| @@ -1,22 +0,0 @@ | |||
| name: Ansible Lint | |||
| on: [push, pull_request] | |||
| jobs: | |||
| build: | |||
| runs-on: ubuntu-latest | |||
| steps: | |||
| - uses: actions/checkout@v2 | |||
| - name: Lint Ansible Playbook | |||
| uses: ansible/ansible-lint-action@c37fb7b4bda2c8cb18f4942716bae9f11b0dc9bc | |||
| with: | |||
| # Paths to ansible files (i.e., playbooks, tasks, handlers etc..) | |||
| targets: "./" | |||
| override-deps: | | |||
| ansible-lint==5.3.1 | |||
| args: "-x metadata, formatting" | |||
| @@ -1,3 +1,64 @@ | |||
| # 2022-01-07 | |||
| ## Dendrite support | |||
| **TLDR**: We now have optional experimental [Dendrite](https://github.com/matrix-org/dendrite) homeserver support for new installations. **Existing (Synapse) installations need to be updated**, because some internals changed. See [Adapting the configuration for existing Synapse installations](#adapting-the-configuration-for-existing-synapse-installations). | |||
| [Jip J. Dekker](https://github.com/Dekker1) did the [initial work](https://github.com/spantaleev/matrix-docker-ansible-deploy/pull/818) of adding [Dendrite](https://github.com/matrix-org/dendrite) support to the playbook back in January 2021. Lots of work (and time) later, Dendrite support is finally ready for testing. | |||
| We believe that 2022 will be the year of the non-Synapse Matrix server! | |||
| The playbook was previously quite [Synapse](https://github.com/matrix-org/synapse)-centric, but can now accommodate multiple homeserver implementations. Only one homeserver implementation can be active (installed) at a given time. | |||
| **Synapse is still the default homeserver implementation** installed by the playbook. A new variable (`matrix_homeserver_implementation`) controls which server implementation is enabled (`synapse` or `dendrite` at the given moment). | |||
| ### Adapting the configuration for existing Synapse installations | |||
| Because the playbook is not so Synapse-centric anymore, a small configuration change is necessary for existing installations to bring them up to date. | |||
| The `vars.yml` file for **existing installations will need to be updated** by adding this **additional configuration**: | |||
| ```yaml | |||
| # All secrets keys are now derived from `matrix_homeserver_generic_secret_key`, not from `matrix_synapse_macaroon_secret_key`. | |||
| # To keep them all the same, define `matrix_homeserver_generic_secret_key` in terms of `matrix_synapse_macaroon_secret_key`. | |||
| # Using a new secret value for this configuration key is also possible and should not cause any problems. | |||
| # | |||
| # Fun fact: new installations (based on the new `examples/vars.yml` file) do this in reverse. | |||
| # That is, the Synapse macaroon secret is derived from `matrix_homeserver_generic_secret_key`. | |||
| matrix_homeserver_generic_secret_key: "{{ matrix_synapse_macaroon_secret_key }}" | |||
| ``` | |||
| ### Trying out Dendrite | |||
| Finally, **to try out Dendrite**, we recommend that you **use a new server** and the following addition to your `vars.yml` configuration: | |||
| ```yaml | |||
| matrix_homeserver_implementation: dendrite | |||
| ``` | |||
| **The homeserver implementation of an existing server cannot be changed** (e.g. from Synapse to Dendrite) without data loss. | |||
| We're excited to gain support for other homeserver implementations, like [Conduit](https://conduit.rs/), etc! | |||
| ## Honoroit bot support | |||
| Thanks to [Aine](https://gitlab.com/etke.cc) of [etke.cc](https://etke.cc/), the playbook can now help you set up [Honoroit](https://gitlab.com/etke.cc/honoroit) - a helpdesk bot. | |||
| See our [Setting up Honoroit](docs/configuring-playbook-bot-honoroit.md) documentation to get started. | |||
| # 2022-01-06 | |||
| ## Cinny support | |||
| Thanks to [Aine](https://gitlab.com/etke.cc) of [etke.cc](https://etke.cc/), the playbook now supports [Cinny](https://cinny.in/) - a new simple, elegant and secure Matrix client. | |||
| By default, we still install Element. Still, people who'd like to try Cinny out can now install it via the playbook. | |||
| Additional details are available in [Setting up Cinny](docs/configuring-playbook-client-cinny.md). | |||
| # 2021-12-22 | |||
| ## Twitter bridging support via mautrix-twitter | |||
| @@ -19,6 +19,8 @@ Using this playbook, you can get the following services configured on your serve | |||
| - (optional, default) a [Synapse](https://github.com/matrix-org/synapse) homeserver - storing your data and managing your presence in the [Matrix](http://matrix.org/) network | |||
| - (optional) a [Dendrite](https://github.com/matrix-org/dendrite) homeserver - storing your data and managing your presence in the [Matrix](http://matrix.org/) network. Dendrite is a second-generation Matrix homeserver written in Go, an alternative to Synapse. | |||
| - (optional) [Amazon S3](https://aws.amazon.com/s3/) storage for Synapse's content repository (`media_store`) files using [Goofys](https://github.com/kahing/goofys) | |||
| - (optional, default) [PostgreSQL](https://www.postgresql.org/) database for Synapse. [Using an external PostgreSQL server](docs/configuring-playbook-external-postgres.md) is also possible. | |||
| @@ -99,6 +101,8 @@ Using this playbook, you can get the following services configured on your serve | |||
| - (optional) [matrix-reminder-bot](https://github.com/anoadragon453/matrix-reminder-bot) for scheduling one-off & recurring reminders and alarms - see [docs/configuring-playbook-bot-matrix-reminder-bot.md](docs/configuring-playbook-bot-matrix-reminder-bot.md) for setup documentation | |||
| - (optional) [honoroit](https://gitlab.com/etke.cc/honoroit) helpdesk bot - see [docs/configuring-playbook-bot-honoroit.md](docs/configuring-playbook-bot-honoroit.md) for setup documentation | |||
| - (optional) [Go-NEB](https://github.com/matrix-org/go-neb) multi functional bot written in Go - see [docs/configuring-playbook-bot-go-neb.md](docs/configuring-playbook-bot-go-neb.md) for setup documentation | |||
| - (optional) [Mjolnir](https://github.com/matrix-org/mjolnir), a moderation tool for Matrix - see [docs/configuring-playbook-bot-mjolnir.md](docs/configuring-playbook-bot-mjolnir.md) for setup documentation | |||
| @@ -113,6 +117,8 @@ Using this playbook, you can get the following services configured on your serve | |||
| - (optional) the [Hydrogen](https://github.com/vector-im/hydrogen-web) web client - see [docs/configuring-playbook-client-hydrogen.md](docs/configuring-playbook-client-hydrogen.md) for setup documentation | |||
| - (optional) the [Cinny](https://github.com/ajbura/cinny) web client - see [docs/configuring-playbook-client-cinny.md](docs/configuring-playbook-client-cinny.md) for setup documentation | |||
| Basically, this playbook aims to get you up-and-running with all the necessities around Matrix, without you having to do anything else. | |||
| **Note**: the list above is exhaustive. It includes optional or even some advanced components that you will most likely not need. | |||
| @@ -4,7 +4,7 @@ An AWX setup for managing multiple Matrix servers. | |||
| This section is used in an AWX system that can create and manage multiple [Matrix](http://matrix.org/) servers. You can issue members an AWX login to their own 'organisation', which they can use to manage/configure 1 to N servers. | |||
| Members can be assigned a server from Digitalocean, or they can connect their own on-premises server. This script is free to use in a commercial context with the 'MemberPress Plus' and 'WP Oauth Sever' addons. It can also be run in a non-commercial context. | |||
| Members can be assigned a server from Digitalocean, or they can connect their own on-premises server. These playbooks are free to use in a commercial context with the 'MemberPress Plus' plugin. They can also be run in a non-commercial context. | |||
| The AWX system is arranged into 'members' each with their own 'subscriptions'. After creating a subscription the user enters the 'provision stage' where they defined the URLs they will use, the servers location and whether or not there's already a website at the base domain. They then proceed onto the 'deploy stage' where they can configure their Matrix server. | |||
| @@ -21,12 +21,7 @@ The following repositories allow you to copy and use this setup: | |||
| [Ansible Provision Server](https://gitlab.com/GoMatrixHosting/ansible-provision-server) - Used by AWX members to perform initial configuration of their DigitalOcean or On-Premises server. | |||
| ## Testing Fork For This Playbook | |||
| Updates to this section are trailed here: | |||
| [GoMatrixHosting Matrix Docker Ansible Deploy](https://gitlab.com/GoMatrixHosting/matrix-docker-ansible-deploy) | |||
| [GMHosting External Tools](https://gitlab.com/GoMatrixHosting/gmhosting-external-tools) - Extra tools we run outside of AWX, some of which are experimental. | |||
| ## Does I need an AWX setup to use this? How do I configure it? | |||
| @@ -38,7 +33,6 @@ For simpler installation steps you can use to get started with this system, chec | |||
| ## Does I need a front-end WordPress site? And a DigitalOcean account? | |||
| You do not need a front-end WordPress site or any of the mentioned WordPress plugins to use this setup. It can be run on it's own in a non-commercial context. | |||
| You also don't need a DigitalOcean account, but this will limit you to only being able to connect 'On-Premises' servers. | |||
| You do not need a front-end WordPress site or the MemberPress plugin to use this setup. It can be run on it's own in a non-commercial context. | |||
| You also don't need a DigitalOcean account, although this will limit you to only being able to connect 'On-Premises' servers. | |||
| @@ -37,6 +37,7 @@ If you are using Cloudflare DNS, make sure to disable the proxy and set all reco | |||
| | CNAME | `goneb` | - | - | - | `matrix.<your-domain>` | | |||
| | CNAME | `sygnal` | - | - | - | `matrix.<your-domain>` | | |||
| | CNAME | `hydrogen` | - | - | - | `matrix.<your-domain>` | | |||
| | CNAME | `cinny` | - | - | - | `matrix.<your-domain>` | | |||
| ## Subdomains setup | |||
| @@ -57,6 +58,7 @@ The `sygnal.<your-domain>` subdomain may be necessary, because this playbook cou | |||
| The `hydrogen.<your-domain>` subdomain may be necessary, because this playbook could install the [Hydrogen](https://github.com/vector-im/hydrogen-web) web client. The installation of Hydrogen is disabled by default, it is not a core required component. To learn how to install it, see our [configuring Hydrogen guide](configuring-playbook-client-hydrogen.md). If you do not wish to set up Hydrogen, feel free to skip the `hydrogen.<your-domain>` DNS record. | |||
| The `cinny.<your-domain>` subdomain may be necessary, because this playbook could install the [Cinny](https://github.com/ajbura/cinny) web client. The installation of cinny is disabled by default, it is not a core required component. To learn how to install it, see our [configuring cinny guide](configuring-playbook-client-cinny.md). If you do not wish to set up cinny, feel free to skip the `cinny.<your-domain>` DNS record. | |||
| ## `_matrix-identity._tcp` SRV record setup | |||
| @@ -0,0 +1,55 @@ | |||
| # Setting up Honoroit (optional) | |||
| The playbook can install and configure [Honoroit](https://gitlab.com/etke.cc/honoroit) for you. | |||
| It's a bot you can use to setup **your own helpdesk on matrix** | |||
| See the project's [documentation](https://gitlab.com/etke.cc/honoroit#how-it-looks-like) to learn what it does with screenshots and why it might be useful to you. | |||
| ## Registering the bot user | |||
| By default, the playbook will set up the bot with a username like this: `@honoroit:DOMAIN`. | |||
| (to use a different username, adjust the `matrix_bot_honoroit_login` variable). | |||
| You **need to register the bot user manually** before setting up the bot. You can use the playbook to [register a new user](registering-users.md): | |||
| ``` | |||
| ansible-playbook -i inventory/hosts setup.yml --extra-vars='username=honoroit password=PASSWORD_FOR_THE_BOT admin=no' --tags=register-user | |||
| ``` | |||
| Choose a strong password for the bot. You can generate a good password with a command like this: `pwgen -s 64 1`. | |||
| ## Adjusting the playbook configuration | |||
| Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file: | |||
| ```yaml | |||
| matrix_bot_honoroit_enabled: true | |||
| # Adjust this to whatever password you chose when registering the bot user | |||
| matrix_bot_honoroit_password: PASSWORD_FOR_THE_BOT | |||
| # Adjust this to your room ID | |||
| matrix_bot_honoroit_roomid: "!yourRoomID:DOMAIN" | |||
| ``` | |||
| ## Installing | |||
| After configuring the playbook, run the [installation](installing.md) command again: | |||
| ``` | |||
| ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start | |||
