Mautrix wsproxypull/2261/head
| @@ -0,0 +1,27 @@ | |||||
| # Setting up Mautrix wsproxy (optional) | |||||
| The playbook can install and configure [mautrix-wsproxy](https://github.com/mautrix/wsproxy) for you. | |||||
| See the project's [documentation](https://github.com/mautrix/wsproxy#readme) to learn what it does and why it might be useful to you. | |||||
| Use the following playbook configuration: | |||||
| ```yaml | |||||
| matrix_mautrix_wsproxy_enabled: true | |||||
| matrix_mautrix_imessage_user: 'user@domain.com' | |||||
| ``` | |||||
| ## Set up Double Puppeting | |||||
| If you'd like to use [Double Puppeting](https://github.com/tulir/mautrix-hangouts/wiki/Authentication#double-puppeting) (hint: you most likely do), you have 1 way of going about it. | |||||
| ### Method 1: automatically, by enabling Shared Secret Auth | |||||
| The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook. | |||||
| This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future. | |||||
| ## Usage | |||||
| Follow the [matrix-imessage documenation](https://docs.mau.fi/bridges/go/imessage/index.html) for running `matrix-imessage` on your iOS device. | |||||
| @@ -607,6 +607,48 @@ matrix_mautrix_whatsapp_database_password: "{{ '%s' | format(matrix_homeserver_g | |||||
| # | # | ||||
| ###################################################################### | ###################################################################### | ||||
| ###################################################################### | |||||
| # | |||||
| # matrix-bridge-mautrix-wsproxy | |||||
| # | |||||
| ###################################################################### | |||||
| # We don't enable bridges by default. | |||||
| matrix_mautrix_wsproxy_enabled: false | |||||
| matrix_mautrix_wsproxy_systemd_required_services_list: | | |||||
| {{ | |||||
| ['docker.service'] | |||||
| + | |||||
| (['matrix-synapse.service'] if matrix_synapse_enabled else []) | |||||
| + | |||||
| (['matrix-postgres.service'] if matrix_postgres_enabled else []) | |||||
| }} | |||||
| matrix_mautrix_wsproxy_homeserver_domain: '{{ matrix_domain }}' | |||||
| matrix_mautrix_wsproxy_homeserver_address: "{{ 'http://matrix-synapse:8008' if matrix_synapse_enabled else '' }}" | |||||
| matrix_mautrix_wsproxy_homeserver_token: "{{ matrix_synapse_macaroon_secret_key | password_hash('sha512', 'wsproxy.hs.token') | to_uuid }}" | |||||
| matrix_mautrix_wsproxy_appservice_token: "{{ matrix_synapse_macaroon_secret_key | password_hash('sha512', 'wsproxy.as.token') | to_uuid }}" | |||||
| matrix_mautrix_imessage_homeserver_token: "{{ matrix_synapse_macaroon_secret_key | password_hash('sha512', 'imessage.hs.token') | to_uuid }}" | |||||
| matrix_mautrix_imessage_appservice_token: "{{ matrix_synapse_macaroon_secret_key | password_hash('sha512', 'imessage.as.token') | to_uuid }}" | |||||
| matrix_mautrix_wsproxy_login_shared_secret: "{{ matrix_synapse_ext_password_provider_shared_secret_auth_shared_secret if matrix_synapse_ext_password_provider_shared_secret_auth_enabled else '' }}" | |||||
| # Postgres is the default, except if not using `matrix_postgres` (internal postgres) | |||||
| ###################################################################### | |||||
| # | |||||
| # /matrix-bridge-mautrix-wsproxy | |||||
| # | |||||
| ###################################################################### | |||||
| ###################################################################### | ###################################################################### | ||||
| # | # | ||||
| # matrix-sms-bridge | # matrix-sms-bridge | ||||
| @@ -1390,6 +1432,7 @@ matrix_nginx_proxy_proxy_bot_go_neb_enabled: "{{ matrix_bot_go_neb_enabled }}" | |||||
| matrix_nginx_proxy_proxy_jitsi_enabled: "{{ matrix_jitsi_enabled }}" | matrix_nginx_proxy_proxy_jitsi_enabled: "{{ matrix_jitsi_enabled }}" | ||||
| matrix_nginx_proxy_proxy_grafana_enabled: "{{ matrix_grafana_enabled }}" | matrix_nginx_proxy_proxy_grafana_enabled: "{{ matrix_grafana_enabled }}" | ||||
| matrix_nginx_proxy_proxy_sygnal_enabled: "{{ matrix_sygnal_enabled }}" | matrix_nginx_proxy_proxy_sygnal_enabled: "{{ matrix_sygnal_enabled }}" | ||||
| matrix_nginx_proxy_proxy_mautrix_wsproxy_enabled: "{{ matrix_mautrix_wsproxy_enabled }}" | |||||
