>0.56.1" version = ">= 0.70.0"
} }
} }
required_version = ">=1.6.2" required_version = ">=1.6.2"
@ -13,50 +13,50 @@ provider "proxmox" {
api_token = var.pve_api_token api_token = var.pve_api_token
} }
module "netboot_server" { # module "netboot_server" {
source = "./modules/netboot_server" # source = "./modules/netboot_server"
hostname = "netboot_server" # hostname = "netboot_server"
prod_network_name = var.admin_network_name # prod_network_name = var.admin_network_name
dhcp_iface = "ens18" # dhcp_iface = "ens18"
dhcp_server_ip_addr = cidrhost(var.admin_network_prefix, 2) # dhcp_server_ip_addr = cidrhost(var.admin_network_prefix, 2)
dhcp_gateway = cidrhost(var.admin_network_prefix, 1) # dhcp_gateway = cidrhost(var.admin_network_prefix, 1)
dhcp_range = var.admin_network_prefix # dhcp_range = var.admin_network_prefix
ssh_public_key_opentofu_netboot_server = var.ssh_public_key_opentofu_netboot_server # ssh_public_key_opentofu_netboot_server = var.ssh_public_key_opentofu_netboot_server
pve_api_base_url = var.pve_api_base_url # pve_api_base_url = var.pve_api_base_url
pve_api_token = var.pve_api_token # pve_api_token = var.pve_api_token
pve_node_name = var.pve_node_name # pve_node_name = var.pve_node_name
pve_storage_id = var.pve_storage_id # pve_storage_id = var.pve_storage_id
pve_vm_id = 108 # pve_vm_id = 108
} # }
module "poc" { # module "poc" {
depends_on = [ module.netboot_server ] # depends_on = [module.netboot_server]
source = "./modules/poc" # source = "./modules/poc"
pve_vm_id = 110 # pve_vm_id = 110
pve_storage_id = "local" # pve_storage_id = "local"
pve_node_name = "ns3152888" # pve_node_name = "ns3152888"
pve_ssh_user = var.pve_ssh_user # pve_ssh_user = var.pve_ssh_user
pve_ssh_host = var.pve_ssh_host # pve_ssh_host = var.pve_ssh_host
netboot_server_ip_address = cidrhost(var.admin_network_prefix, 2) # netboot_server_ip_address = cidrhost(var.admin_network_prefix, 2)
admin_network = { # admin_network = {
name = var.admin_network_name # name = var.admin_network_name
prefix = var.admin_network_prefix # prefix = var.admin_network_prefix
mac_address = "1c:69:7a:ff:ff:01" # mac_address = "1c:69:7a:ff:ff:01"
} # }
prod_network = { # prod_network = {
name = var.prod_network_name # name = var.prod_network_name
prefix = var.prod_network_prefix # prefix = var.prod_network_prefix
mac_address = "1c:69:7a:ef:ff:01" # mac_address = "1c:69:7a:ef:ff:01"
} # }
monitoring_network = { # monitoring_network = {
name = var.monit_network_name # name = var.monit_network_name
prefix = var.monit_network_prefix # prefix = var.monit_network_prefix
mac_address = "1c:69:7a:df:ff:01" # mac_address = "1c:69:7a:df:ff:01"
} # }
admin_ssh_public_key = var.ssh_public_key_admin_netboot_server # admin_ssh_public_key = var.ssh_public_key_admin_netboot_server
} # }
locals { locals {
castopod_domain = "pod.broken-by-design.fr" castopod_domain = "pod.broken-by-design.fr"
@ -83,10 +83,26 @@ module "caddy_config" {
upstreams = [ upstreams = [
"10.109.0.13:${local.castopod_upstream_port}" "10.109.0.13:${local.castopod_upstream_port}"
] ]
},
{
domain = "nextcloud.broken-by-design.fr"
upstreams = [
"10.109.0.16:8443"
]
} }
] ]
ssh_authorized_keys = [ ssh_authorized_keys = var.ssh_authorized_keys
file("/var/home/fmaury/.ssh/fma_ovh_rise2.pub") }
]
module "nextcloud_config" {
source = "./modules/nextcloud"
ssh_authorized_keys = var.ssh_authorized_keys
nextcloud_domain = "nextcloud.broken-by-design.fr"
reverse_proxy_ip_address = "10.109.0.14"
nextcloud_trusted_domains = [
"nextcloud.broken-by-design.fr",
]
luks_passphrase = var.nextcloud_luks_passphrase
luks_use_tpm2 = false
} }