| ``` | |||
| ## Usage | |||
| To use the bot, invite the `@honoroit:DOMAIN` to the room you specified in config, after that any matrix user can send a message to the `@honoroit:DOMAIN` to start a new thread in that room. | |||
| Send `!ho help` to the room to see the bot's help menu for additional commands. | |||
| You can also refer to the upstream [documentation](https://gitlab.com/etke.cc/honoroit#features). | |||
| @@ -2,9 +2,9 @@ | |||
| **Note**: bridging to [Twitter](https://twitter.com/) can also happen via the [mx-puppet-twitter](configuring-playbook-bridge-mx-puppet-twitter.md) bridge supported by the playbook. | |||
| The playbook can install and configure [mautrix-twitter](https://github.com/tulir/mautrix-twitter) for you. | |||
| The playbook can install and configure [mautrix-twitter](https://github.com/mautrix/twitter) for you. | |||
| See the project's [documentation](https://github.com/tulir/mautrix-twitter/wiki#usage) to learn what it does and why it might be useful to you. | |||
| See the project's [documentation](https://github.com/mautrix/twitter) to learn what it does and why it might be useful to you. | |||
| ```yaml | |||
| matrix_mautrix_twitter_enabled: true | |||
| @@ -13,7 +13,7 @@ matrix_mautrix_twitter_enabled: true | |||
| ## Set up Double Puppeting | |||
| If you'd like to use [Double Puppeting](https://github.com/tulir/mautrix-twitter/wiki/Authentication#double-puppeting) (hint: you most likely do), you have 2 ways of going about it. | |||
| If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have 2 ways of going about it. | |||
| ### Method 1: automatically, by enabling Shared Secret Auth | |||
| @@ -23,7 +23,7 @@ This is the recommended way of setting up Double Puppeting, as it's easier to ac | |||
| ### Method 2: manually, by asking each user to provide a working access token | |||
| This method is currently not available for the Mautrix-Twitter bridge, but is on the [roadmap](https://github.com/tulir/mautrix-twitter/blob/master/ROADMAP.md) under Misc/Manual login with `login-matrix` | |||
| This method is currently not available for the Mautrix-Twitter bridge, but is on the [roadmap](https://github.com/mautrix/twitter/blob/master/ROADMAP.md) under Misc/Manual login with `login-matrix` | |||
| ## Usage | |||
| @@ -32,6 +32,4 @@ This method is currently not available for the Mautrix-Twitter bridge, but is on | |||
| You can learn more here about authentication from the bridge's [official documentation on Authentication](https://docs.mau.fi/bridges/python/twitter/authentication.html). | |||
| If you run into trouble, check the [Troubleshooting](#troubleshooting) section below. | |||
| After successfully enabling bridging, you may wish to [set up Double Puppeting](#set-up-double-puppeting), if you haven't already done so. | |||
| @@ -0,0 +1,21 @@ | |||
| # Configuring Cinny (optional) | |||
| This playbook can install the [cinny](https://github.com/ajbura/cinny) Matrix web client for you. | |||
| cinny is a web client focusing primarily on simple, elegant and secure interface. | |||
| cinny can be installed alongside or instead of Element. | |||
| If you'd like cinny to be installed, add the following to your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`): | |||
| ```yaml | |||
| matrix_client_cinny_enabled: true | |||
| ``` | |||
| You will also need to add a DNS record so that cinny can be accessed. | |||
| By default cinny will use https://cinny.DOMAIN so you will need to create an CNAME record | |||
| for `cinny`. See [Configuring DNS](configuring-dns.md). | |||
| If you would like to use a different domain, add the following to your configuration file (changing it to use your preferred domain): | |||
| ```yaml | |||
| matrix_server_fqn_cinny: "app.{{ matrix_domain }}" | |||
| ``` | |||
| @@ -58,7 +58,7 @@ curl -X POST --header 'Content-Type: application/json' -d '{ | |||
| "type": "m.login.password" | |||
| }' 'https://matrix.YOURDOMAIN/_matrix/client/r0/login' | |||
| ``` | |||
| *Change the "YourDimensionUser/Pass" URL accordigly* | |||
| *Change `YourDimensionUsername`, `YourDimensionPassword`, and `YOURDOMAIN` accordingly.* | |||
| **Access tokens are sensitive information. Do not include them in any bug reports, messages, or logs. Do not share the access token with anyone.** | |||
| @@ -25,6 +25,23 @@ The Dimension administrator users can configure the default URL template. The Di | |||
| If you wish to disable the Etherpad chat button, you can do it by appending `?showChat=false` to the end of the pad URL, or the template. | |||
| Example: `https://dimension.<your-domain>/etherpad/p/$roomId_$padName?showChat=false` | |||
| ### Etherpad Admin access (optional) | |||
| Etherpad comes with a admin web-UI which is disabled by default. You can enable it by setting a username and password in your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`): | |||
| ```yaml | |||
| matrix_etherpad_admin_username: admin | |||
| matrix_etherpad_admin_password: some-password | |||
| ``` | |||
| The admin web-UI should then be available on: `https://dimension.<your-domain>/etherpad/admin` | |||
| ### Managing / Deleting old pads | |||
| If you want to manage and remove old unused pads from Etherpad, you will first need to able Admin access as described above. | |||
| Then from the plugin manager page (`https://dimension.<your-domain>/etherpad/admin/plugins`), install the `adminpads2` plugin. Once installed, you should have a "Manage pads" section in the Admin web-UI. | |||
| ## Known issues | |||
| If your Etherpad widget fails to load, this might be due to Dimension generating a Pad name so long, the Etherpad app rejects it. | |||
| @@ -69,6 +69,7 @@ When you're done with all the configuration you'd like to do, continue with [Ins | |||
| - [Adjusting email-sending settings](configuring-playbook-email.md) (optional) | |||
| - [Setting up Hydrogen](configuring-playbook-client-hydrogen.md) - a new lightweight matrix client with legacy and mobile browser support (optional) | |||
| - [Setting up Cinny](configuring-playbook-client-cinny.md) - a web client focusing primarily on simple, elegant and secure interface (optional) | |||
| ### Authentication and user-related | |||
| @@ -141,6 +142,8 @@ When you're done with all the configuration you'd like to do, continue with [Ins | |||
| - [Setting up matrix-reminder-bot](configuring-playbook-bot-matrix-reminder-bot.md) - a bot to remind you about stuff (optional) | |||
| - [Setting up honoroit](configuring-playbook-bot-honoroit.md) - a helpdesk bot (optional) | |||
| - [Setting up Go-NEB](configuring-playbook-bot-go-neb.md) - an extensible multifunctional bot (optional) | |||
| - [Setting up Mjolnir](configuring-playbook-bot-mjolnir.md) - a moderation tool/bot (optional) | |||
| @@ -30,6 +30,8 @@ These services are enabled and used by default, but you can turn them off, if yo | |||
| These services are not part of our default installation, but can be enabled by [configuring the playbook](configuring-playbook.md) (either before the initial installation or any time later): | |||
| - [matrixdotorg/dendrite-monolith](https://hub.docker.com/r/matrixdotorg/dendrite-monolith/) - the official [Dendrite](https://github.com/matrix-org/dendrite) Matrix homeserver (optional) | |||
| - [ewoutp/goofys](https://hub.docker.com/r/ewoutp/goofys/) - the [Goofys](https://github.com/kahing/goofys) Amazon [S3](https://aws.amazon.com/s3/) file-system-mounting program (optional) | |||
| - [etherpad/etherpad](https://hub.docker.com/r/etherpad/etherpad/) - the [Etherpad](https://etherpad.org) realtime collaborative text editor that can be used in a Jitsi audio/video call or integrated as a widget into Matrix chat rooms via the Dimension integration manager (optional) | |||
| @@ -46,7 +48,7 @@ These services are not part of our default installation, but can be enabled by [ | |||
| - [mautrix/facebook](https://mau.dev/mautrix/facebook/container_registry) - the [mautrix-facebook](https://github.com/mautrix/facebook) bridge to [Facebook](https://facebook.com/) (optional) | |||
| - [tulir/mautrix-twitter](https://mau.dev/mautrix/twitter/container_registry) - the [mautrix-twitter](https://github.com/tulir/mautrix-twitter) bridge to [Twitter](https://twitter.com/) (optional) | |||
| - [mautrix/twitter](https://mau.dev/mautrix/twitter/container_registry) - the [mautrix-twitter](https://github.com/mautrix/twitter) bridge to [Twitter](https://twitter.com/) (optional) | |||
| - [mautrix/hangouts](https://mau.dev/mautrix/hangouts/container_registry) - the [mautrix-hangouts](https://github.com/mautrix/hangouts) bridge to [Google Hangouts](https://en.wikipedia.org/wiki/Google_Hangouts) (optional) | |||
| @@ -92,6 +94,8 @@ These services are not part of our default installation, but can be enabled by [ | |||
| - [anoa/matrix-reminder-bot](https://hub.docker.com/r/anoa/matrix-reminder-bot) - the [matrix-reminder-bot](https://github.com/anoadragon453/matrix-reminder-bot) bot for one-off & recurring reminders and alarms (optional) | |||
| - [etke.cc/honoroit](https://gitlab.com/etke.cc/honoroit/container_registry) - the [honoroit](https://gitlab.com/etke.cc/honoroit) helpdesk bot (optional) | |||
| - [matrixdotorg/go-neb](https://hub.docker.com/r/matrixdotorg/go-neb) - the [Go-NEB](https://github.com/matrix-org/go-neb) bot (optional) | |||
| - [matrixdotorg/mjolnir](https://hub.docker.com/r/matrixdotorg/mjolnir) - the [mjolnir](https://github.com/matrix-org/mjolnir) moderation bot (optional) | |||
| @@ -15,6 +15,7 @@ List of roles where self-building the Docker image is currently possible: | |||
| - `matrix-synapse-admin` | |||
| - `matrix-client-element` | |||
| - `matrix-client-hydrogen` | |||
| - `matrix-client-cinny` | |||
| - `matrix-registration` | |||
| - `matrix-coturn` | |||
| - `matrix-corporal` | |||
| @@ -33,6 +34,7 @@ List of roles where self-building the Docker image is currently possible: | |||
| - `matrix-bridge-mautrix-whatsapp` | |||
| - `matrix-bridge-mx-puppet-skype` | |||
| - `matrix-bot-mjolnir` | |||
| - `matrix-bot-honoroit` | |||
| - `matrix-bot-matrix-reminder-bot` | |||
| - `matrix-email2matrix` | |||
| @@ -10,6 +10,14 @@ | |||
| # Example value: example.com | |||
| matrix_domain: YOUR_BARE_DOMAIN_NAME_HERE | |||
| # The Matrix homeserver software to install. | |||
| # See `roles/matrix-base/defaults/main.yml` for valid options. | |||
| matrix_homeserver_implementation: synapse | |||
| # A secret used as a base, for generating various other secrets. | |||
| # You can put any string here, but generating a strong one is preferred (e.g. `pwgen -s 64 1`). | |||
| matrix_homeserver_generic_secret_key: '' | |||
| # This is something which is provided to Let's Encrypt when retrieving SSL certificates for domains. | |||
| # | |||
| # In case SSL renewal fails at some point, you'll also get an email notification there. | |||
| @@ -20,14 +28,6 @@ matrix_domain: YOUR_BARE_DOMAIN_NAME_HERE | |||
| # Example value: someone@example.com | |||
| matrix_ssl_lets_encrypt_support_email: '' | |||
| # A shared secret (between Coturn and Synapse) used for authentication. | |||
| # You can put any string here, but generating a strong one is preferred (e.g. `pwgen -s 64 1`). | |||
| matrix_coturn_turn_static_auth_secret: '' | |||
| # A secret used to protect access keys issued by the server. | |||
| # You can put any string here, but generating a strong one is preferred (e.g. `pwgen -s 64 1`). | |||
| matrix_synapse_macaroon_secret_key: '' | |||
| # A Postgres password to use for the superuser Postgres user (called `matrix` by default). | |||
| # | |||
| # The playbook creates additional Postgres users and databases (one for each enabled service) | |||
| @@ -8,9 +8,9 @@ | |||
| tags: | |||
| - always | |||
| # Renames the variables if needed | |||
| # Renames or updates the vars.yml if needed | |||
| - include_tasks: | |||
| file: "rename_variables.yml" | |||
| file: "update_variables.yml" | |||
| apply: | |||
| tags: always | |||
| when: run_setup|bool and matrix_awx_enabled|bool | |||
| @@ -1,8 +0,0 @@ | |||
| --- | |||
| - name: Rename synapse presence variable | |||
| delegate_to: 127.0.0.1 | |||
| replace: | |||
| path: "/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/matrix_vars.yml" | |||
| regexp: 'matrix_synapse_use_presence' | |||
| replace: 'matrix_synapse_presence_enabled' | |||
| @@ -0,0 +1,26 @@ | |||
| --- | |||
| - name: Rename synapse presence variable | |||
| delegate_to: 127.0.0.1 | |||
| replace: | |||
| path: "/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/matrix_vars.yml" | |||
| regexp: 'matrix_synapse_use_presence' | |||
| replace: 'matrix_synapse_presence_enabled' | |||
| - name: Generate matrix_homeserver_generic_secret_key variable | |||
| delegate_to: 127.0.0.1 | |||
| command: | | |||
| openssl rand -hex 16 | |||
| register: generic_secret | |||
| no_log: True | |||
