forked from MirrorHub/synapse
Remove support for ACME v1 (#10194)
Fixes #9778 ACME v1 has been fully decommissioned for existing installs on June 1st 2021(see https://community.letsencrypt.org/t/end-of-life-plan-for-acmev1/88430/27), so we can now safely remove it from Synapse.
This commit is contained in:
parent
8c97d5863f
commit
08c8469322
18 changed files with 18 additions and 836 deletions
|
@ -442,10 +442,7 @@ so, you will need to edit `homeserver.yaml`, as follows:
|
||||||
|
|
||||||
- You will also need to uncomment the `tls_certificate_path` and
|
- You will also need to uncomment the `tls_certificate_path` and
|
||||||
`tls_private_key_path` lines under the `TLS` section. You will need to manage
|
`tls_private_key_path` lines under the `TLS` section. You will need to manage
|
||||||
provisioning of these certificates yourself — Synapse had built-in ACME
|
provisioning of these certificates yourself.
|
||||||
support, but the ACMEv1 protocol Synapse implements is deprecated, not
|
|
||||||
allowed by LetsEncrypt for new sites, and will break for existing sites in
|
|
||||||
late 2020. See [ACME.md](docs/ACME.md).
|
|
||||||
|
|
||||||
If you are using your own certificate, be sure to use a `.pem` file that
|
If you are using your own certificate, be sure to use a `.pem` file that
|
||||||
includes the full certificate chain including any intermediate certificates
|
includes the full certificate chain including any intermediate certificates
|
||||||
|
|
|
@ -142,13 +142,6 @@ the form of::
|
||||||
As when logging in, you will need to specify a "Custom server". Specify your
|
As when logging in, you will need to specify a "Custom server". Specify your
|
||||||
desired ``localpart`` in the 'User name' box.
|
desired ``localpart`` in the 'User name' box.
|
||||||
|
|
||||||
ACME setup
|
|
||||||
==========
|
|
||||||
|
|
||||||
For details on having Synapse manage your federation TLS certificates
|
|
||||||
automatically, please see `<docs/ACME.md>`_.
|
|
||||||
|
|
||||||
|
|
||||||
Security note
|
Security note
|
||||||
=============
|
=============
|
||||||
|
|
||||||
|
|
1
changelog.d/10194.removal
Normal file
1
changelog.d/10194.removal
Normal file
|
@ -0,0 +1 @@
|
||||||
|
Remove Synapse's support for automatically fetching and renewing certificates using the ACME v1 protocol. This protocol has been fully turned off by Let's Encrypt for existing install on June 1st 2021. Admins previously using this feature should use a [reverse proxy](https://matrix-org.github.io/synapse/develop/reverse_proxy.html) to handle TLS termination, or use an external ACME client (such as [certbot](https://certbot.eff.org/)) to retrieve a certificate and key and provide them to Synapse using the `tls_certificate_path` and `tls_private_key_path` configuration settings.
|
|
@ -7,12 +7,6 @@
|
||||||
tls_certificate_path: "/data/{{ SYNAPSE_SERVER_NAME }}.tls.crt"
|
tls_certificate_path: "/data/{{ SYNAPSE_SERVER_NAME }}.tls.crt"
|
||||||
tls_private_key_path: "/data/{{ SYNAPSE_SERVER_NAME }}.tls.key"
|
tls_private_key_path: "/data/{{ SYNAPSE_SERVER_NAME }}.tls.key"
|
||||||
|
|
||||||
{% if SYNAPSE_ACME %}
|
|
||||||
acme:
|
|
||||||
enabled: true
|
|
||||||
port: 8009
|
|
||||||
{% endif %}
|
|
||||||
|
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
## Server ##
|
## Server ##
|
||||||
|
|
161
docs/ACME.md
161
docs/ACME.md
|
@ -1,161 +0,0 @@
|
||||||
# ACME
|
|
||||||
|
|
||||||
From version 1.0 (June 2019) onwards, Synapse requires valid TLS
|
|
||||||
certificates for communication between servers (by default on port
|
|
||||||
`8448`) in addition to those that are client-facing (port `443`). To
|
|
||||||
help homeserver admins fulfil this new requirement, Synapse v0.99.0
|
|
||||||
introduced support for automatically provisioning certificates through
|
|
||||||
[Let's Encrypt](https://letsencrypt.org/) using the ACME protocol.
|
|
||||||
|
|
||||||
## Deprecation of ACME v1
|
|
||||||
|
|
||||||
In [March 2019](https://community.letsencrypt.org/t/end-of-life-plan-for-acmev1/88430),
|
|
||||||
Let's Encrypt announced that they were deprecating version 1 of the ACME
|
|
||||||
protocol, with the plan to disable the use of it for new accounts in
|
|
||||||
November 2019, for new domains in June 2020, and for existing accounts and
|
|
||||||
domains in June 2021.
|
|
||||||
|
|
||||||
Synapse doesn't currently support version 2 of the ACME protocol, which
|
|
||||||
means that:
|
|
||||||
|
|
||||||
* for existing installs, Synapse's built-in ACME support will continue
|
|
||||||
to work until June 2021.
|
|
||||||
* for new installs, this feature will not work at all.
|
|
||||||
|
|
||||||
Either way, it is recommended to move from Synapse's ACME support
|
|
||||||
feature to an external automated tool such as [certbot](https://github.com/certbot/certbot)
|
|
||||||
(or browse [this list](https://letsencrypt.org/fr/docs/client-options/)
|
|
||||||
for an alternative ACME client).
|
|
||||||
|
|
||||||
It's also recommended to use a reverse proxy for the server-facing
|
|
||||||
communications (more documentation about this can be found
|
|
||||||
[here](/docs/reverse_proxy.md)) as well as the client-facing ones and
|
|
||||||
have it serve the certificates.
|
|
||||||
|
|
||||||
In case you can't do that and need Synapse to serve them itself, make
|
|
||||||
sure to set the `tls_certificate_path` configuration setting to the path
|
|
||||||
of the certificate (make sure to use the certificate containing the full
|
|
||||||
certification chain, e.g. `fullchain.pem` if using certbot) and
|
|
||||||
`tls_private_key_path` to the path of the matching private key. Note
|
|
||||||
that in this case you will need to restart Synapse after each
|
|
||||||
certificate renewal so that Synapse stops using the old certificate.
|
|
||||||
|
|
||||||
If you still want to use Synapse's built-in ACME support, the rest of
|
|
||||||
this document explains how to set it up.
|
|
||||||
|
|
||||||
## Initial setup
|
|
||||||
|
|
||||||
In the case that your `server_name` config variable is the same as
|
|
||||||
the hostname that the client connects to, then the same certificate can be
|
|
||||||
used between client and federation ports without issue.
|
|
||||||
|
|
||||||
If your configuration file does not already have an `acme` section, you can
|
|
||||||
generate an example config by running the `generate_config` executable. For
|
|
||||||
example:
|
|
||||||
|
|
||||||
```
|
|
||||||
~/synapse/env3/bin/generate_config
|
|
||||||
```
|
|
||||||
|
|
||||||
You will need to provide Let's Encrypt (or another ACME provider) access to
|
|
||||||
your Synapse ACME challenge responder on port 80, at the domain of your
|
|
||||||
homeserver. This requires you to either change the port of the ACME listener
|
|
||||||
provided by Synapse to a high port and reverse proxy to it, or use a tool
|
|
||||||
like `authbind` to allow Synapse to listen on port 80 without root access.
|
|
||||||
(Do not run Synapse with root permissions!) Detailed instructions are
|
|
||||||
available under "ACME setup" below.
|
|
||||||
|
|
||||||
If you already have certificates, you will need to back up or delete them
|
|
||||||
(files `example.com.tls.crt` and `example.com.tls.key` in Synapse's root
|
|
||||||
directory), Synapse's ACME implementation will not overwrite them.
