| @@ -92,7 +92,7 @@ When updating the playbook, refer to [the changelog](CHANGELOG.md) to catch up w | |||
| This playbook sets up your server using the following Docker images: | |||
| - [matrixdotorg/synapse](https://hub.docker.com/r/matrixdotorg/synapse/) - the official [Matrix Synapse](https://github.com/matrix-org/synapse) server | |||
| - [matrixdotorg/synapse](https://hub.docker.com/r/matrixdotorg/synapse/) - the official [Synapse](https://github.com/matrix-org/synapse) Matrix homeserver | |||
| - [instrumentisto/coturn](https://hub.docker.com/r/instrumentisto/coturn/) - the [Coturn](https://github.com/coturn/coturn) STUN/TURN server (optional) | |||
| @@ -1,9 +1,9 @@ | |||
| # Storing Matrix media files on Amazon S3 (optional) | |||
| By default, this playbook configures your server to store Matrix Synapse's content repository (`media_store`) files on the local filesystem. | |||
| By default, this playbook configures your server to store Synapse's content repository (`media_store`) files on the local filesystem. | |||
| If that's alright, you can skip this. | |||
| If you'd like to store Matrix Synapse's content repository (`media_store`) files on Amazon S3, | |||
| If you'd like to store Synapse's content repository (`media_store`) files on Amazon S3, | |||
| you can let this playbook configure [Goofys](https://github.com/kahing/goofys) for you. | |||
| You'll need an Amazon S3 bucket and some IAM user credentials (access key + secret key) with full write access to the bucket. Example security policy: | |||
| @@ -36,4 +36,4 @@ matrix_s3_media_store_bucket_name: "your-bucket-name" | |||
| matrix_s3_media_store_aws_access_key: "access-key-goes-here" | |||
| matrix_s3_media_store_aws_secret_key: "secret-key-goes-here" | |||
| matrix_s3_media_store_region: "eu-central-1" | |||
| ``` | |||
| ``` | |||
| @@ -0,0 +1,33 @@ | |||
| # TURN server | |||
| The playbook installs a [Coturn](https://github.com/coturn/coturn) TURN server by default, so that clients can make audio/video calls even from [NAT](https://en.wikipedia.org/wiki/Network_address_translation)-ed networks. | |||
| By default, the Synapse chat server is configured, so that it points to the Coturn TURN server installed by the playbook. | |||
| ## Disabling Coturn | |||
| If, for some reason, you'd like to prevent the playbook from installing Coturn, you can use the following configuration: | |||
| ```yaml | |||
| matrix_coturn_enabled: false | |||
| ``` | |||
| In that case, Synapse would not point to any Coturn servers and audio/video call functionality may fail. | |||
| ## Using your own external Coturn server | |||
| If you'd like to use another TURN server (be it Coturn or some other one), you can configure the playbook like this: | |||
| ```yaml | |||
| # Disable integrated Coturn server | |||
| matrix_coturn_enabled: false | |||
| # Point Synapse to your other Coturn server | |||
| matrix_synapse_turn_uris: | |||
| - turns:HOSTNAME_OR_IP?transport=udp | |||
| - turns:HOSTNAME_OR_IP?transport=tcp | |||
| - turn:HOSTNAME_OR_IP?transport=udp | |||
| - turn:HOSTNAME_OR_IP?transport=tcp | |||
| ``` | |||
| @@ -27,11 +27,12 @@ When you're done with all the configuration you'd like to do, continue with [Ins | |||
| ## Other configuration options | |||
| - [Enabling Telemetry for your Matrix server](configuring-playbook-telemetry.md) (optional) | |||
| ### Additional useful services | |||
| - [Controlling Matrix federation](configuring-playbook-federation.md) (optional) | |||
| - [Setting up the Dimension Integration Manager](configuring-playbook-dimension.md) (optional, but recommended; after [installing](installing.md)) | |||
| - [Adjusting email-sending settings](configuring-playbook-email.md) (optional) | |||
| ### Core service adjustments | |||
| - [Storing Matrix media files on Amazon S3](configuring-playbook-s3.md) (optional) | |||
| @@ -47,6 +48,20 @@ When you're done with all the configuration you'd like to do, continue with [Ins | |||
| - [Using your own webserver, instead of this playbook's nginx proxy](configuring-playbook-own-webserver.md) (optional, advanced) | |||
