From 00cb1e5c0c4950aa308a5cd1734106562720bba7 Mon Sep 17 00:00:00 2001 From: Aine <97398200+aine-etke@users.noreply.github.com> Date: Mon, 14 Apr 2025 18:12:25 +0300 Subject: [PATCH 001/404] Synapse Admin v0.10.3-etke39 --- roles/custom/matrix-synapse-admin/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse-admin/defaults/main.yml b/roles/custom/matrix-synapse-admin/defaults/main.yml index 350b3b5cd..a7333d093 100644 --- a/roles/custom/matrix-synapse-admin/defaults/main.yml +++ b/roles/custom/matrix-synapse-admin/defaults/main.yml @@ -25,7 +25,7 @@ matrix_synapse_admin_container_image_self_build: false matrix_synapse_admin_container_image_self_build_repo: "https://github.com/etkecc/synapse-admin.git" # renovate: datasource=docker depName=ghcr.io/etkecc/synapse-admin -matrix_synapse_admin_version: v0.10.3-etke38 +matrix_synapse_admin_version: v0.10.3-etke39 matrix_synapse_admin_docker_image: "{{ matrix_synapse_admin_docker_image_registry_prefix }}etkecc/synapse-admin:{{ matrix_synapse_admin_version }}" matrix_synapse_admin_docker_image_registry_prefix: "{{ 'localhost/' if matrix_synapse_admin_container_image_self_build else matrix_synapse_admin_docker_image_registry_prefix_upstream }}" matrix_synapse_admin_docker_image_registry_prefix_upstream: "{{ matrix_synapse_admin_docker_image_registry_prefix_upstream_default }}" From 222f8772613ac03d05366dc674116223c26dbeac Mon Sep 17 00:00:00 2001 From: Aine <97398200+aine-etke@users.noreply.github.com> Date: Mon, 14 Apr 2025 22:51:01 +0300 Subject: [PATCH 002/404] Honoroit v0.9.28 --- roles/custom/matrix-bot-honoroit/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bot-honoroit/defaults/main.yml b/roles/custom/matrix-bot-honoroit/defaults/main.yml index edac46e0a..fbb44a250 100644 --- a/roles/custom/matrix-bot-honoroit/defaults/main.yml +++ b/roles/custom/matrix-bot-honoroit/defaults/main.yml @@ -30,7 +30,7 @@ matrix_bot_honoroit_docker_repo_version: "{{ matrix_bot_honoroit_version }}" matrix_bot_honoroit_docker_src_files_path: "{{ matrix_base_data_path }}/honoroit/docker-src" # renovate: datasource=docker depName=ghcr.io/etkecc/honoroit -matrix_bot_honoroit_version: v0.9.27 +matrix_bot_honoroit_version: v0.9.28 matrix_bot_honoroit_docker_image: "{{ matrix_bot_honoroit_docker_image_registry_prefix }}etkecc/honoroit:{{ matrix_bot_honoroit_version }}" matrix_bot_honoroit_docker_image_registry_prefix: "{{ 'localhost/' if matrix_bot_honoroit_container_image_self_build else matrix_bot_honoroit_docker_image_registry_prefix_upstream }}" matrix_bot_honoroit_docker_image_registry_prefix_upstream: "{{ matrix_bot_honoroit_docker_image_registry_prefix_upstream_default }}" From b35289cae8aa71052d0824171434d730a14a5b75 Mon Sep 17 00:00:00 2001 From: QEDeD Date: Tue, 15 Apr 2025 20:30:32 +0200 Subject: [PATCH 003/404] Update howto-srv-server-delegation.md Fix single typo Rraefik --> Traefik --- docs/howto-srv-server-delegation.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/howto-srv-server-delegation.md b/docs/howto-srv-server-delegation.md index d1013f598..dda92b9a3 100644 --- a/docs/howto-srv-server-delegation.md +++ b/docs/howto-srv-server-delegation.md @@ -79,7 +79,7 @@ traefik_configuration_extension_yaml: | - "8.8.8.8:53" storage: {{ traefik_config_certificatesResolvers_acme_storage | to_json }} -# 2. Configure the environment variables needed by Rraefik to automate the ACME DNS Challenge (example for Cloudflare) +# 2. Configure the environment variables needed by Traefik to automate the ACME DNS Challenge (example for Cloudflare) traefik_environment_variables: | CF_API_EMAIL=redacted CF_ZONE_API_TOKEN=redacted From 6ed5db146482e0edc4999633cff97c63bf25051b Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 16 Apr 2025 06:01:15 +0000 Subject: [PATCH 004/404] Update docker.io/metio/matrix-alertmanager-receiver Docker tag to v2025.4.16 --- roles/custom/matrix-alertmanager-receiver/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-alertmanager-receiver/defaults/main.yml b/roles/custom/matrix-alertmanager-receiver/defaults/main.yml index 4869d823f..eed24970f 100644 --- a/roles/custom/matrix-alertmanager-receiver/defaults/main.yml +++ b/roles/custom/matrix-alertmanager-receiver/defaults/main.yml @@ -11,7 +11,7 @@ matrix_alertmanager_receiver_enabled: true # renovate: datasource=docker depName=docker.io/metio/matrix-alertmanager-receiver -matrix_alertmanager_receiver_version: 2025.3.26 +matrix_alertmanager_receiver_version: 2025.4.16 matrix_alertmanager_receiver_scheme: https From 1317e5632a26cad463e19dae17686c401c53e03c Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 16 Apr 2025 12:15:19 +0000 Subject: [PATCH 005/404] Update dock.mau.dev/mautrix/discord Docker tag to v0.7.3 --- roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml index fa1a8e777..40d91ebb0 100644 --- a/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml @@ -21,7 +21,7 @@ matrix_mautrix_discord_container_image_self_build_repo: "https://mau.dev/mautrix matrix_mautrix_discord_container_image_self_build_branch: "{{ 'main' if matrix_mautrix_discord_version == 'latest' else matrix_mautrix_discord_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/discord -matrix_mautrix_discord_version: v0.7.2 +matrix_mautrix_discord_version: v0.7.3 # See: https://mau.dev/mautrix/discord/container_registry matrix_mautrix_discord_docker_image: "{{ matrix_mautrix_discord_docker_image_registry_prefix }}mautrix/discord:{{ matrix_mautrix_discord_version }}" From 0d30d315e33d4125d7bd47f1d06f77173713e586 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 16 Apr 2025 12:15:23 +0000 Subject: [PATCH 006/404] Update dock.mau.dev/mautrix/meta Docker tag to v0.4.6 --- .../matrix-bridge-mautrix-meta-instagram/defaults/main.yml | 2 +- .../matrix-bridge-mautrix-meta-messenger/defaults/main.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml index 85b1cce2a..85f7034bb 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml @@ -20,7 +20,7 @@ matrix_mautrix_meta_instagram_enabled: true matrix_mautrix_meta_instagram_identifier: matrix-mautrix-meta-instagram # renovate: datasource=docker depName=dock.mau.dev/mautrix/meta -matrix_mautrix_meta_instagram_version: v0.4.5 +matrix_mautrix_meta_instagram_version: v0.4.6 matrix_mautrix_meta_instagram_base_path: "{{ matrix_base_data_path }}/mautrix-meta-instagram" matrix_mautrix_meta_instagram_config_path: "{{ matrix_mautrix_meta_instagram_base_path }}/config" diff --git a/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml index f644aec5a..7a34eb7f2 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml @@ -20,7 +20,7 @@ matrix_mautrix_meta_messenger_enabled: true matrix_mautrix_meta_messenger_identifier: matrix-mautrix-meta-messenger # renovate: datasource=docker depName=dock.mau.dev/mautrix/meta -matrix_mautrix_meta_messenger_version: v0.4.5 +matrix_mautrix_meta_messenger_version: v0.4.6 matrix_mautrix_meta_messenger_base_path: "{{ matrix_base_data_path }}/mautrix-meta-messenger" matrix_mautrix_meta_messenger_config_path: "{{ matrix_mautrix_meta_messenger_base_path }}/config" From c4da60c4e4133f8f6c1fdbd58c3d495b4b2b828a Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 16 Apr 2025 13:09:34 +0000 Subject: [PATCH 007/404] Update dock.mau.dev/mautrix/signal Docker tag to v0.8.2 --- roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml index 790f03b16..f3f9ce553 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml @@ -25,7 +25,7 @@ matrix_mautrix_signal_container_image_self_build_repo: "https://mau.dev/mautrix/ matrix_mautrix_signal_container_image_self_build_branch: "{{ 'main' if matrix_mautrix_signal_version == 'latest' else matrix_mautrix_signal_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/signal -matrix_mautrix_signal_version: v0.8.1 +matrix_mautrix_signal_version: v0.8.2 # See: https://mau.dev/mautrix/signal/container_registry matrix_mautrix_signal_docker_image: "{{ matrix_mautrix_signal_docker_image_registry_prefix }}mautrix/signal:{{ matrix_mautrix_signal_docker_image_tag }}" From ef156614ece0d72efeca0f18885908cf5ca2b30f Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 16 Apr 2025 18:43:53 +0000 Subject: [PATCH 008/404] Update dock.mau.dev/mautrix/slack Docker tag to v0.2.1 --- roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml index b0d2406fc..0b98dbdf7 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml @@ -17,7 +17,7 @@ matrix_mautrix_slack_container_image_self_build_repo: "https://mau.dev/mautrix/s matrix_mautrix_slack_container_image_self_build_branch: "{{ 'main' if matrix_mautrix_slack_version == 'latest' else matrix_mautrix_slack_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/slack -matrix_mautrix_slack_version: v0.2.0 +matrix_mautrix_slack_version: v0.2.1 # See: https://mau.dev/mautrix/slack/container_registry matrix_mautrix_slack_docker_image: "{{ matrix_mautrix_slack_docker_image_registry_prefix }}mautrix/slack:{{ matrix_mautrix_slack_version }}" matrix_mautrix_slack_docker_image_registry_prefix: "{{ 'localhost/' if matrix_mautrix_slack_container_image_self_build else matrix_mautrix_slack_docker_image_registry_prefix_upstream }}" From d48867c07ef82e112ef0bd269ceb62df8283e1af Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 16 Apr 2025 18:43:58 +0000 Subject: [PATCH 009/404] Update nginx Docker tag to v1.27.5 --- .../matrix-synapse-reverse-proxy-companion/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse-reverse-proxy-companion/defaults/main.yml b/roles/custom/matrix-synapse-reverse-proxy-companion/defaults/main.yml index 4caa634be..fb9e554a7 100644 --- a/roles/custom/matrix-synapse-reverse-proxy-companion/defaults/main.yml +++ b/roles/custom/matrix-synapse-reverse-proxy-companion/defaults/main.yml @@ -24,7 +24,7 @@ matrix_synapse_reverse_proxy_companion_enabled: true # renovate: datasource=docker depName=nginx -matrix_synapse_reverse_proxy_companion_version: 1.27.4-alpine +matrix_synapse_reverse_proxy_companion_version: 1.27.5-alpine matrix_synapse_reverse_proxy_companion_base_path: "{{ matrix_synapse_base_path }}/reverse-proxy-companion" matrix_synapse_reverse_proxy_companion_confd_path: "{{ matrix_synapse_reverse_proxy_companion_base_path }}/conf.d" From de10cb223985aefa295d94498896adafc5074308 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 16 Apr 2025 22:00:29 +0000 Subject: [PATCH 010/404] Update dock.mau.dev/mautrix/twitter Docker tag to v0.4.0 --- roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml index 84613f754..d88089881 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml @@ -22,7 +22,7 @@ matrix_mautrix_twitter_container_image_self_build_repo: "https://github.com/maut matrix_mautrix_twitter_container_image_self_build_repo_version: "{{ 'master' if matrix_mautrix_twitter_version == 'latest' else matrix_mautrix_twitter_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/twitter -matrix_mautrix_twitter_version: v0.3.0 +matrix_mautrix_twitter_version: v0.4.0 # See: https://mau.dev/tulir/mautrix-twitter/container_registry matrix_mautrix_twitter_docker_image: "{{ matrix_mautrix_twitter_docker_image_registry_prefix }}mautrix/twitter:{{ matrix_mautrix_twitter_version }}" matrix_mautrix_twitter_docker_image_registry_prefix: "{{ 'localhost/' if matrix_mautrix_twitter_container_image_self_build else matrix_mautrix_twitter_docker_image_registry_prefix_upstream }}" From 6915c7de12ecbc7015fa82039876f1fb9bf7887b Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 16 Apr 2025 22:00:33 +0000 Subject: [PATCH 011/404] Update dock.mau.dev/mautrix/whatsapp Docker tag to v0.12.0 --- roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml index b461573b6..428b3ee1c 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml @@ -28,7 +28,7 @@ matrix_mautrix_whatsapp_container_image_self_build_repo: "https://mau.dev/mautri matrix_mautrix_whatsapp_container_image_self_build_branch: "{{ 'master' if matrix_mautrix_whatsapp_version == 'latest' else matrix_mautrix_whatsapp_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/whatsapp -matrix_mautrix_whatsapp_version: v0.11.4 +matrix_mautrix_whatsapp_version: v0.12.0 # See: https://mau.dev/mautrix/whatsapp/container_registry matrix_mautrix_whatsapp_docker_image: "{{ matrix_mautrix_whatsapp_docker_image_registry_prefix }}mautrix/whatsapp:{{ matrix_mautrix_whatsapp_version }}" From 5eb247b5bf7bc3d019d06673e8d6ec7698cb28e9 Mon Sep 17 00:00:00 2001 From: Onestacked Date: Thu, 17 Apr 2025 21:08:25 +0200 Subject: [PATCH 012/404] Add matrix_bridges_msc4190_enabled flag for using msc4190 on supported mautrix bridges. flag for using msc4190 on supported mautrix bridges. (#4258) * Add matrix_bridges_msc4190_enabled flag for using msc4190 on supported mautrix bridges. * Apply to_json to msc4190 in mautrix configs * Add | to_json to mautrix bridge registration io.element.msc4190. * require matrix_synapse_experimental_features_msc3202_device_masquerading_enabled for matrix_bridges_msc4190_enabled * Also add msc4190 support for mautrix-telegram --- roles/custom/matrix-base/defaults/main.yml | 3 +++ .../matrix-bridge-mautrix-bluesky/defaults/main.yml | 3 +++ .../templates/config.yaml.j2 | 9 +++++---- .../matrix-bridge-mautrix-gmessages/defaults/main.yml | 3 +++ .../templates/config.yaml.j2 | 5 +++++ .../defaults/main.yml | 3 +++ .../templates/config.yaml.j2 | 5 +++++ .../defaults/main.yml | 3 +++ .../templates/config.yaml.j2 | 5 +++++ .../matrix-bridge-mautrix-signal/defaults/main.yml | 3 +++ .../templates/config.yaml.j2 | 5 +++++ .../custom/matrix-bridge-mautrix-slack/defaults/main.yml | 3 +++ .../matrix-bridge-mautrix-slack/templates/config.yaml.j2 | 5 +++++ .../matrix-bridge-mautrix-telegram/defaults/main.yml | 3 +++ .../templates/config.yaml.j2 | 5 +++++ .../matrix-bridge-mautrix-twitter/defaults/main.yml | 3 +++ .../templates/config.yaml.j2 | 3 ++- .../matrix-bridge-mautrix-whatsapp/defaults/main.yml | 3 +++ .../templates/config.yaml.j2 | 5 +++++ 19 files changed, 72 insertions(+), 5 deletions(-) diff --git a/roles/custom/matrix-base/defaults/main.yml b/roles/custom/matrix-base/defaults/main.yml index 31ccaad86..ce6943b35 100644 --- a/roles/custom/matrix-base/defaults/main.yml +++ b/roles/custom/matrix-base/defaults/main.yml @@ -48,6 +48,9 @@ matrix_bridges_encryption_enabled: false # Global var to make encryption default/optional across all bridges with encryption support matrix_bridges_encryption_default: "{{ matrix_bridges_encryption_enabled }}" +# Global var for enabling msc4190 ( On supported bridges) +matrix_bridges_msc4190_enabled: "{{ matrix_authentication_service_enabled and matrix_bridges_encryption_enabled and matrix_synapse_experimental_features_msc3202_device_masquerading_enabled }}" + # Global var to enable/disable relay mode across all bridges with relay mode support matrix_bridges_relay_enabled: false diff --git a/roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml index db743b0eb..6f39551a2 100644 --- a/roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml @@ -31,6 +31,8 @@ matrix_mautrix_bluesky_homeserver_address: "" matrix_mautrix_bluesky_homeserver_domain: '{{ matrix_domain }}' matrix_mautrix_bluesky_appservice_address: 'http://matrix-mautrix-bluesky:29340' +matrix_mautrix_bluesky_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" + # A public address that external services can use to reach this appservice. matrix_mautrix_bluesky_appservice_public_address: '' @@ -187,6 +189,7 @@ matrix_mautrix_bluesky_registration_yaml: | rate_limited: false de.sorunome.msc2409.push_ephemeral: true receive_ephemeral: true + io.element.msc4190: {{ matrix_mautrix_bluesky_msc4190_enabled | to_json }} matrix_mautrix_bluesky_registration: "{{ matrix_mautrix_bluesky_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 index 156c68048..ca64555eb 100644 --- a/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 @@ -209,10 +209,6 @@ appservice: # However, messages will not be guaranteed to be bridged in the same order they were sent in. # This value doesn't affect the registration file. async_transactions: false - # Whether to use MSC4190 instead of appservice login to create the bridge bot device. - # Requires the homeserver to support MSC4190 and the device masquerading parts of MSC3202. - # Only relevant when using end-to-bridge encryption, required when using encryption with next-gen auth (MSC3861). - msc4190: false # Authentication tokens for AS <-> HS communication. Autogenerated; do not modify. as_token: {{ matrix_mautrix_bluesky_appservice_token | to_json }} @@ -358,6 +354,11 @@ encryption: # Whether to use MSC2409/MSC3202 instead of /sync long polling for receiving encryption-related data. # This option is not yet compatible with standard Matrix servers like Synapse and should not be used. appservice: {{ matrix_mautrix_bluesky_bridge_encryption_appservice | to_json }} + # Whether to use MSC4190 instead of appservice login to create the bridge bot device. + # Requires the homeserver to support MSC4190 and the device masquerading parts of MSC3202. + # Only relevant when using end-to-bridge encryption, required when using encryption with next-gen auth (MSC3861). + # Changing this option requires updating the appservice registration file. + msc4190: {{ matrix_mautrix_bluesky_msc4190_enabled | to_json }} # Enable key sharing? If enabled, key requests for rooms where users are in will be fulfilled. # You must use a client that supports requesting keys from other users to use this feature. allow_key_sharing: {{ matrix_mautrix_bluesky_bridge_encryption_key_sharing_allow | to_json }} diff --git a/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml index 1809f6177..ea504beeb 100644 --- a/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml @@ -36,6 +36,8 @@ matrix_mautrix_gmessages_homeserver_address: "" matrix_mautrix_gmessages_homeserver_domain: "{{ matrix_domain }}" matrix_mautrix_gmessages_appservice_address: "http://matrix-mautrix-gmessages:8080" +matrix_mautrix_gmessages_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" + matrix_mautrix_gmessages_backfill_enabled: true matrix_mautrix_gmessages_backfill_max_initial_messages: 50 matrix_mautrix_gmessages_backfill_max_catchup_messages: 500 @@ -212,5 +214,6 @@ matrix_mautrix_gmessages_registration_yaml: | - exclusive: true regex: '^@{{ matrix_mautrix_gmessages_appservice_bot_username | regex_escape }}:{{ matrix_mautrix_gmessages_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true + io.element.msc4190: {{ matrix_mautrix_gmessages_msc4190_enabled | to_json }} matrix_mautrix_gmessages_registration: "{{ matrix_mautrix_gmessages_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-gmessages/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-gmessages/templates/config.yaml.j2 index 3fd39a78a..844d547e3 100644 --- a/roles/custom/matrix-bridge-mautrix-gmessages/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-gmessages/templates/config.yaml.j2 @@ -354,6 +354,11 @@ encryption: # Whether to use MSC2409/MSC3202 instead of /sync long polling for receiving encryption-related data. # This option is not yet compatible with standard Matrix servers like Synapse and should not be used. appservice: {{ matrix_mautrix_gmessages_bridge_encryption_appservice | to_json }} + # Whether to use MSC4190 instead of appservice login to create the bridge bot device. + # Requires the homeserver to support MSC4190 and the device masquerading parts of MSC3202. + # Only relevant when using end-to-bridge encryption, required when using encryption with next-gen auth (MSC3861). + # Changing this option requires updating the appservice registration file. + msc4190: {{ matrix_mautrix_gmessages_msc4190_enabled | to_json }} # Enable key sharing? If enabled, key requests for rooms where users are in will be fulfilled. # You must use a client that supports requesting keys from other users to use this feature. allow_key_sharing: {{ matrix_mautrix_gmessages_bridge_encryption_key_sharing_allow | to_json }} diff --git a/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml index 85f7034bb..e0058562e 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml @@ -123,6 +123,8 @@ matrix_mautrix_meta_instagram_appservice_address: "http://{{ matrix_mautrix_meta matrix_mautrix_meta_instagram_appservice_id: "{{ matrix_mautrix_meta_instagram_meta_mode }}" +matrix_mautrix_meta_instagram_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" + # For Facebook/Messenger, we use the same `@messengerbot:example.com` username regardless of how bridging happens for multiple reasons: # - it's consistent - regardless of how bridging happens, the bridged service is actually Messenger # - it's easy for users - you may change the mode, but the bot is always at `@messengerbot:example.com` @@ -297,5 +299,6 @@ matrix_mautrix_meta_instagram_registration_yaml: | sender_localpart: _bot_{{ matrix_mautrix_meta_instagram_appservice_username }} rate_limited: false de.sorunome.msc2409.push_ephemeral: true + io.element.msc4190: {{ matrix_mautrix_meta_instagram_msc4190_enabled | to_json }} matrix_mautrix_meta_instagram_registration: "{{ matrix_mautrix_meta_instagram_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2 index e905b1771..25fe00481 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2 @@ -367,6 +367,11 @@ encryption: # Whether to use MSC2409/MSC3202 instead of /sync long polling for receiving encryption-related data. # This option is not yet compatible with standard Matrix servers like Synapse and should not be used. appservice: {{ matrix_mautrix_meta_instagram_bridge_encryption_appservice | to_json }} + # Whether to use MSC4190 instead of appservice login to create the bridge bot device. + # Requires the homeserver to support MSC4190 and the device masquerading parts of MSC3202. + # Only relevant when using end-to-bridge encryption, required when using encryption with next-gen auth (MSC3861). + # Changing this option requires updating the appservice registration file. + msc4190: {{ matrix_mautrix_meta_instagram_msc4190_enabled | to_json }} # Enable key sharing? If enabled, key requests for rooms where users are in will be fulfilled. # You must use a client that supports requesting keys from other users to use this feature. allow_key_sharing: {{ matrix_mautrix_meta_instagram_bridge_encryption_allow_key_sharing | to_json }} diff --git a/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml index 7a34eb7f2..69e19e730 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml @@ -123,6 +123,8 @@ matrix_mautrix_meta_messenger_appservice_address: "http://{{ matrix_mautrix_meta matrix_mautrix_meta_messenger_appservice_id: "{{ matrix_mautrix_meta_messenger_meta_mode }}" +matrix_mautrix_meta_messenger_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" + # For Facebook/Messenger, we use the same `@messengerbot:example.com` username regardless of how bridging happens for multiple reasons: # - it's consistent - regardless of how bridging happens, the bridged service is actually Messenger # - it's easy for users - you may change the mode, but the bot is always at `@messengerbot:example.com` @@ -297,5 +299,6 @@ matrix_mautrix_meta_messenger_registration_yaml: | sender_localpart: _bot_{{ matrix_mautrix_meta_messenger_appservice_username }} rate_limited: false de.sorunome.msc2409.push_ephemeral: true + io.element.msc4190: {{ matrix_mautrix_meta_messenger_msc4190_enabled | to_json }} matrix_mautrix_meta_messenger_registration: "{{ matrix_mautrix_meta_messenger_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2 index b5f9404b3..e34844f12 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2 @@ -367,6 +367,11 @@ encryption: # Whether to use MSC2409/MSC3202 instead of /sync long polling for receiving encryption-related data. # This option is not yet compatible with standard Matrix servers like Synapse and should not be used. appservice: {{ matrix_mautrix_meta_messenger_bridge_encryption_appservice | to_json }} + # Whether to use MSC4190 instead of appservice login to create the bridge bot device. + # Requires the homeserver to support MSC4190 and the device masquerading parts of MSC3202. + # Only relevant when using end-to-bridge encryption, required when using encryption with next-gen auth (MSC3861). + # Changing this option requires updating the appservice registration file. + msc4190: {{ matrix_mautrix_meta_messenger_msc4190_enabled | to_json }} # Enable key sharing? If enabled, key requests for rooms where users are in will be fulfilled. # You must use a client that supports requesting keys from other users to use this feature. allow_key_sharing: {{ matrix_mautrix_meta_messenger_bridge_encryption_allow_key_sharing | to_json }} diff --git a/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml index f3f9ce553..e47609ced 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml @@ -44,6 +44,8 @@ matrix_mautrix_signal_homeserver_address: "" matrix_mautrix_signal_homeserver_domain: "{{ matrix_domain }}" matrix_mautrix_signal_appservice_address: "http://matrix-mautrix-signal:8080" +matrix_mautrix_signal_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" + matrix_mautrix_signal_command_prefix: "!signal" matrix_mautrix_signal_bridge_permissions: | @@ -210,6 +212,7 @@ matrix_mautrix_signal_registration_yaml: | - exclusive: true regex: '^@{{ matrix_mautrix_signal_appservice_bot_username | regex_escape }}:{{ matrix_mautrix_signal_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true + io.element.msc4190: {{ matrix_mautrix_signal_msc4190_enabled | to_json }} matrix_mautrix_signal_registration: "{{ matrix_mautrix_signal_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2 index e4af6d962..d890d66f2 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2 @@ -334,6 +334,11 @@ encryption: # Whether to use MSC2409/MSC3202 instead of /sync long polling for receiving encryption-related data. # This option is not yet compatible with standard Matrix servers like Synapse and should not be used. appservice: false + # Whether to use MSC4190 instead of appservice login to create the bridge bot device. + # Requires the homeserver to support MSC4190 and the device masquerading parts of MSC3202. + # Only relevant when using end-to-bridge encryption, required when using encryption with next-gen auth (MSC3861). + # Changing this option requires updating the appservice registration file. + msc4190: {{ matrix_mautrix_signal_msc4190_enabled | to_json }} # Enable key sharing? If enabled, key requests for rooms where users are in will be fulfilled. # You must use a client that supports requesting keys from other users to use this feature. allow_key_sharing: {{ matrix_mautrix_signal_bridge_encryption_key_sharing_allow | to_json }} diff --git a/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml index 0b98dbdf7..cb86e03bd 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml @@ -34,6 +34,8 @@ matrix_mautrix_slack_homeserver_address: "" matrix_mautrix_slack_homeserver_domain: "{{ matrix_domain }}" matrix_mautrix_slack_appservice_address: "http://matrix-mautrix-slack:8080" +matrix_mautrix_slack_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" + matrix_mautrix_slack_command_prefix: "!slack" matrix_mautrix_slack_bridge_permissions: | @@ -151,6 +153,7 @@ matrix_mautrix_slack_registration_yaml: | - exclusive: true regex: '^@{{ matrix_mautrix_slack_appservice_bot_username | regex_escape }}:{{ matrix_mautrix_slack_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true + io.element.msc4190: {{ matrix_mautrix_slack_msc4190_enabled | to_json }} matrix_mautrix_slack_registration: "{{ matrix_mautrix_slack_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 index 5c02dd946..5b231afa8 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 @@ -371,6 +371,11 @@ encryption: # Whether to use MSC2409/MSC3202 instead of /sync long polling for receiving encryption-related data. # This option is not yet compatible with standard Matrix servers like Synapse and should not be used. appservice: false + # Whether to use MSC4190 instead of appservice login to create the bridge bot device. + # Requires the homeserver to support MSC4190 and the device masquerading parts of MSC3202. + # Only relevant when using end-to-bridge encryption, required when using encryption with next-gen auth (MSC3861). + # Changing this option requires updating the appservice registration file. + msc4190: {{ matrix_mautrix_slack_msc4190_enabled | to_json }} # Enable key sharing? If enabled, key requests for rooms where users are in will be fulfilled. # You must use a client that supports requesting keys from other users to use