Commit Graph

27 Commits (master)

Author SHA1 Message Date
Dan Caseley 460fc98fc0 Add config to allow for GitHub Packages instead 2025-02-12 10:00:49 +01:00
Matthew Vivian 9d99ddbc8c refactor: rename openfire.sql to clarify execution order
Renamed openfire.sql to 000-init-openfire.sql to make the initialisation order explicit in the filename. This helps when adding additional SQL scripts that need to run after the schema is created, as PostgreSQL executes files in /docker-entrypoint-initdb.d alphabetically.

The new openfire-integration-test repo uses this openfire-docker-compose repository as a base (using git submodules) for its tests but needs to reconfigure Openfire via the database before startup. To do this it overlays additional SQL files into this openfire-docker-compose repository's sql folders so they are run on startup. It has had to prefix its new SQL file with zz- to make sure it runs after the initialisation SQL file in our repository. This change should make future similar uses less complex/error-prone.
2025-01-07 13:41:20 +00:00
Matthew Vivian 697aab97ed chore: Update java.security with new from Openfire
This file has been updated in Openfire to enable CRL downloading, so I'm porting it into this project as we use a copy of the security directory and overwrite the original.
2024-12-03 15:40:53 +01:00
Matthew Vivian 478caa939b doc: Fix revocation.sh examples & clarify usage
Clarify that revocation.sh must be run from federation/ directory.
2024-11-25 21:48:45 +01:00
Matthew Vivian 3dae0e20ee docs: Add OCSP responder IPv6 IP to diagram 2024-11-21 14:09:03 +01:00
Matthew Vivian 68a6a4ca3c fix: Keep OCSP responder running on invalid request
Added the openssl ocsp flag to ignore malformed requests. The OCSP responder now continues running instead of terminating upon receiving a malformed request.

When testing connectivity it is useful to be able to curl http://ocsp-responder:8888. Previous to this commit the responder would send 200 OK then exit. With this change we still get the 200 response but the responder remains active.
2024-11-21 14:09:03 +01:00
Matthew Vivian 836b0be3c2 feat: Add IPv6 support to OCSP responder
The OCSP responder in OpenSSL (in Alpine) only supports IPv4 so I've used socat as a proxy to listen in IPv4 and IPv6 then forward to the OCSP responder on localhost using IPv4.
2024-11-21 14:09:03 +01:00
Matthew Vivian bc7a1186bc test: Set to TRACE logging by default
I think this is a reasonable default given the purpose of this project.
2024-11-21 14:09:03 +01:00
Matthew Vivian dc8ea3e3eb chore: Copy java.security from Openfire to configure OCSP
This file is being added to Openfire so I'm porting it into this project as we use a copy of the security directory and overwrite the original.

To pick up the setting in this new file, and the new system property (jdk.tls.server.enableStatusRequestExtension=true), we must also use the updated openfire.sh start script which includes the new file and sets the mentioned system property. This will happen naturally when those changes make it into the Openfire Docker image. Until then you can recreate this behaviour by adding the following to xmpp1 and xmpp2:

```
environment:
    JAVA_TOOL_OPTIONS: >
      -Djava.security.properties=/var/lib/openfire/conf/security/java.security
      -Djdk.tls.server.enableStatusRequestExtension=true
```
2024-11-21 14:09:03 +01:00
Matthew Vivian 977c098411 doc: fix OCSP responder IP in README 2024-11-21 14:09:03 +01:00
Matthew Vivian a2ac9c45f0 fix: Support OCSP in dualstack mode
I considered adding IPv6 support to the OCSP responder but it would add more files and complexity for (I think) little gain.

Instead this change keeps the OCSP responder on IPv4 only, but makes sure it's properly configured in the hosts file even when using the -6 flag. The OCSP responder will always use IPv4, other services will be able to reach it via IPv4 regardless of whether they're using IPv6 for their own communication.
2024-11-21 14:09:03 +01:00
Matthew Vivian 5f80851d44 feat: Support certificate revocation 2024-11-21 14:09:03 +01:00
Matthew Vivian a99d37d2e4 chore: latest truststores from Openfire 2024-11-21 14:09:03 +01:00
Matthew Vivian ea06f16911 doc: Add OCSP responder to diagram 2024-11-21 14:09:03 +01:00
Matthew Vivian 5a595cd864 feat: Cert generation for multiple xmpp nodes
Cert generation and import scripts now support any number of XMPP servers and use more intuitive naming for the certificates.

 This will make it easier to move cert generation to other configurations. Maybe promoting this to a top-level script to generate certs in all scenarios.
2024-11-21 14:09:03 +01:00
Matthew Vivian 4c608f22f8 fix: Use unique IP for OCSP
Prior to this the OCSP responder used 172.50.0.30. This conflicts with an example given in the readme, which uses the same IP address describing how to add a third node to the setup.

This change avoids confusion, and keeps things consistent if we ever decide to copy this to the other configurations (eg clustering_with_federation).
2024-11-21 14:09:03 +01:00
Matthew Vivian 26928c0762 feat: Switch OCSP configuration to use domain names
- Update OCSP URL in certificate generation from IP to domain name
- Add OCSP hostname to docker-compose network configuration
- Document useful hosts file entries in README.md

The changes make it easier to test OCSP locally with clients by using domain names that can be mapped in host files.
2024-11-21 14:09:03 +01:00
Matthew Vivian 7102765241 feat: Add OCSP support to federated environment
Adds Online Certificate Status Protocol (OCSP) support to the federated Openfire setup:
- Add certificate generation script with full PKI hierarchy
- Add certificate import script for Openfire keystores
- Implement OCSP responder service via Docker compose
- Update documentation with OCSP usage instructions

The -o flag can now be used with start.sh to enable OCSP support.
2024-11-21 14:09:03 +01:00
Guus der Kinderen 3b4862328b Add dualstack support
This adds support for IPv6, by giving all `start.sh` scripts an `-6` argument, that causes a dualstack configuration to be loaded.

Each individual docker-compose file has been split out. Now, each file no longer defines any networking. Instead, one of two networking fragments is expected to be merged in.

When starting Openfire, a Hazelcast configuration option is passed through to the Openfire process to denote preference for IPv4 or IPv6. This passing through depends on the change in Openfire, that is introduced by 2634d4a83a

Minor other changes have been applied, that mostly make the start scripts more consistent amongst each-other.

fixes #61
2024-11-05 09:47:10 +00:00
Dan Caseley 46d4fa34db For federation, add self-signed certs to each other's truststore 2024-02-21 15:52:51 +01:00
Dan Caseley 346a4e4005 Drop use of old style "docker-compose" in favour "docker compose" everywhere 2022-07-27 14:47:41 +02:00
Dan Caseley f9e5e43506 Fix stop errors 2022-07-27 14:47:41 +02:00
Dan Caseley 5742077a93 Fix popd noise 2022-07-27 14:47:41 +02:00
Dan Caseley 438c9ec933 Fixes 2022-07-27 14:47:41 +02:00
Dan Caseley 097d29d8f5 Update scripts. More reliable stop, and mitigate #18 2022-07-27 14:47:41 +02:00
Dan Caseley 7caafe6056 Fix READMEs 2022-07-27 14:47:41 +02:00
Dan Caseley c5ff481255 Move all the files into purpose-defined subdirectories 2022-07-27 14:47:41 +02:00