View file

@ -0,0 +1,102 @@
http://${nextcloud_domain}:80 {
redir https://${nextcloud_domain}{uri} permanent
}
${nextcloud_domain}:443 {
root * /var/www/html
encode gzip zstd
rewrite /ocm-provider/ /index.php
rewrite /ocs-provider/ /ocs-provider/index.php
rewrite /remote /remote.php
rewrite /remote/* /remote.php?{query}
redir /.well-known/caldav /remote.php/dav 301
redir /.well-known/carddav /remote.php/dav 301
redir /.well-known/webfinger /index.php/.well-known/webfinger 301
redir /.well-known/nodeinfo /index.php/.well-known/nodeinfo 301
# .htaccess / data / config / ... shouldn't be accessible from outside
@forbidden {
path /.htaccess
path /.xml
path /console.php
path /cron.php
path /3rdparty/*
path /README
path /autotest/*
path /build/*
path /config/*
path /console/*
path /data/*
path /db_*/*
path /db_structure
path /indie/*
path /issue/*
path /lib/*
path /occ
path /occ/*
path /templates/*
path /tests/*
}
respond @forbidden 404
@static {
method GET HEAD
not path /index.php*
not path /apps/theming/composer/*
not path /apps/theming/lib/*
not path /apps/theming/templates/*
not path /apps/theming/theme/*
not path /js/core/merged-template-prepend.js
path *.css
path *.css.map
path *.gif
path *.ico
path *.jpg
path *.js
path *.js.map
path *.json
path *.mjs
path *.otf
path *.png
path *.svg
path *.tflite
path *.wasm
path *.webp
path *.woff2
}
handle @static {
header Cache-Control "max-age=604800"
file_server
}
handle * {
@index_files file {
try_files {path} {path}/index.php /index.php{path}
split_path .php
}
rewrite @index_files {file_match.relative}
php_fastcgi nextcloud:9000 {
env PATH /bin
env modHeadersAvailable true
env front_controller_active true
dial_timeout 60s
read_timeout 3600s
write_timeout 300s
}
}
header Strict-Transport-Security "max-age=15768000;"
header X-Content-Type-Options "nosniff"
header X-XSS-Protection "1; mode=block"
header X-Robots-Tag "noindex, nofollow"
header X-Download-Options "noopen"
header X-Permitted-Cross-Domain-Policies "none"
header Referrer-Policy "no-referrer"
header X-Frame-Options "SAMEORIGIN"
log
tls internal
}

View file

@ -0,0 +1,6 @@
[Unit]
Description = Caddy Backend Network
[Network]
NetworkName = caddy-backend
Internal = true

View file

@ -0,0 +1,11 @@
[Unit]
Description = Caddy Data Volume
[Volume]
VolumeName = ${caddy_data_volume_name}
Device=/dev/disk/by-label/${caddy_data_volume_name}
Options=nodev,noexec,nosuid,rootcontext=system_u:object_r:container_file_t:s0
Type=ext4
[Install]
WantedBy=default.target

View file

@ -0,0 +1,5 @@
[Unit]
Description = Caddy Frontend Network
[Network]
NetworkName = caddy-frontend

View file

@ -0,0 +1,23 @@
[Unit]
Description = Caddy Reverse Proxy
[Container]
ContainerName = ${caddy_container_name}
Image = ${caddy_image_name}:${caddy_image_tag}
Network = caddy-frontend.network
Network = caddy-backend.network
Volume = caddy-data.volume:/data:z
Volume = ${caddyfile_file_path}:/etc/caddy/Caddyfile:ro,z
Volume = nextcloud-data.volume:/var/www/html:ro,z
PublishPort = 8080:80
PublishPort = 8443:443
[Service]
ExecStartPre=/usr/bin/chcon -t container_file_t ${caddyfile_file_path}
Restart=on-failure
[Install]
WantedBy=multi-user.target

View file

@ -0,0 +1,10 @@
[Unit]
Description = Generate Secrets
[Service]
Type=oneshot
RemainAfterExit=true
ExecStart=/usr/bin/bash -c "podman secret exists ${postgres_password_secret_name} || head -c 16 /dev/urandom | base64 | podman secret create ${postgres_password_secret_name} -"
[Install]
WantedBy=multi-user.target

View file

@ -0,0 +1,6 @@
[Unit]
Description = Nextcloud Backend Network
[Network]
NetworkName = nextcloud-backend
Internal = true

View file

@ -0,0 +1,11 @@
[Unit]
Description = Nextcloud Data Volume
[Volume]
VolumeName = ${nextcloud_data_volume_name}
Device=/dev/disk/by-label/${nextcloud_data_volume_name}
Options=nodev,noexec,nosuid,rootcontext=system_u:object_r:container_file_t:s0
Type=ext4
[Install]
WantedBy=default.target

View file

@ -0,0 +1,5 @@
[Unit]
Description = Nextcloud Internet Network
[Network]
NetworkName = nextcloud-internet

View file

@ -0,0 +1,31 @@
[Unit]
Description = "Nextcloud"
Wants=generate-secrets.service
After=generate-secrets.service
[Container]
ContainerName = ${nextcloud_container_name}
Image = ${nextcloud_image_name}:${nextcloud_image_tag}
Network=caddy-backend.network
Network=nextcloud-backend.network
Network=nextcloud-internet.network
Volume = nextcloud-data.volume:/var/www/html:z
Volume = ${php_fpm_config_file_path}:/usr/local/etc/php-fpm.d/www.conf:ro,z
EnvironmentFile=${postgres_env_file_path}
Environment=POSTGRES_HOST=${postgres_container_name}
Secret=${postgres_password_secret_name}
Environment=REDIS_HOST=${valkey_container_name}
Environment=NEXTCLOUD_TRUSTED_DOMAINS=${nextcloud_trusted_domains}
Environment=PHP_UPLOAD_LIMIT=${php_upload_limit}
Environment=TRUSTED_PROXIES=${nextcloud_trusted_proxies}
[Service]
Restart = on-failure
ExecStartPre = /usr/bin/chcon -t container_file_t ${php_fpm_config_file_path}
[Install]
WantedBy = multi-user.target