this feature. allow_key_sharing: {{ matrix_mautrix_slack_bridge_encryption_key_sharing_allow | to_json }} diff --git a/roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml index f941b7c59..28a270d96 100644 --- a/roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml @@ -84,6 +84,8 @@ matrix_mautrix_telegram_appservice_public_external: '{{ matrix_mautrix_telegram_ matrix_mautrix_telegram_appservice_bot_username: telegrambot +matrix_mautrix_telegram_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" + # Specifies the default log level for all bridge loggers. matrix_mautrix_telegram_logging_level: WARNING @@ -239,6 +241,7 @@ matrix_mautrix_telegram_registration_yaml: | url: {{ matrix_mautrix_telegram_appservice_address }} rate_limited: false de.sorunome.msc2409.push_ephemeral: true + io.element.msc4190: {{ matrix_mautrix_telegram_msc4190_enabled | to_json }} matrix_mautrix_telegram_registration: "{{ matrix_mautrix_telegram_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-telegram/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-telegram/templates/config.yaml.j2 index 6cbd30130..5ebd4b904 100644 --- a/roles/custom/matrix-bridge-mautrix-telegram/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-telegram/templates/config.yaml.j2 @@ -269,6 +269,11 @@ bridge: default: {{ matrix_mautrix_telegram_bridge_encryption_default|to_json }} # Whether to use MSC2409/MSC3202 instead of /sync long polling for receiving encryption-related data. appservice: false + # Whether to use MSC4190 instead of appservice login to create the bridge bot device. + # Requires the homeserver to support MSC4190 and the device masquerading parts of MSC3202. + # Only relevant when using end-to-bridge encryption, required when using encryption with next-gen auth (MSC3861). + # Changing this option requires updating the appservice registration file. + msc4190: {{ matrix_mautrix_telegram_msc4190_enabled | to_json }} # Require encryption, drop any unencrypted messages. require: false # Enable key sharing? If enabled, key requests for rooms where users are in will be fulfilled. diff --git a/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml index d88089881..c8a2edf88 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml @@ -39,6 +39,8 @@ matrix_mautrix_twitter_homeserver_address: "" matrix_mautrix_twitter_homeserver_domain: '{{ matrix_domain }}' matrix_mautrix_twitter_appservice_address: 'http://matrix-mautrix-twitter:29327' +matrix_mautrix_twitter_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" + # A public address that external services can use to reach this appservice. matrix_mautrix_twitter_appservice_public_address: '' @@ -196,6 +198,7 @@ matrix_mautrix_twitter_registration_yaml: | rate_limited: false de.sorunome.msc2409.push_ephemeral: true receive_ephemeral: true + io.element.msc4190: {{ matrix_mautrix_twitter_msc4190_enabled | to_json }} matrix_mautrix_twitter_registration: "{{ matrix_mautrix_twitter_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 index 1a0b474f4..c0d1db4ec 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 @@ -212,7 +212,8 @@ appservice: # Whether to use MSC4190 instead of appservice login to create the bridge bot device. # Requires the homeserver to support MSC4190 and the device masquerading parts of MSC3202. # Only relevant when using end-to-bridge encryption, required when using encryption with next-gen auth (MSC3861). - msc4190: false + # Changing this option requires updating the appservice registration file. + msc4190: {{ matrix_mautrix_twitter_msc4190_enabled | to_json }} # Authentication tokens for AS <-> HS communication. Autogenerated; do not modify. as_token: {{ matrix_mautrix_twitter_appservice_token | to_json }} diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml index 428b3ee1c..a77bcf750 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml @@ -46,6 +46,8 @@ matrix_mautrix_whatsapp_homeserver_address: "" matrix_mautrix_whatsapp_homeserver_domain: "{{ matrix_domain }}" matrix_mautrix_whatsapp_appservice_address: "http://matrix-mautrix-whatsapp:8080" +matrix_mautrix_whatsapp_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" + matrix_mautrix_whatsapp_extev_polls: false matrix_mautrix_whatsapp_command_prefix: "!wa" @@ -229,5 +231,6 @@ matrix_mautrix_whatsapp_registration_yaml: | - exclusive: true regex: '^@{{ matrix_mautrix_whatsapp_appservice_bot_username | regex_escape }}:{{ matrix_mautrix_whatsapp_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true + io.element.msc4190: {{ matrix_mautrix_whatsapp_msc4190_enabled | to_json }} matrix_mautrix_whatsapp_registration: "{{ matrix_mautrix_whatsapp_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 index 832234832..612e358f3 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 @@ -445,6 +445,11 @@ encryption: # Whether to use MSC2409/MSC3202 instead of /sync long polling for receiving encryption-related data. # This option is not yet compatible with standard Matrix servers like Synapse and should not be used. appservice: false + # Whether to use MSC4190 instead of appservice login to create the bridge bot device. + # Requires the homeserver to support MSC4190 and the device masquerading parts of MSC3202. + # Only relevant when using end-to-bridge encryption, required when using encryption with next-gen auth (MSC3861). + # Changing this option requires updating the appservice registration file. + msc4190: {{ matrix_mautrix_whatsapp_msc4190_enabled | to_json }} # Enable key sharing? If enabled, key requests for rooms where users are in will be fulfilled. # You must use a client that supports requesting keys from other users to use this feature. allow_key_sharing: {{ matrix_mautrix_whatsapp_bridge_encryption_key_sharing_allow | to_json }} From 85d82eb1e42a0817bc7924354922880abc656dc6 Mon Sep 17 00:00:00 2001 From: Catalan Lover <48515417+FSG-Cat@users.noreply.github.com> Date: Thu, 17 Apr 2025 21:47:16 +0200 Subject: [PATCH 013/404] Rework Draupnir report interception to accommodate other Web API uses. (#4221) --- group_vars/matrix_servers | 4 +-- .../matrix-bot-draupnir/defaults/main.yml | 14 ++++---- .../tasks/validate_config.yml | 7 ++++ .../matrix-bot-draupnir/templates/labels.j2 | 35 ++++++++++--------- 4 files changed, 35 insertions(+), 25 deletions(-) diff --git a/group_vars/matrix_servers b/group_vars/matrix_servers index 5dd0d9f5a..9ed1ced91 100755 --- a/group_vars/matrix_servers +++ b/group_vars/matrix_servers @@ -3199,8 +3199,8 @@ matrix_bot_draupnir_config_rawHomeserverUrl: "{{ matrix_addons_homeserver_client matrix_bot_draupnir_container_labels_traefik_enabled: "{{ matrix_bot_draupnir_config_web_enabled and matrix_playbook_reverse_proxy_type in ['playbook-managed-traefik', 'other-traefik-container'] }}" matrix_bot_draupnir_container_labels_traefik_docker_network: "{{ matrix_playbook_reverse_proxyable_services_additional_network }}" -matrix_bot_draupnir_container_labels_traefik_entrypoints: "{{ traefik_entrypoint_primary }}" -matrix_bot_draupnir_container_labels_traefik_tls_certResolver: "{{ traefik_certResolver_primary }}" +matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_entrypoints: "{{ traefik_entrypoint_primary }}" +matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_tls_certResolver: "{{ traefik_certResolver_primary }}" ###################################################################### # diff --git a/roles/custom/matrix-bot-draupnir/defaults/main.yml b/roles/custom/matrix-bot-draupnir/defaults/main.yml index 0b2eb28d0..d84e7457e 100644 --- a/roles/custom/matrix-bot-draupnir/defaults/main.yml +++ b/roles/custom/matrix-bot-draupnir/defaults/main.yml @@ -157,13 +157,13 @@ matrix_bot_draupnir_configuration: "{{ matrix_bot_draupnir_configuration_yaml | # See `matrix_synapse_container_labels_traefik_enabled` or `matrix_synapse_container_labels_matrix_related_labels_enabled` matrix_bot_draupnir_container_labels_traefik_enabled: false matrix_bot_draupnir_container_labels_traefik_docker_network: "{{ matrix_draupnir_bot_container_network }}" -matrix_bot_draupnir_container_labels_traefik_hostname: "{{ matrix_synapse_container_labels_traefik_hostname }}" -matrix_bot_draupnir_container_labels_traefik_path_regexp: "^/_matrix/client/(r0|v3)/rooms/([^/]*)/report/" -matrix_bot_draupnir_container_labels_traefik_rule: "Host(`{{ matrix_bot_draupnir_container_labels_traefik_hostname }}`) && PathRegexp(`{{ matrix_bot_draupnir_container_labels_traefik_path_regexp }}`)" -matrix_bot_draupnir_container_labels_traefik_priority: 0 -matrix_bot_draupnir_container_labels_traefik_entrypoints: "{{ matrix_synapse_container_labels_traefik_entrypoints }}" -matrix_bot_draupnir_container_labels_traefik_tls: "{{ matrix_bot_draupnir_container_labels_traefik_entrypoints != 'web' }}" -matrix_bot_draupnir_container_labels_traefik_tls_certResolver: "{{ matrix_synapse_container_labels_traefik_tls_certResolver }}" # noqa var-naming +matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_hostname: "{{ matrix_synapse_container_labels_traefik_hostname }}" # noqa var-naming +matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_path_regexp: "^/_matrix/client/(r0|v3)/rooms/([^/]*)/report/(.*)$" # noqa var-naming +matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_rule: "Host(`{{ matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_hostname }}`) && PathRegexp(`{{ matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_path_regexp }}`)" # noqa var-naming +matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_priority: 0 # noqa var-naming +matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_entrypoints: "{{ matrix_synapse_container_labels_traefik_entrypoints }}" # noqa var-naming +matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_tls: "{{ matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_entrypoints != 'web' }}" # noqa var-naming +matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_tls_certResolver: "{{ matrix_synapse_container_labels_traefik_tls_certResolver }}" # noqa var-naming # matrix_bot_draupnir_container_labels_traefik_labels_additional_labels contains a multiline string with additional labels to add to the container label file. # See `../templates/labels.j2` for details. # diff --git a/roles/custom/matrix-bot-draupnir/tasks/validate_config.yml b/roles/custom/matrix-bot-draupnir/tasks/validate_config.yml index a876c9e4f..9f903f5ee 100644 --- a/roles/custom/matrix-bot-draupnir/tasks/validate_config.yml +++ b/roles/custom/matrix-bot-draupnir/tasks/validate_config.yml @@ -24,6 +24,13 @@ - {'old': 'matrix_bot_draupnir_web_enabled', 'new': 'matrix_bot_draupnir_config_web_enabled'} - {'old': 'matrix_bot_draupnir_abuse_reporting_enabled', 'new': 'matrix_bot_draupnir_config_web_abuseReporting'} - {'old': 'matrix_bot_draupnir_display_reports', 'new': 'matrix_bot_draupnir_config_displayReports'} + - {'old': 'matrix_bot_draupnir_container_labels_traefik_hostname', 'new': 'matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_hostname'} + - {'old': 'matrix_bot_draupnir_container_labels_traefik_path_regexp', 'new': 'matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_path_regexp'} + - {'old': 'matrix_bot_draupnir_container_labels_traefik_rule', 'new': 'matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_rule'} + - {'old': 'matrix_bot_draupnir_container_labels_traefik_priority', 'new': 'matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_priority'} + - {'old': 'matrix_bot_draupnir_container_labels_traefik_entrypoints', 'new': 'matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_entrypoints'} + - {'old': 'matrix_bot_draupnir_container_labels_traefik_tls', 'new': 'matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_tls'} + - {'old': 'matrix_bot_draupnir_container_labels_traefik_tls_certResolver', 'new': 'matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_tls_certResolver'} - name: Fail if required matrix-bot-draupnir variables are undefined ansible.builtin.fail: diff --git a/roles/custom/matrix-bot-draupnir/templates/labels.j2 b/roles/custom/matrix-bot-draupnir/templates/labels.j2 index aeab96277..67ec0e29b 100644 --- a/roles/custom/matrix-bot-draupnir/templates/labels.j2 +++ b/roles/custom/matrix-bot-draupnir/templates/labels.j2 @@ -1,5 +1,6 @@ {# SPDX-FileCopyrightText: 2024 MDAD project contributors +SPDX-FileCopyrightText: 2025 Catalan Lover SPDX-License-Identifier: AGPL-3.0-or-later #} @@ -13,6 +14,7 @@ traefik.docker.network={{ matrix_bot_draupnir_container_labels_traefik_docker_ne traefik.http.services.matrix-bot-draupnir.loadbalancer.server.port=8080 +{% if matrix_bot_draupnir_config_web_abuseReporting %} ############################################################ # # # Abuse Reports (/_matrix/client/../rooms/../report) # @@ -21,32 +23,32 @@ traefik.http.services.matrix-bot-draupnir.loadbalancer.server.port=8080 {% set middlewares = [] %} -traefik.http.middlewares.matrix-bot-draupnir-redirect.replacepathregex.regex=^/_matrix/client/(r0|v3)/rooms/([^/]*)/report/(.*)$ -traefik.http.middlewares.matrix-bot-draupnir-redirect.replacepathregex.replacement=/api/1/report/$2/$3 +traefik.http.middlewares.matrix-bot-draupnir-web-abuseReporting-redirect.replacepathregex.regex={{ matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_path_regexp }} +traefik.http.middlewares.matrix-bot-draupnir-web-abuseReporting-redirect.replacepathregex.replacement=/api/1/report/$2/$3 -{% set middlewares = middlewares + ['matrix-bot-draupnir-redirect'] %} +{% set middlewares = middlewares + ['matrix-bot-draupnir-web-abuseReporting-redirect'] %} -traefik.http.middlewares.matrix-bot-draupnir-cors.headers.accesscontrolalloworiginlist=* -traefik.http.middlewares.matrix-bot-draupnir-cors.headers.accesscontrolallowheaders=Content-Type,Authorization -traefik.http.middlewares.matrix-bot-draupnir-cors.headers.accesscontrolallowmethods=POST,OPTIONS +traefik.http.middlewares.matrix-bot-draupnir-web-abuseReporting-cors.headers.accesscontrolalloworiginlist=* +traefik.http.middlewares.matrix-bot-draupnir-web-abuseReporting-cors.headers.accesscontrolallowheaders=Content-Type,Authorization +traefik.http.middlewares.matrix-bot-draupnir-web-abuseReporting-cors.headers.accesscontrolallowmethods=POST,OPTIONS -{% set middlewares = middlewares + ['matrix-bot-draupnir-cors'] %} +{% set middlewares = middlewares + ['matrix-bot-draupnir-web-abuseReporting-cors'] %} -traefik.http.routers.matrix-bot-draupnir.rule={{ matrix_bot_draupnir_container_labels_traefik_rule }} +traefik.http.routers.matrix-bot-draupnir-web-abuseReporting.rule={{ matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_rule }} -{% if matrix_bot_draupnir_container_labels_traefik_priority | int > 0 %} -traefik.http.routers.matrix-bot-draupnir.priority={{ matrix_bot_draupnir_container_labels_traefik_priority }} +{% if matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_priority | int > 0 %} +traefik.http.routers.matrix-bot-draupnir-web-abuseReporting.priority={{ matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_priority }} {% endif %} {% if middlewares | length > 0 %} -traefik.http.routers.matrix-bot-draupnir.middlewares={{ middlewares | join(',') }} +traefik.http.routers.matrix-bot-draupnir-web-abuseReporting.middlewares={{ middlewares | join(',') }} {% endif %} -traefik.http.routers.matrix-bot-draupnir.service=matrix-bot-draupnir -traefik.http.routers.matrix-bot-draupnir.entrypoints={{ matrix_bot_draupnir_container_labels_traefik_entrypoints }} -traefik.http.routers.matrix-bot-draupnir.tls={{ matrix_bot_draupnir_container_labels_traefik_tls | to_json }} +traefik.http.routers.matrix-bot-draupnir-web-abuseReporting.service=matrix-bot-draupnir +traefik.http.routers.matrix-bot-draupnir-web-abuseReporting.entrypoints={{ matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_entrypoints }} +traefik.http.routers.matrix-bot-draupnir-web-abuseReporting.tls={{ matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_tls | to_json }} -{% if matrix_bot_draupnir_container_labels_traefik_tls %} -traefik.http.routers.matrix-bot-draupnir.tls.certResolver={{ matrix_bot_draupnir_container_labels_traefik_tls_certResolver }} +{% if matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_tls %} +traefik.http.routers.matrix-bot-draupnir-web-abuseReporting.tls.certResolver={{ matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_tls_certResolver }} {% endif %} ############################################################ @@ -55,5 +57,6 @@ traefik.http.routers.matrix-bot-draupnir.tls.certResolver={{ matrix_bot_draupnir # # ############################################################ {% endif %} +{% endif %} {{ matrix_bot_draupnir_container_labels_traefik_labels_additional_labels }} From f32633826abd5f590dfaf4e5d5f98479c2f8d972 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 19 Apr 2025 13:39:59 +0000 Subject: [PATCH 014/404] Update dependency packaging to v25 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 24be89607..8c284c93c 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -13,7 +13,7 @@ MarkupSafe==3.0.2 mdit-py-plugins==0.4.2 mdurl==0.1.2 myst-parser==4.0.1 -packaging==24.2 +packaging==25.0 Pygments==2.19.1 PyYAML==6.0.2 requests==2.32.3 From 3f19344e9da4ec0143b8d800ca56d8161a0938d1 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 19 Apr 2025 19:06:48 +0000 Subject: [PATCH 015/404] Update dependency setuptools to v78.1.1 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 8c284c93c..5d2bbc235 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -17,7 +17,7 @@ packaging==25.0 Pygments==2.19.1 PyYAML==6.0.2 requests==2.32.3 -setuptools==78.1.0 +setuptools==78.1.1 snowballstemmer==2.2.0 Sphinx==8.2.3 sphinx-intl==2.3.1 From 5c120397ab8709a1e6fc7020e036ec9c80288185 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sun, 20 Apr 2025 17:39:04 +0000 Subject: [PATCH 016/404] Update dependency setuptools to v79 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 5d2bbc235..38f9402ea 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -17,7 +17,7 @@ packaging==25.0 Pygments==2.19.1 PyYAML==6.0.2 requests==2.32.3 -setuptools==78.1.1 +setuptools==79.0.0 snowballstemmer==2.2.0 Sphinx==8.2.3 sphinx-intl==2.3.1 From efb3072bc8d3f193620f36db2687e5506343c0ff Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 22 Apr 2025 19:02:22 +0000 Subject: [PATCH 017/404] Update ghcr.io/element-hq/element-web Docker tag to v1.11.98 --- roles/custom/matrix-client-element/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-element/defaults/main.yml b/roles/custom/matrix-client-element/defaults/main.yml index fa32f286d..5a9dbd30f 100644 --- a/roles/custom/matrix-client-element/defaults/main.yml +++ b/roles/custom/matrix-client-element/defaults/main.yml @@ -29,7 +29,7 @@ matrix_client_element_container_image_self_build_repo: "https://github.com/eleme matrix_client_element_container_image_self_build_low_memory_system_patch_enabled: "{{ ansible_memtotal_mb < 4096 }}" # renovate: datasource=docker depName=ghcr.io/element-hq/element-web -matrix_client_element_version: v1.11.97 +matrix_client_element_version: v1.11.98 matrix_client_element_docker_image: "{{ matrix_client_element_docker_image_registry_prefix }}element-hq/element-web:{{ matrix_client_element_version }}" matrix_client_element_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_element_container_image_self_build else matrix_client_element_docker_image_registry_prefix_upstream }}" From 80ac45e0693394a737c7b37a326483fc9c8d497a Mon Sep 17 00:00:00 2001 From: Aine Date: Wed, 23 Apr 2025 08:41:31 +0300 Subject: [PATCH 018/404] updated backup_borg (v1.4.0-1.9.13-1 -> v1.4.1-1.9.14-0); updated grafana (v11.6.0-0 -> v11.6.0-security-01-0); --- requirements.yml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/requirements.yml b/requirements.yml index 3afe3c692..c731d6cdf 100644 --- a/requirements.yml +++ b/requirements.yml @@ -4,7 +4,7 @@ version: v1.0.0-5 name: auxiliary - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-backup_borg.git - version: v1.4.0-1.9.13-1 + version: v1.4.1-1.9.14-0 name: backup_borg - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-container-socket-proxy.git version: v0.3.0-4 @@ -22,7 +22,7 @@ version: v4.98.1-r0-2-0 name: exim_relay - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-grafana.git - version: v11.6.0-0 + version: v11.6.0-security-01-0 name: grafana - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-jitsi.git version: v10184-0 From 69d6111354a2afede26b016fe97bc8238d0eed60 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Wed, 23 Apr 2025 10:08:45 +0300 Subject: [PATCH 019/404] Update default OpenAI model for text-generation for baibot (`gpt-4o` -> `gpt-4.1`) Ref: https://openai.com/index/gpt-4-1/ --- roles/custom/matrix-bot-baibot/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bot-baibot/defaults/main.yml b/roles/custom/matrix-bot-baibot/defaults/main.yml index cbb94b5bb..fdcd7534d 100644 --- a/roles/custom/matrix-bot-baibot/defaults/main.yml +++ b/roles/custom/matrix-bot-baibot/defaults/main.yml @@ -368,7 +368,7 @@ matrix_bot_baibot_config_agents_static_definitions_openai_config_api_key: "" matrix_bot_baibot_config_agents_static_definitions_openai_config_text_generation_enabled: true # For valid model choices, see: https://platform.openai.com/docs/models -matrix_bot_baibot_config_agents_static_definitions_openai_config_text_generation_model_id: gpt-4o +matrix_bot_baibot_config_agents_static_definitions_openai_config_text_generation_model_id: gpt-4.1 # The prompt text to use (can be null or empty to not use a prompt). # See: https://huggingface.co/docs/transformers/en/tasks/prompting matrix_bot_baibot_config_agents_static_definitions_openai_config_text_generation_prompt: "{{ matrix_bot_baibot_config_agents_static_definitions_prompt }}" From 38c9f47bb0ae0338554394bc207ea539b83c28e8 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 23 Apr 2025 10:53:56 +0000 Subject: [PATCH 020/404] Update ghcr.io/element-hq/element-web Docker tag to v1.11.99 --- roles/custom/matrix-client-element/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-element/defaults/main.yml b/roles/custom/matrix-client-element/defaults/main.yml index 5a9dbd30f..2267bf137 100644 --- a/roles/custom/matrix-client-element/defaults/main.yml +++ b/roles/custom/matrix-client-element/defaults/main.yml @@ -29,7 +29,7 @@ matrix_client_element_container_image_self_build_repo: "https://github.com/eleme matrix_client_element_container_image_self_build_low_memory_system_patch_enabled: "{{ ansible_memtotal_mb < 4096 }}" # renovate: datasource=docker depName=ghcr.io/element-hq/element-web -matrix_client_element_version: v1.11.98 +matrix_client_element_version: v1.11.99 matrix_client_element_docker_image: "{{ matrix_client_element_docker_image_registry_prefix }}element-hq/element-web:{{ matrix_client_element_version }}" matrix_client_element_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_element_container_image_self_build else matrix_client_element_docker_image_registry_prefix_upstream }}" From 909bf8729e30aa1483f3271d81d24c4c7ffd5b6a Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 23 Apr 2025 10:53:50 +0000 Subject: [PATCH 021/404] Update docker.io/metio/matrix-alertmanager-receiver Docker tag to v2025.4.23 --- roles/custom/matrix-alertmanager-receiver/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-alertmanager-receiver/defaults/main.yml b/roles/custom/matrix-alertmanager-receiver/defaults/main.yml index eed24970f..afdc24928 100644 --- a/roles/custom/matrix-alertmanager-receiver/defaults/main.yml +++ b/roles/custom/matrix-alertmanager-receiver/defaults/main.yml @@ -11,7 +11,7 @@ matrix_alertmanager_receiver_enabled: true # renovate: datasource=docker depName=docker.io/metio/matrix-alertmanager-receiver -matrix_alertmanager_receiver_version: 2025.4.16 +matrix_alertmanager_receiver_version: 2025.4.23 matrix_alertmanager_receiver_scheme: https From b719c3c11a66f85adbb6fe07e2d151780ad81a45 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 23 Apr 2025 15:48:32 +0000 Subject: [PATCH 022/404] Update ghcr.io/element-hq/matrix-authentication-service Docker tag to v0.15.0 --- roles/custom/matrix-authentication-service/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-authentication-service/defaults/main.yml b/roles/custom/matrix-authentication-service/defaults/main.yml index 41320b155..6a4f9af1f 100644 --- a/roles/custom/matrix-authentication-service/defaults/main.yml +++ b/roles/custom/matrix-authentication-service/defaults/main.yml @@ -22,7 +22,7 @@ matrix_authentication_service_container_repo_version: "{{ 'main' if matrix_authe matrix_authentication_service_container_src_files_path: "{{ matrix_base_data_path }}/matrix-authentication-service/container-src" # renovate: datasource=docker depName=ghcr.io/element-hq/matrix-authentication-service -matrix_authentication_service_version: 0.14.1 +matrix_authentication_service_version: 0.15.0 matrix_authentication_service_container_image_registry_prefix: "{{ 'localhost/' if matrix_authentication_service_container_image_self_build else matrix_authentication_service_container_image_registry_prefix_upstream }}" matrix_authentication_service_container_image_registry_prefix_upstream: "{{ matrix_authentication_service_container_image_registry_prefix_upstream_default }}" matrix_authentication_service_container_image_registry_prefix_upstream_default: "ghcr.io/" From 57ea2400603cd211ec8bb3c85a6ebbc6bb5474db Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 23 Apr 2025 15:48:39 +0000 Subject: [PATCH 023/404] Update ghcr.io/element-hq/matrix-authentication-service/syn2mas Docker tag to v0.15.0 --- roles/custom/matrix-authentication-service/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-authentication-service/defaults/main.yml b/roles/custom/matrix-authentication-service/defaults/main.yml index 6a4f9af1f..ba9ccd662 100644 --- a/roles/custom/matrix-authentication-service/defaults/main.yml +++ b/roles/custom/matrix-authentication-service/defaults/main.yml @@ -562,7 +562,7 @@ matrix_authentication_service_syn2mas_start_wait_time_seconds: 5 matrix_authentication_service_syn2mas_dry_run: false # renovate: datasource=docker depName=ghcr.io/element-hq/matrix-authentication-service/syn2mas -matrix_authentication_service_syn2mas_version: 0.14.1 +matrix_authentication_service_syn2mas_version: 0.15.0 matrix_authentication_service_syn2mas_container_image: "{{ matrix_authentication_service_syn2mas_container_image_registry_prefix }}element-hq/matrix-authentication-service/syn2mas:{{ matrix_authentication_service_syn2mas_version }}" matrix_authentication_service_syn2mas_container_image_registry_prefix: "{{ 'localhost/' if matrix_authentication_service_container_image_self_build else matrix_authentication_service_syn2mas_container_image_registry_prefix_upstream }}" matrix_authentication_service_syn2mas_container_image_registry_prefix_upstream: "{{ matrix_authentication_service_syn2mas_container_image_registry_prefix_upstream_default }}" From 202be672a4d2ca3b3ee97e65559c44f445bc1a21 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 24 Apr 2025 02:06:12 +0000 Subject: [PATCH 024/404] Update dependency setuptools to v79.0.1 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 38f9402ea..22ba53164 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -17,7 +17,7 @@ packaging==25.0 Pygments==2.19.1 PyYAML==6.0.2 requests==2.32.3 -setuptools==79.0.0 +setuptools==79.0.1 snowballstemmer==2.2.0 Sphinx==8.2.3 sphinx-intl==2.3.1 From 2b50a0e6a0a64ea193c90e0ba0b8d4cd9c0ffa86 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 23 Apr 2025 22:10:31 +0000 Subject: [PATCH 025/404] Update nginx Docker tag to v1.28.0 --- .../matrix-synapse-reverse-proxy-companion/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse-reverse-proxy-companion/defaults/main.yml b/roles/custom/matrix-synapse-reverse-proxy-companion/defaults/main.yml index fb9e554a7..47dbdce7c 100644 --- a/roles/custom/matrix-synapse-reverse-proxy-companion/defaults/main.yml +++ b/roles/custom/matrix-synapse-reverse-proxy-companion/defaults/main.yml @@ -24,7 +24,7 @@ matrix_synapse_reverse_proxy_companion_enabled: true # renovate: datasource=docker depName=nginx -matrix_synapse_reverse_proxy_companion_version: 1.27.5-alpine +matrix_synapse_reverse_proxy_companion_version: 1.28.0-alpine matrix_synapse_reverse_proxy_companion_base_path: "{{ matrix_synapse_base_path }}/reverse-proxy-companion" matrix_synapse_reverse_proxy_companion_confd_path: "{{ matrix_synapse_reverse_proxy_companion_base_path }}/conf.d" From 74b8f78a7f7a0e59a1a01d1242597b00524db79d Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Thu, 24 Apr 2025 18:11:17 +0300 Subject: [PATCH 026/404] Upgrade Traefik (v3.3.5-0 -> v3.3.6-0) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index c731d6cdf..fa580dca8 100644 --- a/requirements.yml +++ b/requirements.yml @@ -67,7 +67,7 @@ version: v1.0.0-0 name: timesync - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik.git - version: v3.3.5-0 + version: v3.3.6-0 name: traefik - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik-certs-dumper.git version: v2.10.0-0 From 8a4eb88f0dbe86c57d642cd2f709d2ccb836defa Mon Sep 17 00:00:00 2001 From: HarHarLinks <2803622+HarHarLinks@users.noreply.github.com> Date: Fri, 25 Apr 2025 15:49:07 +0200 Subject: [PATCH 027/404] fix yaml templating failing when bridge user displaynames contain emoji Signed-off-by: HarHarLinks <2803622+HarHarLinks@users.noreply.github.com> --- .../matrix-bridge-beeper-linkedin/templates/config.yaml.j2 | 2 +- roles/custom/matrix-bridge-hookshot/templates/config.yaml.j2 | 2 +- .../matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 | 2 +- .../matrix-bridge-mautrix-discord/templates/config.yaml.j2 | 2 +- .../templates/config.yaml.j2 | 2 +- .../templates/config.yaml.j2 | 2 +- .../matrix-bridge-mautrix-twitter/templates/config.yaml.j2 | 2 +- 7 files changed, 7 insertions(+), 7 deletions(-) diff --git a/roles/custom/matrix-bridge-beeper-linkedin/templates/config.yaml.j2 b/roles/custom/matrix-bridge-beeper-linkedin/templates/config.yaml.j2 index d73988cdf..ea7caa765 100644 --- a/roles/custom/matrix-bridge-beeper-linkedin/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-beeper-linkedin/templates/config.yaml.j2 @@ -67,7 +67,7 @@ appservice: bot_username: {{ matrix_beeper_linkedin_appservice_bot_username | to_json }} # Display name and avatar for bot. Set to "remove" to remove display name/avatar, leave empty # to leave display name/avatar as-is. - bot_displayname: {{ matrix_beeper_linkedin_appservice_bot_displayname | to_json }} + bot_displayname: {{ matrix_beeper_linkedin_appservice_bot_displayname | to_json(ensure_ascii=False) }} bot_avatar: {{ matrix_beeper_linkedin_appservice_bot_avatar | to_json }} # Whether or not to receive ephemeral events via appservice transactions. diff --git a/roles/custom/matrix-bridge-hookshot/templates/config.yaml.j2 b/roles/custom/matrix-bridge-hookshot/templates/config.yaml.j2 index c476f6b4b..0f99ea747 100644 --- a/roles/custom/matrix-bridge-hookshot/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-hookshot/templates/config.yaml.j2 @@ -103,7 +103,7 @@ passFile: bot: # (Optional) Define profile information for the bot user # - displayname: {{ matrix_hookshot_bot_displayname | to_json }} + displayname: {{ matrix_hookshot_bot_displayname | to_json(ensure_ascii=False) }} avatar: {{ matrix_hookshot_bot_avatar | to_json }} metrics: # (Optional) Prometheus metrics support diff --git a/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 index ca64555eb..a631b4872 100644 --- a/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 @@ -199,7 +199,7 @@ appservice: username: {{ matrix_mautrix_bluesky_appservice_bot_username | to_json }} # Display name and avatar for bot. Set to "remove" to remove display name/avatar, leave empty # to leave display name/avatar as-is. - displayname: {{ matrix_mautrix_bluesky_appservice_bot_displayname | to_json }} + displayname: {{ matrix_mautrix_bluesky_appservice_bot_displayname | to_json(ensure_ascii=False) }} avatar: {{ matrix_mautrix_bluesky_appservice_bot_avatar | to_json }} # Whether to receive ephemeral events via appservice transactions. diff --git a/roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2 index c859c1149..21f018cf3 100644 --- a/roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2 @@ -61,7 +61,7 @@ appservice: username: {{ matrix_mautrix_discord_appservice_bot_username | to_json }} # Display name and avatar for bot. Set to "remove" to remove display name/avatar, leave empty # to leave display name/avatar as-is. - displayname: {{ matrix_mautrix_discord_appservice_bot_displayname | to_json }} + displayname: {{ matrix_mautrix_discord_appservice_bot_displayname | to_json(ensure_ascii=False) }} avatar: {{ matrix_mautrix_discord_appservice_bot_avatar | to_json }} # Whether or not to receive ephemeral events via appservice transactions. diff --git a/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2 index 25fe00481..315799dd6 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2 @@ -212,7 +212,7 @@ appservice: username: {{ matrix_mautrix_meta_instagram_appservice_username | to_json }} # Display name and avatar for bot. Set to "remove" to remove display name/avatar, leave empty # to leave display name/avatar as-is. - displayname: {{ matrix_mautrix_meta_instagram_appservice_displayname | to_json }} + displayname: {{ matrix_mautrix_meta_instagram_appservice_displayname | to_json(ensure_ascii=False) }} avatar: {{ matrix_mautrix_meta_instagram_appservice_avatar | to_json }} # Whether to receive ephemeral events via appservice transactions. diff --git a/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2 index e34844f12..dfe8acc08 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2 @@ -212,7 +212,7 @@ appservice: username: {{ matrix_mautrix_meta_messenger_appservice_username | to_json }} # Display name and avatar for bot. Set to "remove" to remove display name/avatar, leave empty # to leave display name/avatar as-is. - displayname: {{ matrix_mautrix_meta_messenger_appservice_displayname | to_json }} + displayname: {{ matrix_mautrix_meta_messenger_appservice_displayname | to_json(ensure_ascii=False) }} avatar: {{ matrix_mautrix_meta_messenger_appservice_avatar | to_json }} # Whether to receive ephemeral events via appservice transactions. diff --git a/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 index c0d1db4ec..e437ffc3c 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 @@ -199,7 +199,7 @@ appservice: username: {{ matrix_mautrix_twitter_appservice_bot_username | to_json }} # Display name and avatar for bot. Set to "remove" to remove display name/avatar, leave empty # to leave display name/avatar as-is. - displayname: {{ matrix_mautrix_twitter_appservice_bot_displayname | to_json }} + displayname: {{ matrix_mautrix_twitter_appservice_bot_displayname | to_json(ensure_ascii=False) }} avatar: {{ matrix_mautrix_twitter_appservice_bot_avatar | to_json }} # Whether to receive ephemeral events via appservice transactions. From dd2f8d1150c82707d9b6ef223c3d3ea8145100c9 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Fri, 25 Apr 2025 17:04:20 +0300 Subject: [PATCH 028/404] Relax mautrix-whatsapp regex in registration file to match what mautrix-whatsapp v0.12.0 expects Since mautrix-whatsapp v0.12.0, the bridge deals with more than just phone numbers now, so it sometimes tries to manage users with Matrix IDs like: `@whatsapp_lid-123456789:example.com` Ref: - https://github.com/mautrix/whatsapp/releases/tag/v0.12.0 - https://mau.fi/blog/2025-04-mautrix-release/ --- roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml index a77bcf750..e6f59a1ea 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml @@ -226,7 +226,7 @@ matrix_mautrix_whatsapp_registration_yaml: | rate_limited: false namespaces: users: - - regex: '^@whatsapp_[0-9]+:{{ matrix_mautrix_whatsapp_homeserver_domain | regex_escape }}$' + - regex: '^@whatsapp_.*:{{ matrix_mautrix_whatsapp_homeserver_domain | regex_escape }}$' exclusive: true - exclusive: true regex: '^@{{ matrix_mautrix_whatsapp_appservice_bot_username | regex_escape }}:{{ matrix_mautrix_whatsapp_homeserver_domain | regex_escape }}$' From 98e4f369b7e5bd4eae76fdba2d191ffe2ff4b849 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Fri, 25 Apr 2025 17:11:53 +0300 Subject: [PATCH 029/404] Add `receive_ephemeral` everywhere `de.sorunome.msc2409.push_ephemeral` is used Ref: - https://github.com/mautrix/go/blob/33f3ccd6aef0a3ef3a37fefead208c6249169142/CHANGELOG.md#L134-L136 - https://github.com/mautrix/go/blob/7165d3fa583444352ea770b5c003c93a7fc6989c/appservice/registration.go#L30 Intentionally not removing the old configuration setting yet, as some bridges may/do not support the new setting name. It's likely just bridgev2 mautrix bridges that have been updated and support both right now. --- docs/configuring-playbook-conduit.md | 1 + docs/configuring-playbook-conduwuit.md | 1 + roles/custom/matrix-bridge-beeper-linkedin/defaults/main.yml | 1 + roles/custom/matrix-bridge-go-skype-bridge/defaults/main.yml | 1 + .../custom/matrix-bridge-hookshot/templates/registration.yml.j2 | 1 + roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml | 1 + roles/custom/matrix-bridge-mautrix-facebook/defaults/main.yml | 1 + roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml | 1 + roles/custom/matrix-bridge-mautrix-googlechat/defaults/main.yml | 1 + roles/custom/matrix-bridge-mautrix-instagram/defaults/main.yml | 1 + .../matrix-bridge-mautrix-meta-instagram/defaults/main.yml | 1 + .../matrix-bridge-mautrix-meta-messenger/defaults/main.yml | 1 + roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml | 1 + roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml | 1 + roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml | 1 + roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml | 1 + roles/custom/matrix-bridge-mx-puppet-discord/defaults/main.yml | 1 + roles/custom/matrix-bridge-mx-puppet-groupme/defaults/main.yml | 1 + roles/custom/matrix-bridge-mx-puppet-instagram/defaults/main.yml | 1 + roles/custom/matrix-bridge-mx-puppet-slack/defaults/main.yml | 1 + roles/custom/matrix-bridge-mx-puppet-steam/defaults/main.yml | 1 + roles/custom/matrix-bridge-mx-puppet-twitter/defaults/main.yml | 1 + roles/custom/matrix-bridge-wechat/defaults/main.yml | 1 + 23 files changed, 23 insertions(+) diff --git a/docs/configuring-playbook-conduit.md b/docs/configuring-playbook-conduit.md index 76a3c9666..70029a7a4 100644 --- a/docs/configuring-playbook-conduit.md +++ b/docs/configuring-playbook-conduit.md @@ -65,6 +65,7 @@ Find the `registration.yaml` in the `/matrix` directory, for example `/matrix/ma ``` as_token: de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true hs_token: id: signal namespaces: diff --git a/docs/configuring-playbook-conduwuit.md b/docs/configuring-playbook-conduwuit.md index f31d57ab4..77685de03 100644 --- a/docs/configuring-playbook-conduwuit.md +++ b/docs/configuring-playbook-conduwuit.md @@ -83,6 +83,7 @@ Then, send its content to the existing admin room: ``` as_token: de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true hs_token: id: signal namespaces: diff --git a/roles/custom/matrix-bridge-beeper-linkedin/defaults/main.yml b/roles/custom/matrix-bridge-beeper-linkedin/defaults/main.yml index e06c37c37..ad5d6cdee 100644 --- a/roles/custom/matrix-bridge-beeper-linkedin/defaults/main.yml +++ b/roles/custom/matrix-bridge-beeper-linkedin/defaults/main.yml @@ -167,5 +167,6 @@ matrix_beeper_linkedin_registration_yaml: | - exclusive: true regex: '^@{{ matrix_beeper_linkedin_appservice_bot_username | regex_escape }}:{{ matrix_beeper_linkedin_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_beeper_linkedin_registration: "{{ matrix_beeper_linkedin_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-go-skype-bridge/defaults/main.yml b/roles/custom/matrix-bridge-go-skype-bridge/defaults/main.yml index 0b8c9b3e0..92f43be70 100644 --- a/roles/custom/matrix-bridge-go-skype-bridge/defaults/main.yml +++ b/roles/custom/matrix-bridge-go-skype-bridge/defaults/main.yml @@ -159,5 +159,6 @@ matrix_go_skype_bridge_registration_yaml: | - exclusive: true regex: '^@{{ matrix_go_skype_bridge_appservice_bot_username | regex_escape }}:{{ matrix_go_skype_bridge_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_go_skype_bridge_registration: "{{ matrix_go_skype_bridge_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-hookshot/templates/registration.yml.j2 b/roles/custom/matrix-bridge-hookshot/templates/registration.yml.j2 index 2e617df76..05ed7809d 100644 --- a/roles/custom/matrix-bridge-hookshot/templates/registration.yml.j2 +++ b/roles/custom/matrix-bridge-hookshot/templates/registration.yml.j2 @@ -32,5 +32,6 @@ rate_limited: false {% if matrix_hookshot_encryption_enabled %} de.sorunome.msc2409.push_ephemeral: true push_ephemeral: true +receive_ephemeral: true org.matrix.msc3202: true {% endif %} diff --git a/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml index 40d91ebb0..1b7dede9f 100644 --- a/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml @@ -224,6 +224,7 @@ matrix_mautrix_discord_registration_yaml: | - exclusive: true regex: '^@{{ matrix_mautrix_discord_appservice_bot_username | regex_escape }}:{{ matrix_mautrix_discord_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_mautrix_discord_registration: "{{ matrix_mautrix_discord_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-facebook/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-facebook/defaults/main.yml index 0fe7f52f1..74640ba3e 100644 --- a/roles/custom/matrix-bridge-mautrix-facebook/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-facebook/defaults/main.yml @@ -214,6 +214,7 @@ matrix_mautrix_facebook_registration_yaml: | sender_localpart: _bot_{{ matrix_mautrix_facebook_appservice_bot_username }} rate_limited: false de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_mautrix_facebook_registration: "{{ matrix_mautrix_facebook_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml index ea504beeb..fed4f0dcc 100644 --- a/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml @@ -214,6 +214,7 @@ matrix_mautrix_gmessages_registration_yaml: | - exclusive: true regex: '^@{{ matrix_mautrix_gmessages_appservice_bot_username | regex_escape }}:{{ matrix_mautrix_gmessages_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true io.element.msc4190: {{ matrix_mautrix_gmessages_msc4190_enabled | to_json }} matrix_mautrix_gmessages_registration: "{{ matrix_mautrix_gmessages_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-googlechat/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-googlechat/defaults/main.yml index 213573c11..ee0eb4748 100644 --- a/roles/custom/matrix-bridge-mautrix-googlechat/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-googlechat/defaults/main.yml @@ -199,6 +199,7 @@ matrix_mautrix_googlechat_registration_yaml: | sender_localpart: _bot_{{ matrix_mautrix_googlechat_appservice_bot_username }} rate_limited: false de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_mautrix_googlechat_registration: "{{ matrix_mautrix_googlechat_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-instagram/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-instagram/defaults/main.yml index 1304d7586..23c2c85eb 100644 --- a/roles/custom/matrix-bridge-mautrix-instagram/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-instagram/defaults/main.yml @@ -183,6 +183,7 @@ matrix_mautrix_instagram_registration_yaml: | sender_localpart: _bot_{{ matrix_mautrix_instagram_appservice_bot_username }} rate_limited: false de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_mautrix_instagram_registration: "{{ matrix_mautrix_instagram_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml index e0058562e..1960ae986 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml @@ -299,6 +299,7 @@ matrix_mautrix_meta_instagram_registration_yaml: | sender_localpart: _bot_{{ matrix_mautrix_meta_instagram_appservice_username }} rate_limited: false de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true io.element.msc4190: {{ matrix_mautrix_meta_instagram_msc4190_enabled | to_json }} matrix_mautrix_meta_instagram_registration: "{{ matrix_mautrix_meta_instagram_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml index 69e19e730..4aaee719c 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml @@ -299,6 +299,7 @@ matrix_mautrix_meta_messenger_registration_yaml: | sender_localpart: _bot_{{ matrix_mautrix_meta_messenger_appservice_username }} rate_limited: false de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true io.element.msc4190: {{ matrix_mautrix_meta_messenger_msc4190_enabled | to_json }} matrix_mautrix_meta_messenger_registration: "{{ matrix_mautrix_meta_messenger_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml index e47609ced..2853931e4 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml @@ -212,6 +212,7 @@ matrix_mautrix_signal_registration_yaml: | - exclusive: true regex: '^@{{ matrix_mautrix_signal_appservice_bot_username | regex_escape }}:{{ matrix_mautrix_signal_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true io.element.msc4190: {{ matrix_mautrix_signal_msc4190_enabled | to_json }} matrix_mautrix_signal_registration: "{{ matrix_mautrix_signal_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml index cb86e03bd..3a9fceff3 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml @@ -153,6 +153,7 @@ matrix_mautrix_slack_registration_yaml: | - exclusive: true regex: '^@{{ matrix_mautrix_slack_appservice_bot_username | regex_escape }}:{{ matrix_mautrix_slack_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true io.element.msc4190: {{ matrix_mautrix_slack_msc4190_enabled | to_json }} matrix_mautrix_slack_registration: "{{ matrix_mautrix_slack_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml index 28a270d96..069e8ace4 100644 --- a/roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml @@ -241,6 +241,7 @@ matrix_mautrix_telegram_registration_yaml: | url: {{ matrix_mautrix_telegram_appservice_address }} rate_limited: false de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true io.element.msc4190: {{ matrix_mautrix_telegram_msc4190_enabled | to_json }} matrix_mautrix_telegram_registration: "{{ matrix_mautrix_telegram_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml index e6f59a1ea..dc5cbb9ae 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml @@ -231,6 +231,7 @@ matrix_mautrix_whatsapp_registration_yaml: | - exclusive: true regex: '^@{{ matrix_mautrix_whatsapp_appservice_bot_username | regex_escape }}:{{ matrix_mautrix_whatsapp_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true io.element.msc4190: {{ matrix_mautrix_whatsapp_msc4190_enabled | to_json }} matrix_mautrix_whatsapp_registration: "{{ matrix_mautrix_whatsapp_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mx-puppet-discord/defaults/main.yml b/roles/custom/matrix-bridge-mx-puppet-discord/defaults/main.yml index 5cda2b0f4..196052d59 100644 --- a/roles/custom/matrix-bridge-mx-puppet-discord/defaults/main.yml +++ b/roles/custom/matrix-bridge-mx-puppet-discord/defaults/main.yml @@ -139,5 +139,6 @@ matrix_mx_puppet_discord_registration_yaml: | sender_localpart: _discordpuppet_bot url: {{ matrix_mx_puppet_discord_appservice_address }} de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_mx_puppet_discord_registration: "{{ matrix_mx_puppet_discord_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mx-puppet-groupme/defaults/main.yml b/roles/custom/matrix-bridge-mx-puppet-groupme/defaults/main.yml index a4d7570ef..5a58f5be9 100644 --- a/roles/custom/matrix-bridge-mx-puppet-groupme/defaults/main.yml +++ b/roles/custom/matrix-bridge-mx-puppet-groupme/defaults/main.yml @@ -133,5 +133,6 @@ matrix_mx_puppet_groupme_registration_yaml: | sender_localpart: _groupmepuppet_bot url: {{ matrix_mx_puppet_groupme_appservice_address }} de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_mx_puppet_groupme_registration: "{{ matrix_mx_puppet_groupme_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mx-puppet-instagram/defaults/main.yml b/roles/custom/matrix-bridge-mx-puppet-instagram/defaults/main.yml index 14568af1a..72ccc00d9 100644 --- a/roles/custom/matrix-bridge-mx-puppet-instagram/defaults/main.yml +++ b/roles/custom/matrix-bridge-mx-puppet-instagram/defaults/main.yml @@ -127,5 +127,6 @@ matrix_mx_puppet_instagram_registration_yaml: | sender_localpart: _instagrampuppet_bot url: {{ matrix_mx_puppet_instagram_appservice_address }} de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_mx_puppet_instagram_registration: "{{ matrix_mx_puppet_instagram_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mx-puppet-slack/defaults/main.yml b/roles/custom/matrix-bridge-mx-puppet-slack/defaults/main.yml index 338eb3691..e073b5089 100644 --- a/roles/custom/matrix-bridge-mx-puppet-slack/defaults/main.yml +++ b/roles/custom/matrix-bridge-mx-puppet-slack/defaults/main.yml @@ -179,5 +179,6 @@ matrix_mx_puppet_slack_registration_yaml: | sender_localpart: _slackpuppet_bot url: {{ matrix_mx_puppet_slack_appservice_address }} de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_mx_puppet_slack_registration: "{{ matrix_mx_puppet_slack_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mx-puppet-steam/defaults/main.yml b/roles/custom/matrix-bridge-mx-puppet-steam/defaults/main.yml index 65161cf54..033c01940 100644 --- a/roles/custom/matrix-bridge-mx-puppet-steam/defaults/main.yml +++ b/roles/custom/matrix-bridge-mx-puppet-steam/defaults/main.yml @@ -134,5 +134,6 @@ matrix_mx_puppet_steam_registration_yaml: | sender_localpart: _steampuppet_bot url: {{ matrix_mx_puppet_steam_appservice_address }} de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_mx_puppet_steam_registration: "{{ matrix_mx_puppet_steam_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mx-puppet-twitter/defaults/main.yml b/roles/custom/matrix-bridge-mx-puppet-twitter/defaults/main.yml index c556cda4a..9f14f1272 100644 --- a/roles/custom/matrix-bridge-mx-puppet-twitter/defaults/main.yml +++ b/roles/custom/matrix-bridge-mx-puppet-twitter/defaults/main.yml @@ -179,5 +179,6 @@ matrix_mx_puppet_twitter_registration_yaml: | sender_localpart: "{{ matrix_mx_puppet_twitter_bot_localpart }}" url: {{ matrix_mx_puppet_twitter_appservice_address }} de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_mx_puppet_twitter_registration: "{{ matrix_mx_puppet_twitter_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-wechat/defaults/main.yml b/roles/custom/matrix-bridge-wechat/defaults/main.yml index 907f959ba..635b04ccb 100644 --- a/roles/custom/matrix-bridge-wechat/defaults/main.yml +++ b/roles/custom/matrix-bridge-wechat/defaults/main.yml @@ -150,6 +150,7 @@ matrix_wechat_registration_yaml: | - exclusive: true regex: '^@{{ matrix_wechat_appservice_bot_username | regex_escape }}:{{ matrix_wechat_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true matrix_wechat_registration: "{{ matrix_wechat_registration_yaml | from_yaml }}" From 41ac05391228e0b39c7e01581bb506bb9888c95f Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 25 Apr 2025 20:42:32 +0000 Subject: [PATCH 030/404] Update ghcr.io/element-hq/element-call Docker tag to v0.10.0 --- roles/custom/matrix-element-call/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-element-call/defaults/main.yml b/roles/custom/matrix-element-call/defaults/main.yml index f5ab28310..d93a46202 100644 --- a/roles/custom/matrix-element-call/defaults/main.yml +++ b/roles/custom/matrix-element-call/defaults/main.yml @@ -21,7 +21,7 @@ matrix_element_call_enabled: false matrix_rtc_enabled: "{{ matrix_element_call_enabled }}" # renovate: datasource=docker depName=ghcr.io/element-hq/element-call -matrix_element_call_version: v0.9.0 +matrix_element_call_version: v0.10.0 matrix_element_call_scheme: https From 6383b1b37aba0d7372f12222903aaa06f0d39688 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 26 Apr 2025 03:44:58 +0000 Subject: [PATCH 031/404] Update dependency certifi to v2025.4.26 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 22ba53164..b4c2aff9d 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -1,6 +1,6 @@ alabaster==1.0.0 babel==2.17.0 -certifi==2025.1.31 +certifi==2025.4.26 charset-normalizer==3.4.1 click==8.1.8 docutils==0.21.2 From bd405c410ac8cfabac6a8c0e7767df48dbd266ef Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Sat, 26 Apr 2025 08:12:53 +0200 Subject: [PATCH 032/404] Add continuwuity support (#4267) * continuwuity support * continuwuity support * use main instead of commit tag * fix docker image link * migration from conduwuit * fix yaml lint * backup directories and linter fixes * linter fixes --- README.md | 1 + docs/configuring-playbook-continuwuity.md | 108 ++ docs/configuring-playbook.md | 2 + docs/container-images.md | 1 + docs/howto-srv-server-delegation.md | 2 +- group_vars/matrix_servers | 58 +- .../docs/configuring-playbook-continuwuity.po | 134 ++ roles/custom/matrix-base/defaults/main.yml | 2 +- .../matrix-base/tasks/validate_config.yml | 2 +- .../matrix-continuwuity/defaults/main.yml | 195 +++ .../matrix-continuwuity/tasks/install.yml | 64 + .../custom/matrix-continuwuity/tasks/main.yml | 40 + .../tasks/migrate_from_conduwuit.yml | 65 + .../tasks/self_check_client_api.yml | 28 + .../tasks/self_check_federation_api.yml | 32 + .../tasks/setup_install.yml | 63 + .../tasks/setup_uninstall.yml | 23 + .../matrix-continuwuity/tasks/uninstall.yml | 23 + .../tasks/validate_config.yml | 15 + .../templates/continuwuity.toml.j2 | 1546 +++++++++++++++++ .../matrix-continuwuity/templates/env.j2 | 1 + .../templates/env.j2.license | 3 + .../matrix-continuwuity/templates/labels.j2 | 173 ++ .../systemd/matrix-continuwuity.service.j2 | 51 + .../matrix-continuwuity.service.j2.license | 4 + .../custom/matrix-continuwuity/vars/main.yml | 9 + .../ensure_user_registered_continuwuity.yml | 10 + setup.yml | 1 + 28 files changed, 2652 insertions(+), 4 deletions(-) create mode 100644 docs/configuring-playbook-continuwuity.md create mode 100644 i18n/locales/bg/LC_MESSAGES/docs/configuring-playbook-continuwuity.po create mode 100644 roles/custom/matrix-continuwuity/defaults/main.yml create mode 100644 roles/custom/matrix-continuwuity/tasks/install.yml create mode 100644 roles/custom/matrix-continuwuity/tasks/main.yml create mode 100644 roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml create mode 100644 roles/custom/matrix-continuwuity/tasks/self_check_client_api.yml create mode 100644 roles/custom/matrix-continuwuity/tasks/self_check_federation_api.yml create mode 100644 roles/custom/matrix-continuwuity/tasks/setup_install.yml create mode 100644 roles/custom/matrix-continuwuity/tasks/setup_uninstall.yml create mode 100644 roles/custom/matrix-continuwuity/tasks/uninstall.yml create mode 100644 roles/custom/matrix-continuwuity/tasks/validate_config.yml create mode 100644 roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 create mode 100644 roles/custom/matrix-continuwuity/templates/env.j2 create mode 100644 roles/custom/matrix-continuwuity/templates/env.j2.license create mode 100644 roles/custom/matrix-continuwuity/templates/labels.j2 create mode 100644 roles/custom/matrix-continuwuity/templates/systemd/matrix-continuwuity.service.j2 create mode 100644 roles/custom/matrix-continuwuity/templates/systemd/matrix-continuwuity.service.j2.license create mode 100644 roles/custom/matrix-continuwuity/vars/main.yml create mode 100644 roles/custom/matrix-user-creator/tasks/util/ensure_user_registered_continuwuity.yml diff --git a/README.md b/README.md index 47b4074c4..045a7b1a6 100644 --- a/README.md +++ b/README.md @@ -53,6 +53,7 @@ The homeserver is the backbone of your Matrix system. Choose one from the follow | [Synapse](https://github.com/element-hq/synapse) | ✅ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network | [Link](docs/configuring-playbook-synapse.md) | | [Conduit](https://conduit.rs) | ❌ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network. Conduit is a lightweight open-source server implementation of the Matrix Specification with a focus on easy setup and low system requirements | [Link](docs/configuring-playbook-conduit.md) | | [conduwuit](https://conduwuit.puppyirl.gay/) | ❌ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network. conduwuit is a fork of Conduit. | [Link](docs/configuring-playbook-conduwuit.md) | +| [continuwuity](https://continuwuity.org) | ❌ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network. continuwuity is a continuation of conduwuit. | [Link](docs/configuring-playbook-continuwuity.md) | | [Dendrite](https://github.com/element-hq/dendrite) | ❌ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network. Dendrite is a second-generation Matrix homeserver written in Go, an alternative to Synapse. | [Link](docs/configuring-playbook-dendrite.md) | ### Clients diff --git a/docs/configuring-playbook-continuwuity.md