| matrix_nginx_proxy_proxy_matrix_corporal_api_enabled: "{{ matrix_corporal_enabled and matrix_corporal_http_api_enabled }}" | matrix_nginx_proxy_proxy_matrix_corporal_api_enabled: "{{ matrix_corporal_enabled and matrix_corporal_http_api_enabled }}" | ||||
| matrix_nginx_proxy_proxy_matrix_corporal_api_addr_with_container: "matrix-corporal:41081" | matrix_nginx_proxy_proxy_matrix_corporal_api_addr_with_container: "matrix-corporal:41081" | ||||
| @@ -1492,6 +1535,8 @@ matrix_ssl_domains_to_obtain_certificates_for: | | |||||
| + | + | ||||
| ([matrix_server_fqn_sygnal] if matrix_sygnal_enabled else []) | ([matrix_server_fqn_sygnal] if matrix_sygnal_enabled else []) | ||||
| + | + | ||||
| ([matrix_server_fqn_mautrix_wsproxy] if matrix_mautrix_wsproxy_enabled else []) | |||||
| + | |||||
| ([matrix_domain] if matrix_nginx_proxy_base_domain_serving_enabled else []) | ([matrix_domain] if matrix_nginx_proxy_base_domain_serving_enabled else []) | ||||
| + | + | ||||
| matrix_ssl_additional_domains_to_obtain_certificates_for | matrix_ssl_additional_domains_to_obtain_certificates_for | ||||
| @@ -51,6 +51,9 @@ matrix_server_fqn_grafana: "stats.{{ matrix_domain }}" | |||||
| # This is where you access the Sygnal push gateway. | # This is where you access the Sygnal push gateway. | ||||
| matrix_server_fqn_sygnal: "sygnal.{{ matrix_domain }}" | matrix_server_fqn_sygnal: "sygnal.{{ matrix_domain }}" | ||||
| # This is where you access the mautrix wsproxy push gateway. | |||||
| matrix_server_fqn_mautrix_wsproxy: "mautrix-wsproxy.{{ matrix_domain }}" | |||||
| matrix_federation_public_port: 8448 | matrix_federation_public_port: 8448 | ||||
| # The architecture that your server runs. | # The architecture that your server runs. | ||||
| @@ -0,0 +1,94 @@ | |||||
| # mautrix-wsproxy is a Matrix <-> websocket bridge | |||||
| # See: https://github.com/tulir/mautrix-wsproxy | |||||
| matrix_mautrix_wsproxy_enabled: true | |||||
| matrix_mautrix_wsproxy_version: latest | |||||
| # See: https://mau.dev/tulir/mautrix-wsproxy/container_registry | |||||
| matrix_mautrix_wsproxy_docker_image: "dock.mau.dev/tulir/mautrix-wsproxy:{{ matrix_mautrix_wsproxy_version }}" | |||||
| matrix_mautrix_wsproxy_docker_image_force_pull: "{{ matrix_mautrix_wsproxy_docker_image.endswith(':latest') }}" | |||||
| matrix_mautrix_wsproxy_base_path: "{{ matrix_base_data_path }}/mautrix-wsproxy" | |||||
| matrix_mautrix_wsproxy_config_path: "{{ matrix_mautrix_wsproxy_base_path }}/config" | |||||
| matrix_mautrix_wsproxy_data_path: "{{ matrix_mautrix_wsproxy_base_path }}/data" | |||||
| matrix_mautrix_wsproxy_homeserver_address: "{{ matrix_homeserver_container_url }}" | |||||
| matrix_mautrix_wsproxy_homeserver_domain: "{{ matrix_domain }}" | |||||
| matrix_mautrix_wsproxy_appservice_address: "http://matrix-mautrix-wsproxy:29331" | |||||
| matrix_mautrix_wsproxy_appservice_websocket: "ws://matrix-mautrix-wsproxy:29331" | |||||
| # A list of extra arguments to pass to the container | |||||
| matrix_mautrix_wsproxy_container_extra_arguments: [] | |||||
| # List of systemd services that matrix-mautrix-wsproxy.service depends on. | |||||
| matrix_mautrix_wsproxy_systemd_required_services_list: ['docker.service'] | |||||
| # List of systemd services that matrix-mautrix-wsproxy.service wants | |||||
| matrix_mautrix_wsproxy_systemd_wanted_services_list: [] | |||||
| matrix_mautrix_wsproxy_appservice_token: '' | |||||
| matrix_mautrix_wsproxy_homeserver_token: '' | |||||
| matrix_mautrix_wsproxy_appservice_bot_username: imessagebot | |||||
| # Default mautrix-wsproxy configuration template which covers the generic use case. | |||||
| # You can customize it by controlling the various variables inside it. | |||||
| # | |||||
| # For a more advanced customization, you can extend the default (see `matrix_mautrix_wsproxy_configuration_extension_yaml`) | |||||
| # or completely replace this variable with your own template. | |||||
| matrix_mautrix_wsproxy_configuration_yaml: "{{ lookup('template', 'templates/config.yaml.j2') }}" | |||||
| matrix_mautrix_wsproxy_configuration_extension_yaml: | | |||||
| # Your custom YAML configuration goes here. | |||||
| # This configuration extends the default starting configuration (`matrix_mautrix_wsproxy_configuration_yaml`). | |||||
| # | |||||
| # You can override individual variables from the default configuration, or introduce new ones. | |||||
