Add matrix-nginx-proxy config for mautrix-wsproxypull/1050/head
| @@ -1,22 +0,0 @@ | |||
| # Setting up Mautrix Whatsapp (optional) | |||
| The playbook can install and configure [mautrix-whatsapp](https://github.com/tulir/mautrix-whatsapp) for you. | |||
| See the project's [documentation](https://github.com/tulir/mautrix-whatsapp/wiki) to learn what it does and why it might be useful to you. | |||
| Use the following playbook configuration: | |||
| ```yaml | |||
| matrix_mautrix_wsproxy_enabled: true | |||
| matrix_mautrix_imessage_user: 'user@domain.com' | |||
| ``` | |||
| ## Set up Double Puppeting | |||
| ## Usage | |||
| You then need to start a chat with `@whatsappbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain). | |||
| @@ -0,0 +1,27 @@ | |||
| # Setting up Mautrix wsproxy (optional) | |||
| The playbook can install and configure [mautrix-wsproxy](https://github.com/mautrix/wsproxy) for you. | |||
| See the project's [documentation](https://github.com/mautrix/wsproxy#readme) to learn what it does and why it might be useful to you. | |||
| Use the following playbook configuration: | |||
| ```yaml | |||
| matrix_mautrix_wsproxy_enabled: true | |||
| matrix_mautrix_imessage_user: 'user@domain.com' | |||
| ``` | |||
| ## Set up Double Puppeting | |||
| If you'd like to use [Double Puppeting](https://github.com/tulir/mautrix-hangouts/wiki/Authentication#double-puppeting) (hint: you most likely do), you have 1 way of going about it. | |||
| ### Method 1: automatically, by enabling Shared Secret Auth | |||
| The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook. | |||
| This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future. | |||
| ## Usage | |||
| Follow the [matrix-imessage documenation](https://docs.mau.fi/bridges/go/imessage/index.html) for running `matrix-imessage` on your iOS device. | |||
| @@ -1248,6 +1248,7 @@ matrix_nginx_proxy_proxy_bot_go_neb_enabled: "{{ matrix_bot_go_neb_enabled }}" | |||
| matrix_nginx_proxy_proxy_jitsi_enabled: "{{ matrix_jitsi_enabled }}" | |||
| matrix_nginx_proxy_proxy_grafana_enabled: "{{ matrix_grafana_enabled }}" | |||
| matrix_nginx_proxy_proxy_sygnal_enabled: "{{ matrix_sygnal_enabled }}" | |||
| matrix_nginx_proxy_proxy_mautrix_wsproxy_enabled: "{{ matrix_mautrix_wsproxy_enabled }}" | |||
| matrix_nginx_proxy_proxy_matrix_corporal_api_enabled: "{{ matrix_corporal_enabled and matrix_corporal_http_api_enabled }}" | |||
| matrix_nginx_proxy_proxy_matrix_corporal_api_addr_with_container: "matrix-corporal:41081" | |||
| @@ -1330,6 +1331,8 @@ matrix_ssl_domains_to_obtain_certificates_for: | | |||
| + | |||
| ([matrix_server_fqn_sygnal] if matrix_sygnal_enabled else []) | |||
| + | |||
| ([matrix_server_fqn_mautrix_wsproxy] if matrix_mautrix_wsproxy_enabled else []) | |||
| + | |||
| ([matrix_domain] if matrix_nginx_proxy_base_domain_serving_enabled else []) | |||
| + | |||
| matrix_ssl_additional_domains_to_obtain_certificates_for | |||
| @@ -33,6 +33,9 @@ matrix_server_fqn_grafana: "stats.{{ matrix_domain }}" | |||
| # This is where you access the Sygnal push gateway. | |||
| matrix_server_fqn_sygnal: "sygnal.{{ matrix_domain }}" | |||
| # This is where you access the mautrix wsproxy push gateway. | |||
| matrix_server_fqn_mautrix_wsproxy: "mautrix-wsproxy.{{ matrix_domain }}" | |||
| matrix_federation_public_port: 8448 | |||
| # The architecture that your server runs. | |||
| @@ -14,8 +14,8 @@ matrix_mautrix_wsproxy_data_path: "{{ matrix_mautrix_wsproxy_base_path }}/data" | |||
| matrix_mautrix_wsproxy_homeserver_address: "{{ matrix_homeserver_container_url }}" | |||
| matrix_mautrix_wsproxy_homeserver_domain: "{{ matrix_domain }}" | |||