| - [Adjusting TURN server configuration](configuring-playbook-turn.md) (optional, advanced) | |||
| ### Server connectivity | |||
| - [Enabling Telemetry for your Matrix server](configuring-playbook-telemetry.md) (optional) | |||
| - [Controlling Matrix federation](configuring-playbook-federation.md) (optional) | |||
| - [Adjusting email-sending settings](configuring-playbook-email.md) (optional) | |||
| ### Authentication and user-related | |||
| - [Setting up the REST authentication password provider module](configuring-playbook-rest-auth.md) (optional, advanced) | |||
| - [Setting up the Shared Secret Auth password provider module](configuring-playbook-shared-secret-auth.md) (optional, advanced) | |||
| @@ -55,6 +70,9 @@ When you're done with all the configuration you'd like to do, continue with [Ins | |||
| - [Setting up Matrix Corporal](configuring-playbook-matrix-corporal.md) (optional, advanced) | |||
| ### Bridging other networks | |||
| - [Setting up Mautrix Telegram bridging](configuring-playbook-bridge-mautrix-telegram.md) (optional) | |||
| - [Setting up Mautrix Whatsapp bridging](configuring-playbook-bridge-mautrix-whatsapp.md) (optional) | |||
| @@ -62,5 +80,3 @@ When you're done with all the configuration you'd like to do, continue with [Ins | |||
| - [Setting up Appservice IRC bridging](configuring-playbook-bridge-appservice-irc.md) (optional) | |||
| - [Setting up Appservice Discord bridging](configuring-playbook-bridge-appservice-discord.md) (optional) | |||
| - [Setting up Dimension](configuring-playbook-dimension.md) (optional) | |||
| @@ -1,6 +1,6 @@ | |||
| # Importing `media_store` data files from an existing installation (optional) | |||
| Run this if you'd like to import your `media_store` files from a previous installation of Matrix Synapse. | |||
| Run this if you'd like to import your `media_store` files from a previous installation of Synapse. | |||
| ## Prerequisites | |||
| @@ -19,4 +19,4 @@ Run this command (make sure to replace `<server-path-to-media_store>` with a pat | |||
| ansible-playbook -i inventory/hosts setup.yml --extra-vars='server_path_media_store=<server-path-to-media_store>' --tags=import-media-store | |||
| **Note**: `<server-path-to-media_store>` must be a file path to a `media_store` directory on the server (not on your local machine!). | |||
| **Note**: `<server-path-to-media_store>` must be a file path to a `media_store` directory on the server (not on your local machine!). | |||
| @@ -1,6 +1,6 @@ | |||
| # Importing an existing Postgres database from another installation (optional) | |||
| Run this if you'd like to import your database from a previous installation of Matrix Synapse. | |||
| Run this if you'd like to import your database from a previous installation of Synapse. | |||
| (don't forget to import your `media_store` files as well - see [the importing-media-store guide](importing-media-store.md)). | |||
| @@ -1,12 +1,12 @@ | |||
| # Importing an existing SQLite database from another installation (optional) | |||
| Run this if you'd like to import your database from a previous default installation of Matrix Synapse. | |||
| Run this if you'd like to import your database from a previous default installation of Synapse. | |||
| (don't forget to import your `media_store` files as well - see [the importing-media-store guide](importing-media-store.md)). | |||
| While this playbook always sets up PostgreSQL, by default a Matrix Synapse installation would run | |||
| While this playbook always sets up PostgreSQL, by default a Synapse installation would run | |||
| using an SQLite database. | |||
| If you have such a Matrix Synapse setup and wish to migrate it here (and over to PostgreSQL), this command is for you. | |||
| If you have such a Synapse setup and wish to migrate it here (and over to PostgreSQL), this command is for you. | |||
| ## Prerequisites | |||
| @@ -20,4 +20,4 @@ Run this command (make sure to replace `<server-path-to-homeserver.db>` with a f | |||
| ansible-playbook -i inventory/hosts setup.yml --extra-vars='server_path_homeserver_db=<server-path-to-homeserver.db>' --tags=import-sqlite-db | |||