View file

@ -0,0 +1,490 @@
; Start a new pool named 'www'.
; the variable $pool can be used in any directive and will be replaced by the
; pool name ('www' here)
[www]
; Per pool prefix
; It only applies on the following directives:
; - 'access.log'
; - 'slowlog'
; - 'listen' (unixsocket)
; - 'chroot'
; - 'chdir'
; - 'php_values'
; - 'php_admin_values'
; When not set, the global prefix (or NONE) applies instead.
; Note: This directive can also be relative to the global prefix.
; Default Value: none
;prefix = /path/to/pools/$pool
; Unix user/group of the child processes. This can be used only if the master
; process running user is root. It is set after the child process is created.
; The user and group can be specified either by their name or by their numeric
; IDs.
; Note: If the user is root, the executable needs to be started with
; --allow-to-run-as-root option to work.
; Default Values: The user is set to master process running user by default.
; If the group is not set, the user's group is used.
user = www-data
group = www-data
; The address on which to accept FastCGI requests.
; Valid syntaxes are:
; 'ip.add.re.ss:port' - to listen on a TCP socket to a specific IPv4 address on
; a specific port;
; '[ip:6:addr:ess]:port' - to listen on a TCP socket to a specific IPv6 address on
; a specific port;
; 'port' - to listen on a TCP socket to all addresses
; (IPv6 and IPv4-mapped) on a specific port;
; '/path/to/unix/socket' - to listen on a unix socket.
; Note: This value is mandatory.
listen = 9000
; Set listen(2) backlog.
; Default Value: 511 (-1 on Linux, FreeBSD and OpenBSD)
;listen.backlog = 511
; Set permissions for unix socket, if one is used. In Linux, read/write
; permissions must be set in order to allow connections from a web server. Many
; BSD-derived systems allow connections regardless of permissions. The owner
; and group can be specified either by name or by their numeric IDs.
; Default Values: Owner is set to the master process running user. If the group
; is not set, the owner's group is used. Mode is set to 0660.
;listen.owner = www-data
;listen.group = www-data
;listen.mode = 0660
; When POSIX Access Control Lists are supported you can set them using
; these options, value is a comma separated list of user/group names.
; When set, listen.owner and listen.group are ignored
;listen.acl_users =
;listen.acl_groups =
; List of addresses (IPv4/IPv6) of FastCGI clients which are allowed to connect.
; Equivalent to the FCGI_WEB_SERVER_ADDRS environment variable in the original
; PHP FCGI (5.2.2+). Makes sense only with a tcp listening socket. Each address
; must be separated by a comma. If this value is left blank, connections will be
; accepted from any ip address.
; Default Value: any
;listen.allowed_clients = 127.0.0.1
; Set the associated the route table (FIB). FreeBSD only
; Default Value: -1
;listen.setfib = 1
; Specify the nice(2) priority to apply to the pool processes (only if set)
; The value can vary from -19 (highest priority) to 20 (lower priority)
; Note: - It will only work if the FPM master process is launched as root
; - The pool processes will inherit the master process priority
; unless it specified otherwise
; Default Value: no set
; process.priority = -19
; Set the process dumpable flag (PR_SET_DUMPABLE prctl for Linux or
; PROC_TRACE_CTL procctl for FreeBSD) even if the process user
; or group is different than the master process user. It allows to create process
; core dump and ptrace the process for the pool user.
; Default Value: no
; process.dumpable = yes
; Choose how the process manager will control the number of child processes.
; Possible Values:
; static - a fixed number (pm.max_children) of child processes;
; dynamic - the number of child processes are set dynamically based on the
; following directives. With this process management, there will be
; always at least 1 children.
; pm.max_children - the maximum number of children that can
; be alive at the same time.
; pm.start_servers - the number of children created on startup.
; pm.min_spare_servers - the minimum number of children in 'idle'
; state (waiting to process). If the number
; of 'idle' processes is less than this
; number then some children will be created.
; pm.max_spare_servers - the maximum number of children in 'idle'
; state (waiting to process). If the number
; of 'idle' processes is greater than this
; number then some children will be killed.
; pm.max_spawn_rate - the maximum number of rate to spawn child
; processes at once.
; ondemand - no children are created at startup. Children will be forked when
; new requests will connect. The following parameter are used:
; pm.max_children - the maximum number of children that
; can be alive at the same time.
; pm.process_idle_timeout - The number of seconds after which
; an idle process will be killed.
; Note: This value is mandatory.
pm = dynamic
; The number of child processes to be created when pm is set to 'static' and the
; maximum number of child processes when pm is set to 'dynamic' or 'ondemand'.
; This value sets the limit on the number of simultaneous requests that will be
; served. Equivalent to the ApacheMaxClients directive with mpm_prefork.
; Equivalent to the PHP_FCGI_CHILDREN environment variable in the original PHP
; CGI. The below defaults are based on a server without much resources. Don't
; forget to tweak pm.* to fit your needs.
; Note: Used when pm is set to 'static', 'dynamic' or 'ondemand'
; Note: This value is mandatory.
pm.max_children = 120
; The number of child processes created on startup.
; Note: Used only when pm is set to 'dynamic'
; Default Value: (min_spare_servers + max_spare_servers) / 2
pm.start_servers = 12
; The desired minimum number of idle server processes.
; Note: Used only when pm is set to 'dynamic'
; Note: Mandatory when pm is set to 'dynamic'
pm.min_spare_servers = 6
; The desired maximum number of idle server processes.
; Note: Used only when pm is set to 'dynamic'
; Note: Mandatory when pm is set to 'dynamic'
pm.max_spare_servers = 18
; The number of rate to spawn child processes at once.
; Note: Used only when pm is set to 'dynamic'
; Note: Mandatory when pm is set to 'dynamic'
; Default Value: 32
;pm.max_spawn_rate = 32
; The number of seconds after which an idle process will be killed.
; Note: Used only when pm is set to 'ondemand'
; Default Value: 10s
;pm.process_idle_timeout = 10s;
; The number of requests each child process should execute before respawning.
; This can be useful to work around memory leaks in 3rd party libraries. For
; endless request processing specify '0'. Equivalent to PHP_FCGI_MAX_REQUESTS.
; Default Value: 0
;pm.max_requests = 500