| # | |||||
| # If you need something more special, you can take full control by | |||||
| # completely redefining `matrix_mautrix_wsproxy_configuration_yaml`. | |||||
| matrix_mautrix_wsproxy_configuration_extension: "{{ matrix_mautrix_wsproxy_configuration_extension_yaml|from_yaml if matrix_mautrix_wsproxy_configuration_extension_yaml|from_yaml is mapping else {} }}" | |||||
| # Holds the final configuration (a combination of the default and its extension). | |||||
| # You most likely don't need to touch this variable. Instead, see `matrix_mautrix_wsproxy_configuration_yaml`. | |||||
| matrix_mautrix_wsproxy_configuration: "{{ matrix_mautrix_wsproxy_configuration_yaml|from_yaml|combine(matrix_mautrix_wsproxy_configuration_extension, recursive=True) }}" | |||||
| # Default mautrix-wsproxy configuration template which covers the generic use case. | |||||
| # You can customize it by controlling the various variables inside it. | |||||
| # | |||||
| # For a more advanced customization, you can extend the default (see `matrix_mautrix_wsproxy_configuration_extension_yaml`) | |||||
| # or completely replace this variable with your own template. | |||||
| matrix_mautrix_imessage_configuration_yaml: "{{ lookup('template', 'templates/config-ios.yaml.j2') }}" | |||||
| matrix_mautrix_imessage_configuration_extension_yaml: | | |||||
| # Your custom YAML configuration goes here. | |||||
| # This configuration extends the default starting configuration (`matrix_mautrix_wsproxy_configuration_yaml`). | |||||
| # | |||||
| # You can override individual variables from the default configuration, or introduce new ones. | |||||
| # | |||||
| # If you need something more special, you can take full control by | |||||
| # completely redefining `matrix_mautrix_imessage_configuration_yaml`. | |||||
| matrix_mautrix_imessage_configuration_extension: "{{ matrix_mautrix_imessage_configuration_extension_yaml|from_yaml if matrix_mautrix_imessage_configuration_extension_yaml|from_yaml is mapping else {} }}" | |||||
| # Holds the final configuration (a combination of the default and its extension). | |||||
| # You most likely don't need to touch this variable. Instead, see `matrix_mautrix_imessage_configuration_yaml`. | |||||
| matrix_mautrix_imessage_configuration: "{{ matrix_mautrix_imessage_configuration_yaml|from_yaml|combine(matrix_mautrix_imessage_configuration_extension, recursive=True) }}" | |||||
| matrix_mautrix_imessage_user: '' | |||||
| matrix_mautrix_wsproxy_registration_yaml: | | |||||
| id: imessage | |||||
| url: {{ matrix_mautrix_wsproxy_appservice_address }} | |||||
| as_token: "{{ matrix_mautrix_wsproxy_appservice_token }}" | |||||
| hs_token: "{{ matrix_mautrix_wsproxy_homeserver_token }}" | |||||
| sender_localpart: _bot_{{ matrix_mautrix_wsproxy_appservice_bot_username }} | |||||
| rate_limited: false | |||||
| namespaces: | |||||
| users: | |||||
| - regex: '@imessage_.+:{{ matrix_mautrix_wsproxy_homeserver_domain|regex_escape }}$' | |||||
| exclusive: true | |||||
| - exclusive: true | |||||
| regex: '^@{{ matrix_mautrix_wsproxy_appservice_bot_username|regex_escape }}:{{ matrix_mautrix_wsproxy_homeserver_domain|regex_escape }}$' | |||||
| matrix_mautrix_wsproxy_registration: "{{ matrix_mautrix_wsproxy_registration_yaml|from_yaml }}" | |||||
| @@ -0,0 +1,16 @@ | |||||
| - set_fact: | |||||
| matrix_systemd_services_list: "{{ matrix_systemd_services_list + ['matrix-mautrix-wsproxy.service'] }}" | |||||
| when: matrix_mautrix_wsproxy_enabled|bool | |||||
| # If the matrix-synapse role is not used, these variables may not exist. | |||||
| - set_fact: | |||||
| matrix_synapse_container_extra_arguments: > | |||||
| {{ matrix_synapse_container_extra_arguments|default([]) }} | |||||
| + | |||||
| ["--mount type=bind,src={{ matrix_mautrix_wsproxy_config_path }}/registration.yaml,dst=/matrix-mautrix-wsproxy-registration.yaml,ro"] | |||||
| matrix_synapse_app_service_config_files: > | |||||
| {{ matrix_synapse_app_service_config_files|default([]) }} | |||||
| + | |||||
| {{ ["/matrix-mautrix-wsproxy-registration.yaml"] }} | |||||
| when: matrix_mautrix_wsproxy_enabled|bool | |||||
| @@ -0,0 +1,21 @@ | |||||
| - import_tasks: "{{ role_path }}/tasks/init.yml" | |||||
| tags: | |||||
| - always | |||||
| - import_tasks: "{{ role_path }}/tasks/validate_config.yml" | |||||