| when: ( matrix_homeserver_generic_secret_key is undefined ) or ( matrix_homeserver_generic_secret_key | length == 0 ) | |||
| - name: Add new matrix_homeserver_generic_secret_key variable | |||
| delegate_to: 127.0.0.1 | |||
| lineinfile: | |||
| path: '/var/lib/awx/projects/clients/{{ member_id }}/{{ subscription_id }}/matrix_vars.yml' | |||
| line: "matrix_homeserver_generic_secret_key: {{ generic_secret.stdout }}" | |||
| insertbefore: '# Basic Settings End' | |||
| mode: '0600' | |||
| state: present | |||
| when: ( matrix_homeserver_generic_secret_key is undefined ) or ( matrix_homeserver_generic_secret_key | length == 0 ) | |||
| @@ -7,6 +7,18 @@ | |||
| # Example value: example.com | |||
| matrix_domain: ~ | |||
| # This will contain the homeserver implementation that is in use. | |||
| # Valid values: synapse, dendrite | |||
| # | |||
| # By default, we use Synapse, because it's the only full-featured Matrix server at the moment. | |||
| # | |||
| # This value automatically influences other variables (`matrix_synapse_enabled`, `matrix_dendrite_enabled`, etc.). | |||
| # The homeserver implementation of an existing server cannot be changed without data loss. | |||
| matrix_homeserver_implementation: synapse | |||
| # This contains a secret, which is used for generating various other secrets later on. | |||
| matrix_homeserver_generic_secret_key: '' | |||
| # This is where your data lives and what we set up. | |||
| # This and the Element FQN (see below) are expected to be on the same server. | |||
| matrix_server_fqn_matrix: "matrix.{{ matrix_domain }}" | |||
| @@ -21,6 +33,9 @@ matrix_server_fqn_element: "element.{{ matrix_domain }}" | |||
| # This is where you access the Hydrogen web client from (if enabled via matrix_client_hydrogen_enabled; disabled by default). | |||
| matrix_server_fqn_hydrogen: "hydrogen.{{ matrix_domain }}" | |||
| # This is where you access the Cinny web client from (if enabled via matrix_client_cinny_enabled; disabled by default). | |||
| matrix_server_fqn_cinny: "cinny.{{ matrix_domain }}" | |||
| # This is where you access the Dimension. | |||
| matrix_server_fqn_dimension: "dimension.{{ matrix_domain }}" | |||
| @@ -88,11 +103,16 @@ matrix_ntpd_service: "{{ 'systemd-timesyncd' if (ansible_distribution == 'CentOS | |||
| matrix_homeserver_url: "https://{{ matrix_server_fqn_matrix }}" | |||
| # Specifies where the homeserver is on the container network. | |||
| # Where this is depends on whether there's a reverse-proxy in front of it, etc. | |||
| # Specifies where the homeserver's Client-Server API is on the container network. | |||
| # Where this is depends on whether there's a reverse-proxy in front of the homeserver, which homeserver it is, etc. | |||
| # This likely gets overriden elsewhere. | |||
| matrix_homeserver_container_url: "" | |||
| # Specifies where the homeserver's Federation API is on the container network. | |||
| # Where this is depends on whether there's a reverse-proxy in front of the homeserver, which homeserver it is, etc. | |||
| # This likely gets overriden elsewhere. | |||
| matrix_homeserver_container_federation_url: "" | |||
| matrix_identity_server_url: ~ | |||
| matrix_integration_manager_rest_url: ~ | |||
| @@ -218,6 +238,7 @@ run_synapse_register_user: true | |||
| run_synapse_update_user_password: true | |||
| run_synapse_import_media_store: true | |||
| run_synapse_rust_synapse_compress_state: true | |||
| run_dendrite_register_user: true | |||
| run_setup: true | |||
| run_self_check: true | |||
| run_start: true | |||
| @@ -31,4 +31,5 @@ | |||
| - setup-all | |||
| - setup-ma1sd | |||
| - setup-synapse | |||
| - setup-dendrite | |||
| - setup-nginx-proxy | |||
| @@ -1,5 +1,10 @@ | |||
| --- | |||
| - name: Fail if invalid homeserver implementation | |||
| fail: | |||
| msg: "You need to set a valid homeserver implementation in `matrix_homeserver_implementation`" | |||
| when: "matrix_homeserver_implementation not in ['synapse', 'dendrite']" | |||
| # We generally support Ansible 2.7.1 and above. | |||
| - name: Fail if running on Ansible < 2.7.1 | |||
| fail: | |||
| @@ -28,14 +33,29 @@ | |||
| - {'old': 'hostname_riot', 'new': 'matrix_server_fqn_element'} | |||
| - {'old': 'matrix_server_fqn_riot', 'new': 'matrix_server_fqn_element'} | |||
| # We have a dedicated check for this variable, because we'd like to have a custom (friendlier) message. | |||
| - name: Fail if matrix_homeserver_generic_secret_key is undefined | |||
| fail: | |||
| msg: | | |||
| The `matrix_homeserver_generic_secret_key` variable must be defined and have a non-null and non-empty value. | |||
| If you're observing this error on a new installation, you should ensure that the `matrix_homeserver_generic_secret_key` is defined. | |||
| If you're observing this error on an existing homeserver installation, you can fix it easily and in a backward-compatible way by adding | |||
| `{% raw %}matrix_homeserver_generic_secret_key: "{{ matrix_synapse_macaroon_secret_key }}"{% endraw %}` | |||
| to your `vars.yml` file. Using another secret value for the new variable is also possible and shouldn't cause any trouble. | |||
| when: "matrix_homeserver_generic_secret_key is none or matrix_homeserver_generic_secret_key == ''" | |||
| - name: Fail if required variables are undefined | |||
| fail: | |||
| msg: "The `{{ item }}` variable must be defined and have a non-null value" | |||
| msg: "The `{{ item.var }}` variable must be defined and have a non-null and non-empty value" | |||
| with_items: | |||
| - matrix_domain | |||
| - matrix_server_fqn_matrix | |||
| - matrix_server_fqn_element | |||
| when: "item not in vars or vars[item] is none" | |||
| - {'var': matrix_domain, 'value': "{{ matrix_domain|default('') }}"} | |||
| - {'var': matrix_server_fqn_matrix, 'value': "{{ matrix_server_fqn_matrix|default('') }}"} | |||
| - {'var': matrix_server_fqn_element, 'value': "{{ matrix_server_fqn_element|default('') }}"} | |||
| - {'var': matrix_homeserver_container_url, 'value': "{{ matrix_homeserver_container_url|default('') }}"} | |||
| - {'var': matrix_homeserver_container_federation_url, 'value': "{{ matrix_homeserver_container_federation_url|default('') }}"} | |||
| when: "item.value is none or item.value == ''" | |||
| - name: Fail if uppercase domain used | |||
| fail: | |||
| @@ -4,8 +4,6 @@ | |||
| pacman: | |||
| name: | |||
| - python-docker | |||
| # TODO This needs to be verified. Which version do we need? | |||
| - fuse3 | |||
| - python-dnspython | |||
| state: latest | |||
| update_cache: yes | |||
| @@ -21,7 +21,6 @@ | |||
| yum: | |||
| name: | |||
| - "{{ matrix_ntpd_package }}" | |||
| - fuse | |||
| state: latest | |||
| update_cache: yes | |||
| @@ -28,7 +28,6 @@ | |||
| yum: | |||
| name: | |||
| - "{{ matrix_ntpd_package }}" | |||
| - fuse | |||
| state: latest | |||
| update_cache: yes | |||
| @@ -44,4 +43,4 @@ | |||
| pip: | |||
| name: docker-py | |||
| state: latest | |||
| when: matrix_docker_installation_enabled|bool | |||
| when: matrix_docker_installation_enabled|bool | |||
| @@ -29,7 +29,6 @@ | |||
| apt: | |||
| name: | |||
| - "{{ matrix_ntpd_package }}" | |||
| - fuse | |||
| state: latest | |||
| update_cache: yes | |||
| @@ -29,7 +29,6 @@ | |||
| apt: | |||
| name: | |||
| - "{{ matrix_ntpd_package }}" | |||
| - fuse | |||
| state: latest | |||
| update_cache: yes | |||
| @@ -0,0 +1,23 @@ | |||
| # This is for both CentOS 7 and 8 | |||
| - name: Ensure fuse installed (CentOS) | |||
| yum: | |||
| name: | |||
| - fuse | |||
| state: latest | |||
| when: ansible_distribution == 'CentOS' | |||
| # This is for both Debian and Raspbian | |||
| - name: Ensure fuse installed (Debian/Raspbian) | |||
| apt: | |||
| name: | |||
| - fuse | |||
| state: latest | |||
| when: ansible_os_family == 'Debian' | |||
| - name: Ensure fuse installed (Archlinux) | |||
| pacman: | |||
| name: | |||
| - fuse3 | |||
| state: latest | |||
| when: ansible_distribution == 'Archlinux' | |||
| @@ -1,9 +0,0 @@ | |||
| --- | |||
| - name: Fail if required Matrix Base settings not defined | |||
| fail: | |||
| msg: >- | |||
| You need to define a required configuration setting (`{{ item }}`) for using this playbook. | |||
| when: "vars[item] == ''" | |||
| with_items: | |||
| - "matrix_homeserver_container_url" | |||
| @@ -1,3 +1,3 @@ | |||
| # This will contain a list of enabled services that the playbook is managing. | |||
| # Each component is expected to append its service name to this list. | |||
| matrix_systemd_services_list: [] | |||
| matrix_systemd_services_list: [] | |||
| @@ -39,8 +39,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-bot-go-neb \ | |||
| {{ matrix_bot_go_neb_docker_image }} \ | |||
| -c "go-neb /config/config.yaml" | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-bot-go-neb 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-bot-go-neb 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-bot-go-neb 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-bot-go-neb 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-bot-go-neb | |||
| @@ -0,0 +1,103 @@ | |||
| # honoroit is a helpdesk bot | |||
| # See: https://gitlab.com/etke.cc/honoroit | |||
| matrix_bot_honoroit_enabled: true | |||
| matrix_bot_honoroit_container_image_self_build: false | |||
| matrix_bot_honoroit_docker_repo: "https://gitlab.com/etke.cc/honoroit.git" | |||
| matrix_bot_honoroit_docker_src_files_path: "{{ matrix_base_data_path }}/honoroit/docker-src" | |||
| matrix_bot_honoroit_version: v0.9.1 | |||
| matrix_bot_honoroit_docker_image: "{{ matrix_bot_honoroit_docker_image_name_prefix }}honoroit:{{ matrix_bot_honoroit_version }}" | |||
| matrix_bot_honoroit_docker_image_name_prefix: "{{ 'localhost/' if matrix_bot_honoroit_container_image_self_build else 'registry.gitlab.com/etke.cc/' }}" | |||
| matrix_bot_honoroit_docker_image_force_pull: "{{ matrix_bot_honoroit_docker_image.endswith(':latest') }}" | |||
| matrix_bot_honoroit_base_path: "{{ matrix_base_data_path }}/honoroit" | |||
| matrix_bot_honoroit_config_path: "{{ matrix_bot_honoroit_base_path }}/config" | |||
| matrix_bot_honoroit_data_path: "{{ matrix_bot_honoroit_base_path }}/data" | |||
| matrix_bot_honoroit_data_store_path: "{{ matrix_bot_honoroit_data_path }}/store" | |||
| # A list of extra arguments to pass to the container | |||
| matrix_bot_honoroit_container_extra_arguments: [] | |||
| # List of systemd services that matrix-bot-honoroit.service depends on | |||
| matrix_bot_honoroit_systemd_required_services_list: ['docker.service'] | |||
| # List of systemd services that matrix-bot-honoroit.service wants | |||
| matrix_bot_honoroit_systemd_wanted_services_list: [] | |||
| # Database-related configuration fields. | |||
| # | |||
| # To use SQLite, stick to these defaults. | |||
| # | |||
| # To use Postgres: | |||
| # - change the engine (`matrix_bot_honoroit_database_engine: 'postgres'`) | |||
| # - adjust your database credentials via the `matrix_bot_honoroit_database_*` variables | |||
| matrix_bot_honoroit_database_engine: 'sqlite' | |||
| matrix_bot_honoroit_sqlite_database_path_local: "{{ matrix_bot_honoroit_data_path }}/bot.db" | |||
| matrix_bot_honoroit_sqlite_database_path_in_container: "/data/bot.db" | |||
| matrix_bot_honoroit_database_username: 'honoroit' | |||
| matrix_bot_honoroit_database_password: 'some-password' | |||
| matrix_bot_honoroit_database_hostname: 'matrix-postgres' | |||
| matrix_bot_honoroit_database_port: 5432 | |||
| matrix_bot_honoroit_database_name: 'honoroit' | |||
| matrix_bot_honoroit_database_connection_string: 'postgres://{{ matrix_bot_honoroit_database_username }}:{{ matrix_bot_honoroit_database_password }}@{{ matrix_bot_honoroit_database_hostname }}:{{ matrix_bot_honoroit_database_port }}/{{ matrix_bot_honoroit_database_name }}?sslmode=disable' | |||
| matrix_bot_honoroit_storage_database: "{{ | |||
| { | |||
| 'sqlite': matrix_bot_honoroit_sqlite_database_path_in_container, | |||
| 'postgres': matrix_bot_honoroit_database_connection_string, | |||
| }[matrix_bot_honoroit_database_engine] | |||
| }}" | |||
| matrix_bot_honoroit_database_dialect: "{{ | |||
| { | |||
| 'sqlite': 'sqlite3', | |||
| 'postgres': 'postgres', | |||
| }[matrix_bot_honoroit_database_engine] | |||
| }}" | |||
| # The bot's username. This user needs to be created manually beforehand. | |||
| # Also see `matrix_bot_honoroit_password`. | |||
| matrix_bot_honoroit_login: "honoroit" | |||
| # The password that the bot uses to authenticate. | |||
| matrix_bot_honoroit_password: '' | |||
| matrix_bot_honoroit_homeserver: "{{ matrix_homeserver_container_url }}" | |||
| # The room ID where bot will create threads | |||
| matrix_bot_honoroit_roomid: '' | |||
| # Command prefix | |||
| matrix_bot_honoroit_prefix: '' | |||
| # Sentry DSN | |||
| matrix_bot_honoroit_sentry: '' | |||
| # Log level | |||
| matrix_bot_honoroit_loglevel: '' | |||