; The URI to view the FPM status page. If this value is not set, no URI will be
; recognized as a status page. It shows the following information:
; pool - the name of the pool;
; process manager - static, dynamic or ondemand;
; start time - the date and time FPM has started;
; start since - number of seconds since FPM has started;
; accepted conn - the number of request accepted by the pool;
; listen queue - the number of request in the queue of pending
; connections (see backlog in listen(2));
; max listen queue - the maximum number of requests in the queue
; of pending connections since FPM has started;
; listen queue len - the size of the socket queue of pending connections;
; idle processes - the number of idle processes;
; active processes - the number of active processes;
; total processes - the number of idle + active processes;
; max active processes - the maximum number of active processes since FPM
; has started;
; max children reached - number of times, the process limit has been reached,
; when pm tries to start more children (works only for
; pm 'dynamic' and 'ondemand');
; Value are updated in real time.
; Example output:
; pool: www
; process manager: static
; start time: 01/Jul/2011:17:53:49 +0200
; start since: 62636
; accepted conn: 190460
; listen queue: 0
; max listen queue: 1
; listen queue len: 42
; idle processes: 4
; active processes: 11
; total processes: 15
; max active processes: 12
; max children reached: 0
;
; By default the status page output is formatted as text/plain. Passing either
; 'html', 'xml' or 'json' in the query string will return the corresponding
; output syntax. Example:
; http://www.foo.bar/status
; http://www.foo.bar/status?json
; http://www.foo.bar/status?html
; http://www.foo.bar/status?xml
;
; By default the status page only outputs short status. Passing 'full' in the
; query string will also return status for each pool process.
; Example:
; http://www.foo.bar/status?full
; http://www.foo.bar/status?json&full
; http://www.foo.bar/status?html&full
; http://www.foo.bar/status?xml&full
; The Full status returns for each process:
; pid - the PID of the process;
; state - the state of the process (Idle, Running, ...);
; start time - the date and time the process has started;
; start since - the number of seconds since the process has started;
; requests - the number of requests the process has served;
; request duration - the duration in µs of the requests;
; request method - the request method (GET, POST, ...);
; request URI - the request URI with the query string;
; content length - the content length of the request (only with POST);
; user - the user (PHP_AUTH_USER) (or '-' if not set);
; script - the main script called (or '-' if not set);
; last request cpu - the %cpu the last request consumed
; it's always 0 if the process is not in Idle state
; because CPU calculation is done when the request
; processing has terminated;
; last request memory - the max amount of memory the last request consumed
; it's always 0 if the process is not in Idle state
; because memory calculation is done when the request
; processing has terminated;
; If the process is in Idle state, then informations are related to the
; last request the process has served. Otherwise informations are related to
; the current request being served.
; Example output:
; ************************
; pid: 31330
; state: Running
; start time: 01/Jul/2011:17:53:49 +0200
; start since: 63087
; requests: 12808
; request duration: 1250261
; request method: GET
; request URI: /test_mem.php?N=10000
; content length: 0
; user: -
; script: /home/fat/web/docs/php/test_mem.php
; last request cpu: 0.00
; last request memory: 0
;
; Note: There is a real-time FPM status monitoring sample web page available
; It's available in: /usr/local/share/php/fpm/status.html
;
; Note: The value must start with a leading slash (/). The value can be
; anything, but it may not be a good idea to use the .php extension or it
; may conflict with a real PHP file.
; Default Value: not set
;pm.status_path = /status
; The address on which to accept FastCGI status request. This creates a new
; invisible pool that can handle requests independently. This is useful
; if the main pool is busy with long running requests because it is still possible
; to get the status before finishing the long running requests.
;
; Valid syntaxes are:
; 'ip.add.re.ss:port' - to listen on a TCP socket to a specific IPv4 address on
; a specific port;
; '[ip:6:addr:ess]:port' - to listen on a TCP socket to a specific IPv6 address on
; a specific port;
; 'port' - to listen on a TCP socket to all addresses
; (IPv6 and IPv4-mapped) on a specific port;
; '/path/to/unix/socket' - to listen on a unix socket.
; Default Value: value of the listen option
;pm.status_listen = 127.0.0.1:9001
; The ping URI to call the monitoring page of FPM. If this value is not set, no
; URI will be recognized as a ping page. This could be used to test from outside
; that FPM is alive and responding, or to
; - create a graph of FPM availability (rrd or such);
; - remove a server from a group if it is not responding (load balancing);
; - trigger alerts for the operating team (24/7).
; Note: The value must start with a leading slash (/). The value can be
; anything, but it may not be a good idea to use the .php extension or it
; may conflict with a real PHP file.
; Default Value: not set
;ping.path = /ping
; This directive may be used to customize the response of a ping request. The
; response is formatted as text/plain with a 200 response code.
; Default Value: pong
;ping.response = pong
; The access log file
; Default: not set
;access.log = log/$pool.access.log
; The access log format.
; The following syntax is allowed
; %%: the '%' character
; %C: %CPU used by the request
; it can accept the following format:
; - %{user}C for user CPU only
; - %{system}C for system CPU only
; - %{total}C for user + system CPU (default)
; %d: time taken to serve the request
; it can accept the following format:
; - %{seconds}d (default)
; - %{milliseconds}d
; - %{milli}d
; - %{microseconds}d
; - %{micro}d
; %e: an environment variable (same as $_ENV or $_SERVER)
; it must be associated with embraces to specify the name of the env
; variable. Some examples:
; - server specifics like: %{REQUEST_METHOD}e or %{SERVER_PROTOCOL}e
; - HTTP headers like: %{HTTP_HOST}e or %{HTTP_USER_AGENT}e
; %f: script filename
; %l: content-length of the request (for POST request only)
; %m: request method
; %M: peak of memory allocated by PHP
; it can accept the following format:
; - %{bytes}M (default)
; - %{kilobytes}M
; - %{kilo}M
; - %{megabytes}M
; - %{mega}M
; %n: pool name
; %o: output header