|
|
||||||
|
|
||||||
## ACME setup
|
|
||||||
|
|
||||||
The main steps for enabling ACME support in short summary are:
|
|
||||||
|
|
||||||
1. Allow Synapse to listen for incoming ACME challenges.
|
|
||||||
1. Enable ACME support in `homeserver.yaml`.
|
|
||||||
1. Move your old certificates (files `example.com.tls.crt` and `example.com.tls.key` out of the way if they currently exist at the paths specified in `homeserver.yaml`.
|
|
||||||
1. Restart Synapse.
|
|
||||||
|
|
||||||
Detailed instructions for each step are provided below.
|
|
||||||
|
|
||||||
### Listening on port 80
|
|
||||||
|
|
||||||
In order for Synapse to complete the ACME challenge to provision a
|
|
||||||
certificate, it needs access to port 80. Typically listening on port 80 is
|
|
||||||
only granted to applications running as root. There are thus two solutions to
|
|
||||||
this problem.
|
|
||||||
|
|
||||||
#### Using a reverse proxy
|
|
||||||
|
|
||||||
A reverse proxy such as Apache or nginx allows a single process (the web
|
|
||||||
server) to listen on port 80 and proxy traffic to the appropriate program
|
|
||||||
running on your server. It is the recommended method for setting up ACME as
|
|
||||||
it allows you to use your existing webserver while also allowing Synapse to
|
|
||||||
provision certificates as needed.
|
|
||||||
|
|
||||||
For nginx users, add the following line to your existing `server` block:
|
|
||||||
|
|
||||||
```
|
|
||||||
location /.well-known/acme-challenge {
|
|
||||||
proxy_pass http://localhost:8009;
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
For Apache, add the following to your existing webserver config:
|
|
||||||
|
|
||||||
```
|
|
||||||
ProxyPass /.well-known/acme-challenge http://localhost:8009/.well-known/acme-challenge
|
|
||||||
```
|
|
||||||
|
|
||||||
Make sure to restart/reload your webserver after making changes.
|
|
||||||
|
|
||||||
Now make the relevant changes in `homeserver.yaml` to enable ACME support:
|
|
||||||
|
|
||||||
```
|
|
||||||
acme:
|
|
||||||
enabled: true
|
|
||||||
port: 8009
|
|
||||||
```
|
|
||||||
|
|
||||||
#### Authbind
|
|
||||||
|
|
||||||
`authbind` allows a program which does not run as root to bind to
|
|
||||||
low-numbered ports in a controlled way. The setup is simpler, but requires a
|
|
||||||
webserver not to already be running on port 80. **This includes every time
|
|
||||||
Synapse renews a certificate**, which may be cumbersome if you usually run a
|
|
||||||
web server on port 80. Nevertheless, if you're sure port 80 is not being used
|
|
||||||
for any other purpose then all that is necessary is the following:
|
|
||||||
|
|
||||||
Install `authbind`. For example, on Debian/Ubuntu:
|
|
||||||
|
|
||||||
```
|
|
||||||
sudo apt-get install authbind
|
|
||||||
```
|
|
||||||
|
|
||||||
Allow `authbind` to bind port 80:
|
|
||||||
|
|
||||||
```
|
|
||||||
sudo touch /etc/authbind/byport/80
|
|
||||||
sudo chmod 777 /etc/authbind/byport/80
|
|
||||||
```
|
|
||||||
|
|
||||||
When Synapse is started, use the following syntax:
|
|
||||||
|
|
||||||
```
|
|
||||||
authbind --deep <synapse start command>
|
|
||||||
```
|
|
||||||
|
|
||||||
Make the relevant changes in `homeserver.yaml` to enable ACME support:
|
|
||||||
|
|
||||||
```
|
|
||||||
acme:
|
|
||||||
enabled: true
|
|
||||||
```
|
|
||||||
|
|
||||||
### (Re)starting synapse
|
|
||||||
|
|
||||||
Ensure that the certificate paths specified in `homeserver.yaml` (`tls_certificate_path` and `tls_private_key_path`) do not currently point to any files. Synapse will not provision certificates if files exist, as it does not want to overwrite existing certificates.
|
|
||||||
|
|
||||||
Finally, start/restart Synapse.
|
|
|
@ -101,15 +101,6 @@ In this case, your `server_name` points to the host where your Synapse is
|
||||||
running. There is no need to create a `.well-known` URI or an SRV record, but
|
running. There is no need to create a `.well-known` URI or an SRV record, but
|
||||||
you will need to give Synapse a valid, signed, certificate.
|
you will need to give Synapse a valid, signed, certificate.
|
||||||
|
|
||||||
The easiest way to do that is with Synapse's built-in ACME (Let's Encrypt)
|
|
||||||
support. Full details are in [ACME.md](./ACME.md) but, in a nutshell:
|
|
||||||
|
|
||||||
1. Allow Synapse to listen on port 80 with `authbind`, or forward it from a
|
|
||||||
reverse proxy.
|
|
||||||
2. Enable acme support in `homeserver.yaml`.
|
|
||||||
3. Move your old certificates out of the way.
|
|
||||||
4. Restart Synapse.
|
|
||||||
|
|
||||||
### If you do have an SRV record currently
|
### If you do have an SRV record currently
|
||||||
|
|
||||||
If you are using an SRV record, your matrix domain (`server_name`) may not
|
If you are using an SRV record, your matrix domain (`server_name`) may not
|
||||||
|
@ -130,15 +121,9 @@ In this situation, you have three choices for how to proceed:
|
||||||
#### Option 1: give Synapse a certificate for your matrix domain
|
#### Option 1: give Synapse a certificate for your matrix domain
|
||||||
|
|
||||||
Synapse 1.0 will expect your server to present a TLS certificate for your
|
Synapse 1.0 will expect your server to present a TLS certificate for your
|
||||||
`server_name` (`example.com` in the above example). You can achieve this by
|
`server_name` (`example.com` in the above example). You can achieve this by acquiring a
|
||||||
doing one of the following:
|
certificate for the `server_name` yourself (for example, using `certbot`), and giving it
|
||||||
|
and the key to Synapse via `tls_certificate_path` and `tls_private_key_path`.
|
||||||
* Acquire a certificate for the `server_name` yourself (for example, using
|
|
||||||
`certbot`), and give it and the key to Synapse via `tls_certificate_path`
|
|
||||||
and `tls_private_key_path`, or:
|
|
||||||
|
|
||||||
* Use Synapse's [ACME support](./ACME.md), and forward port 80 on the
|
|
||||||
`server_name` domain to your Synapse instance.
|
|
||||||
|
|
||||||
#### Option 2: run Synapse behind a reverse proxy
|
#### Option 2: run Synapse behind a reverse proxy
|
||||||
|
|
||||||
|
@ -161,10 +146,9 @@ You can do this with a `.well-known` file as follows:
|
||||||
with Synapse 0.34 and earlier.
|
with Synapse 0.34 and earlier.
|
||||||
|
|
||||||
2. Give Synapse a certificate corresponding to the target domain
|
2. Give Synapse a certificate corresponding to the target domain
|
||||||
(`customer.example.net` in the above example). You can either use Synapse's
|
(`customer.example.net` in the above example). You can do this by acquire a
|
||||||
built-in [ACME support](./ACME.md) for this (via the `domain` parameter in
|
certificate for the target domain and giving it to Synapse via `tls_certificate_path`
|
||||||
the `acme` section), or acquire a certificate yourself and give it to
|
and `tls_private_key_path`.
|
||||||
Synapse via `tls_certificate_path` and `tls_private_key_path`.