| # Text: greetings | |||
| matrix_bot_honoroit_text_greetings: '' | |||
| # Text: error | |||
| matrix_bot_honoroit_text_error: '' | |||
| # Text: empty room | |||
| matrix_bot_honoroit_text_emptyroom: '' | |||
| # Text: done | |||
| matrix_bot_honoroit_text_done: '' | |||
| # Additional environment variables to pass to the Honoroit container | |||
| # | |||
| # Example: | |||
| # matrix_bot_honoroit_environment_variables_extension: | | |||
| # HONOROIT_TEXT_DONE=Done | |||
| matrix_bot_honoroit_environment_variables_extension: '' | |||
| @@ -0,0 +1,3 @@ | |||
| - set_fact: | |||
| matrix_systemd_services_list: "{{ matrix_systemd_services_list + ['matrix-bot-honoroit.service'] }}" | |||
| when: matrix_bot_honoroit_enabled|bool | |||
| @@ -0,0 +1,21 @@ | |||
| - import_tasks: "{{ role_path }}/tasks/init.yml" | |||
| tags: | |||
| - always | |||
| - import_tasks: "{{ role_path }}/tasks/validate_config.yml" | |||
| when: "run_setup|bool and matrix_bot_honoroit_enabled|bool" | |||
| tags: | |||
| - setup-all | |||
| - setup-bot-honoroit | |||
| - import_tasks: "{{ role_path }}/tasks/setup_install.yml" | |||
| when: "run_setup|bool and matrix_bot_honoroit_enabled|bool" | |||
| tags: | |||
| - setup-all | |||
| - setup-bot-honoroit | |||
| - import_tasks: "{{ role_path }}/tasks/setup_uninstall.yml" | |||
| when: "run_setup|bool and not matrix_bot_honoroit_enabled|bool" | |||
| tags: | |||
| - setup-all | |||
| - setup-bot-honoroit | |||
| @@ -0,0 +1,92 @@ | |||
| --- | |||
| - set_fact: | |||
| matrix_bot_honoroit_requires_restart: false | |||
| - block: | |||
| - name: Check if an SQLite database already exists | |||
| stat: | |||
| path: "{{ matrix_bot_honoroit_sqlite_database_path_local }}" | |||
| register: matrix_bot_honoroit_sqlite_database_path_local_stat_result | |||
| - block: | |||
| - set_fact: | |||
| matrix_postgres_db_migration_request: | |||
| src: "{{ matrix_bot_honoroit_sqlite_database_path_local }}" | |||
| dst: "{{ matrix_bot_honoroit_database_connection_string }}" | |||
| caller: "{{ role_path|basename }}" | |||
| engine_variable_name: 'matrix_bot_honoroit_database_engine' | |||
| engine_old: 'sqlite' | |||
| systemd_services_to_stop: ['matrix-bot-honoroit.service'] | |||
| - import_tasks: "{{ role_path }}/../matrix-postgres/tasks/util/migrate_db_to_postgres.yml" | |||
| - set_fact: | |||
| matrix_bot_honoroit_requires_restart: true | |||
| when: "matrix_bot_honoroit_sqlite_database_path_local_stat_result.stat.exists|bool" | |||
| when: "matrix_bot_honoroit_database_engine == 'postgres'" | |||
| - name: Ensure honoroit paths exist | |||
| file: | |||
| path: "{{ item.path }}" | |||
| state: directory | |||
| mode: 0750 | |||
| owner: "{{ matrix_user_username }}" | |||
| group: "{{ matrix_user_groupname }}" | |||
| with_items: | |||
| - { path: "{{ matrix_bot_honoroit_config_path }}", when: true } | |||
| - { path: "{{ matrix_bot_honoroit_data_path }}", when: true } | |||
| - { path: "{{ matrix_bot_honoroit_data_store_path }}", when: true } | |||
| - { path: "{{ matrix_bot_honoroit_docker_src_files_path }}", when: true} | |||
| when: "item.when|bool" | |||
| - name: Ensure honoroit environment variables file created | |||
| template: | |||
| src: "{{ role_path }}/templates/env.j2" | |||
| dest: "{{ matrix_bot_honoroit_config_path }}/env" | |||
| mode: 0640 | |||
| - name: Ensure honoroit image is pulled | |||
| docker_image: | |||
| name: "{{ matrix_bot_honoroit_docker_image }}" | |||
| source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" | |||
| force_source: "{{ matrix_bot_honoroit_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_bot_honoroit_docker_image_force_pull }}" | |||
| when: "not matrix_bot_honoroit_container_image_self_build|bool" | |||
| - name: Ensure honoroit repository is present on self-build | |||
| git: | |||
| repo: "{{ matrix_bot_honoroit_docker_repo }}" | |||
| dest: "{{ matrix_bot_honoroit_docker_src_files_path }}" | |||
| force: "yes" | |||
| register: matrix_bot_honoroit_git_pull_results | |||
| when: "matrix_bot_honoroit_container_image_self_build|bool" | |||
| - name: Ensure honoroit image is built | |||
| docker_image: | |||
| name: "{{ matrix_bot_honoroit_docker_image }}" | |||
| source: build | |||
| force_source: "{{ matrix_bot_honoroit_git_pull_results.changed if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_mailer_git_pull_results.changed }}" | |||
| build: | |||
| dockerfile: Dockerfile | |||
| path: "{{ matrix_bot_honoroit_docker_src_files_path }}" | |||
| pull: yes | |||
| when: "matrix_bot_honoroit_container_image_self_build|bool" | |||
| - name: Ensure matrix-bot-honoroit.service installed | |||
| template: | |||
| src: "{{ role_path }}/templates/systemd/matrix-bot-honoroit.service.j2" | |||
| dest: "{{ matrix_systemd_path }}/matrix-bot-honoroit.service" | |||
| mode: 0644 | |||
| register: matrix_bot_honoroit_systemd_service_result | |||
| - name: Ensure systemd reloaded after matrix-bot-honoroit.service installation | |||
| service: | |||
| daemon_reload: yes | |||
| when: "matrix_bot_honoroit_systemd_service_result.changed|bool" | |||
| - name: Ensure matrix-bot-honoroit.service restarted, if necessary | |||
| service: | |||
| name: "matrix-bot-honoroit.service" | |||
| state: restarted | |||
| when: "matrix_bot_honoroit_requires_restart|bool" | |||
| @@ -0,0 +1,36 @@ | |||
| --- | |||
| - name: Check existence of matrix-honoroit service | |||
| stat: | |||
| path: "{{ matrix_systemd_path }}/matrix-bot-honoroit.service" | |||
| register: matrix_bot_honoroit_service_stat | |||
| - name: Ensure matrix-honoroit is stopped | |||
| service: | |||
| name: matrix-bot-honoroit | |||
| state: stopped | |||
| enabled: no | |||
| daemon_reload: yes | |||
| register: stopping_result | |||
| when: "matrix_bot_honoroit_service_stat.stat.exists|bool" | |||
| - name: Ensure matrix-bot-honoroit.service doesn't exist | |||
| file: | |||
| path: "{{ matrix_systemd_path }}/matrix-bot-honoroit.service" | |||
| state: absent | |||
| when: "matrix_bot_honoroit_service_stat.stat.exists|bool" | |||
| - name: Ensure systemd reloaded after matrix-bot-honoroit.service removal | |||
| service: | |||
| daemon_reload: yes | |||
| when: "matrix_bot_honoroit_service_stat.stat.exists|bool" | |||
| - name: Ensure Matrix honoroit paths don't exist | |||
| file: | |||
| path: "{{ matrix_bot_honoroit_base_path }}" | |||
| state: absent | |||
| - name: Ensure honoroit Docker image doesn't exist | |||
| docker_image: | |||
| name: "{{ matrix_bot_honoroit_docker_image }}" | |||
| state: absent | |||
| @@ -0,0 +1,10 @@ | |||
| --- | |||
| - name: Fail if required settings not defined | |||
| fail: | |||
| msg: >- | |||
| You need to define a required configuration setting (`{{ item }}`). | |||
| when: "vars[item] == ''" | |||
| with_items: | |||
| - "matrix_bot_honoroit_password" | |||
| - "matrix_bot_honoroit_roomid" | |||
| @@ -0,0 +1,15 @@ | |||
| HONOROIT_LOGIN={{ matrix_bot_honoroit_login }} | |||
| HONOROIT_PASSWORD={{ matrix_bot_honoroit_password }} | |||
| HONOROIT_HOMESERVER={{ matrix_bot_honoroit_homeserver }} | |||
| HONOROIT_ROOMID={{ matrix_bot_honoroit_roomid }} | |||
| HONOROIT_DB_DSN={{ matrix_bot_honoroit_database_connection_string }} | |||
| HONOROIT_DB_DIALECT={{ matrix_bot_honoroit_database_dialect }} | |||
| HONOROIT_PREFIX={{ matrix_bot_honoroit_prefix }} | |||
| HONOROIT_SENTRY={{ matrix_bot_honoroit_sentry }} | |||
| HONOROIT_LOGLEVEL={{ matrix_bot_honoroit_loglevel }} | |||
| HONOROIT_TEXT_GREETINGS={{ matrix_bot_honoroit_text_greetings }} | |||
| HONOROIT_TEXT_ERROR={{ matrix_bot_honoroit_text_error }} | |||
| HONOROIT_TEXT_EMPTYROOM={{ matrix_bot_honoroit_text_emptyroom }} | |||
| HONOROIT_TEXT_DONE={{ matrix_bot_honoroit_text_done }} | |||
| {{ matrix_bot_honoroit_environment_variables_extension }} | |||
| @@ -0,0 +1,39 @@ | |||
| #jinja2: lstrip_blocks: "True" | |||
| [Unit] | |||
| Description=Matrix helpdesk bot | |||
| {% for service in matrix_bot_honoroit_systemd_required_services_list %} | |||
| Requires={{ service }} | |||
| After={{ service }} | |||
| {% endfor %} | |||
| {% for service in matrix_bot_honoroit_systemd_wanted_services_list %} | |||
| Wants={{ service }} | |||
| {% endfor %} | |||
| DefaultDependencies=no | |||
| [Service] | |||
| Type=simple | |||
| Environment="HOME={{ matrix_systemd_unit_home_path }}" | |||
| ExecStartPre=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-bot-honoroit 2>/dev/null' | |||
| ExecStartPre=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-bot-honoroit 2>/dev/null' | |||
| ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-bot-honoroit \ | |||
| --log-driver=none \ | |||
| --user={{ matrix_user_uid }}:{{ matrix_user_gid }} \ | |||
| --cap-drop=ALL \ | |||
| --read-only \ | |||
| --network={{ matrix_docker_network }} \ | |||
| --env-file={{ matrix_bot_honoroit_config_path }}/env \ | |||
| --mount type=bind,src={{ matrix_bot_honoroit_data_path }},dst=/data \ | |||
| {% for arg in matrix_bot_honoroit_container_extra_arguments %} | |||
| {{ arg }} \ | |||
| {% endfor %} | |||
| {{ matrix_bot_honoroit_docker_image }} | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-bot-honoroit 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-bot-honoroit 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-bot-honoroit | |||
| [Install] | |||
| WantedBy=multi-user.target | |||
| @@ -3,7 +3,7 @@ | |||
| matrix_bot_matrix_reminder_bot_enabled: true | |||
| matrix_bot_matrix_reminder_bot_container_self_build: false | |||
| matrix_bot_matrix_reminder_bot_container_image_self_build: false | |||
| matrix_bot_matrix_reminder_bot_docker_repo: "https://github.com/anoadragon453/matrix-reminder-bot.git" | |||
| matrix_bot_matrix_reminder_bot_docker_src_files_path: "{{ matrix_base_data_path }}/matrix-reminder-bot/docker-src" | |||
| @@ -46,7 +46,7 @@ | |||
| source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" | |||
| force_source: "{{ matrix_bot_matrix_reminder_bot_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_bot_matrix_reminder_bot_docker_image_force_pull }}" | |||
| when: "not matrix_bot_matrix_reminder_bot_container_self_build|bool" | |||
| when: "not matrix_bot_matrix_reminder_bot_container_image_self_build|bool" | |||
| - name: Ensure matrix-reminder-bot repository is present on self-build | |||
| git: | |||
| @@ -54,7 +54,7 @@ | |||
| dest: "{{ matrix_bot_matrix_reminder_bot_docker_src_files_path }}" | |||
| force: "yes" | |||
| register: matrix_bot_matrix_reminder_bot_git_pull_results | |||
| when: "matrix_bot_matrix_reminder_bot_container_self_build|bool" | |||
| when: "matrix_bot_matrix_reminder_bot_container_image_self_build|bool" | |||
| - name: Ensure matrix-reminder-bot image is built | |||
| docker_image: | |||
| @@ -66,7 +66,7 @@ | |||
| dockerfile: docker/Dockerfile | |||
| path: "{{ matrix_bot_matrix_reminder_bot_docker_src_files_path }}" | |||
| pull: yes | |||
| when: "matrix_bot_matrix_reminder_bot_container_self_build|bool" | |||
| when: "matrix_bot_matrix_reminder_bot_container_image_self_build|bool" | |||
| - name: Ensure matrix-reminder-bot config installed | |||
| copy: | |||
| @@ -8,3 +8,12 @@ | |||
| with_items: | |||
| - "matrix_bot_matrix_reminder_bot_matrix_user_password" | |||
| - "matrix_bot_matrix_reminder_bot_reminders_timezone" | |||
| - name: (Deprecation) Catch and report renamed settings | |||
| fail: | |||
| msg: >- | |||
| Your configuration contains a variable, which now has a different name. | |||
| Please change your configuration to rename the variable (`{{ item.old }}` -> `{{ item.new }}`). | |||
| when: "item.old in vars" | |||
| with_items: | |||
| - {'old': 'matrix_bot_matrix_reminder_bot_container_self_build', 'new': 'matrix_bot_matrix_reminder_bot_container_image_self_build'} | |||
| @@ -32,8 +32,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-bot-matrix-rem | |||
| {{ matrix_bot_matrix_reminder_bot_docker_image }} \ | |||
| -c "matrix-reminder-bot /config/config.yaml" | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-bot-matrix-reminder-bot 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-bot-matrix-reminder-bot 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-bot-matrix-reminder-bot 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-bot-matrix-reminder-bot 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-bot-matrix-reminder-bot | |||
| @@ -32,8 +32,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-bot-mjolnir \ | |||
| {% endfor %} | |||
| {{ matrix_bot_mjolnir_docker_image }} | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-bot-mjolnir 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-bot-mjolnir 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-bot-mjolnir 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-bot-mjolnir 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-bot-mjolnir | |||
| @@ -35,8 +35,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-appservice-dis | |||