; it must be associated with embraces to specify the name of the header:
; - %{Content-Type}o
; - %{X-Powered-By}o
; - %{Transfert-Encoding}o
; - ....
; %p: PID of the child that serviced the request
; %P: PID of the parent of the child that serviced the request
; %q: the query string
; %Q: the '?' character if query string exists
; %r: the request URI (without the query string, see %q and %Q)
; %R: remote IP address
; %s: status (response code)
; %t: server time the request was received
; it can accept a strftime(3) format:
; %d/%b/%Y:%H:%M:%S %z (default)
; The strftime(3) format must be encapsulated in a %{<strftime_format>}t tag
; e.g. for a ISO8601 formatted timestring, use: %{%Y-%m-%dT%H:%M:%S%z}t
; %T: time the log has been written (the request has finished)
; it can accept a strftime(3) format:
; %d/%b/%Y:%H:%M:%S %z (default)
; The strftime(3) format must be encapsulated in a %{<strftime_format>}t tag
; e.g. for a ISO8601 formatted timestring, use: %{%Y-%m-%dT%H:%M:%S%z}t
; %u: remote user
;
; Default: "%R - %u %t \"%m %r\" %s"
;access.format = "%R - %u %t \"%m %r%Q%q\" %s %f %{milli}d %{kilo}M %C%%"
; A list of request_uri values which should be filtered from the access log.
;
; As a security precuation, this setting will be ignored if:
; - the request method is not GET or HEAD; or
; - there is a request body; or
; - there are query parameters; or
; - the response code is outwith the successful range of 200 to 299
;
; Note: The paths are matched against the output of the access.format tag "%r".
; On common configurations, this may look more like SCRIPT_NAME than the
; expected pre-rewrite URI.
;
; Default Value: not set
;access.suppress_path[] = /ping
;access.suppress_path[] = /health_check.php
; The log file for slow requests
; Default Value: not set
; Note: slowlog is mandatory if request_slowlog_timeout is set
;slowlog = log/$pool.log.slow
; The timeout for serving a single request after which a PHP backtrace will be
; dumped to the 'slowlog' file. A value of '0s' means 'off'.
; Available units: s(econds)(default), m(inutes), h(ours), or d(ays)
; Default Value: 0
;request_slowlog_timeout = 0
; Depth of slow log stack trace.
; Default Value: 20
;request_slowlog_trace_depth = 20
; The timeout for serving a single request after which the worker process will
; be killed. This option should be used when the 'max_execution_time' ini option
; does not stop script execution for some reason. A value of '0' means 'off'.
; Available units: s(econds)(default), m(inutes), h(ours), or d(ays)
; Default Value: 0
;request_terminate_timeout = 0
; The timeout set by 'request_terminate_timeout' ini option is not engaged after
; application calls 'fastcgi_finish_request' or when application has finished and
; shutdown functions are being called (registered via register_shutdown_function).
; This option will enable timeout limit to be applied unconditionally
; even in such cases.
; Default Value: no
;request_terminate_timeout_track_finished = no
; Set open file descriptor rlimit.
; Default Value: system defined value
;rlimit_files = 1024
; Set max core size rlimit.
; Possible Values: 'unlimited' or an integer greater or equal to 0
; Default Value: system defined value
;rlimit_core = 0
; Chroot to this directory at the start. This value must be defined as an
; absolute path. When this value is not set, chroot is not used.
; Note: you can prefix with '$prefix' to chroot to the pool prefix or one
; of its subdirectories. If the pool prefix is not set, the global prefix
; will be used instead.
; Note: chrooting is a great security feature and should be used whenever
; possible. However, all PHP paths will be relative to the chroot
; (error_log, sessions.save_path, ...).
; Default Value: not set
;chroot =
; Chdir to this directory at the start.
; Note: relative path can be used.
; Default Value: current directory or / when chroot
;chdir = /var/www
; Redirect worker stdout and stderr into main error log. If not set, stdout and
; stderr will be redirected to /dev/null according to FastCGI specs.
; Note: on highloaded environment, this can cause some delay in the page
; process time (several ms).
; Default Value: no
;catch_workers_output = yes
; Decorate worker output with prefix and suffix containing information about
; the child that writes to the log and if stdout or stderr is used as well as
; log level and time. This options is used only if catch_workers_output is yes.
; Settings to "no" will output data as written to the stdout or stderr.
; Default value: yes
;decorate_workers_output = no
; Clear environment in FPM workers
; Prevents arbitrary environment variables from reaching FPM worker processes
; by clearing the environment in workers before env vars specified in this
; pool configuration are added.
; Setting to "no" will make all environment variables available to PHP code
; via getenv(), $_ENV and $_SERVER.
; Default Value: yes
;clear_env = no
; Limits the extensions of the main script FPM will allow to parse. This can
; prevent configuration mistakes on the web server side. You should only limit
; FPM to .php extensions to prevent malicious users to use other extensions to
; execute php code.
; Note: set an empty value to allow all extensions.
; Default Value: .php
;security.limit_extensions = .php .php3 .php4 .php5 .php7
; Pass environment variables like LD_LIBRARY_PATH. All $VARIABLEs are taken from
; the current environment.
; Default Value: clean env
;env[HOSTNAME] = $HOSTNAME
;env[PATH] = /usr/local/bin:/usr/bin:/bin
;env[TMP] = /tmp
;env[TMPDIR] = /tmp
;env[TEMP] = /tmp
; Additional php.ini defines, specific to this pool of workers. These settings
; overwrite the values previously defined in the php.ini. The directives are the
; same as the PHP SAPI:
; php_value/php_flag - you can set classic ini defines which can
; be overwritten from PHP call 'ini_set'.
; php_admin_value/php_admin_flag - these directives won't be overwritten by
; PHP call 'ini_set'
; For php_*flag, valid values are on, off, 1, 0, true, false, yes or no.
; Defining 'extension' will load the corresponding shared extension from
; extension_dir. Defining 'disable_functions' or 'disable_classes' will not
; overwrite previously defined php.ini values, but will append the new value
; instead.
; Note: path INI options can be relative and will be expanded with the prefix
; (pool, global or /usr/local)
; Default Value: nothing is defined by default except the values in php.ini and
; specified at startup with the -d argument
;php_admin_value[sendmail_path] = /usr/sbin/sendmail -t -i -f www@my.domain.com
;php_flag[display_errors] = off
;php_admin_value[error_log] = /var/log/fpm-php.www.log
;php_admin_flag[log_errors] = on
;php_admin_value[memory_limit] = 32M