| when: "run_setup|bool and matrix_mautrix_wsproxy_enabled|bool" | |||||
| tags: | |||||
| - setup-all | |||||
| - setup-mautrix-wsproxy | |||||
| - import_tasks: "{{ role_path }}/tasks/setup_install.yml" | |||||
| when: "run_setup and matrix_mautrix_wsproxy_enabled" | |||||
| tags: | |||||
| - setup-all | |||||
| - setup-mautrix-wsproxy | |||||
| - import_tasks: "{{ role_path }}/tasks/setup_uninstall.yml" | |||||
| when: "run_setup and not matrix_mautrix_wsproxy_enabled" | |||||
| tags: | |||||
| - setup-all | |||||
| - setup-mautrix-wsproxy | |||||
| @@ -0,0 +1,78 @@ | |||||
| --- | |||||
| # If the matrix-synapse role is not used, `matrix_synapse_role_executed` won't exist. | |||||
| # We don't want to fail in such cases. | |||||
| - name: Fail if matrix-synapse role already executed | |||||
| fail: | |||||
| msg: >- | |||||
| The matrix-bridge-mautrix-wsproxy role needs to execute before the matrix-synapse role. | |||||
| when: "matrix_synapse_role_executed|default(False)" | |||||
| - set_fact: | |||||
| matrix_mautrix_wsproxy_requires_restart: false | |||||
| - name: Ensure Mautrix wsproxy image is pulled | |||||
| docker_image: | |||||
| name: "{{ matrix_mautrix_wsproxy_docker_image }}" | |||||
| source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" | |||||
| force_source: "{{ matrix_mautrix_wsproxy_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_mautrix_wsproxy_docker_image_force_pull }}" | |||||
| - name: Ensure Mautrix wsproxy paths exists | |||||
| file: | |||||
| path: "{{ item }}" | |||||
| state: directory | |||||
| mode: 0750 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| with_items: | |||||
| - "{{ matrix_mautrix_wsproxy_base_path }}" | |||||
| - "{{ matrix_mautrix_wsproxy_config_path }}" | |||||
| - "{{ matrix_mautrix_wsproxy_data_path }}" | |||||
| - name: Check if an old matrix state file exists | |||||
| stat: | |||||
| path: "{{ matrix_mautrix_wsproxy_base_path }}/mx-state.json" | |||||
| register: matrix_mautrix_wsproxy_stat_mx_state | |||||
| - name: Ensure mautrix-wsproxy config.yaml installed | |||||
| copy: | |||||
| content: "{{ matrix_mautrix_wsproxy_configuration|to_nice_yaml }}" | |||||
| dest: "{{ matrix_mautrix_wsproxy_config_path }}/config.yaml" | |||||
| mode: 0644 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| - name: Ensure mautrix-imessage config-ios.yaml installed | |||||
| copy: | |||||
| content: "{{ matrix_mautrix_imessage_configuration|to_nice_yaml }}" | |||||
| dest: "{{ matrix_mautrix_wsproxy_config_path }}/config-ios.yaml" | |||||
| mode: 0644 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| - name: Ensure mautrix-wsproxy registration.yaml installed | |||||
| copy: | |||||
| content: "{{ matrix_mautrix_wsproxy_registration|to_nice_yaml }}" | |||||
| dest: "{{ matrix_mautrix_wsproxy_config_path }}/registration.yaml" | |||||
| mode: 0644 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| - name: Ensure matrix-mautrix-wsproxy.service installed | |||||
| template: | |||||
| src: "{{ role_path }}/templates/systemd/matrix-mautrix-wsproxy.service.j2" | |||||
| dest: "{{ matrix_systemd_path }}/matrix-mautrix-wsproxy.service" | |||||
| mode: 0644 | |||||
| register: matrix_mautrix_wsproxy_systemd_service_result | |||||
| - name: Ensure systemd reloaded after matrix-mautrix-wsproxy.service installation | |||||
| service: | |||||
| daemon_reload: yes | |||||
| when: "matrix_mautrix_wsproxy_systemd_service_result.changed" | |||||
| - name: Ensure matrix-mautrix-wsproxy.service restarted, if necessary | |||||
| service: | |||||
| name: "matrix-mautrix-wsproxy.service" | |||||
| state: restarted | |||||
| when: "matrix_mautrix_wsproxy_requires_restart|bool" | |||||
| @@ -0,0 +1,24 @@ | |||||
| --- | |||||
| - name: Check existence of matrix-mautrix-wsproxy service | |||||
| stat: | |||||
| path: "{{ matrix_systemd_path }}/matrix-mautrix-wsproxy.service" | |||||
| register: matrix_mautrix_wsproxy_service_stat | |||||
| - name: Ensure matrix-mautrix-wsproxy is stopped | |||||
| service: | |||||
| name: matrix-mautrix-wsproxy | |||||
| state: stopped | |||||
| daemon_reload: yes | |||||
| when: "matrix_mautrix_wsproxy_service_stat.stat.exists" | |||||
| - name: Ensure matrix-mautrix-wsproxy.service doesn't exist | |||||
| file: | |||||