|
|
||||||
|
|
||||||
3. Restart Synapse to ensure the new certificate is loaded.
|
3. Restart Synapse to ensure the new certificate is loaded.
|
||||||
|
|
||||||
|
|
|
@ -552,13 +552,9 @@ retention:
|
||||||
# This certificate, as of Synapse 1.0, will need to be a valid and verifiable
|
# This certificate, as of Synapse 1.0, will need to be a valid and verifiable
|
||||||
# certificate, signed by a recognised Certificate Authority.
|
# certificate, signed by a recognised Certificate Authority.
|
||||||
#
|
#
|
||||||
# See 'ACME support' below to enable auto-provisioning this certificate via
|
# Be sure to use a `.pem` file that includes the full certificate chain including
|
||||||
# Let's Encrypt.
|
# any intermediate certificates (for instance, if using certbot, use
|
||||||
#
|
# `fullchain.pem` as your certificate, not `cert.pem`).
|
||||||
# If supplying your own, be sure to use a `.pem` file that includes the
|
|
||||||
# full certificate chain including any intermediate certificates (for
|
|
||||||
# instance, if using certbot, use `fullchain.pem` as your certificate,
|
|
||||||
# not `cert.pem`).
|
|
||||||
#
|
#
|
||||||
#tls_certificate_path: "CONFDIR/SERVERNAME.tls.crt"
|
#tls_certificate_path: "CONFDIR/SERVERNAME.tls.crt"
|
||||||
|
|
||||||
|
@ -609,80 +605,6 @@ retention:
|
||||||
# - myCA2.pem
|
# - myCA2.pem
|
||||||
# - myCA3.pem
|
# - myCA3.pem
|
||||||
|
|
||||||
# ACME support: This will configure Synapse to request a valid TLS certificate
|
|
||||||
# for your configured `server_name` via Let's Encrypt.
|
|
||||||
#
|
|
||||||
# Note that ACME v1 is now deprecated, and Synapse currently doesn't support
|
|
||||||
# ACME v2. This means that this feature currently won't work with installs set
|
|
||||||
# up after November 2019. For more info, and alternative solutions, see
|
|
||||||
# https://github.com/matrix-org/synapse/blob/master/docs/ACME.md#deprecation-of-acme-v1
|
|
||||||
#
|
|
||||||
# Note that provisioning a certificate in this way requires port 80 to be
|
|
||||||
# routed to Synapse so that it can complete the http-01 ACME challenge.
|
|
||||||
# By default, if you enable ACME support, Synapse will attempt to listen on
|
|
||||||
# port 80 for incoming http-01 challenges - however, this will likely fail
|
|
||||||
# with 'Permission denied' or a similar error.
|
|
||||||
#
|
|
||||||
# There are a couple of potential solutions to this:
|
|
||||||
#
|
|
||||||
# * If you already have an Apache, Nginx, or similar listening on port 80,
|
|
||||||
# you can configure Synapse to use an alternate port, and have your web
|
|
||||||
# server forward the requests. For example, assuming you set 'port: 8009'
|
|
||||||
# below, on Apache, you would write:
|
|
||||||
#
|
|
||||||
# ProxyPass /.well-known/acme-challenge http://localhost:8009/.well-known/acme-challenge
|
|
||||||
#
|
|
||||||
# * Alternatively, you can use something like `authbind` to give Synapse
|
|
||||||
# permission to listen on port 80.
|
|
||||||
#
|
|
||||||
acme:
|
|
||||||
# ACME support is disabled by default. Set this to `true` and uncomment
|
|
||||||
# tls_certificate_path and tls_private_key_path above to enable it.
|
|
||||||
#
|
|
||||||
enabled: false
|
|
||||||
|
|
||||||
# Endpoint to use to request certificates. If you only want to test,
|
|
||||||
# use Let's Encrypt's staging url:
|
|
||||||
# https://acme-staging.api.letsencrypt.org/directory
|
|
||||||
#
|
|
||||||
#url: https://acme-v01.api.letsencrypt.org/directory
|
|
||||||
|
|
||||||
# Port number to listen on for the HTTP-01 challenge. Change this if
|
|
||||||
# you are forwarding connections through Apache/Nginx/etc.
|
|
||||||
#
|
|
||||||
port: 80
|
|
||||||
|
|
||||||
# Local addresses to listen on for incoming connections.
|
|
||||||
# Again, you may want to change this if you are forwarding connections
|
|
||||||
# through Apache/Nginx/etc.
|
|
||||||
#
|
|
||||||
bind_addresses: ['::', '0.0.0.0']
|
|
||||||
|
|
||||||
# How many days remaining on a certificate before it is renewed.
|
|
||||||
#
|
|
||||||
reprovision_threshold: 30
|
|
||||||
|
|
||||||
# The domain that the certificate should be for. Normally this
|
|
||||||
# should be the same as your Matrix domain (i.e., 'server_name'), but,
|
|
||||||
# by putting a file at 'https://<server_name>/.well-known/matrix/server',
|
|
||||||
# you can delegate incoming traffic to another server. If you do that,
|
|
||||||
# you should give the target of the delegation here.
|
|
||||||
#
|
|
||||||
# For example: if your 'server_name' is 'example.com', but
|
|
||||||
# 'https://example.com/.well-known/matrix/server' delegates to
|
|
||||||
# 'matrix.example.com', you should put 'matrix.example.com' here.
|
|
||||||
#
|
|
||||||
# If not set, defaults to your 'server_name'.
|
|
||||||
#
|
|
||||||
domain: matrix.example.com
|
|
||||||
|
|
||||||
# file to use for the account key. This will be generated if it doesn't
|
|
||||||
# exist.
|
|
||||||
#
|
|
||||||
# If unspecified, we will use CONFDIR/client.key.
|
|
||||||
#
|
|
||||||
account_key_file: DATADIR/acme_account.key
|
|
||||||
|
|
||||||
|
|
||||||
## Federation ##
|
## Federation ##
|
||||||
|
|
||||||
|
|
3
mypy.ini
3
mypy.ini
|
@ -176,9 +176,6 @@ ignore_missing_imports = True
|
||||||
[mypy-josepy.*]
|
[mypy-josepy.*]
|
||||||
ignore_missing_imports = True
|
ignore_missing_imports = True
|
||||||
|
|
||||||
[mypy-txacme.*]
|
|
||||||
ignore_missing_imports = True
|
|
||||||
|
|
||||||
[mypy-pympler.*]
|
[mypy-pympler.*]
|
||||||
ignore_missing_imports = True
|
ignore_missing_imports = True
|
||||||
|
|
||||||
|
|
|
@ -289,8 +289,7 @@ async def start(hs: "synapse.server.HomeServer"):
|
||||||
"""
|
"""
|
||||||
Start a Synapse server or worker.
|
Start a Synapse server or worker.
|
||||||
|
|
||||||
Should be called once the reactor is running and (if we're using ACME) the
|
Should be called once the reactor is running.
|
||||||
TLS certificates are in place.
|
|
||||||
|
|
||||||
Will start the main HTTP listeners and do some other startup tasks, and then
|
Will start the main HTTP listeners and do some other startup tasks, and then
|
||||||
notify systemd.
|
notify systemd.
|
||||||
|
|
|
@ -363,55 +363,7 @@ def setup(config_options):
|
||||||
except UpgradeDatabaseException as e:
|
except UpgradeDatabaseException as e:
|
||||||
quit_with_error("Failed to upgrade database: %s" % (e,))
|
quit_with_error("Failed to upgrade database: %s" % (e,))
|
||||||
|
|
||||||
async def do_acme() -> bool:
|
|
||||||
"""
|
|
||||||
Reprovision an ACME certificate, if it's required.
|
|
||||||
|
|
||||||
Returns:
|
|
||||||
Whether the cert has been updated.
|
|
||||||
"""
|
|
||||||
acme = hs.get_acme_handler()
|
|
||||||
|
|
||||||
# Check how long the certificate is active for.
|
|
||||||
cert_days_remaining = hs.config.is_disk_cert_valid(allow_self_signed=False)
|
|
||||||
|
|
||||||
# We want to reprovision if cert_days_remaining is None (meaning no
|
|
||||||
# certificate exists), or the days remaining number it returns
|
|
||||||
# is less than our re-registration threshold.
|
|
||||||
provision = False
|
|
||||||
|
|
||||||
if (
|
|
||||||
cert_days_remaining is None
|
|
||||||
or cert_days_remaining < hs.config.acme_reprovision_threshold
|
|
||||||
):
|
|
||||||
provision = True
|
|
||||||
|
|
||||||
if provision:
|
|
||||||
await acme.provision_certificate()
|
|
||||||
|
|
||||||
return provision
|
|
||||||
|
|
||||||
async def reprovision_acme():
|
|
||||||
"""
|
|
||||||
Provision a certificate from ACME, if required, and reload the TLS
|
|
||||||
certificate if it's renewed.