View file

@ -0,0 +1,11 @@
[Unit]
Description = Postgresql Data Volume
[Volume]
VolumeName = ${postgres_data_volume_name}
Device=/dev/disk/by-label/${postgres_data_volume_name}
Options=nodev,noexec,nosuid,rootcontext=system_u:object_r:container_file_t:s0
Type=ext4
[Install]
WantedBy=default.target

View file

@ -0,0 +1,23 @@
[Unit]
Description = Postgresql
Wants=generate-secrets.service
After=generate-secrets.service
[Container]
ContainerName = ${postgres_container_name}
Image = ${postgres_image_name}:${postgres_image_tag}
Volume = postgres-data.volume:/var/lib/postgresql/data:z
Network = nextcloud-backend.network
EnvironmentFile=${postgres_env_file_path}
Environment=PGDATA=/var/lib/postgresql/data/pgdata
Secret=${postgres_password_secret_name}
[Service]
Restart=on-failure
[Install]
WantedBy=multi-user.target

View file

@ -0,0 +1,3 @@
POSTGRES_USER=${postgres_user_name}
POSTGRES_DB=${postgres_database_name}
POSTGRES_PASSWORD_FILE=/run/secrets/postgres-passwd

View file

@ -0,0 +1,8 @@
[Unit]
Description = "Valkey Volume"
[Volume]
VolumeName = ${valkey_data_volume_name}
Device=/dev/disk/by-label/${valkey_data_volume_name}
Options=nodev,noexec,nosuid,rootcontext=system_u:object_r:container_file_t:s0
Type=ext4

View file

@ -0,0 +1,20 @@
[Unit]
Description = "Valkey Container"
[Container]
ContainerName = "${valkey_container_name}"
Image = "${valkey_image_name}:${valkey_image_tag}"
Network = nextcloud-backend.network
Volume = valkey-data.volume:/data:z
# skips find/chown in docker entrypoint which tries to chown lost+found and receive a perm denied
User=valkey
Group=valkey
[Service]
Restart=on-failure
[Install]
WantedBy=default.target