| path: "{{ matrix_systemd_path }}/matrix-mautrix-wsproxy.service" | |||||
| state: absent | |||||
| when: "matrix_mautrix_wsproxy_service_stat.stat.exists" | |||||
| - name: Ensure systemd reloaded after matrix-mautrix-wsproxy.service removal | |||||
| service: | |||||
| daemon_reload: yes | |||||
| when: "matrix_mautrix_wsproxy_service_stat.stat.exists" | |||||
| @@ -0,0 +1,11 @@ | |||||
| --- | |||||
| - name: Fail if required settings not defined | |||||
| fail: | |||||
| msg: >- | |||||
| You need to define a required configuration setting (`{{ item }}`). | |||||
| when: "vars[item] == ''" | |||||
| with_items: | |||||
| - "matrix_mautrix_wsproxy_appservice_token" | |||||
| - "matrix_mautrix_wsproxy_homeserver_token" | |||||
| @@ -0,0 +1,107 @@ | |||||
| #jinja2: lstrip_blocks: "True" | |||||
| # Homeserver details. | |||||
| homeserver: | |||||
| # The address that this appservice can use to connect to the homeserver. | |||||
| address: {{ matrix_mautrix_wsproxy_homeserver_address }} | |||||
| websocket_proxy: {{ matrix_mautrix_wsproxy_appservice_websocket }} | |||||
| # The domain of the homeserver (for MXIDs, etc). | |||||
| domain: {{ matrix_mautrix_wsproxy_homeserver_domain }} | |||||
| # Application service host/registration related details. | |||||
| # Changing these values requires regeneration of the registration. | |||||
| appservice: | |||||
| # SQLite database path | |||||
| database: mautrix-imessage.db | |||||
| # The unique ID of this appservice. | |||||
| id: imessage | |||||
| # Appservice bot details. | |||||
| bot: | |||||
| # Username of the appservice bot. | |||||
| username: imessagebot | |||||
| # Display name and avatar for bot. Set to "remove" to remove display name/avatar, leave empty | |||||
| # to leave display name/avatar as-is. | |||||
| displayname: iMessage bridge bot | |||||
| avatar: mxc://maunium.net/tManJEpANASZvDVzvRvhILdX | |||||
| # Authentication tokens for AS <-> HS communication. Autogenerated; do not modify. | |||||
| as_token: "{{ matrix_mautrix_wsproxy_appservice_token }}" | |||||
| hs_token: "{{ matrix_mautrix_wsproxy_homeserver_token }}" | |||||
| imessage: | |||||
| platform: ios | |||||
| # Bridge config | |||||
| bridge: | |||||
| # The user of the bridge. | |||||
| user: "{{ matrix_mautrix_imessage_user }}" | |||||
| # Localpart template of MXIDs for iMessage users. | |||||
| # {{ '{{.}}' }} is replaced with the phone number or email of the iMessage user. | |||||
| username_template: "{{ 'imessage_{{.}}' }}" | |||||
| # Displayname template for iMessage users. | |||||
| # {{ '{{.}}' }} is replaced with the contact list name (if available) or username (phone number or email) of the iMessage user. | |||||
| displayname_template: "{{ '{{.}} (iMessage)' }}" | |||||
| # Whether or not the bridge should send a read receipt from the bridge bot when a message has been | |||||
| # sent to iMessage. If fetch_message_on_timeout is enabled, a successful post-timeout fetch will | |||||
| # trigger a read receipt too. | |||||
| delivery_receipts: false | |||||
| # Whether or not to update the m.direct account data event when double puppeting is enabled. | |||||
| # Note that updating the m.direct event is not atomic (except with mautrix-asmux) | |||||
| # and is therefore prone to race conditions. | |||||
| sync_direct_chat_list: false | |||||
| # Shared secret for https://github.com/devture/matrix-synapse-shared-secret-auth | |||||
| # | |||||
| # If set, custom puppets will be enabled automatically for local users | |||||
| # instead of users having to find an access token and run `login-matrix` | |||||
| # manually. | |||||
| login_shared_secret: {{ matrix_mautrix_whatsapp_login_shared_secret|to_json }} | |||||
| # Maximum age of chats to sync in days. | |||||
| chat_sync_max_age: 0.5 | |||||
| # Maximum number of messages to backfill for new portal rooms. | |||||
| initial_backfill_limit: 100 | |||||
| # The prefix for commands. Only required in non-management rooms. | |||||
| command_prefix: "!im" | |||||
| # End-to-bridge encryption support options. This requires login_shared_secret to be configured | |||||
| # in order to get a device for the bridge bot. | |||||
| # | |||||
| # Additionally, https://github.com/matrix-org/synapse/pull/5758 is required if using a normal | |||||
| # application service. | |||||
| encryption: | |||||