| {{ matrix_appservice_discord_docker_image }} \ | |||
| node /build/src/discordas.js -p 9005 -c /cfg/config.yaml -f /cfg/registration.yaml | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-appservice-discord 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-appservice-discord 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-appservice-discord 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-appservice-discord 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-appservice-discord | |||
| @@ -3,7 +3,7 @@ | |||
| matrix_appservice_irc_enabled: true | |||
| matrix_appservice_irc_container_self_build: false | |||
| matrix_appservice_irc_container_image_self_build: false | |||
| matrix_appservice_irc_docker_repo: "https://github.com/matrix-org/matrix-appservice-irc.git" | |||
| matrix_appservice_irc_docker_src_files_path: "{{ matrix_base_data_path }}/appservice-irc/docker-src" | |||
| @@ -3,7 +3,7 @@ | |||
| - name: Fail if trying to self-build on Ansible < 2.8 | |||
| fail: | |||
| msg: "To self-build the Element image, you should use Ansible 2.8 or higher. See docs/ansible.md" | |||
| when: "ansible_version.major == 2 and ansible_version.minor < 8 and matrix_appservice_irc_container_self_build and matrix_appservice_irc_enabled" | |||
| when: "ansible_version.major == 2 and ansible_version.minor < 8 and matrix_appservice_irc_container_image_self_build and matrix_appservice_irc_enabled" | |||
| # If the matrix-synapse role is not used, `matrix_synapse_role_executed` won't exist. | |||
| # We don't want to fail in such cases. | |||
| @@ -11,7 +11,7 @@ | |||
| - { path: "{{ matrix_appservice_irc_base_path }}", when: true } | |||
| - { path: "{{ matrix_appservice_irc_config_path }}", when: true } | |||
| - { path: "{{ matrix_appservice_irc_data_path }}", when: true } | |||
| - { path: "{{ matrix_appservice_irc_docker_src_files_path }}", when: "{{ matrix_appservice_irc_container_self_build }}" } | |||
| - { path: "{{ matrix_appservice_irc_docker_src_files_path }}", when: "{{ matrix_appservice_irc_container_image_self_build }}" } | |||
| when: item.when|bool | |||
| - name: Check if an old passkey file already exists | |||
| @@ -61,7 +61,7 @@ | |||
| source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" | |||
| force_source: "{{ matrix_appservice_irc_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_appservice_irc_docker_image_force_pull }}" | |||
| when: "matrix_appservice_irc_enabled|bool and not matrix_appservice_irc_container_self_build|bool" | |||
| when: "matrix_appservice_irc_enabled|bool and not matrix_appservice_irc_container_image_self_build|bool" | |||
| - name: Ensure matrix-appservice-irc repository is present when self-building | |||
| git: | |||
| @@ -69,7 +69,7 @@ | |||
| dest: "{{ matrix_appservice_irc_docker_src_files_path }}" | |||
| force: "yes" | |||
| register: matrix_appservice_irc_git_pull_results | |||
| when: "matrix_appservice_irc_enabled|bool and matrix_appservice_irc_container_self_build|bool" | |||
| when: "matrix_appservice_irc_enabled|bool and matrix_appservice_irc_container_image_self_build|bool" | |||
| - name: Ensure matrix-appservice-irc Docker image is built | |||
| docker_image: | |||
| @@ -81,7 +81,7 @@ | |||
| dockerfile: Dockerfile | |||
| path: "{{ matrix_appservice_irc_docker_src_files_path }}" | |||
| pull: yes | |||
| when: "matrix_appservice_irc_enabled|bool and matrix_appservice_irc_container_self_build|bool and matrix_appservice_irc_git_pull_results.changed" | |||
| when: "matrix_appservice_irc_enabled|bool and matrix_appservice_irc_container_image_self_build|bool and matrix_appservice_irc_git_pull_results.changed" | |||
| - name: Ensure Matrix Appservice IRC config installed | |||
| copy: | |||
| @@ -33,3 +33,4 @@ | |||
| when: "item.old in vars" | |||
| with_items: | |||
| - {'old': 'matrix_appservice_irc_container_expose_client_server_api_port', 'new': '<superseded by matrix_appservice_irc_container_http_host_bind_port>'} | |||
| - {'old': 'matrix_appservice_irc_container_self_build', 'new': 'matrix_appservice_irc_container_image_self_build'} | |||
| @@ -36,8 +36,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-appservice-irc | |||
| {{ matrix_appservice_irc_docker_image }} \ | |||
| -c 'node app.js -c /config/config.yaml -f /config/registration.yaml -p 9999' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-appservice-irc 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-appservice-irc 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-appservice-irc 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-appservice-irc 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-appservice-irc | |||
| @@ -3,7 +3,7 @@ | |||
| matrix_appservice_slack_enabled: true | |||
| matrix_appservice_slack_container_self_build: false | |||
| matrix_appservice_slack_container_image_self_build: false | |||
| matrix_appservice_slack_docker_repo: "https://github.com/matrix-org/matrix-appservice-slack.git" | |||
| matrix_appservice_slack_docker_src_files_path: "{{ matrix_base_data_path }}/appservice-slack/docker-src" | |||
| @@ -3,7 +3,7 @@ | |||
| - name: Fail if trying to self-build on Ansible < 2.8 | |||
| fail: | |||
| msg: "To self-build the Element image, you should use Ansible 2.8 or higher. See docs/ansible.md" | |||
| when: "ansible_version.major == 2 and ansible_version.minor < 8 and matrix_appservice_slack_container_self_build and matrix_appservice_slack_enabled" | |||
| when: "ansible_version.major == 2 and ansible_version.minor < 8 and matrix_appservice_slack_container_image_self_build and matrix_appservice_slack_enabled" | |||
| # If the matrix-synapse role is not used, `matrix_synapse_role_executed` won't exist. | |||
| # We don't want to fail in such cases. | |||
| @@ -44,7 +44,7 @@ | |||
| msg: >- | |||
| Trying to append Slack Appservice's reverse-proxying configuration to matrix-nginx-proxy, | |||
| but it's pointless since the matrix-nginx-proxy role had already executed. | |||
| To fix this, please change the order of roles in your plabook, | |||
| To fix this, please change the order of roles in your playbook, | |||
| so that the matrix-nginx-proxy role would run after the matrix-bridge-appservice-slack role. | |||
| when: matrix_nginx_proxy_role_executed|default(False)|bool | |||
| @@ -11,7 +11,7 @@ | |||
| - { path: "{{ matrix_appservice_slack_base_path }}", when: true } | |||
| - { path: "{{ matrix_appservice_slack_config_path }}", when: true } | |||
| - { path: "{{ matrix_appservice_slack_data_path }}", when: true } | |||
| - { path: "{{ matrix_appservice_slack_docker_src_files_path }}", when: "{{ matrix_appservice_slack_container_self_build }}" } | |||
| - { path: "{{ matrix_appservice_slack_docker_src_files_path }}", when: "{{ matrix_appservice_slack_container_image_self_build }}" } | |||
| when: item.when|bool | |||
| - set_fact: | |||
| @@ -37,7 +37,7 @@ | |||
| source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" | |||
| force_source: "{{ matrix_appservice_slack_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_appservice_slack_docker_image_force_pull }}" | |||
| when: "not matrix_appservice_slack_container_self_build|bool" | |||
| when: "not matrix_appservice_slack_container_image_self_build|bool" | |||
| - name: Ensure matrix-appservice-slack repository is present when self-building | |||
| git: | |||
| @@ -45,7 +45,7 @@ | |||
| dest: "{{ matrix_appservice_slack_docker_src_files_path }}" | |||
| force: "yes" | |||
| register: matrix_appservice_slack_git_pull_results | |||
| when: "matrix_appservice_slack_container_self_build|bool" | |||
| when: "matrix_appservice_slack_container_image_self_build|bool" | |||
| - name: Ensure matrix-appservice-slack Docker image is built | |||
| docker_image: | |||
| @@ -57,7 +57,7 @@ | |||
| dockerfile: Dockerfile | |||
| path: "{{ matrix_appservice_slack_docker_src_files_path }}" | |||
| pull: yes | |||
| when: "matrix_appservice_slack_container_self_build|bool and matrix_appservice_slack_git_pull_results.changed" | |||
| when: "matrix_appservice_slack_container_image_self_build|bool and matrix_appservice_slack_git_pull_results.changed" | |||
| - name: Ensure Matrix Appservice Slack config installed | |||
| copy: | |||
| @@ -11,3 +11,12 @@ | |||
| - "matrix_appservice_slack_homeserver_url" | |||
| - "matrix_appservice_slack_homeserver_token" | |||
| - "matrix_appservice_slack_id_token" | |||
| - name: (Deprecation) Catch and report renamed settings | |||
| fail: | |||
| msg: >- | |||
| Your configuration contains a variable, which now has a different name. | |||
| Please change your configuration to rename the variable (`{{ item.old }}` -> `{{ item.new }}`). | |||
| when: "item.old in vars" | |||
| with_items: | |||
| - {'old': 'matrix_appservice_slack_container_self_build', 'new': 'matrix_appservice_slack_container_image_self_build'} | |||
| @@ -35,8 +35,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-appservice-sla | |||
| {{ matrix_appservice_slack_docker_image }} \ | |||
| node app.js -p {{matrix_appservice_slack_matrix_port}} -c /config/config.yaml -f /config/slack-registration.yaml | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-appservice-slack 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-appservice-slack 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-appservice-slack 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-appservice-slack 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-appservice-slack | |||
| @@ -8,7 +8,7 @@ matrix_appservice_webhooks_container_image_self_build_repo: "https://github.com/ | |||
| matrix_appservice_webhooks_container_image_self_build_repo_version: "{{ 'master' if matrix_appservice_webhooks_version == 'latest' else matrix_appservice_webhooks_version }}" | |||
| matrix_appservice_webhooks_container_image_self_build_repo_dockerfile_path: "Dockerfile" | |||
| matrix_appservice_webhooks_version: latest | |||
| matrix_appservice_webhooks_version: v1.0.2-01 | |||
| matrix_appservice_webhooks_docker_image: "{{ matrix_appservice_webhooks_docker_image_name_prefix }}redoonetworks/matrix-appservice-webhooks:{{ matrix_appservice_webhooks_version }}" | |||
| matrix_appservice_webhooks_docker_image_name_prefix: "{{ 'localhost/' if matrix_appservice_webhooks_container_image_self_build else matrix_container_global_registry_prefix }}" | |||
| matrix_appservice_webhooks_docker_image_force_pull: "{{ matrix_appservice_webhooks_docker_image.endswith(':latest') }}" | |||
| @@ -37,7 +37,7 @@ | |||
| msg: >- | |||
| Trying to append webhooks Appservice's reverse-proxying configuration to matrix-nginx-proxy, | |||
| but it's pointless since the matrix-nginx-proxy role had already executed. | |||
| To fix this, please change the order of roles in your plabook, | |||
| To fix this, please change the order of roles in your playbook, | |||
| so that the matrix-nginx-proxy role would run after the matrix-bridge-appservice-webhooks role. | |||
| when: matrix_nginx_proxy_role_executed|default(False)|bool | |||
| @@ -35,8 +35,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-appservice-web | |||
| {{ matrix_appservice_webhooks_docker_image }} \ | |||
| node index.js -p {{ matrix_appservice_webhooks_matrix_port }} -c /config/config.yaml -f /config/webhooks-registration.yaml | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-appservice-webhooks 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-appservice-webhooks 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-appservice-webhooks 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-appservice-webhooks 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-appservice-webhooks | |||
| @@ -32,8 +32,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-beeper-linkedi | |||
| {{ matrix_beeper_linkedin_docker_image }} \ | |||
| python3 -m linkedin_matrix -c /data/config.yaml -r /data/registration.yaml | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-beeper-linkedin 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-beeper-linkedin 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-beeper-linkedin 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-beeper-linkedin 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-beeper-linkedin | |||
| @@ -41,8 +41,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-heisenbridge \ | |||
| --listen-port 9898 \ | |||
| {{ matrix_heisenbridge_homeserver_url }} | |||
| ExecStop=-{{ matrix_host_command_docker }} kill matrix-heisenbridge | |||
| ExecStop=-{{ matrix_host_command_docker }} rm matrix-heisenbridge | |||
| ExecStopPost=-{{ matrix_host_command_docker }} kill matrix-heisenbridge | |||
| ExecStopPost=-{{ matrix_host_command_docker }} rm matrix-heisenbridge | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-heisenbridge | |||
| @@ -32,8 +32,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mautrix-facebo | |||