| **Note**: `<server-path-to-homeserver.db>` must be a file path to a `homeserver.db` file on the server (not on your local machine!). | |||
| **Note**: `<server-path-to-homeserver.db>` must be a file path to a `homeserver.db` file on the server (not on your local machine!). | |||
| @@ -2,7 +2,7 @@ matrix_mailer_enabled: true | |||
| matrix_mailer_base_path: "{{ matrix_base_data_path }}/mailer" | |||
| matrix_mailer_docker_image: "devture/exim-relay:4.91-r1-0" | |||
| matrix_mailer_docker_image: "devture/exim-relay:4.91-r3-0" | |||
| # The user/group that the container runs with. | |||
| # These match the `exim` user/group within the container image. | |||
| @@ -3,7 +3,7 @@ matrix_nginx_proxy_enabled: true | |||
| # We use an official nginx image, which we fix-up to run unprivileged. | |||
| # An alternative would be an `nginxinc/nginx-unprivileged` image, but | |||
| # those as more frequently out of date. | |||
| matrix_nginx_proxy_docker_image: "nginx:1.15.10-alpine" | |||
| matrix_nginx_proxy_docker_image: "nginx:1.15.12-alpine" | |||
| matrix_nginx_proxy_base_path: "{{ matrix_base_data_path }}/nginx-proxy" | |||
| matrix_nginx_proxy_data_path: "{{ matrix_nginx_proxy_base_path }}/data" | |||
| @@ -1,6 +1,6 @@ | |||
| matrix_riot_web_enabled: true | |||
| matrix_riot_web_docker_image: "bubuntux/riot-web:v1.0.7" | |||
| matrix_riot_web_docker_image: "bubuntux/riot-web:v1.0.8" | |||
| matrix_riot_web_data_path: "{{ matrix_base_data_path }}/riot-web" | |||
| @@ -119,26 +119,26 @@ matrix_synapse_auto_join_rooms: [] | |||
| # automatically if they don't already exist. | |||
| matrix_synapse_autocreate_auto_join_rooms: true | |||
| # Controls password-peppering for Matrix Synapse. Not to be changed after initial setup. | |||
| # Controls password-peppering for Synapse. Not to be changed after initial setup. | |||
| matrix_synapse_password_config_pepper: "" | |||
| # Controls the number of events that Matrix Synapse caches in memory. | |||
| # Controls the number of events that Synapse caches in memory. | |||
| matrix_synapse_event_cache_size: "100K" | |||
| # Controls cache sizes for Matrix Synapse via the SYNAPSE_CACHE_FACTOR environment variable. | |||
| # Controls cache sizes for Synapse via the SYNAPSE_CACHE_FACTOR environment variable. | |||
| # Raise this to increase cache sizes or lower it to potentially lower memory use. | |||
| # To learn more, see: | |||
| # - https://github.com/matrix-org/synapse#help-synapse-eats-all-my-ram | |||
| # - https://github.com/matrix-org/synapse/issues/3939 | |||
| matrix_synapse_cache_factor: 0.5 | |||
| # Controls whether Matrix Synapse will federate at all. | |||
| # Controls whether Synapse will federate at all. | |||
| # Disable this to completely isolate your server from the rest of the Matrix network. | |||
| # Also see: `matrix_synapse_tls_federation_listener_enabled` if you wish to keep federation enabled, | |||
| # but want to stop the TLS listener (port 8448). | |||
| matrix_synapse_federation_enabled: true | |||
| # A list of domain names that are allowed to federate with the given Matrix Synapse server. | |||
| # A list of domain names that are allowed to federate with the given Synapse server. | |||
| # An empty list value (`[]`) will also effectively stop federation, but if that's the desired | |||
| # result, it's better to accomplish it by changing `matrix_synapse_federation_enabled`. | |||
| matrix_synapse_federation_domain_whitelist: ~ | |||
| @@ -73,7 +73,7 @@ | |||
| # We don't chown for Goofys, because due to the way it's mounted, | |||
| # all files become owned by whoever needs to own them. | |||
| - name: Ensure Matrix Synapse is started (if it previously was) | |||
| - name: Ensure Synapse is started (if it previously was) | |||
| service: | |||
| name: "{{ item }}" | |||
| state: started | |||
| @@ -22,7 +22,7 @@ | |||
| daemon_reload: yes | |||
| register: start_result | |||
| - name: Wait a while, so that Matrix Synapse can manage to start | |||
| - name: Wait a while, so that Synapse can manage to start | |||
| pause: | |||