|
|
||||||
"""
|
|
||||||
reprovisioned = await do_acme()
|
|
||||||
if reprovisioned:
|
|
||||||
_base.refresh_certificate(hs)
|
|
||||||
|
|
||||||
async def start():
|
async def start():
|
||||||
# Run the ACME provisioning code, if it's enabled.
|
|
||||||
if hs.config.acme_enabled:
|
|
||||||
acme = hs.get_acme_handler()
|
|
||||||
# Start up the webservices which we will respond to ACME
|
|
||||||
# challenges with, and then provision.
|
|
||||||
await acme.start_listening()
|
|
||||||
await do_acme()
|
|
||||||
|
|
||||||
# Check if it needs to be reprovisioned every day.
|
|
||||||
hs.get_clock().looping_call(reprovision_acme, 24 * 60 * 60 * 1000)
|
|
||||||
|
|
||||||
# Load the OIDC provider metadatas, if OIDC is enabled.
|
# Load the OIDC provider metadatas, if OIDC is enabled.
|
||||||
if hs.config.oidc_enabled:
|
if hs.config.oidc_enabled:
|
||||||
oidc = hs.get_oidc_handler()
|
oidc = hs.get_oidc_handler()
|
||||||
|
|
|
@ -405,7 +405,6 @@ class RootConfig:
|
||||||
listeners=None,
|
listeners=None,
|
||||||
tls_certificate_path=None,
|
tls_certificate_path=None,
|
||||||
tls_private_key_path=None,
|
tls_private_key_path=None,
|
||||||
acme_domain=None,
|
|
||||||
):
|
):
|
||||||
"""
|
"""
|
||||||
Build a default configuration file
|
Build a default configuration file
|
||||||
|
@ -457,9 +456,6 @@ class RootConfig:
|
||||||
|
|
||||||
tls_private_key_path (str|None): The path to the tls private key.
|
tls_private_key_path (str|None): The path to the tls private key.
|
||||||
|
|
||||||
acme_domain (str|None): The domain acme will try to validate. If
|
|
||||||
specified acme will be enabled.
|
|
||||||
|
|
||||||
Returns:
|
Returns:
|
||||||
str: the yaml config file
|
str: the yaml config file
|
||||||
"""
|
"""
|
||||||
|
@ -477,7 +473,6 @@ class RootConfig:
|
||||||
listeners=listeners,
|
listeners=listeners,
|
||||||
tls_certificate_path=tls_certificate_path,
|
tls_certificate_path=tls_certificate_path,
|
||||||
tls_private_key_path=tls_private_key_path,
|
tls_private_key_path=tls_private_key_path,
|
||||||
acme_domain=acme_domain,
|
|
||||||
).values()
|
).values()
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|
|
@ -111,7 +111,6 @@ class RootConfig:
|
||||||
database_conf: Optional[Any] = ...,
|
database_conf: Optional[Any] = ...,
|
||||||
tls_certificate_path: Optional[str] = ...,
|
tls_certificate_path: Optional[str] = ...,
|
||||||
tls_private_key_path: Optional[str] = ...,
|
tls_private_key_path: Optional[str] = ...,
|
||||||
acme_domain: Optional[str] = ...,
|
|
||||||
): ...
|
): ...
|
||||||
@classmethod
|
@classmethod
|
||||||
def load_or_generate_config(cls, description: Any, argv: Any): ...
|
def load_or_generate_config(cls, description: Any, argv: Any): ...
|
||||||
|
|
|
@ -14,7 +14,6 @@
|
||||||
|
|
||||||
import logging
|
import logging
|
||||||
import os
|
import os
|
||||||
import warnings
|
|
||||||
from datetime import datetime
|
from datetime import datetime
|
||||||
from typing import List, Optional, Pattern
|
from typing import List, Optional, Pattern
|
||||||
|
|
||||||
|
@ -26,45 +25,12 @@ from synapse.util import glob_to_regex
|
||||||
|
|
||||||
logger = logging.getLogger(__name__)
|
logger = logging.getLogger(__name__)
|
||||||
|
|
||||||
ACME_SUPPORT_ENABLED_WARN = """\
|
|
||||||
This server uses Synapse's built-in ACME support. Note that ACME v1 has been
|
|
||||||
deprecated by Let's Encrypt, and that Synapse doesn't currently support ACME v2,
|
|
||||||
which means that this feature will not work with Synapse installs set up after
|
|
||||||
November 2019, and that it may stop working on June 2020 for installs set up
|
|
||||||
before that date.
|
|
||||||
|
|
||||||
For more info and alternative solutions, see
|
|
||||||
https://github.com/matrix-org/synapse/blob/master/docs/ACME.md#deprecation-of-acme-v1
|
|
||||||
--------------------------------------------------------------------------------"""
|
|
||||||
|
|
||||||
|
|
||||||
class TlsConfig(Config):
|
class TlsConfig(Config):
|
||||||
section = "tls"
|
section = "tls"
|
||||||
|
|
||||||
def read_config(self, config: dict, config_dir_path: str, **kwargs):
|
def read_config(self, config: dict, config_dir_path: str, **kwargs):
|
||||||
|
|
||||||
acme_config = config.get("acme", None)
|
|
||||||
if acme_config is None:
|
|
||||||
acme_config = {}
|
|
||||||
|
|
||||||
self.acme_enabled = acme_config.get("enabled", False)
|
|
||||||
|
|
||||||
if self.acme_enabled:
|
|
||||||
logger.warning(ACME_SUPPORT_ENABLED_WARN)
|
|
||||||
|
|
||||||
# hyperlink complains on py2 if this is not a Unicode
|
|
||||||
self.acme_url = str(
|
|
||||||
acme_config.get("url", "https://acme-v01.api.letsencrypt.org/directory")
|
|
||||||
)
|
|
||||||
self.acme_port = acme_config.get("port", 80)
|
|
||||||
self.acme_bind_addresses = acme_config.get("bind_addresses", ["::", "0.0.0.0"])
|
|
||||||
self.acme_reprovision_threshold = acme_config.get("reprovision_threshold", 30)
|
|
||||||
self.acme_domain = acme_config.get("domain", config.get("server_name"))
|
|
||||||
|
|
||||||
self.acme_account_key_file = self.abspath(
|
|
||||||
acme_config.get("account_key_file", config_dir_path + "/client.key")
|
|
||||||
)
|
|
||||||
|
|
||||||
self.tls_certificate_file = self.abspath(config.get("tls_certificate_path"))
|
self.tls_certificate_file = self.abspath(config.get("tls_certificate_path"))
|
||||||
self.tls_private_key_file = self.abspath(config.get("tls_private_key_path"))
|
self.tls_private_key_file = self.abspath(config.get("tls_private_key_path"))
|
||||||
|
|
||||||
|
@ -229,11 +195,9 @@ class TlsConfig(Config):
|
||||||
data_dir_path,
|
data_dir_path,
|
||||||
tls_certificate_path,
|
tls_certificate_path,
|
||||||
tls_private_key_path,
|
tls_private_key_path,
|
||||||
acme_domain,
|
|
||||||
**kwargs,
|
**kwargs,
|
||||||
):
|
):
|
||||||
"""If the acme_domain is specified acme will be enabled.
|
"""If the TLS paths are not specified the default will be certs in the
|
||||||
If the TLS paths are not specified the default will be certs in the
|
|
||||||
config directory"""
|
config directory"""
|
||||||
|
|
||||||
base_key_name = os.path.join(config_dir_path, server_name)
|
base_key_name = os.path.join(config_dir_path, server_name)
|
||||||
|
@ -243,28 +207,15 @@ class TlsConfig(Config):
|
||||||
"Please specify both a cert path and a key path or neither."
|
"Please specify both a cert path and a key path or neither."