| {{ matrix_mautrix_facebook_docker_image }} \ | |||
| python3 -m mautrix_facebook -c /config/config.yaml --no-update | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-facebook 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-facebook 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-facebook 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-facebook 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mautrix-facebook | |||
| @@ -28,7 +28,7 @@ | |||
| msg: >- | |||
| Trying to append Mautrix googlechat's reverse-proxying configuration to matrix-nginx-proxy, | |||
| but it's pointless since the matrix-nginx-proxy role had already executed. | |||
| To fix this, please change the order of roles in your plabook, | |||
| To fix this, please change the order of roles in your playbook, | |||
| so that the matrix-nginx-proxy role would run after the matrix-bridge-mautrix-googlechat role. | |||
| when: matrix_nginx_proxy_role_executed|default(False)|bool | |||
| @@ -33,8 +33,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mautrix-google | |||
| {{ matrix_mautrix_googlechat_docker_image }} \ | |||
| python3 -m mautrix_googlechat -c /config/config.yaml --no-update | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-googlechat 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-googlechat 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-googlechat 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-googlechat 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mautrix-googlechat | |||
| @@ -28,7 +28,7 @@ | |||
| msg: >- | |||
| Trying to append Mautrix Hangouts's reverse-proxying configuration to matrix-nginx-proxy, | |||
| but it's pointless since the matrix-nginx-proxy role had already executed. | |||
| To fix this, please change the order of roles in your plabook, | |||
| To fix this, please change the order of roles in your playbook, | |||
| so that the matrix-nginx-proxy role would run after the matrix-bridge-mautrix-hangouts role. | |||
| when: matrix_nginx_proxy_role_executed|default(False)|bool | |||
| @@ -44,8 +44,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mautrix-hangou | |||
| {{ matrix_mautrix_hangouts_docker_image }} \ | |||
| python3 -m mautrix_hangouts -c /config/config.yaml --no-update | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-hangouts 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-hangouts 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-hangouts 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-hangouts 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mautrix-hangouts | |||
| @@ -32,8 +32,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mautrix-instag | |||
| {{ matrix_mautrix_instagram_docker_image }} \ | |||
| python3 -m mautrix_instagram -c /config/config.yaml --no-update | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-instagram 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-instagram 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-instagram 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-instagram 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mautrix-instagram | |||
| @@ -3,7 +3,7 @@ | |||
| matrix_mautrix_signal_enabled: true | |||
| matrix_mautrix_signal_container_self_build: false | |||
| matrix_mautrix_signal_container_image_self_build: false | |||
| matrix_mautrix_signal_docker_repo: "https://mau.dev/mautrix/signal.git" | |||
| matrix_mautrix_signal_docker_src_files_path: "{{ matrix_base_data_path }}/mautrix-signal/docker-src" | |||
| @@ -13,7 +13,7 @@ matrix_mautrix_signal_daemon_version: latest | |||
| matrix_mautrix_signal_docker_image: "dock.mau.dev/mautrix/signal:{{ matrix_mautrix_signal_version }}" | |||
| matrix_mautrix_signal_docker_image_force_pull: "{{ matrix_mautrix_signal_docker_image.endswith(':latest') }}" | |||
| matrix_mautrix_signal_daemon_container_self_build: false | |||
| matrix_mautrix_signal_daemon_container_image_self_build: false | |||
| matrix_mautrix_signal_daemon_docker_repo: "https://mau.dev/maunium/signald.git" | |||
| matrix_mautrix_signal_daemon_docker_src_files_path: "{{ matrix_base_data_path }}/mautrix-signald/docker-src" | |||
| @@ -14,7 +14,7 @@ | |||
| source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" | |||
| force_source: "{{ matrix_mautrix_signal_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_mautrix_signal_docker_image_force_pull }}" | |||
| when: "not matrix_mautrix_signal_container_self_build|bool" | |||
| when: "not matrix_mautrix_signal_container_image_self_build|bool" | |||
| - name: Ensure Mautrix Signal repository is present on self-build | |||
| @@ -23,19 +23,19 @@ | |||
| dest: "{{ matrix_mautrix_signal_docker_src_files_path }}" | |||
| force: "yes" | |||
| register: matrix_mautrix_signal_git_pull_results | |||
| when: "matrix_mautrix_signal_container_self_build|bool" | |||
| when: "matrix_mautrix_signal_container_image_self_build|bool" | |||
| - name: Ensure Mautrix Signal image is built | |||
| docker_image: | |||
| name: "{{ matrix_mautrix_signal_docker_image }}" | |||
| source: build | |||
| force_source: "{{ matrix_mautrix_signal_git_pull_results.changed if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_mailer_git_pull_results.changed }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_mautrix_signal_git_pull_results.changed }}" | |||
| build: | |||
| dockerfile: Dockerfile | |||
| path: "{{ matrix_mautrix_signal_docker_src_files_path }}" | |||
| pull: yes | |||
| when: "matrix_mautrix_signal_container_self_build|bool" | |||
| when: "matrix_mautrix_signal_container_image_self_build|bool" | |||
| - name: Ensure Mautrix Signal Daemon image is pulled | |||
| @@ -44,7 +44,7 @@ | |||
| source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" | |||
| force_source: "{{ matrix_mautrix_signal_daemon_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_mautrix_signal_daemon_docker_image_force_pull }}" | |||
| when: matrix_mautrix_signal_enabled and not matrix_mautrix_signal_daemon_container_self_build|bool | |||
| when: matrix_mautrix_signal_enabled and not matrix_mautrix_signal_daemon_container_image_self_build|bool | |||
| register: matrix_mautrix_signal_daemon_pull_results | |||
| - name: Ensure Mautrix Signal Daemon repository is present on self-build | |||
| @@ -53,19 +53,19 @@ | |||
| dest: "{{ matrix_mautrix_signal_daemon_docker_src_files_path }}" | |||
| force: "yes" | |||
| register: matrix_mautrix_signal_daemon_git_pull_results | |||
| when: "matrix_mautrix_signal_daemon_container_self_build|bool" | |||
| when: "matrix_mautrix_signal_daemon_container_image_self_build|bool" | |||
| - name: Ensure Mautrix Signal Daemon image is built | |||
| docker_image: | |||
| name: "{{ matrix_mautrix_signal_daemon_docker_image }}" | |||
| source: build | |||
| force_source: "{{ matrix_mautrix_signal_daemon_git_pull_results.changed if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_mailer_git_pull_results.changed }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_mautrix_signal_daemon_git_pull_results.changed }}" | |||
| build: | |||
| dockerfile: Dockerfile | |||
| path: "{{ matrix_mautrix_signal_daemon_docker_src_files_path }}" | |||
| pull: yes | |||
| when: "matrix_mautrix_signal_daemon_container_self_build|bool" | |||
| when: "matrix_mautrix_signal_daemon_container_image_self_build|bool" | |||
| - name: Ensure Mautrix Signal paths exist | |||
| file: | |||
| @@ -26,3 +26,5 @@ | |||
| - {'old': 'matrix_mautrix_signal_db_port', 'new': 'matrix_mautrix_signal_database_port'} | |||
| - {'old': 'matrix_mautrix_signal_db_url', 'new': 'matrix_mautrix_signal_database_connection_string'} | |||
| - {'old': 'matrix_mautrix_signal_configuration_permissions', 'new': '<superseded by matrix_mautrix_signal_configuration_extension_yaml>'} | |||
| - {'old': 'matrix_mautrix_signal_container_self_build', 'new': 'matrix_mautrix_signal_container_image_self_build'} | |||
| - {'old': 'matrix_mautrix_signal_daemon_container_self_build', 'new': 'matrix_mautrix_signal_daemon_container_image_self_build'} | |||
| @@ -30,8 +30,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mautrix-signal | |||
| -v {{ matrix_mautrix_signal_daemon_path }}:/signald:z \ | |||
| {{ matrix_mautrix_signal_daemon_docker_image }} | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-signal-daemon 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-signal-daemon 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-signal-daemon 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-signal-daemon 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| @@ -37,8 +37,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mautrix-signal | |||
| {{ matrix_mautrix_signal_docker_image }} \ | |||
| python3 -m mautrix_signal -c /config/config.yaml --no-update | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-signal 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-signal 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-signal 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-signal 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| @@ -3,13 +3,13 @@ | |||
| matrix_mautrix_telegram_enabled: true | |||
| matrix_telegram_lottieconverter_container_self_build: false | |||
| matrix_telegram_lottieconverter_container_self_build_mask_arch: false | |||
| matrix_telegram_lottieconverter_container_image_self_build: false | |||
| matrix_telegram_lottieconverter_container_image_self_build_mask_arch: false | |||
| matrix_telegram_lottieconverter_docker_repo: "https://mau.dev/tulir/lottieconverter.git" | |||
| matrix_telegram_lottieconverter_docker_src_files_path: "{{ matrix_base_data_path }}/lotticonverter/docker-src" | |||
| matrix_telegram_lottieconverter_docker_image: "dock.mau.dev/tulir/lottieconverter:alpine-3.14" # needs to be ajusted according to FROM clause of Dockerfile of mautrix-telegram | |||
| matrix_mautrix_telegram_container_self_build: false | |||
| matrix_mautrix_telegram_container_image_self_build: false | |||
| matrix_mautrix_telegram_docker_repo: "https://mau.dev/mautrix/telegram.git" | |||
| matrix_mautrix_telegram_docker_src_files_path: "{{ matrix_base_data_path }}/mautrix-telegram/docker-src" | |||
| @@ -3,7 +3,7 @@ | |||
| - name: Fail if trying to self-build on Ansible < 2.8 | |||
| fail: | |||
| msg: "To self-build the Element image, you should use Ansible 2.8 or higher. See docs/ansible.md" | |||
| when: "ansible_version.major == 2 and ansible_version.minor < 8 and matrix_mautrix_telegram_container_self_build and matrix_mautrix_telegram_enabled" | |||
| when: "ansible_version.major == 2 and ansible_version.minor < 8 and matrix_mautrix_telegram_container_image_self_build and matrix_mautrix_telegram_enabled" | |||
| - set_fact: | |||
| matrix_systemd_services_list: "{{ matrix_systemd_services_list + ['matrix-mautrix-telegram.service'] }}" | |||
| @@ -28,7 +28,7 @@ | |||
| msg: >- | |||
| Trying to append Mautrix Telegram's reverse-proxying configuration to matrix-nginx-proxy, | |||
| but it's pointless since the matrix-nginx-proxy role had already executed. | |||
| To fix this, please change the order of roles in your plabook, | |||
| To fix this, please change the order of roles in your playbook, | |||
| so that the matrix-nginx-proxy role would run after the matrix-bridge-mautrix-telegram role. | |||
| when: matrix_nginx_proxy_role_executed|default(False)|bool | |||
| @@ -45,7 +45,7 @@ | |||
| - { path: "{{ matrix_mautrix_telegram_base_path }}", when: true } | |||
| - { path: "{{ matrix_mautrix_telegram_config_path }}", when: true } | |||
| - { path: "{{ matrix_mautrix_telegram_data_path }}", when: true } | |||
| - { path: "{{ matrix_mautrix_telegram_docker_src_files_path }}", when: "{{ matrix_mautrix_telegram_container_self_build }}" } | |||
| - { path: "{{ matrix_mautrix_telegram_docker_src_files_path }}", when: "{{ matrix_mautrix_telegram_container_image_self_build }}" } | |||
| when: item.when|bool | |||
| - name: Ensure Mautrix Telegram image is pulled | |||
| @@ -54,7 +54,7 @@ | |||
| source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" | |||
| force_source: "{{ matrix_mautrix_telegram_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_mautrix_telegram_docker_image_force_pull }}" | |||
| when: "not matrix_mautrix_telegram_container_self_build|bool" | |||
| when: "not matrix_mautrix_telegram_container_image_self_build|bool" | |||
| - name: Ensure lottieconverter is present when self-building | |||
| git: | |||
| @@ -62,7 +62,7 @@ | |||
| dest: "{{ matrix_telegram_lottieconverter_docker_src_files_path }}" | |||
| force: "yes" | |||
| register: matrix_telegram_lottieconverter_git_pull_results | |||
| when: "matrix_telegram_lottieconverter_container_self_build|bool and matrix_mautrix_telegram_container_self_build|bool" | |||
| when: "matrix_telegram_lottieconverter_container_image_self_build|bool and matrix_mautrix_telegram_container_image_self_build|bool" | |||