b/docs/configuring-playbook-continuwuity.md new file mode 100644 index 000000000..ac08f852e --- /dev/null +++ b/docs/configuring-playbook-continuwuity.md @@ -0,0 +1,108 @@ + + +# Configuring continuwuity (optional) + +The playbook can install and configure the [continuwuity](https://continuwuity.org) Matrix server for you. + +See the project's [documentation](https://continuwuity.org) to learn what it does and why it might be useful to you. + +By default, the playbook installs [Synapse](https://github.com/element-hq/synapse) as it's the only full-featured Matrix server at the moment. If that's okay, you can skip this document. + +💡 **Note**: continuwuity is a fork of [conduwuit](./configuring-playbook-conduwuit.md), which the playbook also supports. + +> [!WARNING] +> - **You can't switch an existing Matrix server's implementation** (e.g. Synapse -> continuwuity). Proceed below only if you're OK with losing data or you're dealing with a server on a new domain name, which hasn't participated in the Matrix federation yet. +> - **Homeserver implementations other than Synapse may not be fully functional**. The playbook may also not assist you in an optimal way (like it does with Synapse). Make yourself familiar with the downsides before proceeding + +## Adjusting the playbook configuration + +To use continuwuity, you **generally** need to adjust the `matrix_homeserver_implementation: synapse` configuration on your `inventory/host_vars/matrix.example.com/vars.yml` file as below: + +```yaml +matrix_homeserver_implementation: continuwuity + +# Registering users can only happen via the API, +# so it makes sense to enable it, at least initially. +matrix_continuwuity_config_allow_registration: true + +# Generate a strong registration token to protect the registration endpoint from abuse. +# You can create one with a command like `pwgen -s 64 1`. +matrix_continuwuity_config_registration_token: '' +``` + +### Extending the configuration + +There are some additional things you may wish to configure about the server. + +Take a look at: + +- `roles/custom/matrix-continuwuity/defaults/main.yml` for some variables that you can customize via your `vars.yml` file +- `roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2` for the server's default configuration + +There are various Ansible variables that control settings in the `continuwuity.toml` file. + +If a specific setting you'd like to change does not have a dedicated Ansible variable, you can either submit a PR to us to add it, or you can [override the setting using an environment variable](https://continuwuity.org/configuration#environment-variables) using `matrix_continuwuity_environment_variables_extension`. For example: + +```yaml +matrix_continuwuity_environment_variables_extension: | + continuwuity_MAX_REQUEST_SIZE=50000000 + continuwuity_REQUEST_TIMEOUT=60 +``` + +## Creating the first user account + +Unlike other homeserver implementations (like Synapse and Dendrite), continuwuity does not support creating users via the command line or via the playbook. + +If you followed the instructions above (see [Adjusting the playbook configuration](#adjusting-the-playbook-configuration)), you should have registration enabled and protected by a registration token. + +This should allow you to create the first user account via any client (like [Element Web](./configuring-playbook-client-element-web.md)) which supports creating users. + +The **first user account that you create will be marked as an admin** and **will be automatically invited to an admin room**. + + +## Configuring bridges / appservices + +For other homeserver implementations (like Synapse and Dendrite), the playbook automatically registers appservices (for bridges, bots, etc.) with the homeserver. + +For continuwuity, you will have to manually register appservices using the [`!admin appservices register` command](https://continuwuity.org/appservices.html#set-up-the-appservice---general-instructions) sent to the server bot account. + +The server's bot account has a Matrix ID of `@conduit:example.com` (not `@continuwuity:example.com`!) due to continuwuity's historical legacy. +Your first user account would already have been invited to an admin room with this bot. + +Find the appservice file you'd like to register. This can be any `registration.yaml` file found in the `/matrix` directory, for example `/matrix/mautrix-signal/bridge/registration.yaml`. + +Then, send its content to the existing admin room: + + !admin appservices register + + ``` + as_token: + de.sorunome.msc2409.push_ephemeral: true + hs_token: + id: signal + namespaces: + aliases: + - exclusive: true + regex: ^#signal_.+:example\.org$ + users: + - exclusive: true + regex: ^@signal_.+:example\.org$ + - exclusive: true + regex: ^@signalbot:example\.org$ + rate_limited: false + sender_localpart: _bot_signalbot + url: http://matrix-mautrix-signal:29328 + ``` + +## Migrating from conduwuit + +Since continuwuity is a drop-in replacement for conduwuit, migration is possible. First, make sure that continuwuity is properly set up on your `vars.yml` and run the tag `just run-tags migrate-conduwuit` + +## Troubleshooting + +As with all other services, you can find the logs in [systemd-journald](https://www.freedesktop.org/software/systemd/man/systemd-journald.service.html) by logging in to the server with SSH and running `journalctl -fu matrix-continuwuity`. diff --git a/docs/configuring-playbook.md b/docs/configuring-playbook.md index 58cea52b9..34c8d698e 100644 --- a/docs/configuring-playbook.md +++ b/docs/configuring-playbook.md @@ -53,6 +53,8 @@ For a more custom setup, see the [Other configuration options](#other-configurat - [Configuring conduwuit](configuring-playbook-conduwuit.md), if you've switched to the [conduwuit](https://conduwuit.puppyirl.gay/) homeserver implementation + - [Configuring continuwuity](configuring-playbook-continuwuity.md), if you've switched to the [continuwuity](https://continuwuity.org) homeserver implementation + - [Configuring Dendrite](configuring-playbook-dendrite.md), if you've switched to the [Dendrite](https://matrix-org.github.io/dendrite) homeserver implementation - Server components: diff --git a/docs/container-images.md b/docs/container-images.md index b445cc001..953c39d5c 100644 --- a/docs/container-images.md +++ b/docs/container-images.md @@ -28,6 +28,7 @@ We try to stick to official images (provided by their respective projects) as mu | [Synapse](configuring-playbook-synapse.md) | [element-hq/synapse](https://ghcr.io/element-hq/synapse) | ✅ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network | | [Conduit](configuring-playbook-conduit.md) | [matrixconduit/matrix-conduit](https://hub.docker.com/r/matrixconduit/matrix-conduit) | ❌ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network. Conduit is a lightweight open-source server implementation of the Matrix Specification with a focus on easy setup and low system requirements | | [conduwuit](configuring-playbook-conduwuit.md) | [girlbossceo/conduwuit](https://ghcr.io/girlbossceo/conduwuit) | ❌ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network. conduwuit is a fork of Conduit. | +| [continuwuity](configuring-playbook-continuwuity.md) | [continuwuation/continuwuity](https://forgejo.ellis.link/continuwuation/continuwuity) | ❌ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network. continuwuity is a continuation of conduwuit. | | [Dendrite](configuring-playbook-dendrite.md) | [matrixdotorg/dendrite-monolith](https://hub.docker.com/r/matrixdotorg/dendrite-monolith/) | ❌ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network. Dendrite is a second-generation Matrix homeserver written in Go, an alternative to Synapse. | ## Clients diff --git a/docs/howto-srv-server-delegation.md b/docs/howto-srv-server-delegation.md index dda92b9a3..9d03588c7 100644 --- a/docs/howto-srv-server-delegation.md +++ b/docs/howto-srv-server-delegation.md @@ -26,7 +26,7 @@ The up-to-date list can be accessed on [traefik's documentation](https://doc.tra **Note**: the changes below instruct you how to do this for a basic Synapse installation. You will need to adapt the variable name and the content of the labels: -- if you're using another homeserver implementation (e.g. [Conduit](./configuring-playbook-conduit.md), [conduwuit](./configuring-playbook-conduwuit.md) or [Dendrite](./configuring-playbook-dendrite.md)) +- if you're using another homeserver implementation (e.g. [Conduit](./configuring-playbook-conduit.md), [conduwuit](./configuring-playbook-conduwuit.md), [continuwuity](./configuring-playbook-continuwuity.md) or [Dendrite](./configuring-playbook-dendrite.md)) - if you're using [Synapse with workers enabled](./configuring-playbook-synapse.md#load-balancing-with-workers) (`matrix_synapse_workers_enabled: true`). In that case, it's actually the `matrix-synapse-reverse-proxy-companion` service which has Traefik labels attached Also, all instructions below are from an older version of the playbook and may not work anymore. diff --git a/group_vars/matrix_servers b/group_vars/matrix_servers index 9ed1ced91..45d2a81a4 100755 --- a/group_vars/matrix_servers +++ b/group_vars/matrix_servers @@ -243,7 +243,7 @@ matrix_addons_homeserver_client_api_url: "{{ ('http://' + matrix_playbook_revers matrix_addons_homeserver_systemd_services_list: "{{ ([traefik_identifier + '.service'] if matrix_playbook_reverse_proxy_type == 'playbook-managed-traefik' else []) if matrix_playbook_internal_matrix_client_api_traefik_entrypoint_enabled else matrix_homeserver_systemd_services_list }}" # Starting from version `0.6.0` Conduit natively supports some sync v3 (sliding-sync) features. -matrix_homeserver_sliding_sync_url: "{{ matrix_sliding_sync_base_url if matrix_sliding_sync_enabled else (matrix_homeserver_url if matrix_homeserver_implementation in ['conduit', 'conduwuit'] else '') }}" +matrix_homeserver_sliding_sync_url: "{{ matrix_sliding_sync_base_url if matrix_sliding_sync_enabled else (matrix_homeserver_url if matrix_homeserver_implementation in ['conduit', 'conduwuit', 'continuwuity'] else '') }}" ######################################################################## # # @@ -567,6 +567,7 @@ matrix_homeserver_container_client_api_endpoint: |- 'dendrite': ('matrix-dendrite:' + matrix_dendrite_http_bind_port | default('8008') | string), 'conduit': ('matrix-conduit:' + matrix_conduit_port_number | default('8008') | string), 'conduwuit': ('matrix-conduwuit:' + matrix_conduwuit_config_port_number | default('8008') | string), + 'continuwuity': ('matrix-continuwuity:' + matrix_continuwuity_config_port_number | default('8008') | string), }[matrix_homeserver_implementation] }} @@ -577,6 +578,7 @@ matrix_homeserver_container_federation_api_endpoint: |- 'dendrite': ('matrix-dendrite:' + matrix_dendrite_http_bind_port | default('8008') | string), 'conduit': ('matrix-conduit:' + matrix_conduit_port_number | default('8008') | string), 'conduwuit': ('matrix-conduwuit:' + matrix_conduwuit_config_port_number | default('8008') | string), + 'continuwuity': ('matrix-continuwuity:' + matrix_continuwuity_config_port_number | default('8008') | string), }[matrix_homeserver_implementation] }} @@ -5640,6 +5642,7 @@ grafana_default_home_dashboard_path: |- 'dendrite': ('/etc/grafana/dashboards/node-exporter-full.json' if prometheus_node_exporter_enabled else ''), 'conduit': ('/etc/grafana/dashboards/node-exporter-full.json' if prometheus_node_exporter_enabled else ''), 'conduwuit': ('/etc/grafana/dashboards/node-exporter-full.json' if prometheus_node_exporter_enabled else ''), + 'continuwuity': ('/etc/grafana/dashboards/node-exporter-full.json' if prometheus_node_exporter_enabled else ''), }[matrix_homeserver_implementation] }} @@ -5700,6 +5703,7 @@ matrix_registration_shared_secret: |- 'dendrite': matrix_dendrite_client_api_registration_shared_secret | default (''), 'conduit': '', 'conduwuit': '', + 'continuwuity': '', }[matrix_homeserver_implementation] }} @@ -5977,6 +5981,58 @@ matrix_conduwuit_self_check_validate_certificates: "{{ matrix_playbook_ssl_enabl ###################################################################### +###################################################################### +# +# matrix-continuwuity +# +###################################################################### + +matrix_continuwuity_enabled: "{{ matrix_homeserver_implementation == 'continuwuity' }}" + +matrix_continuwuity_hostname: "{{ matrix_server_fqn_matrix }}" + +matrix_continuwuity_config_allow_federation: "{{ matrix_homeserver_federation_enabled }}" + +matrix_continuwuity_docker_image_registry_prefix_upstream: "{{ matrix_container_global_registry_prefix_override if matrix_container_global_registry_prefix_override else matrix_continuwuity_docker_image_registry_prefix_upstream_default }}" + +matrix_continuwuity_container_network: "{{ matrix_homeserver_container_network }}" + +matrix_continuwuity_container_additional_networks_auto: | + {{ + ( + ([matrix_playbook_reverse_proxyable_services_additional_network] if matrix_continuwuity_container_labels_traefik_enabled and matrix_playbook_reverse_proxyable_services_additional_network else []) + ) | unique + }} + +matrix_continuwuity_container_labels_traefik_enabled: "{{ matrix_playbook_reverse_proxy_type in ['playbook-managed-traefik', 'other-traefik-container'] and not matrix_synapse_workers_enabled }}" +matrix_continuwuity_container_labels_traefik_docker_network: "{{ matrix_playbook_reverse_proxyable_services_additional_network }}" +matrix_continuwuity_container_labels_traefik_entrypoints: "{{ traefik_entrypoint_primary }}" +matrix_continuwuity_container_labels_traefik_tls_certResolver: "{{ traefik_certResolver_primary }}" + +matrix_continuwuity_container_labels_public_client_root_redirection_enabled: "{{ matrix_continuwuity_container_labels_public_client_root_redirection_url != '' }}" +matrix_continuwuity_container_labels_public_client_root_redirection_url: "{{ (('https://' if matrix_playbook_ssl_enabled else 'http://') + matrix_server_fqn_element) if matrix_client_element_enabled else '' }}" + +matrix_continuwuity_container_labels_public_federation_api_traefik_hostname: "{{ matrix_server_fqn_matrix_federation }}" +matrix_continuwuity_container_labels_public_federation_api_traefik_entrypoints: "{{ matrix_federation_traefik_entrypoint_name }}" +matrix_continuwuity_container_labels_public_federation_api_traefik_tls: "{{ matrix_federation_traefik_entrypoint_tls }}" + +matrix_continuwuity_container_labels_internal_client_api_enabled: "{{ matrix_playbook_internal_matrix_client_api_traefik_entrypoint_enabled }}" +matrix_continuwuity_container_labels_internal_client_api_traefik_entrypoints: "{{ matrix_playbook_internal_matrix_client_api_traefik_entrypoint_name }}" + +matrix_continuwuity_config_turn_uris: "{{ matrix_coturn_turn_uris if matrix_coturn_enabled else [] }}" +matrix_continuwuity_config_turn_secret: "{{ matrix_coturn_turn_static_auth_secret if (matrix_coturn_enabled and matrix_coturn_authentication_method == 'auth-secret') else '' }}" +matrix_continuwuity_config_turn_username: "{{ matrix_coturn_lt_cred_mech_username if (matrix_coturn_enabled and matrix_coturn_authentication_method == 'lt-cred-mech') else '' }}" +matrix_continuwuity_config_turn_password: "{{ matrix_coturn_lt_cred_mech_password if (matrix_coturn_enabled and matrix_coturn_authentication_method == 'lt-cred-mech') else '' }}" + +matrix_continuwuity_self_check_validate_certificates: "{{ matrix_playbook_ssl_enabled }}" + +###################################################################### +# +# /matrix-continuwuity +# +###################################################################### + + ###################################################################### # # matrix-user-creator diff --git a/i18n/locales/bg/LC_MESSAGES/docs/configuring-playbook-continuwuity.po b/i18n/locales/bg/LC_MESSAGES/docs/configuring-playbook-continuwuity.po new file mode 100644 index 000000000..8e5129018 --- /dev/null +++ b/i18n/locales/bg/LC_MESSAGES/docs/configuring-playbook-continuwuity.po @@ -0,0 +1,134 @@ +# SOME DESCRIPTIVE TITLE. +# Copyright (C) 2018-2025, Slavi Pantaleev, Aine Etke, MDAD community +# members +# This file is distributed under the same license as the +# matrix-docker-ansible-deploy package. +# FIRST AUTHOR , 2025. +# +#, fuzzy +msgid "" +msgstr "" +"Project-Id-Version: matrix-docker-ansible-deploy \n" +"Report-Msgid-Bugs-To: \n" +"POT-Creation-Date: 2025-01-27 09:54+0200\n" +"PO-Revision-Date: YEAR-MO-DA HO:MI+ZONE\n" +"Last-Translator: FULL NAME \n" +"Language: bg\n" +"Language-Team: bg \n" +"Plural-Forms: nplurals=2; plural=(n != 1);\n" +"MIME-Version: 1.0\n" +"Content-Type: text/plain; charset=utf-8\n" +"Content-Transfer-Encoding: 8bit\n" +"Generated-By: Babel 2.16.0\n" + +#: ../../../docs/configuring-playbook-continuwuity.md:1 +msgid "Configuring continuwuity (optional)" +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:3 +msgid "The playbook can install and configure the [continuwuity](https://continuwuity.org/) Matrix server for you." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:5 +msgid "See the project's [documentation](https://continuwuity.org/) to learn what it does and why it might be useful to you." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:7 +msgid "By default, the playbook installs [Synapse](https://github.com/element-hq/synapse) as it's the only full-featured Matrix server at the moment. If that's okay, you can skip this document." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:9 +msgid "💡 **Note**: continuwuity is a fork of [conduwuit](./configuring-playbook-conduwuit.md), which the playbook also supports." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:11 +msgid "⚠️ **Warnings**:" +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:13 +msgid "**You can't switch an existing Matrix server's implementation** (e.g. Synapse -> continuwuity). Proceed below only if you're OK with losing data or you're dealing with a server on a new domain name, which hasn't participated in the Matrix federation yet." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:15 +msgid "**Homeserver implementations other than Synapse may not be fully functional**. The playbook may also not assist you in an optimal way (like it does with Synapse). Make yourself familiar with the downsides before proceeding" +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:17 +msgid "Adjusting the playbook configuration" +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:19 +msgid "To use continuwuity, you **generally** need to adjust the `matrix_homeserver_implementation: synapse` configuration on your `inventory/host_vars/matrix.example.com/vars.yml` file as below:" +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:33 +msgid "Extending the configuration" +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:35 +msgid "There are some additional things you may wish to configure about the server." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:37 +msgid "Take a look at:" +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:39 +msgid "`roles/custom/matrix-continuwuity/defaults/main.yml` for some variables that you can customize via your `vars.yml` file" +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:40 +msgid "`roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2` for the server's default configuration" +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:42 +msgid "There are various Ansible variables that control settings in the `continuwuity.toml` file." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:44 +msgid "If a specific setting you'd like to change does not have a dedicated Ansible variable, you can either submit a PR to us to add it, or you can [override the setting using an environment variable](https://continuwuity.org/configuration#environment-variables) using `matrix_continuwuity_environment_variables_extension`. For example:" +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:52 +msgid "Creating the first user account" +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:54 +msgid "Unlike other homeserver implementations (like Synapse and Dendrite), continuwuity does not support creating users via the command line or via the playbook." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:56 +msgid "If you followed the instructions above (see [Adjusting the playbook configuration](#adjusting-the-playbook-configuration)), you should have registration enabled and protected by a registration token." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:58 +msgid "This should allow you to create the first user account via any client (like [Element Web](./configuring-playbook-client-element-web.md)) which supports creating users." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:60 +msgid "The **first user account that you create will be marked as an admin** and **will be automatically invited to an admin room**." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:63 +msgid "Configuring bridges / appservices" +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:65 +msgid "For other homeserver implementations (like Synapse and Dendrite), the playbook automatically registers appservices (for bridges, bots, etc.) with the homeserver." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:67 +msgid "For continuwuity, you will have to manually register appservices using the [`!admin appservices register` command](https://continuwuity.org/appservices#set-up-the-appservice---general-instructions) sent to the server bot account." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:69 +msgid "The server's bot account has a Matrix ID of `@conduit:example.com` (not `@continuwuity:example.com`!) due to continuwuity's historical legacy. Your first user account would already have been invited to an admin room with this bot." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:72 +msgid "Find the appservice file you'd like to register. This can be any `registration.yaml` file found in the `/matrix` directory, for example `/matrix/mautrix-signal/bridge/registration.yaml`." +msgstr "" + +#: ../../../docs/configuring-playbook-continuwuity.md:74 +msgid "Then, send its content to the existing admin room:" +msgstr "" diff --git a/roles/custom/matrix-base/defaults/main.yml b/roles/custom/matrix-base/defaults/main.yml index ce6943b35..9679208aa 100644 --- a/roles/custom/matrix-base/defaults/main.yml +++ b/roles/custom/matrix-base/defaults/main.yml @@ -81,7 +81,7 @@ matrix_monitoring_container_network: matrix-monitoring matrix_homeserver_enabled: true # This will contain the homeserver implementation that is in use. -# Valid values: synapse, dendrite, conduit, conduwuit +# Valid values: synapse, dendrite, conduit, conduwuit, continuwuity # # By default, we use Synapse, because it's the only full-featured Matrix server at the moment. # diff --git a/roles/custom/matrix-base/tasks/validate_config.yml b/roles/custom/matrix-base/tasks/validate_config.yml index 730b0d1d8..78202331a 100644 --- a/roles/custom/matrix-base/tasks/validate_config.yml +++ b/roles/custom/matrix-base/tasks/validate_config.yml @@ -13,7 +13,7 @@ - name: Fail if invalid homeserver implementation ansible.builtin.fail: msg: "You need to set a valid homeserver implementation in `matrix_homeserver_implementation`" - when: "matrix_homeserver_implementation not in ['synapse', 'dendrite', 'conduit', 'conduwuit']" + when: "matrix_homeserver_implementation not in ['synapse', 'dendrite', 'conduit', 'conduwuit', 'continuwuity']" - name: (Deprecation) Catch and report renamed settings ansible.builtin.fail: diff --git a/roles/custom/matrix-continuwuity/defaults/main.yml b/roles/custom/matrix-continuwuity/defaults/main.yml new file mode 100644 index 000000000..39e6bea33 --- /dev/null +++ b/roles/custom/matrix-continuwuity/defaults/main.yml @@ -0,0 +1,195 @@ +# SPDX-FileCopyrightText: 2025 MDAD project contributors +# SPDX-FileCopyrightText: 2025 Slavi Pantaleev +# +# SPDX-License-Identifier: AGPL-3.0-or-later + +--- +# continuwuity is a continuation of conduwuit (https://conduwuit.puppyirl.gay/). +# Project source code URL: https://forgejo.ellis.link/continuwuation/continuwuity/ +# See: https://continuwuity.org/ + +matrix_continuwuity_enabled: true + +matrix_continuwuity_hostname: '' + +matrix_continuwuity_docker_image: "{{ matrix_continuwuity_docker_image_registry_prefix }}/continuwuation/continuwuity:{{ matrix_continuwuity_docker_image_tag }}" +# renovate: datasource=docker depName=forgejo.ellis.link/continuwuation/-/packages/container/continuwuity/ +matrix_continuwuity_docker_image_tag: main +matrix_continuwuity_docker_image_force_pull: "{{ matrix_continuwuity_docker_image.endswith(':latest') }}" +matrix_continuwuity_docker_image_registry_prefix: "{{ matrix_continuwuity_docker_image_registry_prefix_upstream }}" +matrix_continuwuity_docker_image_registry_prefix_upstream: "{{ matrix_continuwuity_docker_image_registry_prefix_upstream_default }}" +matrix_continuwuity_docker_image_registry_prefix_upstream_default: forgejo.ellis.link + +matrix_continuwuity_base_path: "{{ matrix_base_data_path }}/continuwuity" +matrix_continuwuity_config_path: "{{ matrix_continuwuity_base_path }}/config" +matrix_continuwuity_data_path: "{{ matrix_continuwuity_base_path }}/data" + +matrix_continuwuity_config_port_number: 6167 + +matrix_continuwuity_tmp_directory_size_mb: 500 + +# List of systemd services that matrix-continuwuity.service depends on +matrix_continuwuity_systemd_required_services_list: "{{ matrix_continuwuity_systemd_required_services_list_default + matrix_continuwuity_systemd_required_services_list_auto + matrix_continuwuity_systemd_required_services_list_custom }}" +matrix_continuwuity_systemd_required_services_list_default: "{{ [devture_systemd_docker_base_docker_service_name] if devture_systemd_docker_base_docker_service_name else [] }}" +matrix_continuwuity_systemd_required_services_list_auto: [] +matrix_continuwuity_systemd_required_services_list_custom: [] + +# List of systemd services that matrix-continuwuity.service wants +matrix_continuwuity_systemd_wanted_services_list: [] + +# Controls how long to sleep for after starting the matrix-synapse container. +# +# Delaying, so that the homeserver can manage to fully start and various services +# that depend on it (`matrix_continuwuity_systemd_required_services_list` and `matrix_continuwuity_systemd_wanted_services_list`) +# may only start after the homeserver is up and running. +# +# This can be set to 0 to remove the delay. +matrix_continuwuity_systemd_service_post_start_delay_seconds: 3 + +# The base container network. It will be auto-created by this role if it doesn't exist already. +matrix_continuwuity_container_network: "" + +# A list of additional container networks that the container would be connected to. +# The role does not create these networks, so make sure they already exist. +# Use this to expose this container to another reverse proxy, which runs in a different container network. +matrix_continuwuity_container_additional_networks: "{{ matrix_continuwuity_container_additional_networks_auto + matrix_continuwuity_container_additional_networks_custom }}" +matrix_continuwuity_container_additional_networks_auto: [] +matrix_continuwuity_container_additional_networks_custom: [] + +# matrix_continuwuity_container_labels_traefik_enabled controls whether labels to assist a Traefik reverse-proxy will be attached to the container. +# See `../templates/labels.j2` for details. +# +# To inject your own other container labels, see `matrix_continuwuity_container_labels_additional_labels`. +matrix_continuwuity_container_labels_traefik_enabled: true +matrix_continuwuity_container_labels_traefik_docker_network: "{{ matrix_continuwuity_container_network }}" +matrix_continuwuity_container_labels_traefik_entrypoints: web-secure +matrix_continuwuity_container_labels_traefik_tls_certResolver: default # noqa var-naming + +# Controls whether labels will be added for handling the root (/) path on a public Traefik entrypoint. +matrix_continuwuity_container_labels_public_client_root_enabled: true +matrix_continuwuity_container_labels_public_client_root_traefik_hostname: "{{ matrix_continuwuity_hostname }}" +matrix_continuwuity_container_labels_public_client_root_traefik_rule: "Host(`{{ matrix_continuwuity_container_labels_public_client_root_traefik_hostname }}`) && Path(`/`)" +matrix_continuwuity_container_labels_public_client_root_traefik_priority: 0 +matrix_continuwuity_container_labels_public_client_root_traefik_entrypoints: "{{ matrix_continuwuity_container_labels_traefik_entrypoints }}" +matrix_continuwuity_container_labels_public_client_root_traefik_tls: "{{ matrix_continuwuity_container_labels_public_client_root_traefik_entrypoints != 'web' }}" +matrix_continuwuity_container_labels_public_client_root_traefik_tls_certResolver: "{{ matrix_continuwuity_container_labels_traefik_tls_certResolver }}" # noqa var-naming +matrix_continuwuity_container_labels_public_client_root_redirection_enabled: false +matrix_continuwuity_container_labels_public_client_root_redirection_url: "" + +# Controls whether labels will be added that expose the Client-Server API on a public Traefik entrypoint. +matrix_continuwuity_container_labels_public_client_api_enabled: true +matrix_continuwuity_container_labels_public_client_api_traefik_hostname: "{{ matrix_continuwuity_hostname }}" +matrix_continuwuity_container_labels_public_client_api_traefik_path_prefix: /_matrix +matrix_continuwuity_container_labels_public_client_api_traefik_rule: "Host(`{{ matrix_continuwuity_container_labels_public_client_api_traefik_hostname }}`) && PathPrefix(`{{ matrix_continuwuity_container_labels_public_client_api_traefik_path_prefix }}`)" +matrix_continuwuity_container_labels_public_client_api_traefik_priority: 0 +matrix_continuwuity_container_labels_public_client_api_traefik_entrypoints: "{{ matrix_continuwuity_container_labels_traefik_entrypoints }}" +matrix_continuwuity_container_labels_public_client_api_traefik_tls: "{{ matrix_continuwuity_container_labels_public_client_api_traefik_entrypoints != 'web' }}" +matrix_continuwuity_container_labels_public_client_api_traefik_tls_certResolver: "{{ matrix_continuwuity_container_labels_traefik_tls_certResolver }}" # noqa var-naming + +# Controls whether labels will be added that expose the Client-Server API on the internal Traefik entrypoint. +# This is similar to `matrix_continuwuity_container_labels_public_client_api_enabled`, but the entrypoint and intent is different. +matrix_continuwuity_container_labels_internal_client_api_enabled: false +matrix_continuwuity_container_labels_internal_client_api_traefik_path_prefix: "{{ matrix_continuwuity_container_labels_public_client_api_traefik_path_prefix }}" +matrix_continuwuity_container_labels_internal_client_api_traefik_rule: "PathPrefix(`{{ matrix_continuwuity_container_labels_internal_client_api_traefik_path_prefix }}`)" +matrix_continuwuity_container_labels_internal_client_api_traefik_priority: "{{ matrix_continuwuity_container_labels_public_client_api_traefik_priority }}" +matrix_continuwuity_container_labels_internal_client_api_traefik_entrypoints: "" + +# Controls whether labels will be added that expose the Server-Server API (Federation API) on a public Traefik entrypoint. +matrix_continuwuity_container_labels_public_federation_api_enabled: "{{ matrix_continuwuity_config_allow_federation }}" +matrix_continuwuity_container_labels_public_federation_api_traefik_hostname: "{{ matrix_continuwuity_hostname }}" +matrix_continuwuity_container_labels_public_federation_api_traefik_path_prefix: /_matrix +matrix_continuwuity_container_labels_public_federation_api_traefik_rule: "Host(`{{ matrix_continuwuity_container_labels_public_federation_api_traefik_hostname }}`) && PathPrefix(`{{ matrix_continuwuity_container_labels_public_federation_api_traefik_path_prefix }}`)" +matrix_continuwuity_container_labels_public_federation_api_traefik_priority: 0 +matrix_continuwuity_container_labels_public_federation_api_traefik_entrypoints: '' +# TLS is force-enabled here, because the spec (https://spec.matrix.org/v1.9/server-server-api/#tls) says that the federation API must use HTTPS. +matrix_continuwuity_container_labels_public_federation_api_traefik_tls: true +matrix_continuwuity_container_labels_public_federation_api_traefik_tls_certResolver: "{{ matrix_continuwuity_container_labels_traefik_tls_certResolver }}" # noqa var-naming + +# Controls whether labels will be added that expose the `/_continuwuity` path prefix on a public Traefik entrypoint. +matrix_continuwuity_container_labels_public_continuwuity_api_enabled: true +matrix_continuwuity_container_labels_public_continuwuity_api_traefik_hostname: "{{ matrix_continuwuity_hostname }}" +matrix_continuwuity_container_labels_public_continuwuity_api_traefik_path_prefix: /_continuwuity +matrix_continuwuity_container_labels_public_continuwuity_api_traefik_rule: "Host(`{{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_hostname }}`) && PathPrefix(`{{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_path_prefix }}`)" +matrix_continuwuity_container_labels_public_continuwuity_api_traefik_priority: 0 +matrix_continuwuity_container_labels_public_continuwuity_api_traefik_entrypoints: "{{ matrix_continuwuity_container_labels_traefik_entrypoints }}" +matrix_continuwuity_container_labels_public_continuwuity_api_traefik_tls: "{{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_entrypoints != 'web' }}" +matrix_continuwuity_container_labels_public_continuwuity_api_traefik_tls_certResolver: "{{ matrix_continuwuity_container_labels_traefik_tls_certResolver }}" # noqa var-naming + +# matrix_continuwuity_container_labels_additional_labels contains a multiline string with additional labels to add to the container label file. +# See `../templates/labels.j2` for details. +# +# Example: +# matrix_continuwuity_container_labels_additional_labels: | +# my.label=1 +# another.label="here" +matrix_continuwuity_container_labels_additional_labels: '' + +# Extra arguments for the Docker container +matrix_continuwuity_container_extra_arguments: [] + +# Specifies which template files to use when configuring continuwuity. +# If you'd like to have your own different configuration, feel free to copy and paste +# the original files into your inventory (e.g. in `inventory/host_vars/matrix.example.com/`) +# and then change the specific host's `vars.yml` file like this: +# matrix_continuwuity_template_continuwuity_config: "{{ playbook_dir }}/inventory/host_vars/matrix.example.com/continuwuity.toml.j2" +matrix_continuwuity_template_continuwuity_config: "{{ role_path }}/templates/continuwuity.toml.j2" + +# Max size for uploads, in bytes +matrix_continuwuity_config_server_name: "{{ matrix_domain }}" + +# Max size for uploads, in bytes +matrix_continuwuity_config_max_request_size: 20_000_000 + +# Enables registration. If set to false, no users can register on this server. +matrix_continuwuity_config_allow_registration: false + +# Controls the `yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse` setting. +# This is only used when `matrix_continuwuity_config_allow_registration` is set to true and no registration token is configured. +matrix_continuwuity_config_yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse: false + +# Controls the `registration_token` setting. +# When registration is enabled (`matrix_continuwuity_config_allow_registration`) you: +# - either need to set a token to protect registration from abuse +# - or you need to enable the `yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse` setting +# (see `matrix_continuwuity_config_yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse`), +# to allow registration without any form of 2nd-step. +matrix_continuwuity_config_registration_token: '' + +# Controls the `new_user_displayname_suffix` setting. +# This is the suffix that will be added to the displayname of new users. +# Upstream defaults this to "🏳️‍⚧️", but we keep this consistent across all homeserver implementations and do not enable a suffix. +matrix_continuwuity_config_new_user_displayname_suffix: "" + +# Controls the `allow_check_for_updates` setting. +matrix_continuwuity_config_allow_check_for_updates: false + +# Controls the `emergency_password` setting. +matrix_continuwuity_config_emergency_password: '' + +# Controls the `allow_federation` setting. +matrix_continuwuity_config_allow_federation: true + +matrix_continuwuity_trusted_servers: + - "matrix.org" + +matrix_continuwuity_config_log: "info,state_res=warn,rocket=off,_=off,sled=off" + +# TURN integration. +# See: https://continuwuity.org/turn +matrix_continuwuity_config_turn_uris: [] +matrix_continuwuity_config_turn_secret: '' +matrix_continuwuity_config_turn_username: '' +matrix_continuwuity_config_turn_password: '' + +# Controls whether the self-check feature should validate SSL certificates. +matrix_continuwuity_self_check_validate_certificates: true + +# Additional environment variables to pass to the container. +# +# Environment variables take priority over settings in the configuration file. +# +# Example: +# matrix_continuwuity_environment_variables_extension: | +# continuwuity_MAX_REQUEST_SIZE=50000000 +# continuwuity_REQUEST_TIMEOUT=60 +matrix_continuwuity_environment_variables_extension: '' diff --git a/roles/custom/matrix-continuwuity/tasks/install.yml b/roles/custom/matrix-continuwuity/tasks/install.yml new file mode 100644 index 000000000..19aaff4f2 --- /dev/null +++ b/roles/custom/matrix-continuwuity/tasks/install.yml @@ -0,0 +1,64 @@ +# SPDX-FileCopyrightText: 2025 Slavi Pantaleev +# +# SPDX-License-Identifier: AGPL-3.0-or-later + +--- + +- name: Ensure continuwuity config path exists + ansible.builtin.file: + path: "{{ matrix_continuwuity_config_path }}" + state: directory + mode: 0750 + owner: "{{ matrix_user_username }}" + group: "{{ matrix_user_groupname }}" + +- name: Ensure continuwuity data path exists + ansible.builtin.file: + path: "{{ matrix_continuwuity_data_path }}" + state: directory + mode: 0770 + owner: "{{ matrix_user_username }}" + group: "{{ matrix_user_groupname }}" + +- name: Ensure continuwuity configuration installed + ansible.builtin.template: + src: "{{ matrix_continuwuity_template_continuwuity_config }}" + dest: "{{ matrix_continuwuity_config_path }}/continuwuity.toml" + mode: 0644 + owner: "{{ matrix_user_username }}" + group: "{{ matrix_user_groupname }}" + +- name: Ensure continuwuity support files installed + ansible.builtin.template: + src: "{{ role_path }}/templates/{{ item }}.j2" + dest: "{{ matrix_continuwuity_base_path }}/{{ item }}" + mode: 0640 + owner: "{{ matrix_user_username }}" + group: "{{ matrix_user_groupname }}" + with_items: + - labels + - env + +- name: Ensure continuwuity container network is created + community.general.docker_network: + enable_ipv6: "{{ devture_systemd_docker_base_ipv6_enabled }}" + name: "{{ matrix_continuwuity_container_network }}" + driver: bridge + driver_options: "{{ devture_systemd_docker_base_container_networks_driver_options }}" + +- name: Ensure continuwuity container image is pulled + community.docker.docker_image: + name: "{{ matrix_continuwuity_docker_image }}" + source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" + force_source: "{{ matrix_continuwuity_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" + force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_continuwuity_docker_image_force_pull }}" + register: result + retries: "{{ devture_playbook_help_container_retries_count }}" + delay: "{{ devture_playbook_help_container_retries_delay }}" + until: result is not failed + +- name: Ensure matrix-continuwuity.service installed + ansible.builtin.template: + src: "{{ role_path }}/templates/systemd/matrix-continuwuity.service.j2" + dest: "{{ devture_systemd_docker_base_systemd_path }}/matrix-continuwuity.service" + mode: 0644 diff --git a/roles/custom/matrix-continuwuity/tasks/main.yml b/roles/custom/matrix-continuwuity/tasks/main.yml new file mode 100644 index 000000000..d51b2fff3 --- /dev/null +++ b/roles/custom/matrix-continuwuity/tasks/main.yml @@ -0,0 +1,40 @@ +# SPDX-FileCopyrightText: 2025 MDAD project contributors +# SPDX-FileCopyrightText: 2025 Slavi Pantaleev +# +# SPDX-License-Identifier: AGPL-3.0-or-later + +--- + +- tags: + - setup-all + - setup-continuwuity + - install-all + - install-continuwuity + block: + - when: matrix_continuwuity_enabled | bool + ansible.builtin.include_tasks: "{{ role_path }}/tasks/validate_config.yml" + + - when: matrix_continuwuity_enabled | bool + ansible.builtin.include_tasks: "{{ role_path }}/tasks/install.yml" + +- tags: + - setup-all + - setup-continuwuity + block: + - when: not matrix_continuwuity_enabled | bool + ansible.builtin.include_tasks: "{{ role_path }}/tasks/uninstall.yml" + +- tags: + - self-check + block: + - when: matrix_continuwuity_enabled | bool + ansible.builtin.include_tasks: "{{ role_path }}/tasks/self_check_client_api.yml" + + - when: matrix_continuwuity_enabled | bool + ansible.builtin.include_tasks: "{{ role_path }}/tasks/self_check_federation_api.yml" + +- tags: + - migrate-conduwuit + block: + - when: matrix_continuwuity_enabled | bool + ansible.builtin.include_tasks: "{{ role_path }}/tasks/migrate_from_conduwuit.yml" diff --git a/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml b/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml new file mode 100644 index 000000000..311d5613c --- /dev/null +++ b/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml @@ -0,0 +1,65 @@ +# SPDX-FileCopyrightText: 2025 Slavi Pantaleev +# +# SPDX-License-Identifier: AGPL-3.0-or-later + +--- + +# This migrates the conduwuit server implementation (`/matrix/conduwuit`) to continuwuity (`/matrix/continuwuity`), +# +# Here, we merely backup the fresh continuwuity folder, relocate conduwuit directory to continuwuity (`/matrix/conduwuit`) +# +# and restore continuwuity labels. + +- name: Check existence of conduwuit directory + ansible.builtin.stat: + path: "{{ matrix_base_data_path }}/conduwuit" + register: matrix_conduwuit_directory_stat + +- name: Check existence of continuwuity directory + ansible.builtin.stat: + path: "{{ matrix_base_data_path }}/continuwuity" + register: matrix_continuwuity_directory_stat + +- when: > + matrix_conduwuit_directory_stat.stat.exists | bool and + matrix_continuwuity_directory_stat.stat.exists | bool + block: + - name: Ensure matrix-continuwuity.service systemd service is stopped + ansible.builtin.systemd: + name: matrix-continuwuity + state: stopped + enabled: false + daemon_reload: true + + - name: Ensure continuwuity directory is backed up + ansible.builtin.command: + cmd: "mv {{ matrix_base_data_path }}/continuwuity {{ matrix_base_data_path }}/continuwuity_old" + creates: "{{ matrix_base_data_path }}/continuwuity_old" + removes: "{{ matrix_base_data_path }}/continuwuity" + + - name: Ensure conduwuit directory contents are copied to continuwuity + ansible.builtin.copy: + src: "{{ matrix_base_data_path }}/conduwuit/" + dest: "{{ matrix_base_data_path }}/continuwuity" + remote_src: true + mode: preserve + + - name: Ensure conduwuit.toml file is renamed + ansible.builtin.command: + cmd: "mv {{ matrix_base_data_path }}/continuwuity/config/conduwuit.toml {{ matrix_base_data_path }}/continuwuity/config/continuwuity.toml" + removes: "{{ matrix_base_data_path }}/continuwuity/config/conduwuit.toml" + + - name: Ensure continuwuity labels are restored + ansible.builtin.copy: + src: "{{ matrix_base_data_path }}/continuwuity_old/labels" + dest: "{{ matrix_base_data_path }}/continuwuity/labels" + remote_src: true + force: true + mode: preserve + + - name: Ensure matrix-continuwuity.service systemd service is started + ansible.builtin.systemd: + name: matrix-continuwuity + state: started + enabled: true + daemon_reload: true diff --git a/roles/custom/matrix-continuwuity/tasks/self_check_client_api.yml b/roles/custom/matrix-continuwuity/tasks/self_check_client_api.yml new file mode 100644 index 000000000..566769a2f --- /dev/null +++ b/roles/custom/matrix-continuwuity/tasks/self_check_client_api.yml @@ -0,0 +1,28 @@ +# SPDX-FileCopyrightText: 2025 Slavi Pantaleev +# SPDX-FileCopyrightText: 2025 Suguru Hirahara +# +# SPDX-License-Identifier: AGPL-3.0-or-later + +--- + +- name: Check Matrix Client API + ansible.builtin.uri: + url: "{{ matrix_continuwuity_client_api_url_endpoint_public }}" + follow_redirects: none + validate_certs: "{{ matrix_continuwuity_self_check_validate_certificates }}" + register: result_matrix_continuwuity_client_api + ignore_errors: true + check_mode: false + when: matrix_continuwuity_enabled | bool + delegate_to: 127.0.0.1 + become: false + +- name: Fail if Matrix Client API not working + ansible.builtin.fail: + msg: "Failed checking Matrix Client API is up at `{{ matrix_server_fqn_matrix }}` (checked endpoint: `{{ matrix_continuwuity_client_api_url_endpoint_public }}`). Is continuwuity running? Is port 443 open in your firewall? Full error: {{ result_matrix_continuwuity_client_api }}" + when: "matrix_continuwuity_enabled | bool and (result_matrix_continuwuity_client_api.failed or 'json' not in result_matrix_continuwuity_client_api)" + +- name: Report working Matrix Client API + ansible.builtin.debug: + msg: "The Matrix Client API at `{{ matrix_server_fqn_matrix }}` (checked endpoint: `{{ matrix_continuwuity_client_api_url_endpoint_public }}`) is working" + when: matrix_continuwuity_enabled | bool diff --git a/roles/custom/matrix-continuwuity/tasks/self_check_federation_api.yml b/roles/custom/matrix-continuwuity/tasks/self_check_federation_api.yml new file mode 100644 index 000000000..000a4b608 --- /dev/null +++ b/roles/custom/matrix-continuwuity/tasks/self_check_federation_api.yml @@ -0,0 +1,32 @@ +# SPDX-FileCopyrightText: 2025 Slavi Pantaleev +# +# SPDX-License-Identifier: AGPL-3.0-or-later + +--- + +- name: Check Matrix Federation API + ansible.builtin.uri: + url: "{{ matrix_synapse_federation_api_url_endpoint_public }}" + follow_redirects: none + validate_certs: "{{ matrix_synapse_self_check_validate_certificates }}" + register: result_matrix_synapse_federation_api + ignore_errors: true + check_mode: false + when: matrix_synapse_enabled | bool + delegate_to: 127.0.0.1 + become: false + +- name: Fail if Matrix Federation API not working + ansible.builtin.fail: + msg: "Failed checking Matrix Federation API is up at `{{ matrix_server_fqn_matrix }}` (checked endpoint: `{{ matrix_synapse_federation_api_url_endpoint_public }}`). Is Synapse running? Is port {{ matrix_federation_public_port }} open in your firewall? Full error: {{ result_matrix_synapse_federation_api }}" + when: "matrix_synapse_enabled | bool and matrix_synapse_federation_enabled | bool and (result_matrix_synapse_federation_api.failed or 'json' not in result_matrix_synapse_federation_api)" + +- name: Fail if Matrix Federation API unexpectedly enabled + ansible.builtin.fail: + msg: "Matrix Federation API is up at `{{ matrix_server_fqn_matrix }}` (checked endpoint: `{{ matrix_synapse_federation_api_url_endpoint_public }}`) despite being disabled." + when: "matrix_synapse_enabled | bool and not matrix_synapse_federation_enabled | bool and not result_matrix_synapse_federation_api.failed" + +- name: Report working Matrix Federation API + ansible.builtin.debug: + msg: "The Matrix Federation API at `{{ matrix_server_fqn_matrix }}` (checked endpoint: `{{ matrix_synapse_federation_api_url_endpoint_public }}`) is working" + when: "matrix_synapse_enabled | bool and matrix_synapse_federation_enabled | bool" diff --git a/roles/custom/matrix-continuwuity/tasks/setup_install.yml b/roles/custom/matrix-continuwuity/tasks/setup_install.yml new file mode 100644 index 000000000..8b86cb216 --- /dev/null +++ b/roles/custom/matrix-continuwuity/tasks/setup_install.yml @@ -0,0 +1,63 @@ +# SPDX-FileCopyrightText: 2025 MDAD project contributors +# +# SPDX-License-Identifier: AGPL-3.0-or-later + +--- + +- name: Ensure continuwuity config path exists + ansible.builtin.file: + path: "{{ matrix_continuwuity_config_path }}" + state: directory + mode: 0750 + owner: "{{ matrix_user_username }}" + group: "{{ matrix_user_groupname }}" + +- name: Ensure continuwuity data path exists + ansible.builtin.file: + path: "{{ matrix_continuwuity_data_path }}" + state: directory + mode: 0770 + owner: "{{ matrix_user_username }}" + group: "{{ matrix_user_groupname }}" + +- name: Ensure continuwuity configuration installed + ansible.builtin.template: + src: "{{ matrix_continuwuity_template_continuwuity_config }}" + dest: "{{ matrix_continuwuity_config_path }}/continuwuity.toml" + mode: 0644 + owner: "{{ matrix_user_username }}" + group: "{{ matrix_user_groupname }}" + +- name: Ensure continuwuity support files installed + ansible.builtin.template: + src: "{{ role_path }}/templates/{{ item }}.j2" + dest: "{{ matrix_continuwuity_base_path }}/{{ item }}" + mode: 0640 + owner: "{{ matrix_user_username }}" + group: "{{ matrix_user_groupname }}" + with_items: + - labels + +- name: Ensure continuwuity container network is created + community.general.docker_network: + enable_ipv6: "{{ devture_systemd_docker_base_ipv6_enabled }}" + name: "{{ matrix_continuwuity_container_network }}" + driver: bridge + driver_options: "{{ devture_systemd_docker_base_container_networks_driver_options }}" + +- name: Ensure continuwuity container image is pulled + community.docker.docker_image: + name: "{{ matrix_continuwuity_docker_image }}" + source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" + force_source: "{{ matrix_continuwuity_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" + force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_continuwuity_docker_image_force_pull }}" + register: result + retries: "{{ devture_playbook_help_container_retries_count }}" + delay: "{{ devture_playbook_help_container_retries_delay }}" + until: result is not failed + +- name: Ensure matrix-continuwuity.service installed + ansible.builtin.template: + src: "{{ role_path }}/templates/systemd/matrix-continuwuity.service.j2" + dest: "{{ devture_systemd_docker_base_systemd_path }}/matrix-continuwuity.service" + mode: 0644 diff --git a/roles/custom/matrix-continuwuity/tasks/setup_uninstall.yml b/roles/custom/matrix-continuwuity/tasks/setup_uninstall.yml new file mode 100644 index 000000000..6386a88d6 --- /dev/null +++ b/roles/custom/matrix-continuwuity/tasks/setup_uninstall.yml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2025 MDAD project contributors +# +# SPDX-License-Identifier: AGPL-3.0-or-later + +--- + +- name: Check existence of matrix-continuwuity service + ansible.builtin.stat: + path: "{{ devture_systemd_docker_base_systemd_path }}/matrix-continuwuity.service" + register: matrix_continuwuity_service_stat + +- when: matrix_continuwuity_service_stat.stat.exists | bool + block: + - name: Ensure matrix-continuwuity is stopped + ansible.builtin.systemd: + name: matrix-continuwuity + state: stopped + daemon_reload: true + + - name: Ensure matrix-continuwuity.service doesn't exist + ansible.builtin.file: + path: "{{ devture_systemd_docker_base_systemd_path }}/matrix-continuwuity.service" + state: absent diff --git a/roles/custom/matrix-continuwuity/tasks/uninstall.yml b/roles/custom/matrix-continuwuity/tasks/uninstall.yml new file mode 100644 index 000000000..9d10bfaac --- /dev/null +++ b/roles/custom/matrix-continuwuity/tasks/uninstall.yml @@ -0,0 +1,23 @@ +# SPDX-FileCopyrightText: 2025 Slavi Pantaleev +# +# SPDX-License-Identifier: AGPL-3.0-or-later + +--- + +- name: Check existence of matrix-continuwuity service + ansible.builtin.stat: + path: "{{ devture_systemd_docker_base_systemd_path }}/matrix-continuwuity.service" + register: matrix_continuwuity_service_stat + +- when: matrix_continuwuity_service_stat.stat.exists | bool + block: + - name: Ensure matrix-continuwuity is stopped + ansible.builtin.systemd: + name: matrix-continuwuity + state: stopped + daemon_reload: true + + - name: Ensure matrix-continuwuity.service doesn't exist + ansible.builtin.file: + path: "{{ devture_systemd_docker_base_systemd_path }}/matrix-continuwuity.service" + state: absent diff --git a/roles/custom/matrix-continuwuity/tasks/validate_config.yml b/roles/custom/matrix-continuwuity/tasks/validate_config.yml new file mode 100644 index 000000000..e4c199bfb --- /dev/null +++ b/roles/custom/matrix-continuwuity/tasks/validate_config.yml @@ -0,0 +1,15 @@ +# SPDX-FileCopyrightText: 2025 MDAD project contributors +# +# SPDX-License-Identifier: AGPL-3.0-or-later + +--- + +- name: Fail if required continuwuity settings not defined + ansible.builtin.fail: + msg: >- + You need to define a required configuration setting (`{{ item.name }}`). + when: "item.when | bool and vars[item.name] == ''" + with_items: + - {'name': 'matrix_continuwuity_hostname', when: true} + - {'name': 'matrix_continuwuity_container_network', when: true} + - {'name': 'matrix_continuwuity_container_labels_internal_client_api_traefik_entrypoints', when: "{{ matrix_continuwuity_container_labels_internal_client_api_enabled }}"} diff --git a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 new file mode 100644 index 000000000..6e353a1ae --- /dev/null +++ b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 @@ -0,0 +1,1546 @@ +{# +SPDX-FileCopyrightText: 2025 MDAD project contributors +SPDX-FileCopyrightText: 2025 Slavi Pantaleev +SPDX-FileCopyrightText: 2025 Suguru Hirahara + +SPDX-License-Identifier: AGPL-3.0-or-later +#} + +### continuwuity Configuration +### See: +### https://continuwuity.org/configuration + +[global] + +# The server_name is the pretty name of this server. It is used as a +# suffix for user and room IDs/aliases. +# +# See the docs for reverse proxying and delegation: +# https://continuwuity.org/deploying/generic#setting-up-the-reverse-proxy +# +# Also see the `[global.well_known]` config section at the very bottom. +# +# Examples of delegation: +# - https://puppygock.gay/.well-known/matrix/server +# - https://puppygock.gay/.well-known/matrix/client +# +# YOU NEED TO EDIT THIS. THIS CANNOT BE CHANGED AFTER WITHOUT A DATABASE +# WIPE. +# +# example: "continuwuity.woof" +# +server_name = {{ matrix_continuwuity_config_server_name | to_json }} + +# The default address (IPv4 or IPv6) continuwuity will listen on. +# +# If you are using Docker or a container NAT networking setup, this must +# be "0.0.0.0". +# +# To listen on multiple addresses, specify a vector e.g. ["127.0.0.1", +# "::1"] +# +address = "0.0.0.0" + +# The port(s) continuwuity will listen on. +# +# For reverse proxying, see: +# https://continuwuity.org/deploying/generic#setting-up-the-reverse-proxy +# +# If you are using Docker, don't change this, you'll need to map an +# external port to this. +# +# To listen on multiple ports, specify a vector e.g. [8080, 8448] +# +port = {{ matrix_continuwuity_config_port_number }} + +# The UNIX socket continuwuity will listen on. +# +# continuwuity cannot listen on both an IP address and a UNIX socket. If +# listening on a UNIX socket, you MUST remove/comment the `address` key. +# +# Remember to make sure that your reverse proxy has access to this socket +# file, either by adding your reverse proxy to the 'continuwuity' group or +# granting world R/W permissions with `unix_socket_perms` (666 minimum). +# +# example: "/run/continuwuity/continuwuity.sock" +# +#unix_socket_path = + +# The default permissions (in octal) to create the UNIX socket with. +# +#unix_socket_perms = 660 + +# This is the only directory where continuwuity will save its data, including +# media. Note: this was previously "/var/lib/matrix-conduit". +# +# YOU NEED TO EDIT THIS. +# +# example: "/var/lib/continuwuity" +# +database_path = "/var/lib/continuwuity" + +# continuwuity supports online database backups using RocksDB's Backup engine +# API. To use this, set a database backup path that continuwuity can write +# to. +# +# For more information, see: +# https://continuwuity.org/maintenance.html#backups +# +# example: "/opt/continuwuity-db-backups" +# +#database_backup_path = + +# The amount of online RocksDB database backups to keep/retain, if using +# "database_backup_path", before deleting the oldest one. +# +#database_backups_to_keep = 1 + +# Text which will be added to the end of the user's displayname upon +# registration with a space before the text. In Conduit, this was the +# lightning bolt emoji. +# +# To disable, set this to "" (an empty string). +# +# The default is the trans pride flag. +# +# example: "🏳️‍⚧️" +# +new_user_displayname_suffix = {{ matrix_continuwuity_config_new_user_displayname_suffix | to_json }} + +# If enabled, continuwuity will send a simple GET request periodically to +# `https://pupbrain.dev/check-for-updates/stable` for any new +# announcements made. Despite the name, this is not an update check +# endpoint, it