| # Allow encryption, work in group chat rooms with e2ee enabled | |||||
| allow: false | |||||
| # Default to encryption, force-enable encryption in all portals the bridge creates | |||||
| # This will cause the bridge bot to be in private chats for the encryption to work properly. | |||||
| # It is recommended to also set private_chat_portal_meta to true when using this. | |||||
| default: false | |||||
| # Options for automatic key sharing. | |||||
| key_sharing: | |||||
| # Enable key sharing? If enabled, key requests for rooms where users are in will be fulfilled. | |||||
| # You must use a client that supports requesting keys from other users to use this feature. | |||||
| allow: false | |||||
| # Require the requesting device to have a valid cross-signing signature? | |||||
| # This doesn't require that the bridge has verified the device, only that the user has verified it. | |||||
| # Not yet implemented. | |||||
| require_cross_signing: false | |||||
| # Require devices to be verified by the bridge? | |||||
| # Verification by the bridge is not yet implemented. | |||||
| require_verification: true | |||||
| # Logging config. | |||||
| logging: | |||||
| # The directory for log files. Will be created if not found. | |||||
| directory: ./logs | |||||
| # Available variables: .Date for the file date and .Index for different log files on the same day. | |||||
| file_name_format: "{{ '{{.Date}}-{{.Index}}.log' }}" | |||||
| # Date format for file names in the Go time format: https://golang.org/pkg/time/#pkg-constants | |||||
| file_date_format: "2006-01-02" | |||||
| # Log file permissions. | |||||
| file_mode: 0600 | |||||
| # Timestamp format for log entries in the Go time format. | |||||
| timestamp_format: "Jan _2, 2006 15:04:05" | |||||
| # Minimum severity for log messages. | |||||
| # Options: debug, info, warn, error, fatal | |||||
| print_level: debug | |||||
| @@ -0,0 +1,5 @@ | |||||
| listen_address: 0.0.0.0:29331 | |||||
| appservices: | |||||
| - id: imessage | |||||
| as: "{{ matrix_mautrix_wsproxy_appservice_token }}" | |||||
| hs: "{{ matrix_mautrix_wsproxy_homeserver_token }}" | |||||
| @@ -0,0 +1,43 @@ | |||||
| #jinja2: lstrip_blocks: "True" | |||||
| [Unit] | |||||
| Description=Matrix Mautrix wsproxy bridge | |||||
| {% for service in matrix_mautrix_wsproxy_systemd_required_services_list %} | |||||
| Requires={{ service }} | |||||
| After={{ service }} | |||||
| {% endfor %} | |||||
| {% for service in matrix_mautrix_wsproxy_systemd_wanted_services_list %} | |||||
| Wants={{ service }} | |||||
| {% endfor %} | |||||
| DefaultDependencies=no | |||||
| [Service] | |||||
| Type=simple | |||||
| Environment="HOME={{ matrix_systemd_unit_home_path }}" | |||||
| ExecStartPre=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-wsproxy 2>/dev/null' | |||||
| ExecStartPre=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-wsproxy 2>/dev/null' | |||||
| # Intentional delay, so that the homeserver (we likely depend on) can manage to start. | |||||
| ExecStartPre={{ matrix_host_command_sleep }} 5 | |||||
| ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-mautrix-wsproxy \ | |||||
| --log-driver=none \ | |||||
| --user={{ matrix_user_uid }}:{{ matrix_user_gid }} \ | |||||
| --cap-drop=ALL \ | |||||
| --network={{ matrix_docker_network }} \ | |||||
| -v {{ matrix_mautrix_wsproxy_config_path }}:/config:z \ | |||||
| -v {{ matrix_mautrix_wsproxy_data_path }}:/data:z \ | |||||
| -p 29331:29331 \ | |||||
| {% for arg in matrix_mautrix_wsproxy_container_extra_arguments %} | |||||
| {{ arg }} \ | |||||
| {% endfor %} | |||||
| {{ matrix_mautrix_wsproxy_docker_image }} \ | |||||
| /usr/bin/mautrix-wsproxy -config /config/config.yaml | |||||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-mautrix-wsproxy 2>/dev/null' | |||||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-mautrix-wsproxy 2>/dev/null' | |||||
| Restart=always | |||||
| RestartSec=30 | |||||
| SyslogIdentifier=matrix-mautrix-wsproxy | |||||
| [Install] | |||||
| WantedBy=multi-user.target | |||||
| @@ -178,6 +178,10 @@ matrix_nginx_proxy_proxy_grafana_hostname: "{{ matrix_server_fqn_grafana }}" | |||||
| matrix_nginx_proxy_proxy_sygnal_enabled: false | matrix_nginx_proxy_proxy_sygnal_enabled: false | ||||