| seconds: 7 | |||
| when: start_result.changed | |||
| @@ -1,7 +1,7 @@ | |||
| --- | |||
| # This will throw a Permission Denied error if already mounted using fuse | |||
| - name: Check Matrix Synapse media store path | |||
| - name: Check Synapse media store path | |||
| stat: | |||
| path: "{{ matrix_synapse_media_store_path }}" | |||
| register: local_path_media_store_stat | |||
| @@ -9,7 +9,7 @@ | |||
| # This is separate and conditional, to ensure we don't execute it | |||
| # if the path already exists or we failed to check, because it's mounted using fuse. | |||
| - name: Ensure Matrix media store path exists | |||
| - name: Ensure Synapse media store path exists | |||
| file: | |||
| path: "{{ matrix_synapse_media_store_path }}" | |||
| state: directory | |||
| @@ -18,21 +18,23 @@ | |||
| group: "{{ matrix_user_username }}" | |||
| when: "not local_path_media_store_stat.failed and not local_path_media_store_stat.stat.exists" | |||
| - name: Ensure Matrix Docker image is pulled | |||
| - name: Ensure Synapse Docker image is pulled | |||
| docker_image: | |||
| name: "{{ matrix_synapse_docker_image }}" | |||
| - name: Check if a Matrix Synapse configuration exists | |||
| - name: Check if a Synapse signing key exists | |||
| stat: | |||
| path: "{{ matrix_synapse_config_dir_path }}/homeserver.yaml" | |||
| register: matrix_synapse_config_stat | |||
| path: "{{ matrix_synapse_config_dir_path }}/{{ matrix_server_fqn_matrix }}.signing.key" | |||
| register: matrix_synapse_signing_key_stat | |||
| # We do this mostly so that the keys would get generated. | |||
| # We'll replace the rest of the configuration with our own templates below. | |||
| # We do this so that the signing key would get generated. | |||
| # | |||
| # This will also generate a default homeserver.yaml configuration file and a log configuration file. | |||
| # We don't care about those configuraiton files, as we replace them with our own anyway (see below). | |||
| # | |||
| # We don't use the `docker_container` module, because using it with `cap_drop` requires | |||
| # a very recent version, which is not available for a lot of people yet. | |||
| - name: Generate initial Matrix config | |||
| - name: Generate initial Synapse config and signing key | |||
| command: | | |||
| docker run | |||
| --rm | |||
| @@ -45,15 +47,15 @@ | |||
| -e SYNAPSE_REPORT_STATS=no | |||
| {{ matrix_synapse_docker_image }} | |||
| generate | |||
| when: "not matrix_synapse_config_stat.stat.exists" | |||
| when: "not matrix_synapse_signing_key_stat.stat.exists" | |||
| - name: Ensure Matrix homeserver config installed | |||
| - name: Ensure Synapse homeserver config installed | |||
| template: | |||
| src: "{{ matrix_synapse_template_synapse_homeserver }}" | |||
| dest: "{{ matrix_synapse_config_dir_path }}/homeserver.yaml" | |||
| mode: 0644 | |||
| - name: Ensure Matrix log config installed | |||
| - name: Ensure Synapse log config installed | |||
| template: | |||
| src: "{{ matrix_synapse_template_synapse_log }}" | |||
| dest: "{{ matrix_synapse_config_dir_path }}/{{ matrix_server_fqn_matrix }}.log.config" | |||
| @@ -4,7 +4,7 @@ | |||
| matrix_synapse_media_store_parent_path: "{{ matrix_synapse_media_store_path|dirname }}" | |||
| matrix_synapse_media_store_directory_name: "{{ matrix_synapse_media_store_path|basename }}" | |||
| - name: Ensure Matrix Synapse paths exist | |||
| - name: Ensure Synapse paths exist | |||
| file: | |||
| path: "{{ item }}" | |||
| state: directory | |||
| @@ -17,4 +17,4 @@ | |||
| - "{{ matrix_synapse_ext_path }}" | |||
| # We handle matrix_synapse_media_store_path elsewhere (in setup_synapse_main.yml), | |||
| # because if it's using Goofys and it's already mounted (from before), | |||
| # trying to chown/chmod it here will cause trouble. | |||
| # trying to chown/chmod it here will cause trouble. | |||
| @@ -1,5 +1,5 @@ | |||
| [Unit] | |||
| Description=Matrix Synapse server | |||
| Description=Synapse server | |||
| {% for service in matrix_synapse_systemd_required_services_list %} | |||
| Requires={{ service }} | |||
| After={{ service }} | |||