is simply an announcement check endpoint. +# +# This is disabled by default as this is rarely used except for security +# updates or major updates. +# +allow_check_for_updates = {{ matrix_continuwuity_config_allow_check_for_updates | to_json }} + +# Set this to any float value to multiply continuwuity's in-memory LRU caches +# with such as "auth_chain_cache_capacity". +# +# May be useful if you have significant memory to spare to increase +# performance. +# +# If you have low memory, reducing this may be viable. +# +# By default, the individual caches such as "auth_chain_cache_capacity" +# are scaled by your CPU core count. +# +#cache_capacity_modifier = 1.0 + +# Set this to any float value in megabytes for continuwuity to tell the +# database engine that this much memory is available for database read +# caches. +# +# May be useful if you have significant memory to spare to increase +# performance. +# +# Similar to the individual LRU caches, this is scaled up with your CPU +# core count. +# +# This defaults to 128.0 + (64.0 * CPU core count). +# +#db_cache_capacity_mb = varies by system + +# Set this to any float value in megabytes for continuwuity to tell the +# database engine that this much memory is available for database write +# caches. +# +# May be useful if you have significant memory to spare to increase +# performance. +# +# Similar to the individual LRU caches, this is scaled up with your CPU +# core count. +# +# This defaults to 48.0 + (4.0 * CPU core count). +# +#db_write_buffer_capacity_mb = varies by system + +# This item is undocumented. Please contribute documentation for it. +# +#pdu_cache_capacity = varies by system + +# This item is undocumented. Please contribute documentation for it. +# +#auth_chain_cache_capacity = varies by system + +# This item is undocumented. Please contribute documentation for it. +# +#shorteventid_cache_capacity = varies by system + +# This item is undocumented. Please contribute documentation for it. +# +#eventidshort_cache_capacity = varies by system + +# This item is undocumented. Please contribute documentation for it. +# +#eventid_pdu_cache_capacity = varies by system + +# This item is undocumented. Please contribute documentation for it. +# +#shortstatekey_cache_capacity = varies by system + +# This item is undocumented. Please contribute documentation for it. +# +#statekeyshort_cache_capacity = varies by system + +# This item is undocumented. Please contribute documentation for it. +# +#servernameevent_data_cache_capacity = varies by system + +# This item is undocumented. Please contribute documentation for it. +# +#server_visibility_cache_capacity = varies by system + +# This item is undocumented. Please contribute documentation for it. +# +#user_visibility_cache_capacity = varies by system + +# This item is undocumented. Please contribute documentation for it. +# +#stateinfo_cache_capacity = varies by system + +# This item is undocumented. Please contribute documentation for it. +# +#roomid_spacehierarchy_cache_capacity = varies by system + +# Maximum entries stored in DNS memory-cache. The size of an entry may +# vary so please take care if raising this value excessively. Only +# decrease this when using an external DNS cache. Please note that +# systemd-resolved does *not* count as an external cache, even when +# configured to do so. +# +#dns_cache_entries = 32768 + +# Minimum time-to-live in seconds for entries in the DNS cache. The +# default may appear high to most administrators; this is by design as the +# majority of NXDOMAINs are correct for a long time (e.g. the server is no +# longer running Matrix). Only decrease this if you are using an external +# DNS cache. +# +#dns_min_ttl = 10800 + +# Minimum time-to-live in seconds for NXDOMAIN entries in the DNS cache. +# This value is critical for the server to federate efficiently. +# NXDOMAIN's are assumed to not be returning to the federation and +# aggressively cached rather than constantly rechecked. +# +# Defaults to 3 days as these are *very rarely* false negatives. +# +#dns_min_ttl_nxdomain = 259200 + +# Number of DNS nameserver retries after a timeout or error. +# +#dns_attempts = 10 + +# The number of seconds to wait for a reply to a DNS query. Please note +# that recursive queries can take up to several seconds for some domains, +# so this value should not be too low, especially on slower hardware or +# resolvers. +# +#dns_timeout = 10 + +# Fallback to TCP on DNS errors. Set this to false if unsupported by +# nameserver. +# +#dns_tcp_fallback = true + +# Enable to query all nameservers until the domain is found. Referred to +# as "trust_negative_responses" in hickory_resolver. This can avoid +# useless DNS queries if the first nameserver responds with NXDOMAIN or +# an empty NOERROR response. +# +#query_all_nameservers = true + +# Enable using *only* TCP for querying your specified nameservers instead +# of UDP. +# +# If you are running continuwuity in a container environment, this config +# option may need to be enabled. For more details, see: +# https://continuwuity.org/troubleshooting#potential-dns-issues-when-using-docker +# +#query_over_tcp_only = false + +# DNS A/AAAA record lookup strategy +# +# Takes a number of one of the following options: +# 1 - Ipv4Only (Only query for A records, no AAAA/IPv6) +# +# 2 - Ipv6Only (Only query for AAAA records, no A/IPv4) +# +# 3 - Ipv4AndIpv6 (Query for A and AAAA records in parallel, uses whatever +# returns a successful response first) +# +# 4 - Ipv6thenIpv4 (Query for AAAA record, if that fails then query the A +# record) +# +# 5 - Ipv4thenIpv6 (Query for A record, if that fails then query the AAAA +# record) +# +# If you don't have IPv6 networking, then for better DNS performance it +# may be suitable to set this to Ipv4Only (1) as you will never ever use +# the AAAA record contents even if the AAAA record is successful instead +# of the A record. +# +#ip_lookup_strategy = 5 + +# Max request size for file uploads in bytes. Defaults to 20MB. +# +max_request_size = {{ matrix_continuwuity_config_max_request_size }} + +# This item is undocumented. Please contribute documentation for it. +# +#max_fetch_prev_events = 192 + +# Default/base connection timeout (seconds). This is used only by URL +# previews and update/news endpoint checks. +# +#request_conn_timeout = 10 + +# Default/base request timeout (seconds). The time waiting to receive more +# data from another server. This is used only by URL previews, +# update/news, and misc endpoint checks. +# +#request_timeout = 35 + +# Default/base request total timeout (seconds). The time limit for a whole +# request. This is set very high to not cancel healthy requests while +# serving as a backstop. This is used only by URL previews and update/news +# endpoint checks. +# +#request_total_timeout = 320 + +# Default/base idle connection pool timeout (seconds). This is used only +# by URL previews and update/news endpoint checks. +# +#request_idle_timeout = 5 + +# Default/base max idle connections per host. This is used only by URL +# previews and update/news endpoint checks. Defaults to 1 as generally the +# same open connection can be re-used. +# +#request_idle_per_host = 1 + +# Federation well-known resolution connection timeout (seconds). +# +#well_known_conn_timeout = 6 + +# Federation HTTP well-known resolution request timeout (seconds). +# +#well_known_timeout = 10 + +# Federation client request timeout (seconds). You most definitely want +# this to be high to account for extremely large room joins, slow +# homeservers, your own resources etc. +# +#federation_timeout = 300 + +# Federation client idle connection pool timeout (seconds). +# +#federation_idle_timeout = 25 + +# Federation client max idle connections per host. Defaults to 1 as +# generally the same open connection can be re-used. +# +#federation_idle_per_host = 1 + +# Federation sender request timeout (seconds). The time it takes for the +# remote server to process sent transactions can take a while. +# +#sender_timeout = 180 + +# Federation sender idle connection pool timeout (seconds). +# +#sender_idle_timeout = 180 + +# Federation sender transaction retry backoff limit (seconds). +# +#sender_retry_backoff_limit = 86400 + +# Appservice URL request connection timeout. Defaults to 35 seconds as +# generally appservices are hosted within the same network. +# +#appservice_timeout = 35 + +# Appservice URL idle connection pool timeout (seconds). +# +#appservice_idle_timeout = 300 + +# Notification gateway pusher idle connection pool timeout. +# +#pusher_idle_timeout = 15 + +# Enables registration. If set to false, no users can register on this +# server. +# +# If set to true without a token configured, users can register with no +# form of 2nd-step only if you set the following option to true: +# `yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse` +# +# If you would like registration only via token reg, please configure +# `registration_token` or `registration_token_file`. +# +allow_registration = {{ matrix_continuwuity_config_allow_registration | to_json }} + +yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse = {{ matrix_continuwuity_config_yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse | to_json }} + +allow_federation = {{ matrix_continuwuity_config_allow_federation | to_json }} + +# This item is undocumented. Please contribute documentation for it. +# +#yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse = false + +# A static registration token that new users will have to provide when +# creating an account. If unset and `allow_registration` is true, +# registration is open without any condition. +# +# YOU NEED TO EDIT THIS OR USE registration_token_file. +# +# example: "o&^uCtes4HPf0Vu@F20jQeeWE7" +# +registration_token = {{ matrix_continuwuity_config_registration_token | to_json }} + +# Path to a file on the system that gets read for the registration token. +# this config option takes precedence/priority over "registration_token". +# +# continuwuity must be able to access the file, and it must not be empty +# +# example: "/etc/continuwuity/.reg_token" +# +#registration_token_file = + +# Controls whether encrypted rooms and events are allowed. +# +#allow_encryption = true + +# Controls whether federation is allowed or not. It is not recommended to +# disable this after the fact due to potential federation breakage. +# +#allow_federation = true + +# This item is undocumented. Please contribute documentation for it. +# +#federation_loopback = false + +# Set this to true to require authentication on the normally +# unauthenticated profile retrieval endpoints (GET) +# "/_matrix/client/v3/profile/{userId}". +# +# This can prevent profile scraping. +# +#require_auth_for_profile_requests = false + +# Set this to true to allow your server's public room directory to be +# federated. Set this to false to protect against /publicRooms spiders, +# but will forbid external users from viewing your server's public room +# directory. If federation is disabled entirely (`allow_federation`), this +# is inherently false. +# +#allow_public_room_directory_over_federation = false + +# Set this to true to allow your server's public room directory to be +# queried without client authentication (access token) through the Client +# APIs. Set this to false to protect against /publicRooms spiders. +# +#allow_public_room_directory_without_auth = false + +# Allow guests/unauthenticated users to access TURN credentials. +# +# This is the equivalent of Synapse's `turn_allow_guests` config option. +# This allows any unauthenticated user to call the endpoint +# `/_matrix/client/v3/voip/turnServer`. +# +# It is unlikely you need to enable this as all major clients support +# authentication for this endpoint and prevents misuse of your TURN server +# from potential bots. +# +#turn_allow_guests = false + +# Set this to true to lock down your server's public room directory and +# only allow admins to publish rooms to the room directory. Unpublishing +# is still allowed by all users with this enabled. +# +#lockdown_public_room_directory = false + +# Set this to true to allow federating device display names / allow +# external users to see your device display name. If federation is +# disabled entirely (`allow_federation`), this is inherently false. For +# privacy reasons, this is best left disabled. +# +#allow_device_name_federation = false + +# Config option to allow or disallow incoming federation requests that +# obtain the profiles of our local users from +# `/_matrix/federation/v1/query/profile` +# +# Increases privacy of your local user's such as display names, but some +# remote users may get a false "this user does not exist" error when they +# try to invite you to a DM or room. Also can protect against profile +# spiders. +# +# This is inherently false if `allow_federation` is disabled +# +#allow_inbound_profile_lookup_federation_requests = true + +# Allow standard users to create rooms. Appservices and admins are always +# allowed to create rooms +# +#allow_room_creation = true + +# Set to false to disable users from joining or creating room versions +# that aren't officially supported by continuwuity. +# +# continuwuity officially supports room versions 6 - 11. +# +# continuwuity has slightly experimental (though works fine in practice) +# support for versions 3 - 5. +# +#allow_unstable_room_versions = true + +# Default room version continuwuity will create rooms with. +# +# Per spec, room version 10 is the default. +# +#default_room_version = 10 + +# This item is undocumented. Please contribute documentation for it. +# +#allow_jaeger = false + +# This item is undocumented. Please contribute documentation for it. +# +#jaeger_filter = "info" + +# If the 'perf_measurements' compile-time feature is enabled, enables +# collecting folded stack trace profile of tracing spans using +# tracing_flame. The resulting profile can be visualized with inferno[1], +# speedscope[2], or a number of other tools. +# +# [1]: https://github.com/jonhoo/inferno +# [2]: www.speedscope.app +# +#tracing_flame = false + +# This item is undocumented. Please contribute documentation for it. +# +#tracing_flame_filter = "info" + +# This item is undocumented. Please contribute documentation for it. +# +#tracing_flame_output_path = "./tracing.folded" + +# Examples: +# +# - No proxy (default): +# +# proxy = "none" +# +# - For global proxy, create the section at the bottom of this file: +# +# [global.proxy] +# global = { url = "socks5h://localhost:9050" } +# +# - To proxy some domains: +# +# [global.proxy] +# [[global.proxy.by_domain]] +# url = "socks5h://localhost:9050" +# include = ["*.onion", "matrix.myspecial.onion"] +# exclude = ["*.myspecial.onion"] +# +# Include vs. Exclude: +# +# - If include is an empty list, it is assumed to be `["*"]`. +# +# - If a domain matches both the exclude and include list, the proxy will +# only be used if it was included because of a more specific rule than +# it was excluded. In the above example, the proxy would be used for +# `ordinary.onion`, `matrix.myspecial.onion`, but not +# `hello.myspecial.onion`. +# +#proxy = "none" + +# Servers listed here will be used to gather public keys of other servers +# (notary trusted key servers). +# +# Currently, continuwuity doesn't support inbound batched key requests, so +# this list should only contain other Synapse servers. +# +# example: ["matrix.org", "envs.net", "constellatory.net", "tchncs.de"] +# +trusted_servers = {{ matrix_continuwuity_trusted_servers | to_json }} + +# Whether to query the servers listed in trusted_servers first or query +# the origin server first. For best security, querying the origin server +# first is advised to minimize the exposure to a compromised trusted +# server. For maximum federation/join performance this can be set to true, +# however other options exist to query trusted servers first under +# specific high-load circumstances and should be evaluated before setting +# this to true. +# +#query_trusted_key_servers_first = false + +# Whether to query the servers listed in trusted_servers first +# specifically on room joins. This option limits the exposure to a +# compromised trusted server to room joins only. The join operation +# requires gathering keys from many origin servers which can cause +# significant delays. Therefor this defaults to true to mitigate +# unexpected delays out-of-the-box. The security-paranoid or those willing +# to tolerate delays are advised to set this to false. Note that setting +# query_trusted_key_servers_first to true causes this option to be +# ignored. +# +#query_trusted_key_servers_first_on_join = true + +# Only query trusted servers for keys and never the origin server. This is +# intended for clusters or custom deployments using their trusted_servers +# as forwarding-agents to cache and deduplicate requests. Notary servers +# do not act as forwarding-agents by default, therefor do not enable this +# unless you know exactly what you are doing. +# +#only_query_trusted_key_servers = false + +# Maximum number of keys to request in each trusted server batch query. +# +#trusted_server_batch_size = 1024 + +# Max log level for continuwuity. Allows debug, info, warn, or error. +# +# See also: +# https://docs.rs/tracing-subscriber/latest/tracing_subscriber/filter/struct.EnvFilter.html#directives +# +# **Caveat**: +# For release builds, the tracing crate is configured to only implement +# levels higher than error to avoid unnecessary overhead in the compiled +# binary from trace macros. For debug builds, this restriction is not +# applied. +# +log = {{ matrix_continuwuity_config_log | to_json }} + +# Output logs with ANSI colours. +# +#log_colors = true + +# Configures the span events which will be outputted with the log. +# +#log_span_events = "none" + +# Configures whether continuwuity_LOG EnvFilter matches values using regular +# expressions. See the tracing_subscriber documentation on Directives. +# +#log_filter_regex = true + +# Toggles the display of ThreadId in tracing log output. +# +#log_thread_ids = false + +# OpenID token expiration/TTL in seconds. +# +# These are the OpenID tokens that are primarily used for Matrix account +# integrations (e.g. Vector Integrations in Element), *not* OIDC/OpenID +# Connect/etc. +# +#openid_token_ttl = 3600 + +# Allow an existing session to mint a login token for another client. +# This requires interactive authentication, but has security ramifications +# as a malicious client could use the mechanism to spawn more than one +# session. +# Enabled by default. +# +#login_via_existing_session = true + +# Login token expiration/TTL in milliseconds. +# +# These are short-lived tokens for the m.login.token endpoint. +# This is used to allow existing sessions to create new sessions. +# see login_via_existing_session. +# +#login_token_ttl = 120000 + +# Static TURN username to provide the client if not using a shared secret +# ("turn_secret"), It is recommended to use a shared secret over static +# credentials. +# +#turn_username = false + +# Static TURN password to provide the client if not using a shared secret +# ("turn_secret"). It is recommended to use a shared secret over static +# credentials. +# +#turn_password = false + +# Vector list of TURN URIs/servers to use. +# +# Replace "example.turn.uri" with your TURN domain, such as the coturn +# "realm" config option. If using TURN over TLS, replace the URI prefix +# "turn:" with "turns:". +# +# example: ["turn:example.turn.uri?transport=udp", +# "turn:example.turn.uri?transport=tcp"] +# +turn_uris = {{ matrix_continuwuity_config_turn_uris | to_json }} + +# TURN secret to use for generating the HMAC-SHA1 hash apart of username +# and password generation. +# +# This is more secure, but if needed you can use traditional static +# username/password credentials. +# +#turn_secret = false +{% if matrix_continuwuity_config_turn_secret != '' %} +turn_secret = {{ matrix_continuwuity_config_turn_secret | to_json }} +{% endif %} + +# If you have your TURN server configured to use a username and password +# you can provide these information too. In this case comment out `turn_secret above`! +{% if matrix_continuwuity_config_turn_username != '' or matrix_continuwuity_config_turn_password != '' %} +turn_username = {{ matrix_continuwuity_config_turn_username | to_json }} +turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} +{% endif %} + +# TURN secret to use that's read from the file path specified. +# +# This takes priority over "turn_secret" first, and falls back to +# "turn_secret" if invalid or failed to open. +# +# example: "/etc/continuwuity/.turn_secret" +# +#turn_secret_file = + +# TURN TTL, in seconds. +# +#turn_ttl = 86400 + +# List/vector of room IDs or room aliases that continuwuity will make newly +# registered users join. The rooms specified must be rooms that you have +# joined at least once on the server, and must be public. +# +# example: ["#continuwuity:puppygock.gay", +# "!eoIzvAvVwY23LPDay8:puppygock.gay"] +# +#auto_join_rooms = [] + +# Config option to automatically deactivate the account of any user who +# attempts to join a: +# - banned room +# - forbidden room alias +# - room alias or ID with a forbidden server name +# +# This may be useful if all your banned lists consist of toxic rooms or +# servers that no good faith user would ever attempt to join, and +# to automatically remediate the problem without any admin user +# intervention. +# +# This will also make the user leave all rooms. Federation (e.g. remote +# room invites) are ignored here. +# +# Defaults to false as rooms can be banned for non-moderation-related +# reasons and this performs a full user deactivation. +# +#auto_deactivate_banned_room_attempts = false + +# RocksDB log level. This is not the same as continuwuity's log level. This +# is the log level for the RocksDB engine/library which show up in your +# database folder/path as `LOG` files. continuwuity will log RocksDB errors +# as normal through tracing or panics if severe for safety. +# +#rocksdb_log_level = "error" + +# This item is undocumented. Please contribute documentation for it. +# +#rocksdb_log_stderr = false + +# Max RocksDB `LOG` file size before rotating in bytes. Defaults to 4MB in +# bytes. +# +#rocksdb_max_log_file_size = 4194304 + +# Time in seconds before RocksDB will forcibly rotate logs. +# +#rocksdb_log_time_to_roll = 0 + +# Set this to true to use RocksDB config options that are tailored to HDDs +# (slower device storage). +# +# It is worth noting that by default, continuwuity will use RocksDB with +# Direct IO enabled. *Generally* speaking this improves performance as it +# bypasses buffered I/O (system page cache). However there is a potential +# chance that Direct IO may cause issues with database operations if your +# setup is uncommon. This has been observed with FUSE filesystems, and +# possibly ZFS filesystem. RocksDB generally deals/corrects these issues +# but it cannot account for all setups. If you experience any weird +# RocksDB issues, try enabling this option as it turns off Direct IO and +# feel free to report in the continuwuity Matrix room if this option fixes +# your DB issues. +# +# For more information, see: +# https://github.com/facebook/rocksdb/wiki/Direct-IO +# +#rocksdb_optimize_for_spinning_disks = false + +# Enables direct-io to increase database performance via unbuffered I/O. +# +# For more details about direct I/O and RockDB, see: +# https://github.com/facebook/rocksdb/wiki/Direct-IO +# +# Set this option to false if the database resides on a filesystem which +# does not support direct-io like FUSE, or any form of complex filesystem +# setup such as possibly ZFS. +# +#rocksdb_direct_io = true + +# Amount of threads that RocksDB will use for parallelism on database +# operations such as cleanup, sync, flush, compaction, etc. Set to 0 to +# use all your logical threads. Defaults to your CPU logical thread count. +# +#rocksdb_parallelism_threads = varies by system + +# Maximum number of LOG files RocksDB will keep. This must *not* be set to +# 0. It must be at least 1. Defaults to 3 as these are not very useful +# unless troubleshooting/debugging a RocksDB bug. +# +#rocksdb_max_log_files = 3 + +# Type of RocksDB database compression to use. +# +# Available options are "zstd", "zlib", "bz2", "lz4", or "none". +# +# It is best to use ZSTD as an overall good balance between +# speed/performance, storage, IO amplification, and CPU usage. For more +# performance but less compression (more storage used) and less CPU usage, +# use LZ4. +# +# For more details, see: +# https://github.com/facebook/rocksdb/wiki/Compression +# +# "none" will disable compression. +# +#rocksdb_compression_algo = "zstd" + +# Level of compression the specified compression algorithm for RocksDB to +# use. +# +# Default is 32767, which is internally read by RocksDB as the default +# magic number and translated to the library's default compression level +# as they all differ. See their `kDefaultCompressionLevel`. +# +#rocksdb_compression_level = 32767 + +# Level of compression the specified compression algorithm for the +# bottommost level/data for RocksDB to use. Default is 32767, which is +# internally read by RocksDB as the default magic number and translated to +# the library's default compression level as they all differ. See their +# `kDefaultCompressionLevel`. +# +# Since this is the bottommost level (generally old and least used data), +# it may be desirable to have a very high compression level here as it's +# less likely for this data to be used. Research your chosen compression +# algorithm. +# +#rocksdb_bottommost_compression_level = 32767 + +# Whether to enable RocksDB's "bottommost_compression". +# +# At the expense of more CPU usage, this will further compress the +# database to reduce more storage. It is recommended to use ZSTD +# compression with this for best compression results. This may be useful +# if you're trying to reduce storage usage from the database. +# +# See https://github.com/facebook/rocksdb/wiki/Compression for more details. +# +#rocksdb_bottommost_compression = false + +# Database recovery mode (for RocksDB WAL corruption). +# +# Use this option when the server reports corruption and refuses to start. +# Set mode 2 (PointInTime) to cleanly recover from this corruption. The +# server will continue from the last good state, several seconds or +# minutes prior to the crash. Clients may have to run "clear-cache & +# reload" to account for the rollback. Upon success, you may reset the +# mode back to default and restart again. Please note in some cases the +# corruption error may not be cleared for at least 30 minutes of operation +# in PointInTime mode. +# +# As a very last ditch effort, if PointInTime does not fix or resolve +# anything, you can try mode 3 (SkipAnyCorruptedRecord) but this will +# leave the server in a potentially inconsistent state. +# +# The default mode 1 (TolerateCorruptedTailRecords) will automatically +# drop the last entry in the database if corrupted during shutdown, but +# nothing more. It is extraordinarily unlikely this will desynchronize +# clients. To disable any form of silent rollback set mode 0 +# (AbsoluteConsistency). +# +# The options are: +# 0 = AbsoluteConsistency +# 1 = TolerateCorruptedTailRecords (default) +# 2 = PointInTime (use me if trying to recover) +# 3 = SkipAnyCorruptedRecord (you now voided your continuwuity warranty) +# +# For more information on these modes, see: +# https://github.com/facebook/rocksdb/wiki/WAL-Recovery-Modes +# +# For more details on recovering a corrupt database, see: +# https://continuwuity.org/troubleshooting.html#database-corruption +# +#rocksdb_recovery_mode = 1 + +# Enables or disables paranoid SST file checks. This can improve RocksDB +# database consistency at a potential performance impact due to further +# safety checks ran. +# +# For more information, see: +# https://github.com/facebook/rocksdb/wiki/Online-Verification#columnfamilyoptionsparanoid_file_checks +# +#rocksdb_paranoid_file_checks = false + +# Database repair mode (for RocksDB SST corruption). +# +# Use this option when the server reports corruption while running or +# panics. If the server refuses to start use the recovery mode options +# first. Corruption errors containing the acronym 'SST' which occur after +# startup will likely require this option. +# +# - Backing up your database directory is recommended prior to running the +# repair. +# +# - Disabling repair mode and restarting the server is recommended after +# running the repair. +# +# See https://continuwuity.org/troubleshooting.html#database-corruption for more details on recovering a corrupt database. +# +#rocksdb_repair = false + +# This item is undocumented. Please contribute documentation for it. +# +#rocksdb_read_only = false + +# This item is undocumented. Please contribute documentation for it. +# +#rocksdb_secondary = false + +# Enables idle CPU priority for compaction thread. This is not enabled by +# default to prevent compaction from falling too far behind on busy +# systems. +# +#rocksdb_compaction_prio_idle = false + +# Enables idle IO priority for compaction thread. This prevents any +# unexpected lag in the server's operation and is usually a good idea. +# Enabled by default. +# +#rocksdb_compaction_ioprio_idle = true + +# Disables RocksDB compaction. You should never ever have to set this +# option to true. If you for some reason find yourself needing to use this +# option as part of troubleshooting or a bug, please reach out to us in +# the continuwuity Matrix room with information and details. +# +# Disabling compaction will lead to a significantly bloated and +# explosively large database, gradually poor performance, unnecessarily +# excessive disk read/writes, and slower shutdowns and startups. +# +#rocksdb_compaction = true + +# Level of statistics collection. Some admin commands to display database +# statistics may require this option to be set. Database performance may +# be impacted by higher settings. +# +# Option is a number ranging from 0 to 6: +# 0 = No statistics. +# 1 = No statistics in release mode (default). +# 2 to 3 = Statistics with no performance impact. +# 3 to 5 = Statistics with possible performance impact. +# 6 = All statistics. +# +#rocksdb_stats_level = 1 + +# This is a password that can be configured that will let you login to the +# server bot account (currently `@conduit`) for emergency troubleshooting +# purposes such as recovering/recreating your admin room, or inviting +# yourself back. +# +# See https://continuwuity.org/troubleshooting.html#lost-access-to-admin-room for other ways to get back into your admin room. +# +# Once this password is unset, all sessions will be logged out for +# security purposes. +# +# example: "F670$2CP@Hw8mG7RY1$%!