| matrix_mautrix_wsproxy_appservice_address: "http://localhost:29331" | |||
| matrix_mautrix_wsproxy_appservice_websocket: "ws://localhost:29331" | |||
| matrix_mautrix_wsproxy_appservice_address: "http://matrix-mautrix-wsproxy:29331" | |||
| matrix_mautrix_wsproxy_appservice_websocket: "ws://matrix-mautrix-wsproxy:29331" | |||
| # A list of extra arguments to pass to the container | |||
| matrix_mautrix_wsproxy_container_extra_arguments: [] | |||
| @@ -145,6 +145,10 @@ matrix_nginx_proxy_proxy_grafana_hostname: "{{ matrix_server_fqn_grafana }}" | |||
| matrix_nginx_proxy_proxy_sygnal_enabled: false | |||
| matrix_nginx_proxy_proxy_sygnal_hostname: "{{ matrix_server_fqn_sygnal }}" | |||
| # Controls whether proxying the mautrix wsproxy should be done. | |||
| matrix_nginx_proxy_proxy_mautrix_wsproxy_enabled: false | |||
| matrix_nginx_proxy_proxy_mautrix_wsproxy_hostname: "{{ matrix_server_fqn_mautrix_wsproxy }}" | |||
| # Controls whether proxying for the matrix-corporal API (`/_matrix/corporal`) should be done (on the matrix domain) | |||
| matrix_nginx_proxy_proxy_matrix_corporal_api_enabled: false | |||
| matrix_nginx_proxy_proxy_matrix_corporal_api_addr_with_container: "matrix-corporal:41081" | |||
| @@ -274,6 +278,9 @@ matrix_nginx_proxy_proxy_grafana_additional_server_configuration_blocks: [] | |||
| # A list of strings containing additional configuration blocks to add to Sygnal's server configuration (matrix-sygnal.conf). | |||
| matrix_nginx_proxy_proxy_sygnal_additional_server_configuration_blocks: [] | |||
| # A list of strings containing additional configuration blocks to add to mautrix wsproxy server configuration (matrix-mautrix-wsproxy.conf). | |||
| matrix_nginx_proxy_proxy_mautrix_wsproxy_additional_server_configuration_blocks: [] | |||
| # A list of strings containing additional configuration blocks to add to the base domain server configuration (matrix-base-domain.conf). | |||
| matrix_nginx_proxy_proxy_domain_additional_server_configuration_blocks: [] | |||
| @@ -114,6 +114,13 @@ | |||
| mode: 0644 | |||
| when: matrix_nginx_proxy_proxy_sygnal_enabled|bool | |||
| - name: Ensure Matrix nginx-proxy configuration for mautrix wsproxy exists | |||
| template: | |||
| src: "{{ role_path }}/templates/nginx/conf.d/matrix-mautrix-wsproxy.conf.j2" | |||
| dest: "{{ matrix_nginx_proxy_confd_path }}/matrix-mautrix-wsproxy.conf" | |||
| mode: 0644 | |||
| when: matrix_nginx_proxy_proxy_mautrix_wsproxy_enabled|bool | |||
| - name: Ensure Matrix nginx-proxy configuration for Matrix domain exists | |||
| template: | |||
| src: "{{ role_path }}/templates/nginx/conf.d/matrix-domain.conf.j2" | |||
| @@ -247,6 +254,12 @@ | |||
| state: absent | |||
| when: "not matrix_nginx_proxy_proxy_sygnal_enabled|bool" | |||
| - name: Ensure Matrix nginx-proxy configuration for mautrix wsproxy deleted | |||
| file: | |||
| path: "{{ matrix_nginx_proxy_confd_path }}/matrix-mautrix-wsproxy.conf" | |||
| state: absent | |||
| when: "not matrix_nginx_proxy_proxy_mautrix_wsproxy_enabled|bool" | |||
| - name: Ensure Matrix nginx-proxy homepage for base domain deleted | |||
| file: | |||
| path: "{{ matrix_nginx_proxy_data_path }}/matrix-domain/index.html" | |||
| @@ -0,0 +1,110 @@ | |||
| #jinja2: lstrip_blocks: "True" | |||
| {% macro render_vhost_directives() %} | |||
| gzip on; | |||
| gzip_types text/plain application/json application/javascript text/css image/x-icon font/ttf image/gif; | |||
| {% if matrix_nginx_proxy_hsts_preload_enabled %} | |||
| add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always; | |||
| {% else %} | |||
| add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; | |||
| {% endif %} | |||