| matrix_nginx_proxy_proxy_sygnal_hostname: "{{ matrix_server_fqn_sygnal }}" | matrix_nginx_proxy_proxy_sygnal_hostname: "{{ matrix_server_fqn_sygnal }}" | ||||
| # Controls whether proxying the mautrix wsproxy should be done. | |||||
| matrix_nginx_proxy_proxy_mautrix_wsproxy_enabled: false | |||||
| matrix_nginx_proxy_proxy_mautrix_wsproxy_hostname: "{{ matrix_server_fqn_mautrix_wsproxy }}" | |||||
| # Controls whether proxying for the matrix-corporal API (`/_matrix/corporal`) should be done (on the matrix domain) | # Controls whether proxying for the matrix-corporal API (`/_matrix/corporal`) should be done (on the matrix domain) | ||||
| matrix_nginx_proxy_proxy_matrix_corporal_api_enabled: false | matrix_nginx_proxy_proxy_matrix_corporal_api_enabled: false | ||||
| matrix_nginx_proxy_proxy_matrix_corporal_api_addr_with_container: "matrix-corporal:41081" | matrix_nginx_proxy_proxy_matrix_corporal_api_addr_with_container: "matrix-corporal:41081" | ||||
| @@ -308,6 +312,9 @@ matrix_nginx_proxy_proxy_grafana_additional_server_configuration_blocks: [] | |||||
| # A list of strings containing additional configuration blocks to add to Sygnal's server configuration (matrix-sygnal.conf). | # A list of strings containing additional configuration blocks to add to Sygnal's server configuration (matrix-sygnal.conf). | ||||
| matrix_nginx_proxy_proxy_sygnal_additional_server_configuration_blocks: [] | matrix_nginx_proxy_proxy_sygnal_additional_server_configuration_blocks: [] | ||||
| # A list of strings containing additional configuration blocks to add to mautrix wsproxy server configuration (matrix-mautrix-wsproxy.conf). | |||||
| matrix_nginx_proxy_proxy_mautrix_wsproxy_additional_server_configuration_blocks: [] | |||||
| # A list of strings containing additional configuration blocks to add to the base domain server configuration (matrix-base-domain.conf). | # A list of strings containing additional configuration blocks to add to the base domain server configuration (matrix-base-domain.conf). | ||||
| matrix_nginx_proxy_proxy_domain_additional_server_configuration_blocks: [] | matrix_nginx_proxy_proxy_domain_additional_server_configuration_blocks: [] | ||||
| @@ -143,6 +143,13 @@ | |||||
| mode: 0644 | mode: 0644 | ||||
| when: matrix_nginx_proxy_proxy_sygnal_enabled|bool | when: matrix_nginx_proxy_proxy_sygnal_enabled|bool | ||||
| - name: Ensure Matrix nginx-proxy configuration for mautrix wsproxy exists | |||||
| template: | |||||
| src: "{{ role_path }}/templates/nginx/conf.d/matrix-mautrix-wsproxy.conf.j2" | |||||
| dest: "{{ matrix_nginx_proxy_confd_path }}/matrix-mautrix-wsproxy.conf" | |||||
| mode: 0644 | |||||
| when: matrix_nginx_proxy_proxy_mautrix_wsproxy_enabled|bool | |||||
| - name: Ensure Matrix nginx-proxy configuration for Matrix domain exists | - name: Ensure Matrix nginx-proxy configuration for Matrix domain exists | ||||
| template: | template: | ||||
| src: "{{ role_path }}/templates/nginx/conf.d/matrix-domain.conf.j2" | src: "{{ role_path }}/templates/nginx/conf.d/matrix-domain.conf.j2" | ||||
| @@ -283,6 +290,12 @@ | |||||
| state: absent | state: absent | ||||
| when: "not matrix_nginx_proxy_proxy_sygnal_enabled|bool" | when: "not matrix_nginx_proxy_proxy_sygnal_enabled|bool" | ||||
| - name: Ensure Matrix nginx-proxy configuration for mautrix wsproxy deleted | |||||
| file: | |||||
| path: "{{ matrix_nginx_proxy_confd_path }}/matrix-mautrix-wsproxy.conf" | |||||
| state: absent | |||||
| when: "not matrix_nginx_proxy_proxy_mautrix_wsproxy_enabled|bool" | |||||
| - name: Ensure Matrix nginx-proxy homepage for base domain deleted | - name: Ensure Matrix nginx-proxy homepage for base domain deleted | ||||
| file: | file: | ||||
| path: "{{ matrix_nginx_proxy_data_path }}/matrix-domain/index.html" | path: "{{ matrix_nginx_proxy_data_path }}/matrix-domain/index.html" | ||||
| @@ -0,0 +1,110 @@ | |||||
| #jinja2: lstrip_blocks: "True" | |||||
| {% macro render_vhost_directives() %} | |||||
| gzip on; | |||||
| gzip_types text/plain application/json application/javascript text/css image/x-icon font/ttf image/gif; | |||||
| {% if matrix_nginx_proxy_hsts_preload_enabled %} | |||||
| add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always; | |||||
| {% else %} | |||||
| add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; | |||||
| {% endif %} | |||||
| add_header X-Content-Type-Options nosniff; | |||||