#Ic7YA" +# +emergency_password = {{ matrix_continuwuity_config_emergency_password | to_json }} + +# This item is undocumented. Please contribute documentation for it. +# +#notification_push_path = "/_matrix/push/v1/notify" + +# Allow local (your server only) presence updates/requests. +# +# Note that presence on continuwuity is very fast unlike Synapse's. If using +# outgoing presence, this MUST be enabled. +# +#allow_local_presence = true + +# Allow incoming federated presence updates/requests. +# +# This option receives presence updates from other servers, but does not +# send any unless `allow_outgoing_presence` is true. Note that presence on +# continuwuity is very fast unlike Synapse's. +# +#allow_incoming_presence = true + +# Allow outgoing presence updates/requests. +# +# This option sends presence updates to other servers, but does not +# receive any unless `allow_incoming_presence` is true. Note that presence +# on continuwuity is very fast unlike Synapse's. If using outgoing presence, +# you MUST enable `allow_local_presence` as well. +# +#allow_outgoing_presence = true + +# How many seconds without presence updates before you become idle. +# Defaults to 5 minutes. +# +#presence_idle_timeout_s = 300 + +# How many seconds without presence updates before you become offline. +# Defaults to 30 minutes. +# +#presence_offline_timeout_s = 1800 + +# Enable the presence idle timer for remote users. +# +# Disabling is offered as an optimization for servers participating in +# many large rooms or when resources are limited. Disabling it may cause +# incorrect presence states (i.e. stuck online) to be seen for some remote +# users. +# +#presence_timeout_remote_users = true + +# Allow receiving incoming read receipts from remote servers. +# +#allow_incoming_read_receipts = true + +# Allow sending read receipts to remote servers. +# +#allow_outgoing_read_receipts = true + +# Allow outgoing typing updates to federation. +# +#allow_outgoing_typing = true + +# Allow incoming typing updates from federation. +# +#allow_incoming_typing = true + +# Maximum time federation user can indicate typing. +# +#typing_federation_timeout_s = 30 + +# Minimum time local client can indicate typing. This does not override a +# client's request to stop typing. It only enforces a minimum value in +# case of no stop request. +# +#typing_client_timeout_min_s = 15 + +# Maximum time local client can indicate typing. +# +#typing_client_timeout_max_s = 45 + +# Set this to true for continuwuity to compress HTTP response bodies using +# zstd. This option does nothing if continuwuity was not built with +# `zstd_compression` feature. Please be aware that enabling HTTP +# compression may weaken TLS. Most users should not need to enable this. +# See https://breachattack.com/ and https://wikipedia.org/wiki/BREACH +# before deciding to enable this. +# +#zstd_compression = false + +# Set this to true for continuwuity to compress HTTP response bodies using +# gzip. This option does nothing if continuwuity was not built with +# `gzip_compression` feature. Please be aware that enabling HTTP +# compression may weaken TLS. Most users should not need to enable this. +# See https://breachattack.com/ and https://wikipedia.org/wiki/BREACH before +# deciding to enable this. +# +# If you are in a large amount of rooms, you may find that enabling this +# is necessary to reduce the significantly large response bodies. +# +#gzip_compression = false + +# Set this to true for continuwuity to compress HTTP response bodies using +# brotli. This option does nothing if continuwuity was not built with +# `brotli_compression` feature. Please be aware that enabling HTTP +# compression may weaken TLS. Most users should not need to enable this. +# See https://breachattack.com/ and https://wikipedia.org/wiki/BREACH +# before deciding to enable this. +# +#brotli_compression = false + +# Set to true to allow user type "guest" registrations. Some clients like +# Element attempt to register guest users automatically. +# +#allow_guest_registration = false + +# Set to true to log guest registrations in the admin room. Note that +# these may be noisy or unnecessary if you're a public homeserver. +# +#log_guest_registrations = false + +# Set to true to allow guest registrations/users to auto join any rooms +# specified in `auto_join_rooms`. +# +#allow_guests_auto_join_rooms = false + +# Enable the legacy unauthenticated Matrix media repository endpoints. +# These endpoints consist of: +# - /_matrix/media/*/config +# - /_matrix/media/*/upload +# - /_matrix/media/*/preview_url +# - /_matrix/media/*/download/* +# - /_matrix/media/*/thumbnail/* +# +# The authenticated equivalent endpoints are always enabled. +# +# Defaults to true for now, but this is highly subject to change, likely +# in the next release. +# +#allow_legacy_media = true + +# This item is undocumented. Please contribute documentation for it. +# +#freeze_legacy_media = true + +# Check consistency of the media directory at startup: +# 1. When `media_compat_file_link` is enabled, this check will upgrade +# media when switching back and forth between Conduit and continuwuity. +# Both options must be enabled to handle this. +# 2. When media is deleted from the directory, this check will also delete +# its database entry. +# +# If none of these checks apply to your use cases, and your media +# directory is significantly large setting this to false may reduce +# startup time. +# +#media_startup_check = true + +# Enable backward-compatibility with Conduit's media directory by creating +# symlinks of media. +# +# This option is only necessary if you plan on using Conduit again. +# Otherwise setting this to false reduces filesystem clutter and overhead +# for managing these symlinks in the directory. This is now disabled by +# default. You may still return to upstream Conduit but you have to run +# continuwuity at least once with this set to true and allow the +# media_startup_check to take place before shutting down to return to +# Conduit. +# +#media_compat_file_link = false + +# Prune missing media from the database as part of the media startup +# checks. +# +# This means if you delete files from the media directory the +# corresponding entries will be removed from the database. This is +# disabled by default because if the media directory is accidentally moved +# or inaccessible, the metadata entries in the database will be lost with +# sadness. +# +#prune_missing_media = false + +# Vector list of servers that continuwuity will refuse to download remote +# media from. +# +#prevent_media_downloads_from = [] + +# List of forbidden server names that we will block incoming AND outgoing +# federation with, and block client room joins / remote user invites. +# +# This check is applied on the room ID, room alias, sender server name, +# sender user's server name, inbound federation X-Matrix origin, and +# outbound federation handler. +# +# Basically "global" ACLs. +# +#forbidden_remote_server_names = [] + +# List of forbidden server names that we will block all outgoing federated +# room directory requests for. Useful for preventing our users from +# wandering into bad servers or spaces. +# +#forbidden_remote_room_directory_server_names = [] + +# Vector list of IPv4 and IPv6 CIDR ranges / subnets *in quotes* that you +# do not want continuwuity to send outbound requests to. Defaults to +# RFC1918, unroutable, loopback, multicast, and testnet addresses for +# security. +# +# Please be aware that this is *not* a guarantee. You should be using a +# firewall with zones as doing this on the application layer may have +# bypasses. +# +# Currently this does not account for proxies in use like Synapse does. +# +# To disable, set this to be an empty vector (`[]`). +# +# Defaults to: +# ["127.0.0.0/8", "10.0.0.0/8", "172.16.0.0/12", +# "192.168.0.0/16", "100.64.0.0/10", "192.0.0.0/24", "169.254.0.0/16", +# "192.88.99.0/24", "198.18.0.0/15", "192.0.2.0/24", "198.51.100.0/24", +# "203.0.113.0/24", "224.0.0.0/4", "::1/128", "fe80::/10", "fc00::/7", +# "2001:db8::/32", "ff00::/8", "fec0::/10"] +# +#ip_range_denylist = + +# Optional IP address or network interface-name to bind as the source of +# URL preview requests. If not set, it will not bind to a specific +# address or interface. +# +# Interface names only supported on Linux, Android, and Fuchsia platforms; +# all other platforms can specify the IP address. To list the interfaces +# on your system, use the command `ip link show`. +# +# example: `"eth0"` or `"1.2.3.4"` +# +#url_preview_bound_interface = + +# Vector list of domains allowed to send requests to for URL previews. +# +# This is a *contains* match, not an explicit match. Putting "google.com" +# will match "https://google.com" and +# "http://mymaliciousdomainexamplegoogle.com" Setting this to "*" will +# allow all URL previews. Please note that this opens up significant +# attack surface to your server, you are expected to be aware of the risks +# by doing so. +# +#url_preview_domain_contains_allowlist = [] + +# Vector list of explicit domains allowed to send requests to for URL +# previews. +# +# This is an *explicit* match, not a contains match. Putting "google.com" +# will match "https://google.com", "http://google.com", but not +# "https://mymaliciousdomainexamplegoogle.com". Setting this to "*" will +# allow all URL previews. Please note that this opens up significant +# attack surface to your server, you are expected to be aware of the risks +# by doing so. +# +#url_preview_domain_explicit_allowlist = [] + +# Vector list of explicit domains not allowed to send requests to for URL +# previews. +# +# This is an *explicit* match, not a contains match. Putting "google.com" +# will match "https://google.com", "http://google.com", but not +# "https://mymaliciousdomainexamplegoogle.com". The denylist is checked +# first before allowlist. Setting this to "*" will not do anything. +# +#url_preview_domain_explicit_denylist = [] + +# Vector list of URLs allowed to send requests to for URL previews. +# +# Note that this is a *contains* match, not an explicit match. Putting +# "google.com" will match "https://google.com/", +# "https://google.com/url?q=https://mymaliciousdomainexample.com", and +# "https://mymaliciousdomainexample.com/hi/google.com" Setting this to "*" +# will allow all URL previews. Please note that this opens up significant +# attack surface to your server, you are expected to be aware of the risks +# by doing so. +# +#url_preview_url_contains_allowlist = [] + +# Maximum amount of bytes allowed in a URL preview body size when +# spidering. Defaults to 256KB in bytes. +# +#url_preview_max_spider_size = 256000 + +# Option to decide whether you would like to run the domain allowlist +# checks (contains and explicit) on the root domain or not. Does not apply +# to URL contains allowlist. Defaults to false. +# +# Example usecase: If this is enabled and you have "wikipedia.org" allowed +# in the explicit and/or contains domain allowlist, it will allow all +# subdomains under "wikipedia.org" such as "en.m.wikipedia.org" as the +# root domain is checked and matched. Useful if the domain contains +# allowlist is still too broad for you but you still want to allow all the +# subdomains under a root domain. +# +#url_preview_check_root_domain = false + +# List of forbidden room aliases and room IDs as strings of regex +# patterns. +# +# Regex can be used or explicit contains matches can be done by just +# specifying the words (see example). +# +# This is checked upon room alias creation, custom room ID creation if +# used, and startup as warnings if any room aliases in your database have +# a forbidden room alias/ID. +# +# example: ["19dollarfortnitecards", "b[4a]droom"] +# +#forbidden_alias_names = [] + +# List of forbidden username patterns/strings. +# +# Regex can be used or explicit contains matches can be done by just +# specifying the words (see example). +# +# This is checked upon username availability check, registration, and +# startup as warnings if any local users in your database have a forbidden +# username. +# +# example: ["administrator", "b[a4]dusernam[3e]"] +# +#forbidden_usernames = [] + +# Retry failed and incomplete messages to remote servers immediately upon +# startup. This is called bursting. If this is disabled, said messages may +# not be delivered until more messages are queued for that server. Do not +# change this option unless server resources are extremely limited or the +# scale of the server's deployment is huge. Do not disable this unless you +# know what you are doing. +# +#startup_netburst = true + +# Messages are dropped and not reattempted. The `startup_netburst` option +# must be enabled for this value to have any effect. Do not change this +# value unless you know what you are doing. Set this value to -1 to +# reattempt every message without trimming the queues; this may consume +# significant disk. Set this value to 0 to drop all messages without any +# attempt at redelivery. +# +#startup_netburst_keep = 50 + +# Block non-admin local users from sending room invites (local and +# remote), and block non-admin users from receiving remote room invites. +# +# Admins are always allowed to send and receive all room invites. +# +#block_non_admin_invites = false + +# Allow admins to enter commands in rooms other than "#admins" (admin +# room) by prefixing your message with "\!admin" or "\\!admin" followed up +# a normal continuwuity admin command. The reply will be publicly visible to +# the room, originating from the sender. +# +# example: \\!admin debug ping puppygock.gay +# +#admin_escape_commands = true + +# Automatically activate the continuwuity admin room console / CLI on +# startup. This option can also be enabled with `--console` continuwuity +# argument. +# +#admin_console_automatic = false + +# List of admin commands to execute on startup. +# +# This option can also be configured with the `--execute` continuwuity +# argument and can take standard shell commands and environment variables +# +# For example: `./continuwuity --execute "server admin-notice continuwuity has +# started up at $(date)"` +# +# example: admin_execute = ["debug ping puppygock.gay", "debug echo hi"]` +# +#admin_execute = [] + +# Ignore errors in startup commands. +# +# If false, continuwuity will error and fail to start if an admin execute +# command (`--execute` / `admin_execute`) fails. +# +#admin_execute_errors_ignore = false + +# Controls the max log level for admin command log captures (logs +# generated from running admin commands). Defaults to "info" on release +# builds, else "debug" on debug builds. +# +#admin_log_capture = "info" + +# The default room tag to apply on the admin room. +# +# On some clients like Element, the room tag "m.server_notice" is a +# special pinned room at the very bottom of your room list. The continuwuity +# admin room can be pinned here so you always have an easy-to-access +# shortcut dedicated to your admin room. +# +#admin_room_tag = "m.server_notice" + +# Sentry.io crash/panic reporting, performance monitoring/metrics, etc. +# This is NOT enabled by default. continuwuity's default Sentry reporting +# endpoint domain is `o4506996327251968.ingest.us.sentry.io`. +# +#sentry = false + +# Sentry reporting URL, if a custom one is desired. +# +#sentry_endpoint = "https://fe2eb4536aa04949e28eff3128d64757@o4506996327251968.ingest.us.sentry.io/4506996334657536" + +# Report your continuwuity server_name in Sentry.io crash reports and +# metrics. +# +#sentry_send_server_name = false + +# Performance monitoring/tracing sample rate for Sentry.io. +# +# Note that too high values may impact performance, and can be disabled by +# setting it to 0.0 (0%) This value is read as a percentage to Sentry, +# represented as a decimal. Defaults to 15% of traces (0.15) +# +#sentry_traces_sample_rate = 0.15 + +# Whether to attach a stacktrace to Sentry reports. +# +#sentry_attach_stacktrace = false + +# Send panics to Sentry. This is true by default, but Sentry has to be +# enabled. The global `sentry` config option must be enabled to send any +# data. +# +#sentry_send_panic = true + +# Send errors to sentry. This is true by default, but sentry has to be +# enabled. This option is only effective in release-mode; forced to false +# in debug-mode. +# +#sentry_send_error = true + +# Controls the tracing log level for Sentry to send things like +# breadcrumbs and transactions +# +#sentry_filter = "info" + +# Enable the tokio-console. This option is only relevant to developers. +# +# For more information, see: +# https://continuwuity.org/development.html#debugging-with-tokio-console +# +#tokio_console = false + +# This item is undocumented. Please contribute documentation for it. +# +#test = false + +# Controls whether admin room notices like account registrations, password +# changes, account deactivations, room directory publications, etc will be +# sent to the admin room. Update notices and normal admin command +# responses will still be sent. +# +#admin_room_notices = true + +# Enable database pool affinity support. On supporting systems, block +# device queue topologies are detected and the request pool is optimized +# for the hardware; db_pool_workers is determined automatically. +# +#db_pool_affinity = true + +# Sets the number of worker threads in the frontend-pool of the database. +# This number should reflect the I/O capabilities of the system, +# such as the queue-depth or the number of simultaneous requests in +# flight. Defaults to 32 or four times the number of CPU cores, whichever +# is greater. +# +# Note: This value is only used if db_pool_affinity is disabled or not +# detected on the system, otherwise it is determined automatically. +# +#db_pool_workers = 32 + +# When db_pool_affinity is enabled and detected, the size of any worker +# group will not exceed the determined value. This is necessary when +# thread-pooling approach does not scale to the full capabilities of +# high-end hardware; using detected values without limitation could +# degrade performance. +# +# The value is multiplied by the number of cores which share a device +# queue, since group workers can be scheduled on any of those cores. +# +#db_pool_workers_limit = 64 + +# Determines the size of the queues feeding the database's frontend-pool. +# The size of the queue is determined by multiplying this value with the +# number of pool workers. When this queue is full, tokio tasks conducting +# requests will yield until space is available; this is good for +# flow-control by avoiding buffer-bloat, but can inhibit throughput if +# too low. +# +#db_pool_queue_mult = 4 + +# Sets the initial value for the concurrency of streams. This value simply +# allows overriding the default in the code. The default is 32, which is +# the same as the default in the code. Note this value is itself +# overridden by the computed stream_width_scale, unless that is disabled; +# this value can serve as a fixed-width instead. +# +#stream_width_default = 32 + +# Scales the stream width starting from a base value detected for the +# specific system. The base value is the database pool worker count +# determined from the hardware queue size (e.g. 32 for SSD or 64 or 128+ +# for NVMe). This float allows scaling the width up or down by multiplying +# it (e.g. 1.5, 2.0, etc). The maximum result can be the size of the pool +# queue (see: db_pool_queue_mult) as any larger value will stall the tokio +# task. The value can also be scaled down (e.g. 0.5) to improve +# responsiveness for many users at the cost of throughput for each. +# +# Setting this value to 0.0 causes the stream width to be fixed at the +# value of stream_width_default. The default scale is 1.0 to match the +# capabilities detected for the system. +# +#stream_width_scale = 1.0 + +# Sets the initial amplification factor. This controls batch sizes of +# requests made by each pool worker, multiplying the throughput of each +# stream. This value is somewhat abstract from specific hardware +# characteristics and can be significantly larger than any thread count or +# queue size. This is because each database query may require several +# index lookups, thus many database queries in a batch may make progress +# independently while also sharing index and data blocks which may or may +# not be cached. It is worthwhile to submit huge batches to reduce +# complexity. The maximum value is 32768, though sufficient hardware is +# still advised for that. +# +#stream_amplification = 1024 + +# Number of sender task workers; determines sender parallelism. Default is +# '0' which means the value is determined internally, likely matching the +# number of tokio worker-threads or number of cores, etc. Override by +# setting a non-zero value. +# +#sender_workers = 0 + +[global.well_known] + +# The server URL that the client well-known file will serve. This should +# not contain a port, and should just be a valid HTTPS URL. +# +# example: "https://matrix.example.com" +# +#client = + +# The server base domain of the URL with a specific port that the server +# well-known file will serve. This should contain a port at the end, and +# should not be a URL. +# +# example: "matrix.example.com:443" +# +#server = + +# This item is undocumented. Please contribute documentation for it. +# +#support_page = + +# This item is undocumented. Please contribute documentation for it. +# +#support_role = + +# This item is undocumented. Please contribute documentation for it. +# +#support_email = + +# This item is undocumented. Please contribute documentation for it. +# +#support_mxid = diff --git a/roles/custom/matrix-continuwuity/templates/env.j2 b/roles/custom/matrix-continuwuity/templates/env.j2 new file mode 100644 index 000000000..885bd1b53 --- /dev/null +++ b/roles/custom/matrix-continuwuity/templates/env.j2 @@ -0,0 +1 @@ +{{ matrix_continuwuity_environment_variables_extension }} diff --git a/roles/custom/matrix-continuwuity/templates/env.j2.license b/roles/custom/matrix-continuwuity/templates/env.j2.license new file mode 100644 index 000000000..a149c4232 --- /dev/null +++ b/roles/custom/matrix-continuwuity/templates/env.j2.license @@ -0,0 +1,3 @@ +SPDX-FileCopyrightText: 2025 Slavi Pantaleev + +SPDX-License-Identifier: AGPL-3.0-or-later diff --git a/roles/custom/matrix-continuwuity/templates/labels.j2 b/roles/custom/matrix-continuwuity/templates/labels.j2 new file mode 100644 index 000000000..4852e48f5 --- /dev/null +++ b/roles/custom/matrix-continuwuity/templates/labels.j2 @@ -0,0 +1,173 @@ +{# +SPDX-FileCopyrightText: 2025 MDAD project contributors +SPDX-FileCopyrightText: 2025 Slavi Pantaleev +SPDX-FileCopyrightText: 2025 Suguru Hirahara + +SPDX-License-Identifier: AGPL-3.0-or-later +#} + +{% if matrix_continuwuity_container_labels_traefik_enabled %} +traefik.enable=true + +{% if matrix_continuwuity_container_labels_traefik_docker_network %} +traefik.docker.network={{ matrix_continuwuity_container_labels_traefik_docker_network }} +{% endif %} + +traefik.http.services.matrix-continuwuity.loadbalancer.server.port={{ matrix_continuwuity_config_port_number }} + + +{% if matrix_continuwuity_container_labels_public_client_root_enabled %} +############################################################ +# # +# Public Root path (/) # +# # +############################################################ + +{% set client_root_middlewares = [] %} + +{% if matrix_continuwuity_container_labels_public_client_root_redirection_enabled %} +{% set client_root_middlewares = client_root_middlewares + ['matrix-continuwuity-client-root-redirect'] %} +traefik.http.middlewares.matrix-continuwuity-client-root-redirect.redirectregex.regex=(.