603
modules/nextcloud/main.tf Normal file
View file

@ -0,0 +1,603 @@
locals {
data_device_path = "/dev/vdb"
luks_device_name = "dm-crypt0"
caddy_container_name = "caddy"
nextcloud_container_name = "nextcloud"
postgres_container_name = "psql"
valkey_container_name = "valkey"
caddyfile_dir_path = "/opt/caddy"
caddyfile_file_path = "${local.caddyfile_dir_path}/Caddyfile"
postgres_password_secret_name = "postgres-passwd"
php_fpm_config_dir_path = "/opt/php"
php_fpm_config_file_path = "${local.php_fpm_config_dir_path}/www.conf"
caddy_data_volume_name = "caddy-data"
nextcloud_data_volume_name = "nextcloud-data"
postgres_data_volume_name = "postgres-data"
valkey_data_volume_name = "valkey-data"
caddy_image_name = "docker.io/caddy"
caddy_image_tag = "2.9.1-alpine"
nextcloud_image_name = "docker.io/nextcloud"
nextcloud_image_tag = "stable-fpm-alpine"
postgres_image_name = "docker.io/postgres"
postgres_image_tag = "12.22"
valkey_image_name = "docker.io/valkey/valkey"
valkey_image_tag = "8.0-alpine3.21"
postgres_env_file_path = "/etc/postgres.env"
data_disk = {
device = local.data_device_path
wipeTable = true
partitions = [
{
label = local.caddy_data_volume_name
number = 1
sizeMiB = 500
wipePartitionEntry = true
shouldExist = true
resize = true
},
{
label = local.nextcloud_data_volume_name
number = 2
sizeMiB = 100 * 1024
wipePartitionEntry = true
shouldExist = true
resize = true
},
{
label = local.postgres_data_volume_name
number = 3
sizeMiB = 10 * 1024
wipePartitionEntry = true
shouldExist = true
resize = true
},
{
label = local.valkey_data_volume_name
number = 4
sizeMiB = 1024
wipePartitionEntry = true
shouldExist = true
resize = true
},
]
}
caddy_data_luks = merge(
{
name = "encrypted-${local.caddy_data_volume_name}"
device = "${local.data_device_path}1"
label = "encrypted-${local.caddy_data_volume_name}"
wipeVolume = false
},
var.luks_passphrase == "" ? {} : {
keyFile = {
source = format(
"data:text/plain;base64,%s",
var.luks_passphrase
)
},
},
var.luks_use_tpm2 ? {
clevis = {
tpm2 = true
}
} : {}
)
nextcloud_data_luks = merge(
{
name = "encrypted-${local.nextcloud_data_volume_name}"
device = "${local.data_device_path}2"
label = "encrypted-${local.nextcloud_data_volume_name}"
wipeVolume = false
},
var.luks_passphrase == "" ? {} : {
keyFile = {
source = format(
"data:text/plain;base64,%s",
var.luks_passphrase
)
}
},
var.luks_use_tpm2 ? {
clevis = {
tpm2 = true
}
} : {}
)
postgres_data_luks = merge(
{
name = "encrypted-${local.postgres_data_volume_name}"
device = "${local.data_device_path}3"
label = "encrypted-${local.postgres_data_volume_name}"
wipeVolume = false
},
var.luks_passphrase == "" ? {} : {
keyFile = {
source = format(
"data:text/plain;base64,%s",
var.luks_passphrase
)
}
},
var.luks_use_tpm2 ? {
clevis = {
tpm2 = true
}
} : {}
)
valkey_data_luks = merge(
{
name = "encrypted-${local.valkey_data_volume_name}"
device = "${local.data_device_path}4"
label = "encrypted-${local.valkey_data_volume_name}"
wipeVolume = false
},
var.luks_passphrase == "" ? {} : {
keyFile = {
source = format(
"data:text/plain;base64,%s",
var.luks_passphrase
)
}
},
var.luks_use_tpm2 ? {
clevis = {
tpm2 = true
}
} : {}
)
caddy_data_filesystem = {
device = "/dev/disk/by-id/dm-name-encrypted-${local.caddy_data_volume_name}"
format = "ext4"
label = local.caddy_data_volume_name
wipeFilesystem = false
}
nextcloud_data_filesystem = {
device = "/dev/disk/by-id/dm-name-encrypted-${local.nextcloud_data_volume_name}"
format = "ext4"
label = local.nextcloud_data_volume_name
wipeFilesystem = false
}
postgres_data_filesystem = {
device = "/dev/disk/by-id/dm-name-encrypted-${local.postgres_data_volume_name}"
format = "ext4"
label = local.postgres_data_volume_name
wipeFilesystem = false
}
valkey_data_filesystem = {
device = "/dev/disk/by-id/dm-name-encrypted-${local.valkey_data_volume_name}"
format = "ext4"
label = local.valkey_data_volume_name
wipeFilesystem = false
options = [
"-E", "root_owner=999:999",
]
}
hostname_file = {
path = "/etc/hostname"
user = {id = 0}
group = {id = 0}
mode = 420 # 0644
contents = {
source = "data:text/plain,nextcloud"
}
}
hosts_file = {
path = "/etc/hosts"
user = {id = 0}
group = {id = 0}
mode = 420 # 0644
append = [
{
source = format(
"data:text/plain;base64,%s",
base64encode(
"${var.reverse_proxy_ip_address} ${var.nextcloud_domain}"
)
)
}
]
}
caddy_frontend_network_file = {
path = "/etc/containers/systemd/caddy-frontend.network"
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
file("${path.module}/files/caddy-frontend.network")
)
)
}
}
caddy_backend_network_file = {
path = "/etc/containers/systemd/caddy-backend.network"
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
file("${path.module}/files/caddy-backend.network")
)
)
}
}
nextcloud_backend_network_file = {
path = "/etc/containers/systemd/nextcloud-backend.network"
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
file("${path.module}/files/nextcloud-backend.network")
)
)
}
}
nextcloud_internet_network_file = {
path = "/etc/containers/systemd/nextcloud-internet.network"
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plein;base64,%s",
base64encode(
file("${path.module}/files/nextcloud-internet.network")
)
)
}
}
caddy_data_volume_file = {
path = "/etc/containers/systemd/caddy-data.volume"
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
templatefile(
"${path.module}/files/caddy-data.volume.tftpl",
{
caddy_data_volume_name = local.caddy_data_volume_name
}
)
)
)
}
}
nextcloud_data_volume_file = {
path = "/etc/containers/systemd/nextcloud-data.volume"
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
templatefile(
"${path.module}/files/nextcloud-data.volume.tftpl",
{
nextcloud_data_volume_name = local.nextcloud_data_volume_name
}
)
)
)
}
}
postgres_data_volume_file = {
path = "/etc/containers/systemd/postgres-data.volume"
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
templatefile(
"${path.module}/files/postgres-data.volume.tftpl",
{
postgres_data_volume_name = local.postgres_data_volume_name
}
)
)
)
}
}
valkey_data_volume_file = {
path = "/etc/containers/systemd/valkey-data.volume"
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
templatefile(
"${path.module}/files/valkey-data.volume.tftpl",
{
valkey_data_volume_name = local.valkey_data_volume_name
}
)
)
)
}
}
caddy_container_file = {
path = "/etc/containers/systemd/caddy.container"
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
templatefile(
"${path.module}/files/caddy.container.tftpl",
{
caddy_container_name = local.caddy_container_name
caddy_image_name = local.caddy_image_name
caddy_image_tag = local.caddy_image_tag
caddyfile_file_path = local.caddyfile_file_path
}
)
)
)
}
}
nextcloud_container_file = {
path = "/etc/containers/systemd/nextcloud.container"
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
templatefile(
"${path.module}/files/nextcloud.container.tftpl",
{
nextcloud_container_name = local.nextcloud_container_name
nextcloud_image_name = local.nextcloud_image_name
nextcloud_image_tag = local.nextcloud_image_tag
postgres_env_file_path = local.postgres_env_file_path
postgres_container_name = local.postgres_container_name
postgres_password_secret_name = local.postgres_password_secret_name
valkey_container_name = local.valkey_container_name
nextcloud_trusted_domains = join(" ", var.nextcloud_trusted_domains)
php_upload_limit = "2048M" # variable ?
php_fpm_config_file_path = local.php_fpm_config_file_path
nextcloud_trusted_proxies = "10.0.0.0/8"
}
)
)
)
}
}
postgres_container_file = {
path = "/etc/containers/systemd/postgres.container"
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
templatefile(
"${path.module}/files/postgres.container.tftpl",
{
postgres_container_name = local.postgres_container_name
postgres_image_name = local.postgres_image_name
postgres_image_tag = local.postgres_image_tag
postgres_env_file_path = local.postgres_env_file_path
postgres_password_secret_name = local.postgres_password_secret_name
}
)
)
)
}
}
valkey_container_file = {
path = "/etc/containers/systemd/valkey.container"
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
templatefile(
"${path.module}/files/valkey.container.tftpl",
{
valkey_container_name = local.valkey_container_name
valkey_image_name = local.valkey_image_name
valkey_image_tag = local.valkey_image_tag
}
)
)
)
}
}
caddyfile_dir = {
path = local.caddyfile_dir_path
user = { id = 0 }
group = { id = 0 }
mode = 493 # 0755
}
caddyfile_file = {
path = local.caddyfile_file_path
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
templatefile(
"${path.module}/files/Caddyfile.tftpl",
{
nextcloud_domain = var.nextcloud_domain
nextcloud_container_name = local.nextcloud_container_name
}
)
)
)
}
}
postgres_env_file = {
path = local.postgres_env_file_path
user = { id = 0 }
group = { id = 0 }
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
templatefile(
"${path.module}/files/postgres.env.tftpl",
{
postgres_user_name = "nextcloud"
postgres_database_name = "nextcloud"
}
)
)
)
}
}
php_config_dir = {
path = local.php_fpm_config_dir_path
user = { id = 0 }
group = { id = 0 }
mode = 493 # 0755
}
php_fpm_config_file = {
path = "/opt/php/www.conf"
user = {id = 0}
group = {id = 0}
mode = 420 # 0644
contents = {
source = format(
"data:text/plain;base64,%s",
base64encode(
file("${path.module}/files/php-fpm-www.conf")
)
)
}
}
generate_secrets_systemd_unit = {
name = "generate-secrets.service"
enabled = true
contents = templatefile(
"${path.module}/files/generate-secrets.service.tftpl",
{
postgres_password_secret_name = local.postgres_password_secret_name
}
)
}
ignition_config = {
ignition = {
version = "3.5.0"
}
storage = {
luks = [
local.caddy_data_luks,
local.nextcloud_data_luks,
local.postgres_data_luks,
local.valkey_data_luks,
]
disks = [
local.data_disk,
]
filesystems = [
local.caddy_data_filesystem,
local.nextcloud_data_filesystem,
local.postgres_data_filesystem,
local.valkey_data_filesystem,
]
directories = [
local.caddyfile_dir,
local.php_config_dir,
]
files = [
local.hostname_file,
local.hosts_file,
local.caddy_frontend_network_file,
local.caddy_backend_network_file,
local.nextcloud_backend_network_file,
local.nextcloud_internet_network_file,
local.caddy_data_volume_file,
local.nextcloud_data_volume_file,
local.postgres_data_volume_file,
local.valkey_data_volume_file,
local.caddy_container_file,
local.nextcloud_container_file,
local.postgres_container_file,
local.valkey_container_file,
local.caddyfile_file,
local.postgres_env_file,
local.php_fpm_config_file,
]
}
systemd = {
units = [
local.generate_secrets_systemd_unit,
]
}
passwd = {
users = [
{
name = "core"
sshAuthorizedKeys = var.ssh_authorized_keys
}
]
}
}
}