| add_header X-XSS-Protection "{{ matrix_nginx_proxy_xss_protection }}"; | |||||
| add_header X-Frame-Options SAMEORIGIN; | |||||
| {% if matrix_nginx_proxy_floc_optout_enabled %} | |||||
| add_header Permissions-Policy interest-cohort=() always; | |||||
| {% endif %} | |||||
| {% for configuration_block in matrix_nginx_proxy_proxy_mautrix_wsproxy_additional_server_configuration_blocks %} | |||||
| {{- configuration_block }} | |||||
| {% endfor %} | |||||
| location / { | |||||
| {% if matrix_nginx_proxy_enabled %} | |||||
| {# Use the embedded DNS resolver in Docker containers to discover the service #} | |||||
| resolver 127.0.0.11 valid=5s; | |||||
| set $backend "matrix-mautrix-wsproxy:29331"; | |||||
| proxy_pass http://$backend; | |||||
| {% else %} | |||||
| {# Generic configuration for use outside of our container setup #} | |||||
| proxy_pass http://127.0.0.1:29331; | |||||
| {% endif %} | |||||
| proxy_set_header Host $host; | |||||
| proxy_set_header X-Forwarded-For $remote_addr; | |||||
| proxy_set_header Upgrade $http_upgrade; | |||||
| proxy_set_header Connection "upgrade"; | |||||
| proxy_http_version 1.1; | |||||
| proxy_send_timeout 1d; | |||||
| proxy_read_timeout 1d; | |||||
| tcp_nodelay on; | |||||
| } | |||||
| {% endmacro %} | |||||
| server { | |||||
| listen {{ 8080 if matrix_nginx_proxy_enabled else 80 }}; | |||||
| server_name {{ matrix_nginx_proxy_proxy_mautrix_wsproxy_hostname }}; | |||||
| server_tokens off; | |||||
| root /dev/null; | |||||
| {% if matrix_nginx_proxy_https_enabled %} | |||||
| location /.well-known/acme-challenge { | |||||
| {% if matrix_nginx_proxy_enabled %} | |||||
| {# Use the embedded DNS resolver in Docker containers to discover the service #} | |||||
| resolver 127.0.0.11 valid=5s; | |||||
| set $backend "matrix-certbot:8080"; | |||||
| proxy_pass http://$backend; | |||||
| {% else %} | |||||
| {# Generic configuration for use outside of our container setup #} | |||||
| proxy_pass http://127.0.0.1:{{ matrix_ssl_lets_encrypt_certbot_standalone_http_port }}; | |||||
| {% endif %} | |||||
| } | |||||
| location / { | |||||
| return 301 https://$http_host$request_uri; | |||||
| } | |||||
| {% else %} | |||||
| {{ render_vhost_directives() }} | |||||
| {% endif %} | |||||
| } | |||||
| {% if matrix_nginx_proxy_https_enabled %} | |||||
| server { | |||||
| listen {{ 8443 if matrix_nginx_proxy_enabled else 443 }} ssl http2; | |||||
| listen [::]:{{ 8443 if matrix_nginx_proxy_enabled else 443 }} ssl http2; | |||||
| server_name {{ matrix_nginx_proxy_proxy_mautrix_wsproxy_hostname }}; | |||||
| server_tokens off; | |||||
| root /dev/null; | |||||
| ssl_certificate {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_mautrix_wsproxy_hostname }}/fullchain.pem; | |||||
| ssl_certificate_key {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_mautrix_wsproxy_hostname }}/privkey.pem; | |||||
| ssl_protocols {{ matrix_nginx_proxy_ssl_protocols }}; | |||||
| {% if matrix_nginx_proxy_ssl_ciphers != "" %} | |||||
| ssl_ciphers {{ matrix_nginx_proxy_ssl_ciphers }}; | |||||
| {% endif %} | |||||
| ssl_prefer_server_ciphers {{ matrix_nginx_proxy_ssl_prefer_server_ciphers }}; | |||||
| {% if matrix_nginx_proxy_ocsp_stapling_enabled %} | |||||
| ssl_stapling on; | |||||
| ssl_stapling_verify on; | |||||
| ssl_trusted_certificate {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_mautrix_wsproxy_hostname }}/chain.pem; | |||||
| {% endif %} | |||||
| {% if matrix_nginx_proxy_ssl_session_tickets_off %} | |||||
| ssl_session_tickets off; | |||||
| {% endif %} | |||||
| ssl_session_cache {{ matrix_nginx_proxy_ssl_session_cache }}; | |||||
| ssl_session_timeout {{ matrix_nginx_proxy_ssl_session_timeout }}; | |||||
| {{ render_vhost_directives() }} | |||||
| } | |||||
| {% endif %} | |||||
| @@ -27,6 +27,7 @@ | |||||
| - matrix-bridge-mautrix-signal | - matrix-bridge-mautrix-signal | ||||
| - matrix-bridge-mautrix-telegram | - matrix-bridge-mautrix-telegram | ||||
| - matrix-bridge-mautrix-whatsapp | - matrix-bridge-mautrix-whatsapp | ||||
| - matrix-bridge-mautrix-wsproxy | |||||
| - matrix-bridge-mx-puppet-discord | - matrix-bridge-mx-puppet-discord | ||||
| - matrix-bridge-mx-puppet-groupme | - matrix-bridge-mx-puppet-groupme | ||||
| - matrix-bridge-mx-puppet-steam | - matrix-bridge-mx-puppet-steam | ||||