|
||||||
)
|
)
|
||||||
|
|
||||||
tls_enabled = (
|
tls_enabled = "" if tls_certificate_path and tls_private_key_path else "#"
|
||||||
"" if tls_certificate_path and tls_private_key_path or acme_domain else "#"
|
|
||||||
)
|
|
||||||
|
|
||||||
if not tls_certificate_path:
|
if not tls_certificate_path:
|
||||||
tls_certificate_path = base_key_name + ".tls.crt"
|
tls_certificate_path = base_key_name + ".tls.crt"
|
||||||
if not tls_private_key_path:
|
if not tls_private_key_path:
|
||||||
tls_private_key_path = base_key_name + ".tls.key"
|
tls_private_key_path = base_key_name + ".tls.key"
|
||||||
|
|
||||||
acme_enabled = bool(acme_domain)
|
|
||||||
acme_domain = "matrix.example.com"
|
|
||||||
|
|
||||||
default_acme_account_file = os.path.join(data_dir_path, "acme_account.key")
|
|
||||||
|
|
||||||
# this is to avoid the max line length. Sorrynotsorry
|
|
||||||
proxypassline = (
|
|
||||||
"ProxyPass /.well-known/acme-challenge "
|
|
||||||
"http://localhost:8009/.well-known/acme-challenge"
|
|
||||||
)
|
|
||||||
|
|
||||||
# flake8 doesn't recognise that variables are used in the below string
|
# flake8 doesn't recognise that variables are used in the below string
|
||||||
_ = tls_enabled, proxypassline, acme_enabled, default_acme_account_file
|
_ = tls_enabled
|
||||||
|
|
||||||
return (
|
return (
|
||||||
"""\
|
"""\
|
||||||
|
@ -274,13 +225,9 @@ class TlsConfig(Config):
|
||||||
# This certificate, as of Synapse 1.0, will need to be a valid and verifiable
|
# This certificate, as of Synapse 1.0, will need to be a valid and verifiable
|
||||||
# certificate, signed by a recognised Certificate Authority.
|
# certificate, signed by a recognised Certificate Authority.
|
||||||
#
|
#
|
||||||
# See 'ACME support' below to enable auto-provisioning this certificate via
|
# Be sure to use a `.pem` file that includes the full certificate chain including
|
||||||
# Let's Encrypt.
|
# any intermediate certificates (for instance, if using certbot, use
|
||||||
#
|
# `fullchain.pem` as your certificate, not `cert.pem`).
|
||||||
# If supplying your own, be sure to use a `.pem` file that includes the
|
|
||||||
# full certificate chain including any intermediate certificates (for
|
|
||||||
# instance, if using certbot, use `fullchain.pem` as your certificate,
|
|
||||||
# not `cert.pem`).
|
|
||||||
#
|
#
|
||||||
%(tls_enabled)stls_certificate_path: "%(tls_certificate_path)s"
|
%(tls_enabled)stls_certificate_path: "%(tls_certificate_path)s"
|
||||||
|
|
||||||
|
@ -330,80 +277,6 @@ class TlsConfig(Config):
|
||||||
# - myCA1.pem
|
# - myCA1.pem
|
||||||
# - myCA2.pem
|
# - myCA2.pem
|
||||||
# - myCA3.pem
|
# - myCA3.pem
|
||||||
|
|
||||||
# ACME support: This will configure Synapse to request a valid TLS certificate
|
|
||||||
# for your configured `server_name` via Let's Encrypt.
|
|
||||||
#
|
|
||||||
# Note that ACME v1 is now deprecated, and Synapse currently doesn't support
|
|
||||||
# ACME v2. This means that this feature currently won't work with installs set
|
|
||||||
# up after November 2019. For more info, and alternative solutions, see
|
|
||||||
# https://github.com/matrix-org/synapse/blob/master/docs/ACME.md#deprecation-of-acme-v1
|
|
||||||
#
|
|
||||||
# Note that provisioning a certificate in this way requires port 80 to be
|
|
||||||
# routed to Synapse so that it can complete the http-01 ACME challenge.
|
|
||||||
# By default, if you enable ACME support, Synapse will attempt to listen on
|
|
||||||
# port 80 for incoming http-01 challenges - however, this will likely fail
|
|
||||||
# with 'Permission denied' or a similar error.
|
|
||||||
#
|
|
||||||
# There are a couple of potential solutions to this:
|
|
||||||
#
|
|
||||||
# * If you already have an Apache, Nginx, or similar listening on port 80,
|
|
||||||
# you can configure Synapse to use an alternate port, and have your web
|
|
||||||
# server forward the requests. For example, assuming you set 'port: 8009'
|
|
||||||
# below, on Apache, you would write:
|
|
||||||
#
|
|
||||||
# %(proxypassline)s
|
|
||||||
#
|
|
||||||
# * Alternatively, you can use something like `authbind` to give Synapse
|
|
||||||
# permission to listen on port 80.
|
|
||||||
#
|
|
||||||
acme:
|
|
||||||
# ACME support is disabled by default. Set this to `true` and uncomment
|
|
||||||
# tls_certificate_path and tls_private_key_path above to enable it.
|
|
||||||
#
|
|
||||||
enabled: %(acme_enabled)s
|
|
||||||
|
|
||||||
# Endpoint to use to request certificates. If you only want to test,
|
|
||||||
# use Let's Encrypt's staging url:
|
|
||||||
# https://acme-staging.api.letsencrypt.org/directory
|
|
||||||
#
|
|
||||||
#url: https://acme-v01.api.letsencrypt.org/directory
|
|
||||||
|
|
||||||
# Port number to listen on for the HTTP-01 challenge. Change this if
|
|
||||||
# you are forwarding connections through Apache/Nginx/etc.
|
|
||||||
#
|
|
||||||
port: 80
|
|
||||||
|
|
||||||
# Local addresses to listen on for incoming connections.
|
|
||||||
# Again, you may want to change this if you are forwarding connections
|
|
||||||
# through Apache/Nginx/etc.
|
|
||||||
#
|
|
||||||
bind_addresses: ['::', '0.0.0.0']
|
|
||||||
|
|
||||||
# How many days remaining on a certificate before it is renewed.
|
|
||||||
#
|
|
||||||
reprovision_threshold: 30
|
|
||||||
|
|
||||||
# The domain that the certificate should be for. Normally this
|
|
||||||
# should be the same as your Matrix domain (i.e., 'server_name'), but,
|
|
||||||
# by putting a file at 'https://<server_name>/.well-known/matrix/server',
|
|
||||||
# you can delegate incoming traffic to another server. If you do that,
|
|
||||||
# you should give the target of the delegation here.
|
|
||||||
#
|
|
||||||
# For example: if your 'server_name' is 'example.com', but
|
|
||||||
# 'https://example.com/.well-known/matrix/server' delegates to
|
|
||||||
# 'matrix.example.com', you should put 'matrix.example.com' here.
|
|
||||||
#
|
|
||||||
# If not set, defaults to your 'server_name'.
|
|
||||||
#
|
|
||||||
domain: %(acme_domain)s
|
|
||||||
|
|
||||||
# file to use for the account key. This will be generated if it doesn't
|
|
||||||
# exist.
|
|
||||||
#
|
|
||||||
# If unspecified, we will use CONFDIR/client.key.
|
|
||||||
#
|
|
||||||
account_key_file: %(default_acme_account_file)s
|
|
||||||
"""
|
"""
|
||||||
# Lowercase the string representation of boolean values
|
# Lowercase the string representation of boolean values
|
||||||
% {
|
% {
|
||||||
|
@ -415,8 +288,6 @@ class TlsConfig(Config):
|
||||||
def read_tls_certificate(self) -> crypto.X509:
|
def read_tls_certificate(self) -> crypto.X509:
|
||||||
"""Reads the TLS certificate from the configured file, and returns it
|
"""Reads the TLS certificate from the configured file, and returns it
|
||||||
|
|
||||||
Also checks if it is self-signed, and warns if so
|
|
||||||
|
|
||||||
Returns:
|
Returns:
|
||||||
The certificate
|
The certificate
|
||||||
"""
|
"""
|
||||||
|
@ -425,16 +296,6 @@ class TlsConfig(Config):
|
||||||
cert_pem = self.read_file(cert_path, "tls_certificate_path")
|
cert_pem = self.read_file(cert_path, "tls_certificate_path")
|
||||||
cert = crypto.load_certificate(crypto.FILETYPE_PEM, cert_pem)
|
cert = crypto.load_certificate(crypto.FILETYPE_PEM, cert_pem)
|
||||||
|
|
||||||
# Check if it is self-signed, and issue a warning if so.
|
|
||||||
if cert.get_issuer() == cert.get_subject():
|
|
||||||
warnings.warn(
|
|
||||||
(
|
|
||||||
"Self-signed TLS certificates will not be accepted by Synapse 1.0. "
|
|
||||||
"Please either provide a valid certificate, or use Synapse's ACME "
|
|
||||||
"support to provision one."