View file

@ -0,0 +1,3 @@
output "config" {
value = jsonencode(local.ignition_config)
}

View file

@ -0,0 +1,30 @@
variable "ssh_authorized_keys" {
type = list(string)
nullable = false
}
variable "nextcloud_domain" {
type = string
nullable = false
}
variable "nextcloud_trusted_domains" {
type = list(string)
nullable = false
}
variable "reverse_proxy_ip_address" {
type = string
nullable = false
}
variable "luks_passphrase" {
type = string
nullable = false
sensitive = true
}
variable "luks_use_tpm2" {
type = bool
nullable = false
}

View file

@ -5,3 +5,8 @@ output "castopod_config" {
output "caddy_config" { output "caddy_config" {
value = module.caddy_config.config value = module.caddy_config.config
} }
output "nextcloud_config" {
value = module.nextcloud_config.config
sensitive = true
}

View file

@ -12,3 +12,8 @@ prod_network_name = "prod"
prod_network_prefix = "10.109.0.0/24" prod_network_prefix = "10.109.0.0/24"
monit_network_name = "monit" monit_network_name = "monit"
monit_network_prefix = "10.111.0.0/24" monit_network_prefix = "10.111.0.0/24"
nextcloud_luks_passphrase = "tititoto"
ssh_authorized_keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ0WaC412cZLVwUXN/MyIl7nHjAd5rW5dn0wsZczjwCm fmaury@fedora-2.home"
]

View file

@ -98,3 +98,14 @@ variable "ssh_public_key_admin_netboot_server" {
type = string type = string
nullable = false nullable = false
} }
variable "nextcloud_luks_passphrase" {
type = string
nullable = false
sensitive = true
}
variable "ssh_authorized_keys" {
type = list(string)
nullable = false
}