| - name: Ensure lottieconverter Docker image is built | |||
| docker_image: | |||
| @@ -74,7 +74,7 @@ | |||
| dockerfile: Dockerfile | |||
| path: "{{ matrix_telegram_lottieconverter_docker_src_files_path }}" | |||
| pull: yes | |||
| when: "matrix_telegram_lottieconverter_container_self_build|bool and matrix_telegram_lottieconverter_git_pull_results.changed and matrix_mautrix_telegram_container_self_build|bool" | |||
| when: "matrix_telegram_lottieconverter_container_image_self_build|bool and matrix_telegram_lottieconverter_git_pull_results.changed and matrix_mautrix_telegram_container_image_self_build|bool" | |||
| - name: Ensure matrix-mautrix-telegram repository is present when self-building | |||
| git: | |||
| @@ -82,7 +82,7 @@ | |||
| dest: "{{ matrix_mautrix_telegram_docker_src_files_path }}" | |||
| force: "yes" | |||
| register: matrix_mautrix_telegram_git_pull_results | |||
| when: "matrix_mautrix_telegram_container_self_build|bool" | |||
| when: "matrix_mautrix_telegram_container_image_self_build|bool" | |||
| - name: Ensure matrix-mautrix-telegram Docker image is built | |||
| docker_image: | |||
| @@ -93,10 +93,10 @@ | |||
| build: | |||
| dockerfile: Dockerfile | |||
| path: "{{ matrix_mautrix_telegram_docker_src_files_path }}" | |||
| pull: "{{ not matrix_telegram_lottieconverter_container_self_build_mask_arch|bool }}" | |||
| pull: "{{ not matrix_telegram_lottieconverter_container_image_self_build_mask_arch|bool }}" | |||
| args: | |||
| TARGETARCH: "" | |||
| when: "matrix_mautrix_telegram_container_self_build|bool and matrix_mautrix_telegram_git_pull_results.changed" | |||
| when: "matrix_mautrix_telegram_container_image_self_build|bool and matrix_mautrix_telegram_git_pull_results.changed" | |||
| - name: Check if an old database file already exists | |||
| stat: | |||
| @@ -20,3 +20,6 @@ | |||
| when: "item.old in vars" | |||
| with_items: | |||
| - {'old': 'matrix_mautrix_telegram_container_exposed_port_number', 'new': '<superseded by matrix_mautrix_telegram_container_http_host_bind_port>'} | |||
| - {'old': 'matrix_mautrix_telegram_container_self_build', 'new': 'matrix_mautrix_telegram_container_image_self_build'} | |||
| - {'old': 'matrix_telegram_lottieconverter_container_self_build', 'new': 'matrix_mautrix_telegram_container_image_self_build'} | |||
| - {'old': 'matrix_telegram_lottieconverter_container_self_build_mask_arch', 'new': 'matrix_telegram_lottieconverter_container_image_self_build_mask_arch'} | |||
| @@ -44,8 +44,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mautrix-telegr | |||
| {{ matrix_mautrix_telegram_docker_image }} \ | |||
| python3 -m mautrix_telegram -c /config/config.yaml --no-update | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-telegram 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-telegram 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-telegram 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-telegram 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mautrix-telegram | |||
| @@ -1,10 +1,10 @@ | |||
| # mautrix-twitter is a Matrix <-> Twitter bridge | |||
| # See: https://github.com/tulir/mautrix-twitter | |||
| # See: https://github.com/mautrix/twitter | |||
| matrix_mautrix_twitter_enabled: true | |||
| matrix_mautrix_twitter_container_image_self_build: false | |||
| matrix_mautrix_twitter_container_image_self_build_repo: "https://github.com/tulir/mautrix-twitter.git" | |||
| matrix_mautrix_twitter_container_image_self_build_repo: "https://github.com/mautrix/twitter.git" | |||
| matrix_mautrix_twitter_version: latest | |||
| # See: https://mau.dev/tulir/mautrix-twitter/container_registry | |||
| @@ -32,8 +32,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mautrix-twitte | |||
| {{ matrix_mautrix_twitter_docker_image }} \ | |||
| python3 -m mautrix_twitter -c /config/config.yaml --no-update | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-twitter 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-twitter 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-twitter 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-twitter 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mautrix-twitter | |||
| @@ -33,8 +33,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mautrix-whatsa | |||
| {{ matrix_mautrix_whatsapp_docker_image }} \ | |||
| /usr/bin/mautrix-whatsapp -c /config/config.yaml -r /config/registration.yaml | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-whatsapp 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-whatsapp 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-whatsapp 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-whatsapp 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mautrix-whatsapp | |||
| @@ -33,8 +33,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mx-puppet-disc | |||
| {% endfor %} | |||
| {{ matrix_mx_puppet_discord_docker_image }} | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-discord 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-discord 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-discord 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-discord 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mx-puppet-discord | |||
| @@ -33,8 +33,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mx-puppet-grou | |||
| {% endfor %} | |||
| {{ matrix_mx_puppet_groupme_docker_image }} | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-groupme 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-groupme 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-groupme 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-groupme 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mx-puppet-groupme | |||
| @@ -33,8 +33,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mx-puppet-inst | |||
| {% endfor %} | |||
| {{ matrix_mx_puppet_instagram_docker_image }} | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-instagram 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-instagram 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-instagram 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-instagram 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mx-puppet-instagram | |||
| @@ -33,8 +33,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mx-puppet-skyp | |||
| {% endfor %} | |||
| {{ matrix_mx_puppet_skype_docker_image }} | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-skype 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-skype 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-skype 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-skype 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mx-puppet-skype | |||
| @@ -28,7 +28,7 @@ | |||
| msg: >- | |||
| Trying to append Slack Appservice's reverse-proxying configuration to matrix-nginx-proxy, | |||
| but it's pointless since the matrix-nginx-proxy role had already executed. | |||
| To fix this, please change the order of roles in your plabook, | |||
| To fix this, please change the order of roles in your playbook, | |||
| so that the matrix-nginx-proxy role would run after the matrix-mx-puppet-slack role. | |||
| when: matrix_nginx_proxy_role_executed|default(False)|bool | |||
| @@ -36,8 +36,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mx-puppet-slac | |||
| {% endfor %} | |||
| {{ matrix_mx_puppet_slack_docker_image }} | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-slack 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-slack 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-slack 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-slack 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mx-puppet-slack | |||
| @@ -33,8 +33,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mx-puppet-stea | |||
| {% endfor %} | |||
| {{ matrix_mx_puppet_steam_docker_image }} | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-steam 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-steam 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-steam 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-steam 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mx-puppet-steam | |||
| @@ -28,7 +28,7 @@ | |||
| msg: >- | |||
| Trying to append Twitter Appservice's reverse-proxying configuration to matrix-nginx-proxy, | |||
| but it's pointless since the matrix-nginx-proxy role had already executed. | |||
| To fix this, please change the order of roles in your plabook, | |||
| To fix this, please change the order of roles in your playbook, | |||
| so that the matrix-nginx-proxy role would run after the matrix-mx-puppet-twitter role. | |||
| when: matrix_nginx_proxy_role_executed|default(False)|bool | |||
| @@ -36,8 +36,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mx-puppet-twit | |||
| {% endfor %} | |||
| {{ matrix_mx_puppet_twitter_docker_image }} | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-twitter 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-twitter 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mx-puppet-twitter 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mx-puppet-twitter 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-mx-puppet-twitter | |||
| @@ -35,8 +35,8 @@ ExecStart=/usr/bin/docker run --rm --name matrix-sms-bridge \ | |||
| {% endfor %} | |||
| {{ matrix_sms_bridge_docker_image }} | |||
| ExecStop=-/usr/bin/docker kill matrix-sms-bridge | |||
| ExecStop=-/usr/bin/docker rm matrix-sms-bridge | |||
| ExecStopPost=-/usr/bin/docker kill matrix-sms-bridge | |||
| ExecStopPost=-/usr/bin/docker rm matrix-sms-bridge | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-sms-bridge | |||
| @@ -0,0 +1,54 @@ | |||
| matrix_client_cinny_enabled: true | |||
| matrix_client_cinny_container_image_self_build: false | |||
| matrix_client_cinny_container_image_self_build_repo: "https://github.com/ajbura/cinny.git" | |||
| matrix_client_cinny_version: v1.6.1 | |||
| matrix_client_cinny_docker_image: "{{ matrix_client_cinny_docker_image_name_prefix }}ajbura/cinny:{{ matrix_client_cinny_version }}" | |||
| matrix_client_cinny_docker_image_name_prefix: "{{ 'localhost/' if matrix_client_cinny_container_image_self_build else matrix_container_global_registry_prefix }}" | |||
| matrix_client_cinny_docker_image_force_pull: "{{ matrix_client_cinny_docker_image.endswith(':latest') }}" | |||
| matrix_client_cinny_data_path: "{{ matrix_base_data_path }}/client-cinny" | |||
| matrix_client_cinny_docker_src_files_path: "{{ matrix_client_cinny_data_path }}/docker-src" | |||
| # Controls whether the container exposes its HTTP port (tcp/8080 in the container). | |||
| # | |||
| # Takes an "<ip>:<port>" or "<port>" value (e.g. "127.0.0.1:8768"), or empty string to not expose. | |||
| matrix_client_cinny_container_http_host_bind_port: '' | |||
| # A list of extra arguments to pass to the container | |||
| matrix_client_cinny_container_extra_arguments: [] | |||
| # List of systemd services that matrix-client-cinny.service depends on | |||
| matrix_client_cinny_systemd_required_services_list: ['docker.service'] | |||
| # Controls whether the self-check feature should validate SSL certificates. | |||
| matrix_client_cinny_self_check_validate_certificates: true | |||
| # config.json | |||
| matrix_client_cinny_default_hs_url: "" | |||
| # Default cinny configuration template which covers the generic use case. | |||
| # You can customize it by controlling the various variables inside it. | |||
| # | |||
| # For a more advanced customization, you can extend the default (see `matrix_client_cinny_configuration_extension_json`) | |||
| # or completely replace this variable with your own template. | |||
| # | |||
| # The side-effect of this lookup is that Ansible would even parse the JSON for us, returning a dict. | |||
| # This is unlike what it does when looking up YAML template files (no automatic parsing there). | |||
| matrix_client_cinny_configuration_default: "{{ lookup('template', 'templates/config.json.j2') }}" | |||
| # Your custom JSON configuration for cinny should go to `matrix_client_cinny_configuration_extension_json`. | |||
| # This configuration extends the default starting configuration (`matrix_client_cinny_configuration_default`). | |||
| # | |||
| # You can override individual variables from the default configuration, or introduce new ones. | |||
| # | |||
| # If you need something more special, you can take full control by | |||
| # completely redefining `matrix_client_cinny_configuration_default`. | |||
| matrix_client_cinny_configuration_extension_json: '{}' | |||
| matrix_client_cinny_configuration_extension: "{{ matrix_client_cinny_configuration_extension_json|from_json if matrix_client_cinny_configuration_extension_json|from_json is mapping else {} }}" | |||
| # Holds the final cinny configuration (a combination of the default and its extension). | |||
| # You most likely don't need to touch this variable. Instead, see `matrix_client_cinny_configuration_default`. | |||