|
|
||||||
)
|
|
||||||
)
|
|
||||||
|
|
||||||
return cert
|
return cert
|
||||||
|
|
||||||
def read_tls_private_key(self) -> crypto.PKey:
|
def read_tls_private_key(self) -> crypto.PKey:
|
||||||
|
|
|
@ -1,117 +0,0 @@
|
||||||
# Copyright 2019 New Vector Ltd
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
import logging
|
|
||||||
from typing import TYPE_CHECKING
|
|
||||||
|
|
||||||
import twisted
|
|
||||||
import twisted.internet.error
|
|
||||||
from twisted.web import server, static
|
|
||||||
from twisted.web.resource import Resource
|
|
||||||
|
|
||||||
from synapse.app import check_bind_error
|
|
||||||
|
|
||||||
if TYPE_CHECKING:
|
|
||||||
from synapse.server import HomeServer
|
|
||||||
|
|
||||||
logger = logging.getLogger(__name__)
|
|
||||||
|
|
||||||
ACME_REGISTER_FAIL_ERROR = """
|
|
||||||
--------------------------------------------------------------------------------
|
|
||||||
Failed to register with the ACME provider. This is likely happening because the installation
|
|
||||||
is new, and ACME v1 has been deprecated by Let's Encrypt and disabled for
|
|
||||||
new installations since November 2019.
|
|
||||||
At the moment, Synapse doesn't support ACME v2. For more information and alternative
|
|
||||||
solutions, please read https://github.com/matrix-org/synapse/blob/master/docs/ACME.md#deprecation-of-acme-v1
|
|
||||||
--------------------------------------------------------------------------------"""
|
|
||||||
|
|
||||||
|
|
||||||
class AcmeHandler:
|
|
||||||
def __init__(self, hs: "HomeServer"):
|
|
||||||
self.hs = hs
|
|
||||||
self.reactor = hs.get_reactor()
|
|
||||||
self._acme_domain = hs.config.acme_domain
|
|
||||||
|
|
||||||
async def start_listening(self) -> None:
|
|
||||||
from synapse.handlers import acme_issuing_service
|
|
||||||
|
|
||||||
# Configure logging for txacme, if you need to debug
|
|
||||||
# from eliot import add_destinations
|
|
||||||
# from eliot.twisted import TwistedDestination
|
|
||||||
#
|
|
||||||
# add_destinations(TwistedDestination())
|
|
||||||
|
|
||||||
well_known = Resource()
|
|
||||||
|
|
||||||
self._issuer = acme_issuing_service.create_issuing_service(
|
|
||||||
self.reactor,
|
|
||||||
acme_url=self.hs.config.acme_url,
|
|
||||||
account_key_file=self.hs.config.acme_account_key_file,
|
|
||||||
well_known_resource=well_known,
|
|
||||||
)
|
|
||||||
|
|
||||||
responder_resource = Resource()
|
|
||||||
responder_resource.putChild(b".well-known", well_known)
|
|
||||||
responder_resource.putChild(b"check", static.Data(b"OK", b"text/plain"))
|
|
||||||
srv = server.Site(responder_resource)
|
|
||||||
|
|
||||||
bind_addresses = self.hs.config.acme_bind_addresses
|
|
||||||
for host in bind_addresses:
|
|
||||||
logger.info(
|
|
||||||
"Listening for ACME requests on %s:%i", host, self.hs.config.acme_port
|
|
||||||
)
|
|
||||||
try:
|
|
||||||
self.reactor.listenTCP(
|
|
||||||
self.hs.config.acme_port, srv, backlog=50, interface=host
|
|
||||||
)
|
|
||||||
except twisted.internet.error.CannotListenError as e:
|
|
||||||
check_bind_error(e, host, bind_addresses)
|
|
||||||
|
|
||||||
# Make sure we are registered to the ACME server. There's no public API
|
|
||||||
# for this, it is usually triggered by startService, but since we don't
|
|
||||||
# want it to control where we save the certificates, we have to reach in
|
|
||||||
# and trigger the registration machinery ourselves.
|
|
||||||
self._issuer._registered = False
|
|
||||||
|
|
||||||
try:
|
|
||||||
await self._issuer._ensure_registered()
|
|
||||||
except Exception:
|
|
||||||
logger.error(ACME_REGISTER_FAIL_ERROR)
|
|
||||||
raise
|
|
||||||
|
|
||||||
async def provision_certificate(self) -> None:
|
|
||||||
|
|
||||||
logger.warning("Reprovisioning %s", self._acme_domain)
|
|
||||||
|
|
||||||
try:
|
|
||||||
await self._issuer.issue_cert(self._acme_domain)
|
|
||||||
except Exception:
|
|
||||||
logger.exception("Fail!")
|
|
||||||
raise
|
|
||||||
logger.warning("Reprovisioned %s, saving.", self._acme_domain)
|
|
||||||
cert_chain = self._issuer.cert_store.certs[self._acme_domain]
|
|
||||||
|
|
||||||
try:
|
|
||||||
with open(self.hs.config.tls_private_key_file, "wb") as private_key_file:
|
|
||||||
for x in cert_chain:
|
|
||||||
if x.startswith(b"-----BEGIN RSA PRIVATE KEY-----"):
|
|
||||||
private_key_file.write(x)
|
|
||||||
|
|
||||||
with open(self.hs.config.tls_certificate_file, "wb") as certificate_file:
|
|
||||||
for x in cert_chain:
|
|
||||||
if x.startswith(b"-----BEGIN CERTIFICATE-----"):
|
|
||||||
certificate_file.write(x)
|
|
||||||
except Exception:
|
|
||||||
logger.exception("Failed saving!")
|
|
||||||
raise
|
|
|
@ -1,127 +0,0 @@
|
||||||
# Copyright 2019 New Vector Ltd
|
|
||||||
# Copyright 2019 The Matrix.org Foundation C.I.C.
|
|
||||||
#
|
|
||||||
# Licensed under the Apache License, Version 2.0 (the "License");
|
|
||||||
# you may not use this file except in compliance with the License.
|
|
||||||
# You may obtain a copy of the License at
|
|
||||||
#
|
|
||||||
# http://www.apache.org/licenses/LICENSE-2.0
|
|
||||||
#
|
|
||||||
# Unless required by applicable law or agreed to in writing, software
|
|
||||||
# distributed under the License is distributed on an "AS IS" BASIS,
|
|
||||||
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
||||||
# See the License for the specific language governing permissions and
|
|
||||||
# limitations under the License.
|
|
||||||
|
|
||||||
"""
|
|
||||||
Utility function to create an ACME issuing service.
|
|
||||||
|
|
||||||
This file contains the unconditional imports on the acme and cryptography bits that we
|
|
||||||
only need (and may only have available) if we are doing ACME, so is designed to be
|
|
||||||
imported conditionally.