| add_header X-Content-Type-Options nosniff; | |||
| add_header X-XSS-Protection "{{ matrix_nginx_proxy_xss_protection }}"; | |||
| add_header X-Frame-Options SAMEORIGIN; | |||
| {% if matrix_nginx_proxy_floc_optout_enabled %} | |||
| add_header Permissions-Policy interest-cohort=() always; | |||
| {% endif %} | |||
| {% for configuration_block in matrix_nginx_proxy_proxy_mautrix_wsproxy_additional_server_configuration_blocks %} | |||
| {{- configuration_block }} | |||
| {% endfor %} | |||
| location / { | |||
| {% if matrix_nginx_proxy_enabled %} | |||
| {# Use the embedded DNS resolver in Docker containers to discover the service #} | |||
| resolver 127.0.0.11 valid=5s; | |||
| set $backend "matrix-mautrix-wsproxy:29331"; | |||
| proxy_pass http://$backend; | |||
| {% else %} | |||
| {# Generic configuration for use outside of our container setup #} | |||
| proxy_pass http://127.0.0.1:29331; | |||
| {% endif %} | |||
| proxy_set_header Host $host; | |||
| proxy_set_header X-Forwarded-For $remote_addr; | |||
| proxy_set_header Upgrade $http_upgrade; | |||
| proxy_set_header Connection "upgrade"; | |||
| proxy_http_version 1.1; | |||
| proxy_send_timeout 1d; | |||
| proxy_read_timeout 1d; | |||
| tcp_nodelay on; | |||
| } | |||
| {% endmacro %} | |||
| server { | |||
| listen {{ 8080 if matrix_nginx_proxy_enabled else 80 }}; | |||
| server_name {{ matrix_nginx_proxy_proxy_mautrix_wsproxy_hostname }}; | |||
| server_tokens off; | |||
| root /dev/null; | |||
| {% if matrix_nginx_proxy_https_enabled %} | |||
| location /.well-known/acme-challenge { | |||
| {% if matrix_nginx_proxy_enabled %} | |||
| {# Use the embedded DNS resolver in Docker containers to discover the service #} | |||
| resolver 127.0.0.11 valid=5s; | |||
| set $backend "matrix-certbot:8080"; | |||
| proxy_pass http://$backend; | |||
| {% else %} | |||
| {# Generic configuration for use outside of our container setup #} | |||
| proxy_pass http://127.0.0.1:{{ matrix_ssl_lets_encrypt_certbot_standalone_http_port }}; | |||
| {% endif %} | |||
| } | |||
| location / { | |||
| return 301 https://$http_host$request_uri; | |||
| } | |||
| {% else %} | |||
| {{ render_vhost_directives() }} | |||
| {% endif %} | |||
| } | |||
| {% if matrix_nginx_proxy_https_enabled %} | |||
| server { | |||
| listen {{ 8443 if matrix_nginx_proxy_enabled else 443 }} ssl http2; | |||
| listen [::]:{{ 8443 if matrix_nginx_proxy_enabled else 443 }} ssl http2; | |||
| server_name {{ matrix_nginx_proxy_proxy_mautrix_wsproxy_hostname }}; | |||
| server_tokens off; | |||
| root /dev/null; | |||
| ssl_certificate {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_mautrix_wsproxy_hostname }}/fullchain.pem; | |||
| ssl_certificate_key {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_mautrix_wsproxy_hostname }}/privkey.pem; | |||
| ssl_protocols {{ matrix_nginx_proxy_ssl_protocols }}; | |||
| {% if matrix_nginx_proxy_ssl_ciphers != "" %} | |||
| ssl_ciphers {{ matrix_nginx_proxy_ssl_ciphers }}; | |||
| {% endif %} | |||
| ssl_prefer_server_ciphers {{ matrix_nginx_proxy_ssl_prefer_server_ciphers }}; | |||
| {% if matrix_nginx_proxy_ocsp_stapling_enabled %} | |||
| ssl_stapling on; | |||
| ssl_stapling_verify on; | |||
| ssl_trusted_certificate {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_mautrix_wsproxy_hostname }}/chain.pem; | |||
| {% endif %} | |||
| {% if matrix_nginx_proxy_ssl_session_tickets_off %} | |||
| ssl_session_tickets off; | |||
| {% endif %} | |||
| ssl_session_cache {{ matrix_nginx_proxy_ssl_session_cache }}; | |||
| ssl_session_timeout {{ matrix_nginx_proxy_ssl_session_timeout }}; | |||
| {{ render_vhost_directives() }} | |||
| } | |||
| {% endif %} | |||