| matrix_client_cinny_configuration: "{{ matrix_client_cinny_configuration_default|combine(matrix_client_cinny_configuration_extension, recursive=True) }}" | |||
| @@ -0,0 +1,10 @@ | |||
| # See https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1070 | |||
| # and https://github.com/spantaleev/matrix-docker-ansible-deploy/commit/1ab507349c752042d26def3e95884f6df8886b74#commitcomment-51108407 | |||
| - name: Fail if trying to self-build on Ansible < 2.8 | |||
| fail: | |||
| msg: "To self-build the Cinny image, you should use Ansible 2.8 or higher. See docs/ansible.md" | |||
| when: "ansible_version.major == 2 and ansible_version.minor < 8 and matrix_client_cinny_container_image_self_build and matrix_client_cinny_enabled" | |||
| - set_fact: | |||
| matrix_systemd_services_list: "{{ matrix_systemd_services_list + ['matrix-client-cinny.service'] }}" | |||
| when: matrix_client_cinny_enabled|bool | |||
| @@ -0,0 +1,28 @@ | |||
| - import_tasks: "{{ role_path }}/tasks/init.yml" | |||
| tags: | |||
| - always | |||
| - import_tasks: "{{ role_path }}/tasks/validate_config.yml" | |||
| when: "run_setup|bool and matrix_client_cinny_enabled|bool" | |||
| tags: | |||
| - setup-all | |||
| - setup-client-cinny | |||
| - import_tasks: "{{ role_path }}/tasks/setup_install.yml" | |||
| when: "run_setup|bool and matrix_client_cinny_enabled|bool" | |||
| tags: | |||
| - setup-all | |||
| - setup-client-cinny | |||
| - import_tasks: "{{ role_path }}/tasks/self_check.yml" | |||
| delegate_to: 127.0.0.1 | |||
| become: false | |||
| when: "run_self_check|bool and matrix_client_cinny_enabled|bool" | |||
| tags: | |||
| - self-check | |||
| - import_tasks: "{{ role_path }}/tasks/setup_uninstall.yml" | |||
| when: "run_setup|bool and not matrix_client_cinny_enabled|bool" | |||
| tags: | |||
| - setup-all | |||
| - setup-client-cinny | |||
| @@ -0,0 +1,22 @@ | |||
| --- | |||
| - set_fact: | |||
| matrix_client_cinny_url_endpoint_public: "https://{{ matrix_server_fqn_cinny }}/config.json" | |||
| - name: Check Cinny | |||
| uri: | |||
| url: "{{ matrix_client_cinny_url_endpoint_public }}" | |||
| follow_redirects: none | |||
| validate_certs: "{{ matrix_client_cinny_self_check_validate_certificates }}" | |||
| register: matrix_client_cinny_self_check_result | |||
| check_mode: no | |||
| ignore_errors: true | |||
| - name: Fail if Cinny not working | |||
| fail: | |||
| msg: "Failed checking Cinny is up at `{{ matrix_server_fqn_cinny }}` (checked endpoint: `{{ matrix_client_cinny_url_endpoint_public }}`). Is Cinny running? Is port 443 open in your firewall? Full error: {{ matrix_client_cinny_self_check_result }}" | |||
| when: "matrix_client_cinny_self_check_result.failed or 'json' not in matrix_client_cinny_self_check_result" | |||
| - name: Report working Cinny | |||
| debug: | |||
| msg: "Cinny at `{{ matrix_server_fqn_cinny }}` is working (checked endpoint: `{{ matrix_client_cinny_url_endpoint_public }}`)" | |||
| @@ -0,0 +1,71 @@ | |||
| --- | |||
| - name: Ensure Cinny paths exists | |||
| file: | |||
| path: "{{ item.path }}" | |||
| state: directory | |||
| mode: 0750 | |||
| owner: "{{ matrix_user_username }}" | |||
| group: "{{ matrix_user_groupname }}" | |||
| with_items: | |||
| - { path: "{{ matrix_client_cinny_data_path }}", when: true } | |||
| - { path: "{{ matrix_client_cinny_docker_src_files_path }}", when: "{{ matrix_client_cinny_container_image_self_build }}" } | |||
| when: "item.when|bool" | |||
| - name: Ensure Cinny Docker image is pulled | |||
| docker_image: | |||
| name: "{{ matrix_client_cinny_docker_image }}" | |||
| source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" | |||
| force_source: "{{ matrix_client_cinny_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_client_cinny_docker_image_force_pull }}" | |||
| when: "not matrix_client_cinny_container_image_self_build|bool" | |||
| - name: Ensure Cinny repository is present on self-build | |||
| git: | |||
| repo: "{{ matrix_client_cinny_container_image_self_build_repo }}" | |||
| dest: "{{ matrix_client_cinny_docker_src_files_path }}" | |||
| version: "{{ matrix_client_cinny_docker_image.split(':')[1] }}" | |||
| force: "yes" | |||
| register: matrix_client_cinny_git_pull_results | |||
| when: "matrix_client_cinny_container_image_self_build|bool" | |||
| - name: Ensure Cinny configuration installed | |||
| copy: | |||
| content: "{{ matrix_client_cinny_configuration|to_nice_json }}" | |||
| dest: "{{ matrix_client_cinny_data_path }}/config.json" | |||
| mode: 0644 | |||
| owner: "{{ matrix_user_username }}" | |||
| group: "{{ matrix_user_groupname }}" | |||
| - name: Ensure Cinny additional config files installed | |||
| template: | |||
| src: "{{ item.src }}" | |||
| dest: "{{ matrix_client_cinny_data_path }}/{{ item.name }}" | |||
| mode: 0644 | |||
| owner: "{{ matrix_user_username }}" | |||
| group: "{{ matrix_user_groupname }}" | |||
| with_items: | |||
| - {src: "{{ role_path }}/templates/nginx.conf.j2", name: "nginx.conf"} | |||
| when: "item.src is not none" | |||
| - name: Ensure Cinny Docker image is built | |||
| docker_image: | |||
| name: "{{ matrix_client_cinny_docker_image }}" | |||
| source: build | |||
| force_source: "{{ matrix_client_cinny_git_pull_results.changed }}" | |||
| build: | |||
| dockerfile: Dockerfile | |||
| path: "{{ matrix_client_cinny_docker_src_files_path }}" | |||
| pull: yes | |||
| when: "matrix_client_cinny_container_image_self_build|bool" | |||
| - name: Ensure matrix-client-cinny.service installed | |||
| template: | |||
| src: "{{ role_path }}/templates/systemd/matrix-client-cinny.service.j2" | |||
| dest: "{{ matrix_systemd_path }}/matrix-client-cinny.service" | |||
| mode: 0644 | |||
| register: matrix_client_cinny_systemd_service_result | |||
| - name: Ensure systemd reloaded after matrix-client-cinny.service installation | |||
| service: | |||
| daemon_reload: yes | |||
| when: "matrix_client_cinny_systemd_service_result.changed|bool" | |||
| @@ -0,0 +1,35 @@ | |||
| --- | |||
| - name: Check existence of matrix-client-cinny.service | |||
| stat: | |||
| path: "{{ matrix_systemd_path }}/matrix-client-cinny.service" | |||
| register: matrix_client_cinny_service_stat | |||
| - name: Ensure matrix-client-cinny is stopped | |||
| service: | |||
| name: matrix-client-cinny | |||
| state: stopped | |||
| enabled: no | |||
| daemon_reload: yes | |||
| register: stopping_result | |||
| when: "matrix_client_cinny_service_stat.stat.exists|bool" | |||
| - name: Ensure matrix-client-cinny.service doesn't exist | |||
| file: | |||
| path: "{{ matrix_systemd_path }}/matrix-client-cinny.service" | |||
| state: absent | |||
| when: "matrix_client_cinny_service_stat.stat.exists|bool" | |||
| - name: Ensure systemd reloaded after matrix-client-cinny.service removal | |||
| service: | |||
| daemon_reload: yes | |||
| when: "matrix_client_cinny_service_stat.stat.exists|bool" | |||
| - name: Ensure Cinny paths doesn't exist | |||
| file: | |||
| path: "{{ matrix_client_cinny_data_path }}" | |||
| state: absent | |||
| - name: Ensure Cinny Docker image doesn't exist | |||
| docker_image: | |||
| name: "{{ matrix_client_cinny_docker_image }}" | |||
| state: absent | |||
| @@ -0,0 +1,8 @@ | |||
| --- | |||
| - name: Fail if required Cinny settings not defined | |||
| fail: | |||
| msg: > | |||
| You need to define a required configuration setting (`{{ item }}`) to use Cinny. | |||
| when: "vars[item] == '' or vars[item] is none" | |||
| with_items: | |||
| - "matrix_client_cinny_default_hs_url" | |||
| @@ -0,0 +1,6 @@ | |||
| { | |||
| "defaultHomeserver": 0, | |||
| "homeserverList": [ | |||
| {{ matrix_client_cinny_default_hs_url|string|to_json }} | |||
| ] | |||
| } | |||
| @@ -0,0 +1,66 @@ | |||
| #jinja2: lstrip_blocks: "True" | |||
| # This is a custom nginx configuration file that we use in the container (instead of the default one), | |||
| # because it allows us to run nginx with a non-root user. | |||
| # | |||
| # For this to work, the default vhost file (`/etc/nginx/conf.d/default.conf`) also needs to be removed. | |||
| # (mounting `/dev/null` over `/etc/nginx/conf.d/default.conf` works well) | |||
| # | |||
| # The following changes have been done compared to a default nginx configuration file: | |||
| # - default server port is changed (80 -> 8080), so that a non-root user can bind it | |||
| # - various temp paths are changed to `/tmp`, so that a non-root user can write to them | |||
| # - the `user` directive was removed, as we don't want nginx to switch users | |||
| worker_processes 1; | |||
| error_log /var/log/nginx/error.log warn; | |||
| pid /tmp/nginx.pid; | |||
| events { | |||
| worker_connections 1024; | |||
| } | |||
| http { | |||
| proxy_temp_path /tmp/proxy_temp; | |||
| client_body_temp_path /tmp/client_temp; | |||
| fastcgi_temp_path /tmp/fastcgi_temp; | |||
| uwsgi_temp_path /tmp/uwsgi_temp; | |||
| scgi_temp_path /tmp/scgi_temp; | |||
| include /etc/nginx/mime.types; | |||
| default_type application/octet-stream; | |||
| log_format main '$remote_addr - $remote_user [$time_local] "$request" ' | |||
| '$status $body_bytes_sent "$http_referer" ' | |||
| '"$http_user_agent" "$http_x_forwarded_for"'; | |||
| access_log /var/log/nginx/access.log main; | |||
| sendfile on; | |||
| #tcp_nopush on; | |||
| keepalive_timeout 65; | |||
| #gzip on; | |||
| server { | |||
| listen 8080; | |||
| server_name localhost; | |||
| root /usr/share/nginx/html; | |||
| location / { | |||
| index index.html index.htm; | |||
| } | |||
| location ~* ^/(config(.+)?\.json$|(.+)\.html$|i18n) { | |||
| expires -1; | |||
| } | |||
| error_page 500 502 503 504 /50x.html; | |||
| location = /50x.html { | |||
| root /usr/share/nginx/html; | |||
| } | |||
| } | |||
| } | |||
| @@ -0,0 +1,40 @@ | |||
| #jinja2: lstrip_blocks: "True" | |||
| [Unit] | |||
| Description=Matrix Cinny Client | |||
| {% for service in matrix_client_cinny_systemd_required_services_list %} | |||
| Requires={{ service }} | |||
| After={{ service }} | |||
| {% endfor %} | |||
| DefaultDependencies=no | |||
| [Service] | |||
| Type=simple | |||
| Environment="HOME={{ matrix_systemd_unit_home_path }}" | |||
| ExecStartPre=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-client-cinny 2>/dev/null' | |||
| ExecStartPre=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-client-cinny 2>/dev/null' | |||
| ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-client-cinny \ | |||
| --log-driver=none \ | |||
| --user={{ matrix_user_uid }}:{{ matrix_user_gid }} \ | |||
| --cap-drop=ALL \ | |||
| --read-only \ | |||
| --network={{ matrix_docker_network }} \ | |||
| {% if matrix_client_cinny_container_http_host_bind_port %} | |||
| -p {{ matrix_client_cinny_container_http_host_bind_port }}:8080 \ | |||
| {% endif %} | |||
| --tmpfs=/tmp:rw,noexec,nosuid,size=10m \ | |||
| --mount type=bind,src={{ matrix_client_cinny_data_path }}/nginx.conf,dst=/etc/nginx/nginx.conf,ro \ | |||
| --mount type=bind,src={{ matrix_client_cinny_data_path }}/config.json,dst=/app/config.json,ro \ | |||
| {% for arg in matrix_client_cinny_container_extra_arguments %} | |||
| {{ arg }} \ | |||
| {% endfor %} | |||
| {{ matrix_client_cinny_docker_image }} | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-client-cinny 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-client-cinny 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-client-cinny | |||
| [Install] | |||
| WantedBy=multi-user.target | |||
| @@ -35,8 +35,8 @@ ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-client-element | |||
| {% endfor %} | |||
| {{ matrix_client_element_docker_image }} | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-client-element 2>/dev/null' | |||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-client-element 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-client-element 2>/dev/null' | |||
| ExecStopPost=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-client-element 2>/dev/null' | |||
| Restart=always | |||
| RestartSec=30 | |||
| SyslogIdentifier=matrix-client-element | |||
| @@ -7,7 +7,7 @@ matrix_client_hydrogen_container_image_self_build_repo: "https://github.com/vect | |||
| matrix_client_hydrogen_version: v0.2.19 | |||
| matrix_client_hydrogen_docker_image: "{{ matrix_client_hydrogen_docker_image_name_prefix }}vectorim/hydrogen-web:{{ matrix_client_hydrogen_version }}" | |||
| matrix_client_hydrogen_docker_image_name_prefix: "{{ 'localhost/' if matrix_client_hydrogen_container_image_self_build }}" | |||
| matrix_client_hydrogen_docker_image_name_prefix: "{{ 'localhost/' if matrix_client_hydrogen_container_image_self_build else matrix_container_global_registry_prefix }}" | |||
| matrix_client_hydrogen_docker_image_force_pull: "{{ matrix_client_hydrogen_docker_image.endswith(':latest') }}" | |||
| matrix_client_hydrogen_data_path: "{{ matrix_base_data_path }}/client-hydrogen" | |||