|
|
||||||
"""
|
|
||||||
import logging
|
|
||||||
from typing import Dict, Iterable, List
|
|
||||||
|
|
||||||
import attr
|
|
||||||
import pem
|
|
||||||
from cryptography.hazmat.backends import default_backend
|
|
||||||
from cryptography.hazmat.primitives import serialization
|
|
||||||
from josepy import JWKRSA
|
|
||||||
from josepy.jwa import RS256
|
|
||||||
from txacme.challenges import HTTP01Responder
|
|
||||||
from txacme.client import Client
|
|
||||||
from txacme.interfaces import ICertificateStore
|
|
||||||
from txacme.service import AcmeIssuingService
|
|
||||||
from txacme.util import generate_private_key
|
|
||||||
from zope.interface import implementer
|
|
||||||
|
|
||||||
from twisted.internet import defer
|
|
||||||
from twisted.internet.interfaces import IReactorTCP
|
|
||||||
from twisted.python.filepath import FilePath
|
|
||||||
from twisted.python.url import URL
|
|
||||||
from twisted.web.resource import IResource
|
|
||||||
|
|
||||||
logger = logging.getLogger(__name__)
|
|
||||||
|
|
||||||
|
|
||||||
def create_issuing_service(
|
|
||||||
reactor: IReactorTCP,
|
|
||||||
acme_url: str,
|
|
||||||
account_key_file: str,
|
|
||||||
well_known_resource: IResource,
|
|
||||||
) -> AcmeIssuingService:
|
|
||||||
"""Create an ACME issuing service, and attach it to a web Resource
|
|
||||||
|
|
||||||
Args:
|
|
||||||
reactor: twisted reactor
|
|
||||||
acme_url: URL to use to request certificates
|
|
||||||
account_key_file: where to store the account key
|
|
||||||
well_known_resource: web resource for .well-known.
|
|
||||||
we will attach a child resource for "acme-challenge".
|
|
||||||
|
|
||||||
Returns:
|
|
||||||
AcmeIssuingService
|
|
||||||
"""
|
|
||||||
responder = HTTP01Responder()
|
|
||||||
|
|
||||||
well_known_resource.putChild(b"acme-challenge", responder.resource)
|
|
||||||
|
|
||||||
store = ErsatzStore()
|
|
||||||
|
|
||||||
return AcmeIssuingService(
|
|
||||||
cert_store=store,
|
|
||||||
client_creator=(
|
|
||||||
lambda: Client.from_url(
|
|
||||||
reactor=reactor,
|
|
||||||
url=URL.from_text(acme_url),
|
|
||||||
key=load_or_create_client_key(account_key_file),
|
|
||||||
alg=RS256,
|
|
||||||
)
|
|
||||||
),
|
|
||||||
clock=reactor,
|
|
||||||
responders=[responder],
|
|
||||||
)
|
|
||||||
|
|
||||||
|
|
||||||
@attr.s(slots=True)
|
|
||||||
@implementer(ICertificateStore)
|
|
||||||
class ErsatzStore:
|
|
||||||
"""
|
|
||||||
A store that only stores in memory.
|
|
||||||
"""
|
|
||||||
|
|
||||||
certs = attr.ib(type=Dict[bytes, List[bytes]], default=attr.Factory(dict))
|
|
||||||
|
|
||||||
def store(
|
|
||||||
self, server_name: bytes, pem_objects: Iterable[pem.AbstractPEMObject]
|
|
||||||
) -> defer.Deferred:
|
|
||||||
self.certs[server_name] = [o.as_bytes() for o in pem_objects]
|
|
||||||
return defer.succeed(None)
|
|
||||||
|
|
||||||
|
|
||||||
def load_or_create_client_key(key_file: str) -> JWKRSA:
|
|
||||||
"""Load the ACME account key from a file, creating it if it does not exist.
|
|
||||||
|
|
||||||
Args:
|
|
||||||
key_file: name of the file to use as the account key
|
|
||||||
"""
|
|
||||||
# this is based on txacme.endpoint.load_or_create_client_key, but doesn't
|
|
||||||
# hardcode the 'client.key' filename
|
|
||||||
acme_key_file = FilePath(key_file)
|
|
||||||
if acme_key_file.exists():
|
|
||||||
logger.info("Loading ACME account key from '%s'", acme_key_file)
|
|
||||||
key = serialization.load_pem_private_key(
|
|
||||||
acme_key_file.getContent(), password=None, backend=default_backend()
|
|
||||||
)
|
|
||||||
else:
|
|
||||||
logger.info("Saving new ACME account key to '%s'", acme_key_file)
|
|
||||||
key = generate_private_key("rsa")
|
|
||||||
acme_key_file.setContent(
|
|
||||||
key.private_bytes(
|
|
||||||
encoding=serialization.Encoding.PEM,
|
|
||||||
format=serialization.PrivateFormat.TraditionalOpenSSL,
|
|
||||||
encryption_algorithm=serialization.NoEncryption(),
|
|
||||||
)
|
|
||||||
)
|
|
||||||
return JWKRSA(key=key)
|
|
|
@ -96,11 +96,6 @@ CONDITIONAL_REQUIREMENTS = {
|
||||||
"psycopg2cffi>=2.8 ; platform_python_implementation == 'PyPy'",
|
"psycopg2cffi>=2.8 ; platform_python_implementation == 'PyPy'",
|
||||||
"psycopg2cffi-compat==1.1 ; platform_python_implementation == 'PyPy'",
|
"psycopg2cffi-compat==1.1 ; platform_python_implementation == 'PyPy'",
|
||||||
],
|
],
|
||||||
# ACME support is required to provision TLS certificates from authorities
|
|
||||||
# that use the protocol, such as Let's Encrypt.
|
|
||||||
"acme": [
|
|
||||||
"txacme>=0.9.2",
|
|
||||||
],
|
|
||||||
"saml2": [
|
"saml2": [
|
||||||
"pysaml2>=4.5.0",
|
"pysaml2>=4.5.0",
|
||||||
],
|
],
|
||||||
|
|
|
@ -66,7 +66,6 @@ from synapse.groups.attestations import GroupAttestationSigning, GroupAttestionR
|
||||||
from synapse.groups.groups_server import GroupsServerHandler, GroupsServerWorkerHandler
|
from synapse.groups.groups_server import GroupsServerHandler, GroupsServerWorkerHandler
|
||||||
from synapse.handlers.account_data import AccountDataHandler
|
from synapse.handlers.account_data import AccountDataHandler
|
||||||
from synapse.handlers.account_validity import AccountValidityHandler
|
from synapse.handlers.account_validity import AccountValidityHandler
|
||||||
from synapse.handlers.acme import AcmeHandler
|
|
||||||
from synapse.handlers.admin import AdminHandler
|
from synapse.handlers.admin import AdminHandler
|
||||||
from synapse.handlers.appservice import ApplicationServicesHandler
|
from synapse.handlers.appservice import ApplicationServicesHandler
|
||||||
from synapse.handlers.auth import AuthHandler, MacaroonGenerator
|
from synapse.handlers.auth import AuthHandler, MacaroonGenerator
|
||||||
|
@ -494,10 +493,6 @@ class HomeServer(metaclass=abc.ABCMeta):
|
||||||
def get_e2e_room_keys_handler(self) -> E2eRoomKeysHandler:
|
def get_e2e_room_keys_handler(self) -> E2eRoomKeysHandler:
|
||||||
return E2eRoomKeysHandler(self)
|
return E2eRoomKeysHandler(self)
|
||||||
|
|
||||||
@cache_in_self
|
|
||||||
def get_acme_handler(self) -> AcmeHandler:
|
|
||||||
return AcmeHandler(self)
|
|
||||||
|
|
||||||
@cache_in_self
|
@cache_in_self
|
||||||
def get_admin_handler(self) -> AdminHandler:
|
def get_admin_handler(self) -> AdminHandler:
|
||||||
return AdminHandler(self)
|
return AdminHandler(self)
|
||||||
|
|
|
@ -13,10 +13,7 @@
|
||||||
# See the License for the specific language governing permissions and
|
# See the License for the specific language governing permissions and
|
||||||
# limitations under the License.
|
# limitations under the License.
|
||||||
|
|
||||||
import os
|
|
||||||
|
|
||||||
import idna
|
import idna
|
||||||
import yaml
|
|
||||||
|
|
||||||
from OpenSSL import SSL
|
from OpenSSL import SSL
|
||||||
|
|
||||||
|
@ -39,58 +36,6 @@ class TestConfig(RootConfig):
|
||||||
|
|
||||||
|
|
||||||
class TLSConfigTests(TestCase):
|
class TLSConfigTests(TestCase):
|
||||||
def test_warn_self_signed(self):
|
|
||||||
"""
|
|
||||||
Synapse will give a warning when it loads a self-signed certificate.
|
|
||||||
"""
|
|
||||||
config_dir = self.mktemp()
|
|
||||||
os.mkdir(config_dir)
|
|
||||||
with open(os.path.join(config_dir, "cert.pem"), "w") as f:
|
|
||||||
f.write(
|
|
||||||
"""-----BEGIN CERTIFICATE-----
|
|
||||||
MIID6DCCAtACAws9CjANBgkqhkiG9w0BAQUFADCBtzELMAkGA1UEBhMCVFIxDzAN
|
|
||||||
BgNVBAgMBsOHb3J1bTEUMBIGA1UEBwwLQmHFn21ha8OnxLExEjAQBgNVBAMMCWxv
|
|
||||||
Y2FsaG9zdDEcMBoGA1UECgwTVHdpc3RlZCBNYXRyaXggTGFiczEkMCIGA1UECwwb
|
|
||||||
QXV0b21hdGVkIFRlc3RpbmcgQXV0aG9yaXR5MSkwJwYJKoZIhvcNAQkBFhpzZWN1
|
|
||||||
cml0eUB0d2lzdGVkbWF0cml4LmNvbTAgFw0xNzA3MTIxNDAxNTNaGA8yMTE3MDYx
|
|
||||||
ODE0MDE1M1owgbcxCzAJBgNVBAYTAlRSMQ8wDQYDVQQIDAbDh29ydW0xFDASBgNV
|
|
||||||
BAcMC0JhxZ9tYWvDp8SxMRIwEAYDVQQDDAlsb2NhbGhvc3QxHDAaBgNVBAoME1R3
|
|
||||||
aXN0ZWQgTWF0cml4IExhYnMxJDAiBgNVBAsMG0F1dG9tYXRlZCBUZXN0aW5nIEF1
|
|
||||||
dGhvcml0eTEpMCcGCSqGSIb3DQEJARYac2VjdXJpdHlAdHdpc3RlZG1hdHJpeC5j
|
|
||||||
b20wggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDwT6kbqtMUI0sMkx4h
|
|
||||||
I+L780dA59KfksZCqJGmOsMD6hte9EguasfkZzvCF3dk3NhwCjFSOvKx6rCwiteo
|
|
||||||
WtYkVfo+rSuVNmt7bEsOUDtuTcaxTzIFB+yHOYwAaoz3zQkyVW0c4pzioiLCGCmf
|
|
||||||
FLdiDBQGGp74tb+7a0V6kC3vMLFoM3L6QWq5uYRB5+xLzlPJ734ltyvfZHL3Us6p
|
|
||||||
cUbK+3WTWvb4ER0W2RqArAj6Bc/ERQKIAPFEiZi9bIYTwvBH27OKHRz+KoY/G8zY
|
|
||||||
+l+WZoJqDhupRAQAuh7O7V/y6bSP+KNxJRie9QkZvw1PSaGSXtGJI3WWdO12/Ulg
|
|
||||||
epJpAgMBAAEwDQYJKoZIhvcNAQEFBQADggEBAJXEq5P9xwvP9aDkXIqzcD0L8sf8
|
|
||||||
ewlhlxTQdeqt2Nace0Yk18lIo2oj1t86Y8jNbpAnZJeI813Rr5M7FbHCXoRc/SZG
|
|
||||||
I8OtG1xGwcok53lyDuuUUDexnK4O5BkjKiVlNPg4HPim5Kuj2hRNFfNt/F2BVIlj
|
|
||||||
iZupikC5MT1LQaRwidkSNxCku1TfAyueiBwhLnFwTmIGNnhuDCutEVAD9kFmcJN2
|
|
||||||
SznugAcPk4doX2+rL+ila+ThqgPzIkwTUHtnmjI0TI6xsDUlXz5S3UyudrE2Qsfz
|
|
||||||
s4niecZKPBizL6aucT59CsunNmmb5Glq8rlAcU+1ZTZZzGYqVYhF6axB9Qg=
|
|
||||||
-----END CERTIFICATE-----"""
|
|
||||||
)
|
|
||||||
|
|
||||||
config = {
|
|
||||||
"tls_certificate_path": os.path.join(config_dir, "cert.pem"),
|
|
||||||
}
|
|
||||||
|
|
||||||
t = TestConfig()
|
|
||||||
t.read_config(config, config_dir_path="", data_dir_path="")
|
|
||||||
t.read_tls_certificate()
|
|
||||||
|
|
||||||
warnings = self.flushWarnings()
|
|
||||||
self.assertEqual(len(warnings), 1)
|
|
||||||
self.assertEqual(
|
|
||||||
warnings[0]["message"],
|
|
||||||
(
|
|
||||||
"Self-signed TLS certificates will not be accepted by "
|
|
||||||
"Synapse 1.0. Please either provide a valid certificate, "
|
|
||||||
"or use Synapse's ACME support to provision one."
|
|
||||||
),
|
|
||||||
)
|
|
||||||
|
|
||||||
def test_tls_client_minimum_default(self):
|
def test_tls_client_minimum_default(self):
|
||||||
"""
|
"""
|
||||||
The default client TLS version is 1.0.
|
The default client TLS version is 1.0.
|
||||||
|
@ -202,48 +147,6 @@ s4niecZKPBizL6aucT59CsunNmmb5Glq8rlAcU+1ZTZZzGYqVYhF6axB9Qg=
|
||||||
self.assertEqual(options & SSL.OP_NO_TLSv1_1, 0)
|
self.assertEqual(options & SSL.OP_NO_TLSv1_1, 0)
|
||||||
self.assertEqual(options & SSL.OP_NO_TLSv1_2, 0)
|
self.assertEqual(options & SSL.OP_NO_TLSv1_2, 0)
|
||||||
|
|
||||||
def test_acme_disabled_in_generated_config_no_acme_domain_provied(self):
|
|
||||||
"""
|
|
||||||
Checks acme is disabled by default.
|
|
||||||
"""
|
|
||||||
conf = TestConfig()
|
|
||||||
conf.read_config(
|
|
||||||
yaml.safe_load(
|
|
||||||
TestConfig().generate_config(
|
|
||||||
"/config_dir_path",
|
|
||||||
"my_super_secure_server",
|
|
||||||
"/data_dir_path",
|
|
||||||
tls_certificate_path="/tls_cert_path",
|
|
||||||
tls_private_key_path="tls_private_key",
|
|
||||||
acme_domain=None, # This is the acme_domain
|
|
||||||
)
|
|
||||||
),
|
|
||||||
"/config_dir_path",
|
|
||||||
)
|
|
||||||
|
|
||||||
self.assertFalse(conf.acme_enabled)
|
|
||||||
|
|
||||||
def test_acme_enabled_in_generated_config_domain_provided(self):
|
|
||||||
"""
|
|
||||||
Checks acme is enabled if the acme_domain arg is set to some string.
|
|
||||||
"""
|
|
||||||
conf = TestConfig()
|
|
||||||
conf.read_config(
|
|
||||||
yaml.safe_load(
|
|
||||||
TestConfig().generate_config(
|
|
||||||
"/config_dir_path",
|
|
||||||
"my_super_secure_server",
|
|
||||||
"/data_dir_path",
|
|
||||||
tls_certificate_path="/tls_cert_path",
|
|
||||||
tls_private_key_path="tls_private_key",
|
|
||||||
acme_domain="my_supe_secure_server", # This is the acme_domain
|
|
||||||
)
|
|
||||||
),
|
|
||||||
"/config_dir_path",
|
|
||||||
)
|
|
||||||
|
|
||||||
self.assertTrue(conf.acme_enabled)
|
|
||||||
|
|
||||||
def test_whitelist_idna_failure(self):
|
def test_whitelist_idna_failure(self):
|
||||||
"""
|
"""
|
||||||
The federation certificate whitelist will not allow IDNA domain names.
|
The federation certificate whitelist will not allow IDNA domain names.
|
||||||
|
|
Loading…
Reference in a new issue