*) +traefik.http.middlewares.matrix-continuwuity-client-root-redirect.redirectregex.replacement={{ matrix_continuwuity_container_labels_public_client_root_redirection_url }} +{% endif %} + +traefik.http.routers.matrix-continuwuity-public-client-root.rule={{ matrix_continuwuity_container_labels_public_client_root_traefik_rule }} + +traefik.http.routers.matrix-continuwuity-public-client-root.middlewares={{ client_root_middlewares | join(',') }} + +{% if matrix_continuwuity_container_labels_public_client_root_traefik_priority | int > 0 %} +traefik.http.routers.matrix-continuwuity-public-client-root.priority={{ matrix_continuwuity_container_labels_public_client_root_traefik_priority }} +{% endif %} + +traefik.http.routers.matrix-continuwuity-public-client-root.service=matrix-continuwuity +traefik.http.routers.matrix-continuwuity-public-client-root.entrypoints={{ matrix_continuwuity_container_labels_public_client_root_traefik_entrypoints }} +traefik.http.routers.matrix-continuwuity-public-client-root.tls={{ matrix_continuwuity_container_labels_public_client_root_traefik_tls | to_json }} + +{% if matrix_continuwuity_container_labels_public_client_root_traefik_tls %} +traefik.http.routers.matrix-continuwuity-public-client-root.tls.certResolver={{ matrix_continuwuity_container_labels_public_client_root_traefik_tls_certResolver }} +{% endif %} + +############################################################ +# # +# /Public Root path (/) # +# # +############################################################ +{% endif %} + + +{% if matrix_continuwuity_container_labels_public_client_api_enabled %} +############################################################ +# # +# Public Client-API (/_matrix) # +# # +############################################################ + +traefik.http.routers.matrix-continuwuity-public-client-api.rule={{ matrix_continuwuity_container_labels_public_client_api_traefik_rule }} + +{% if matrix_continuwuity_container_labels_public_client_api_traefik_priority | int > 0 %} +traefik.http.routers.matrix-continuwuity-public-client-api.priority={{ matrix_continuwuity_container_labels_public_client_api_traefik_priority }} +{% endif %} + +traefik.http.routers.matrix-continuwuity-public-client-api.service=matrix-continuwuity +traefik.http.routers.matrix-continuwuity-public-client-api.entrypoints={{ matrix_continuwuity_container_labels_public_client_api_traefik_entrypoints }} + +traefik.http.routers.matrix-continuwuity-public-client-api.tls={{ matrix_continuwuity_container_labels_public_client_api_traefik_tls | to_json }} +{% if matrix_continuwuity_container_labels_public_client_api_traefik_tls %} +traefik.http.routers.matrix-continuwuity-public-client-api.tls.certResolver={{ matrix_continuwuity_container_labels_public_client_api_traefik_tls_certResolver }} +{% endif %} + +############################################################ +# # +# /Public Client-API (/_matrix) # +# # +############################################################ +{% endif %} + + +{% if matrix_continuwuity_container_labels_internal_client_api_enabled %} +############################################################ +# # +# Internal Client-API (/_matrix) # +# # +############################################################ + +traefik.http.routers.matrix-continuwuity-internal-client-api.rule={{ matrix_continuwuity_container_labels_internal_client_api_traefik_rule }} + +{% if matrix_continuwuity_container_labels_internal_client_api_traefik_priority | int > 0 %} +traefik.http.routers.matrix-continuwuity-internal-client-api.priority={{ matrix_continuwuity_container_labels_internal_client_api_traefik_priority }} +{% endif %} + +traefik.http.routers.matrix-continuwuity-internal-client-api.service=matrix-continuwuity +traefik.http.routers.matrix-continuwuity-internal-client-api.entrypoints={{ matrix_continuwuity_container_labels_internal_client_api_traefik_entrypoints }} + +############################################################ +# # +# /Internal Client-API (/_matrix) # +# # +############################################################ +{% endif %} + + +{% if matrix_continuwuity_container_labels_public_federation_api_enabled %} +############################################################ +# # +# Public Federation-API (/_matrix) # +# # +############################################################ + +traefik.http.routers.matrix-continuwuity-public-federation-api.rule={{ matrix_continuwuity_container_labels_public_federation_api_traefik_rule }} + +{% if matrix_continuwuity_container_labels_public_federation_api_traefik_priority | int > 0 %} +traefik.http.routers.matrix-continuwuity-public-federation-api.priority={{ matrix_continuwuity_container_labels_public_federation_api_traefik_priority }} +{% endif %} + +traefik.http.routers.matrix-continuwuity-public-federation-api.service=matrix-continuwuity +traefik.http.routers.matrix-continuwuity-public-federation-api.entrypoints={{ matrix_continuwuity_container_labels_public_federation_api_traefik_entrypoints }} + +traefik.http.routers.matrix-continuwuity-public-federation-api.tls={{ matrix_continuwuity_container_labels_public_federation_api_traefik_tls | to_json }} +{% if matrix_continuwuity_container_labels_public_federation_api_traefik_tls %} +traefik.http.routers.matrix-continuwuity-public-federation-api.tls.certResolver={{ matrix_continuwuity_container_labels_public_federation_api_traefik_tls_certResolver }} +{% endif %} + +############################################################ +# # +# /Public Federation-API (/_matrix) # +# # +############################################################ +{% endif %} + + + + +{% if matrix_continuwuity_container_labels_public_continuwuity_api_enabled %} +############################################################ +# # +# Public continuwuity-API (/_continuwuity) # +# # +############################################################ + +traefik.http.routers.matrix-continuwuity-public-continuwuity-api.rule={{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_rule }} + +{% if matrix_continuwuity_container_labels_public_continuwuity_api_traefik_priority | int > 0 %} +traefik.http.routers.matrix-continuwuity-public-continuwuity-api.priority={{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_priority }} +{% endif %} + +traefik.http.routers.matrix-continuwuity-public-continuwuity-api.service=matrix-continuwuity +traefik.http.routers.matrix-continuwuity-public-continuwuity-api.entrypoints={{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_entrypoints }} + +traefik.http.routers.matrix-continuwuity-public-continuwuity-api.tls={{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_tls | to_json }} +{% if matrix_continuwuity_container_labels_public_continuwuity_api_traefik_tls %} +traefik.http.routers.matrix-continuwuity-public-continuwuity-api.tls.certResolver={{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_tls_certResolver }} +{% endif %} + +############################################################ +# # +# /Public continuwuity-API (/_continuwuity) # +# # +############################################################ +{% endif %} + + +{% endif %} + +{{ matrix_continuwuity_container_labels_additional_labels }} diff --git a/roles/custom/matrix-continuwuity/templates/systemd/matrix-continuwuity.service.j2 b/roles/custom/matrix-continuwuity/templates/systemd/matrix-continuwuity.service.j2 new file mode 100644 index 000000000..572b14882 --- /dev/null +++ b/roles/custom/matrix-continuwuity/templates/systemd/matrix-continuwuity.service.j2 @@ -0,0 +1,51 @@ +#jinja2: lstrip_blocks: "True" +[Unit] +Description=continuwuity Matrix homeserver +{% for service in matrix_continuwuity_systemd_required_services_list %} +Requires={{ service }} +After={{ service }} +{% endfor %} + +[Service] +Type=simple +Environment="HOME={{ devture_systemd_docker_base_systemd_unit_home_path }}" +ExecStartPre=-{{ devture_systemd_docker_base_host_command_sh }} -c '{{ devture_systemd_docker_base_host_command_docker }} stop -t {{ devture_systemd_docker_base_container_stop_grace_time_seconds }} matrix-continuwuity 2>/dev/null || true' +ExecStartPre=-{{ devture_systemd_docker_base_host_command_sh }} -c '{{ devture_systemd_docker_base_host_command_docker }} rm matrix-continuwuity 2>/dev/null || true' + +ExecStartPre={{ devture_systemd_docker_base_host_command_docker }} create \ + --rm \ + --name=matrix-continuwuity \ + --log-driver=none \ + --user={{ matrix_user_uid }}:{{ matrix_user_gid }} \ + --cap-drop=ALL \ + --read-only \ + --tmpfs=/tmp:rw,noexec,nosuid,size={{ matrix_continuwuity_tmp_directory_size_mb }}m \ + --network={{ matrix_continuwuity_container_network }} \ + --env continuwuity_CONFIG=/etc/continuwuity/continuwuity.toml \ + --label-file={{ matrix_continuwuity_base_path }}/labels \ + --mount type=bind,src={{ matrix_continuwuity_data_path }},dst=/var/lib/continuwuity \ + --mount type=bind,src={{ matrix_continuwuity_config_path }},dst=/etc/continuwuity,ro \ + {% for arg in matrix_continuwuity_container_extra_arguments %} + {{ arg }} \ + {% endfor %} + {{ matrix_continuwuity_docker_image }} + +{% for network in matrix_continuwuity_container_additional_networks %} +ExecStartPre={{ devture_systemd_docker_base_host_command_docker }} network connect {{ network }} matrix-continuwuity +{% endfor %} + +ExecStart={{ devture_systemd_docker_base_host_command_docker }} start --attach matrix-continuwuity + +{% if matrix_continuwuity_systemd_service_post_start_delay_seconds != 0 %} +ExecStartPost=-{{ matrix_host_command_sleep }} {{ matrix_continuwuity_systemd_service_post_start_delay_seconds }} +{% endif %} + +ExecStop=-{{ devture_systemd_docker_base_host_command_sh }} -c '{{ devture_systemd_docker_base_host_command_docker }} stop -t {{ devture_systemd_docker_base_container_stop_grace_time_seconds }} matrix-continuwuity 2>/dev/null || true' +ExecStop=-{{ devture_systemd_docker_base_host_command_sh }} -c '{{ devture_systemd_docker_base_host_command_docker }} rm matrix-continuwuity 2>/dev/null || true' +ExecReload={{ devture_systemd_docker_base_host_command_docker }} exec matrix-continuwuity /bin/sh -c 'kill -HUP 1' +Restart=always +RestartSec=30 +SyslogIdentifier=matrix-continuwuity + +[Install] +WantedBy=multi-user.target diff --git a/roles/custom/matrix-continuwuity/templates/systemd/matrix-continuwuity.service.j2.license b/roles/custom/matrix-continuwuity/templates/systemd/matrix-continuwuity.service.j2.license new file mode 100644 index 000000000..6fe7fc50c --- /dev/null +++ b/roles/custom/matrix-continuwuity/templates/systemd/matrix-continuwuity.service.j2.license @@ -0,0 +1,4 @@ +SPDX-FileCopyrightText: 2025 MDAD project contributors +SPDX-FileCopyrightText: 2025 Slavi Pantaleev + +SPDX-License-Identifier: AGPL-3.0-or-later diff --git a/roles/custom/matrix-continuwuity/vars/main.yml b/roles/custom/matrix-continuwuity/vars/main.yml new file mode 100644 index 000000000..d51a37c72 --- /dev/null +++ b/roles/custom/matrix-continuwuity/vars/main.yml @@ -0,0 +1,9 @@ +# SPDX-FileCopyrightText: 2025 MDAD project contributors +# SPDX-FileCopyrightText: 2025 Slavi Pantaleev +# +# SPDX-License-Identifier: AGPL-3.0-or-later + +--- + +matrix_continuwuity_client_api_url_endpoint_public: "{{ 'https' if matrix_playbook_ssl_enabled else 'http' }}://{{ matrix_continuwuity_hostname }}/_matrix/client/versions" +matrix_continuwuity_federation_api_url_endpoint_public: "{{ 'https' if matrix_playbook_ssl_enabled else 'http' }}://{{ matrix_continuwuity_hostname }}:{{ matrix_federation_public_port }}/_matrix/federation/v1/version" diff --git a/roles/custom/matrix-user-creator/tasks/util/ensure_user_registered_continuwuity.yml b/roles/custom/matrix-user-creator/tasks/util/ensure_user_registered_continuwuity.yml new file mode 100644 index 000000000..f5b4c320d --- /dev/null +++ b/roles/custom/matrix-user-creator/tasks/util/ensure_user_registered_continuwuity.yml @@ -0,0 +1,10 @@ +# SPDX-FileCopyrightText: 2025 Slavi Pantaleev +# SPDX-FileCopyrightText: 2025 Suguru Hirahara +# +# SPDX-License-Identifier: AGPL-3.0-or-later + +--- + +- name: Ensure continuwuity user registered - {{ user.username | quote }} + ansible.builtin.debug: + msg: "Not registering user. To register continuwuity users, message the continuwuity bot" diff --git a/setup.yml b/setup.yml index b5aa83412..76aa726a4 100644 --- a/setup.yml +++ b/setup.yml @@ -105,6 +105,7 @@ - custom/matrix-dendrite - custom/matrix-conduit - custom/matrix-conduwuit + - custom/matrix-continuwuity - custom/matrix-synapse-admin - custom/matrix-synapse-usage-exporter - galaxy/prometheus_node_exporter From fd329606874a5be01f1615a0e4fe72de5e8ee7cd Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Sat, 26 Apr 2025 09:31:55 +0300 Subject: [PATCH 033/404] Fix Continuwuity capitalization and clarify migration-from-conduwuit guide Related to https://github.com/spantaleev/matrix-docker-ansible-deploy/pull/4267 --- docs/configuring-playbook-continuwuity.md | 18 +++++++++++++----- 1 file changed, 13 insertions(+), 5 deletions(-) diff --git a/docs/configuring-playbook-continuwuity.md b/docs/configuring-playbook-continuwuity.md index ac08f852e..321b81b27 100644 --- a/docs/configuring-playbook-continuwuity.md +++ b/docs/configuring-playbook-continuwuity.md @@ -5,9 +5,9 @@ SPDX-FileCopyrightText: 2025 Suguru Hirahara SPDX-License-Identifier: AGPL-3.0-or-later --> -# Configuring continuwuity (optional) +# Configuring Continuwuity (optional) -The playbook can install and configure the [continuwuity](https://continuwuity.org) Matrix server for you. +The playbook can install and configure the [Continuwuity](https://continuwuity.org) Matrix server for you. See the project's [documentation](https://continuwuity.org) to learn what it does and why it might be useful to you. @@ -16,12 +16,12 @@ By default, the playbook installs [Synapse](https://github.com/element-hq/synaps 💡 **Note**: continuwuity is a fork of [conduwuit](./configuring-playbook-conduwuit.md), which the playbook also supports. > [!WARNING] -> - **You can't switch an existing Matrix server's implementation** (e.g. Synapse -> continuwuity). Proceed below only if you're OK with losing data or you're dealing with a server on a new domain name, which hasn't participated in the Matrix federation yet. +> - **You can't switch an existing Matrix server's implementation** (e.g. Synapse -> Continuwuity). Proceed below only if you're OK with losing data or you're dealing with a server on a new domain name, which hasn't participated in the Matrix federation yet. > - **Homeserver implementations other than Synapse may not be fully functional**. The playbook may also not assist you in an optimal way (like it does with Synapse). Make yourself familiar with the downsides before proceeding ## Adjusting the playbook configuration -To use continuwuity, you **generally** need to adjust the `matrix_homeserver_implementation: synapse` configuration on your `inventory/host_vars/matrix.example.com/vars.yml` file as below: +To use Continuwuity, you **generally** need to adjust the `matrix_homeserver_implementation: synapse` configuration on your `inventory/host_vars/matrix.example.com/vars.yml` file as below: ```yaml matrix_homeserver_implementation: continuwuity @@ -101,7 +101,15 @@ Then, send its content to the existing admin room: ## Migrating from conduwuit -Since continuwuity is a drop-in replacement for conduwuit, migration is possible. First, make sure that continuwuity is properly set up on your `vars.yml` and run the tag `just run-tags migrate-conduwuit` +Since Continuwuity is a drop-in replacement for [conduwuit](configuring-playbook-conduwuit.md), migration is possible. + +1. Make sure that Continuwuity is properly set up on your `vars.yml` as described above + +2. Make sure that Conduwuit references are removed from your `vars.yml` file + +3. Run the installation in a way that installs new services and uninstalls old ones (e.g. `just setup-all`) + +4. Run the playbook with the `migrate-conduwuit` tag (e.g. `just run-tags migrate-conduwuit`). This migrates data from `/matrix/conduwuit` to `/matrix/continuwuity` ## Troubleshooting From 46e587ee2931c7eaaa904eb8a875cb78406b776e Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Sat, 26 Apr 2025 09:33:01 +0300 Subject: [PATCH 034/404] Mention Continuwuity on Conduwuit docs page Related to https://github.com/spantaleev/matrix-docker-ansible-deploy/pull/4267 --- docs/configuring-playbook-conduwuit.md | 1 + .../custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml | 1 - 2 files changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/configuring-playbook-conduwuit.md b/docs/configuring-playbook-conduwuit.md index 77685de03..dae349561 100644 --- a/docs/configuring-playbook-conduwuit.md +++ b/docs/configuring-playbook-conduwuit.md @@ -18,6 +18,7 @@ By default, the playbook installs [Synapse](https://github.com/element-hq/synaps > [!WARNING] > - **You can't switch an existing Matrix server's implementation** (e.g. Synapse -> conduwuit). Proceed below only if you're OK with losing data or you're dealing with a server on a new domain name, which hasn't participated in the Matrix federation yet. > - **Homeserver implementations other than Synapse may not be fully functional**. The playbook may also not assist you in an optimal way (like it does with Synapse). Make yourself familiar with the downsides before proceeding +> - **the Conduwuit project appears to have been abandoned**. You may wish to install [Conduit](./configuring-playbook-conduit.md), or one of the Conduwuit successors (like [Continuwuity](configuring-playbook-continuwuity.md)) ## Adjusting the playbook configuration diff --git a/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml b/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml index 311d5613c..463796cd5 100644 --- a/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml +++ b/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml @@ -7,7 +7,6 @@ # This migrates the conduwuit server implementation (`/matrix/conduwuit`) to continuwuity (`/matrix/continuwuity`), # # Here, we merely backup the fresh continuwuity folder, relocate conduwuit directory to continuwuity (`/matrix/conduwuit`) -# # and restore continuwuity labels. - name: Check existence of conduwuit directory From 3e1bc3ce59193a9b479015501363206aa3b25646 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Sat, 26 Apr 2025 09:34:51 +0300 Subject: [PATCH 035/404] Rename Continuwuity migration tag (`migrate-conduwuit` -> `conduwuit-migrate-from-continuwuity`) to be less generic This should allow roles for other forks (like Tuwunel) to use similar tags. Related to https://github.com/spantaleev/matrix-docker-ansible-deploy/pull/4267 --- docs/configuring-playbook-continuwuity.md | 3 ++- roles/custom/matrix-continuwuity/tasks/main.yml | 2 +- 2 files changed, 3 insertions(+), 2 deletions(-) diff --git a/docs/configuring-playbook-continuwuity.md b/docs/configuring-playbook-continuwuity.md index 321b81b27..4c9927362 100644 --- a/docs/configuring-playbook-continuwuity.md +++ b/docs/configuring-playbook-continuwuity.md @@ -83,6 +83,7 @@ Then, send its content to the existing admin room: ``` as_token: de.sorunome.msc2409.push_ephemeral: true + receive_ephemeral: true hs_token: id: signal namespaces: @@ -109,7 +110,7 @@ Since Continuwuity is a drop-in replacement for [conduwuit](configuring-playbook 3. Run the installation in a way that installs new services and uninstalls old ones (e.g. `just setup-all`) -4. Run the playbook with the `migrate-conduwuit` tag (e.g. `just run-tags migrate-conduwuit`). This migrates data from `/matrix/conduwuit` to `/matrix/continuwuity` +4. Run the playbook with the `conduwuit-migrate-from-continuwuity` tag (e.g. `just run-tags conduwuit-migrate-from-continuwuity`). This migrates data from `/matrix/conduwuit` to `/matrix/continuwuity` ## Troubleshooting diff --git a/roles/custom/matrix-continuwuity/tasks/main.yml b/roles/custom/matrix-continuwuity/tasks/main.yml index d51b2fff3..9f36c272b 100644 --- a/roles/custom/matrix-continuwuity/tasks/main.yml +++ b/roles/custom/matrix-continuwuity/tasks/main.yml @@ -34,7 +34,7 @@ ansible.builtin.include_tasks: "{{ role_path }}/tasks/self_check_federation_api.yml" - tags: - - migrate-conduwuit + - conduwuit-migrate-from-continuwuity block: - when: matrix_continuwuity_enabled | bool ansible.builtin.include_tasks: "{{ role_path }}/tasks/migrate_from_conduwuit.yml" From f0c48392fe12970bfef6c70685683e6da2912204 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Sat, 26 Apr 2025 09:37:01 +0300 Subject: [PATCH 036/404] Announce Continuwuity --- CHANGELOG.md | 18 ++++++++++++++++++ 1 file changed, 18 insertions(+) diff --git a/CHANGELOG.md b/CHANGELOG.md index 84b1dd658..a037191cf 100644 --- a/CHANGELOG.md +++ b/CHANGELOG.md @@ -1,3 +1,21 @@ +# 2025-04-26 + +## Continuwuity support + +Thanks to [Virkkunen](https://github.com/Virkkunen), we now have optional experimental [Continuwuity](./docs/configuring-playbook-continuwuity.md) homeserver support. + +Continuwuity is a fork of [conduwuit](./docs/configuring-playbook-conduwuit.md), which the playbook also supports. It appears that conduwuit has been abandoned and various forks (like Continuwuity, [Tuwunel](https://github.com/matrix-construct/tuwunel) and possibly others) are continuing in its path. + +Existing installations do **not** need to be updated. **Synapse is still the default homeserver implementation** installed by the playbook. + +People that used to run conduwuit, may wish to: + +- either [migrate from conduwuit to Continuwuity](./docs/configuring-playbook-continuwuity.md#migrating-from-conduwuit) +- or wait for some of the other forks to progress and for support for them to get added to the playbook + +**The homeserver implementation of an existing server cannot be changed** (e.g. from Synapse/Conduit/Dendrite to Continuwuity) without data loss. + + # 2025-04-09 ## Element Call frontend installation is now optional From 5ea613a3f616282b735d7934552f6b705571d568 Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Sat, 26 Apr 2025 08:54:46 +0200 Subject: [PATCH 037/404] migrate_from_conduwuit ownership fix (#4278) * migration ownership fix * lint fix * lint fixes --- .../tasks/migrate_from_conduwuit.yml | 19 +++++++++++++++++++ 1 file changed, 19 insertions(+) diff --git a/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml b/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml index 463796cd5..4f8bb6444 100644 --- a/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml +++ b/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml @@ -7,6 +7,7 @@ # This migrates the conduwuit server implementation (`/matrix/conduwuit`) to continuwuity (`/matrix/continuwuity`), # # Here, we merely backup the fresh continuwuity folder, relocate conduwuit directory to continuwuity (`/matrix/conduwuit`) +# # and restore continuwuity labels. - name: Check existence of conduwuit directory @@ -56,6 +57,24 @@ force: true mode: preserve + - name: Ensure directories ownership is set + block: + - name: Set continuwuity ownership + ansible.builtin.file: + path: "{{ matrix_base_data_path }}/continuwuity" + state: directory + owner: "{{ matrix_user_username }}" + group: "{{ matrix_user_groupname }}" + recurse: true + + - name: Set continuwuity_old ownership + ansible.builtin.file: + path: "{{ matrix_base_data_path }}/continuwuity_old" + state: directory + owner: "{{ matrix_user_username }}" + group: "{{ matrix_user_groupname }}" + recurse: true + - name: Ensure matrix-continuwuity.service systemd service is started ansible.builtin.systemd: name: matrix-continuwuity From 1c39a67c0ae00df2316fd46fab67db783ce42374 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Sat, 26 Apr 2025 10:25:51 +0300 Subject: [PATCH 038/404] Fix Continuwuity migration tag (`conduwuit-migrate-from-continuwuity` -> `continuwuity-migrate-from-conduwuit`) --- docs/configuring-playbook-continuwuity.md | 2 +- roles/custom/matrix-continuwuity/tasks/main.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/docs/configuring-playbook-continuwuity.md b/docs/configuring-playbook-continuwuity.md index 4c9927362..2f645c4d7 100644 --- a/docs/configuring-playbook-continuwuity.md +++ b/docs/configuring-playbook-continuwuity.md @@ -110,7 +110,7 @@ Since Continuwuity is a drop-in replacement for [conduwuit](configuring-playbook 3. Run the installation in a way that installs new services and uninstalls old ones (e.g. `just setup-all`) -4. Run the playbook with the `conduwuit-migrate-from-continuwuity` tag (e.g. `just run-tags conduwuit-migrate-from-continuwuity`). This migrates data from `/matrix/conduwuit` to `/matrix/continuwuity` +4. Run the playbook with the `continuwuity-migrate-from-conduwuit` tag (e.g. `just run-tags continuwuity-migrate-from-conduwuit`). This migrates data from `/matrix/conduwuit` to `/matrix/continuwuity` ## Troubleshooting diff --git a/roles/custom/matrix-continuwuity/tasks/main.yml b/roles/custom/matrix-continuwuity/tasks/main.yml index 9f36c272b..73b85baae 100644 --- a/roles/custom/matrix-continuwuity/tasks/main.yml +++ b/roles/custom/matrix-continuwuity/tasks/main.yml @@ -34,7 +34,7 @@ ansible.builtin.include_tasks: "{{ role_path }}/tasks/self_check_federation_api.yml" - tags: - - conduwuit-migrate-from-continuwuity + - continuwuity-migrate-from-conduwuit block: - when: matrix_continuwuity_enabled | bool ansible.builtin.include_tasks: "{{ role_path }}/tasks/migrate_from_conduwuit.yml" From bcd50c8e08de63e5720bdd8b0195e4c22ca5a269 Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Sat, 26 Apr 2025 11:53:24 +0200 Subject: [PATCH 039/404] fix continuwuity docker envs --- .../templates/systemd/matrix-continuwuity.service.j2 | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/roles/custom/matrix-continuwuity/templates/systemd/matrix-continuwuity.service.j2 b/roles/custom/matrix-continuwuity/templates/systemd/matrix-continuwuity.service.j2 index 572b14882..99fb39096 100644 --- a/roles/custom/matrix-continuwuity/templates/systemd/matrix-continuwuity.service.j2 +++ b/roles/custom/matrix-continuwuity/templates/systemd/matrix-continuwuity.service.j2 @@ -21,7 +21,8 @@ ExecStartPre={{ devture_systemd_docker_base_host_command_docker }} create \ --read-only \ --tmpfs=/tmp:rw,noexec,nosuid,size={{ matrix_continuwuity_tmp_directory_size_mb }}m \ --network={{ matrix_continuwuity_container_network }} \ - --env continuwuity_CONFIG=/etc/continuwuity/continuwuity.toml \ + --env CONDUWUIT_CONFIG=/etc/continuwuity/continuwuity.toml \ + --env CONDUWUIT_DATABASE_PATH=/var/lib/continuwuity \ --label-file={{ matrix_continuwuity_base_path }}/labels \ --mount type=bind,src={{ matrix_continuwuity_data_path }},dst=/var/lib/continuwuity \ --mount type=bind,src={{ matrix_continuwuity_config_path }},dst=/etc/continuwuity,ro \ From 186d3dbd713a07deb0632805cb96773546d32e0e Mon Sep 17 00:00:00 2001 From: Aine Date: Sun, 27 Apr 2025 21:31:15 +0300 Subject: [PATCH 040/404] fluffychat v1.26.0 --- roles/custom/matrix-client-fluffychat/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-fluffychat/defaults/main.yml b/roles/custom/matrix-client-fluffychat/defaults/main.yml index 417911a4c..2e74fd13c 100644 --- a/roles/custom/matrix-client-fluffychat/defaults/main.yml +++ b/roles/custom/matrix-client-fluffychat/defaults/main.yml @@ -13,7 +13,7 @@ matrix_client_fluffychat_container_image_self_build_repo: "https://github.com/et matrix_client_fluffychat_container_image_self_build_version: "{{ 'main' if matrix_client_fluffychat_version == 'latest' else matrix_client_fluffychat_version }}" # renovate: datasource=docker depName=ghcr.io/etkecc/fluffychat-web -matrix_client_fluffychat_version: v1.25.1 +matrix_client_fluffychat_version: v1.26.0 matrix_client_fluffychat_docker_image: "{{ matrix_client_fluffychat_docker_image_registry_prefix }}etkecc/fluffychat-web:{{ matrix_client_fluffychat_version }}" matrix_client_fluffychat_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_fluffychat_container_image_self_build else matrix_client_fluffychat_docker_image_registry_prefix_upstream }}" matrix_client_fluffychat_docker_image_registry_prefix_upstream: "{{ matrix_client_fluffychat_docker_image_registry_prefix_upstream_default }}" From feaa656fdee6385d7c1e18b2e630089cdad4cbad Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sun, 27 Apr 2025 18:01:01 +0000 Subject: [PATCH 041/404] Update dependency setuptools to v80 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index b4c2aff9d..2a3977695 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -17,7 +17,7 @@ packaging==25.0 Pygments==2.19.1 PyYAML==6.0.2 requests==2.32.3 -setuptools==79.0.1 +setuptools==80.0.0 snowballstemmer==2.2.0 Sphinx==8.2.3 sphinx-intl==2.3.1 From 9476be05920fcc56be53b46249b92662b0470389 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Mon, 28 Apr 2025 08:20:45 +0300 Subject: [PATCH 042/404] Upgrade Traefik (v3.3.6-0 -> v3.3.6-1) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index fa580dca8..8fb1d81ae 100644 --- a/requirements.yml +++ b/requirements.yml @@ -67,7 +67,7 @@ version: v1.0.0-0 name: timesync - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik.git - version: v3.3.6-0 + version: v3.3.6-1 name: traefik - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik-certs-dumper.git version: v2.10.0-0 From 71ce8f792da0a6264b19c16453aef28713e79aa5 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Mon, 28 Apr 2025 08:53:22 +0300 Subject: [PATCH 043/404] Upgrade Valkey (v8.0.1-3 -> v8.1.1-0) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 8fb1d81ae..e171ed1d3 100644 --- a/requirements.yml +++ b/requirements.yml @@ -73,5 +73,5 @@ version: v2.10.0-0 name: traefik_certs_dumper - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-valkey.git - version: v8.0.1-3 + version: v8.1.1-0 name: valkey From ffde4fcb80ad366cf1afd07ae823db23e1c1f53d Mon Sep 17 00:00:00 2001 From: Niko Diamadis Date: Mon, 28 Apr 2025 11:17:12 +0200 Subject: [PATCH 044/404] Fix README Matrix badge --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 045a7b1a6..227a6300a 100644 --- a/README.md +++ b/README.md @@ -1,4 +1,4 @@ -[![Support room on Matrix](https://img.shields.io/matrix/matrix-docker-ansible-deploy:devture.com.svg?label=%23matrix-docker-ansible-deploy%3Adevture.com&logo=matrix&style=for-the-badge&server_fqdn=matrix.devture.com)](https://matrix.to/#/#matrix-docker-ansible-deploy:devture.com) [![donate](https://liberapay.com/assets/widgets/donate.svg)](https://liberapay.com/s.pantaleev/donate) [![REUSE status](https://api.reuse.software/badge/github.com/spantaleev/matrix-docker-ansible-deploy)](https://api.reuse.software/info/github.com/spantaleev/matrix-docker-ansible-deploy) +[![Support room on Matrix](https://img.shields.io/matrix/matrix-docker-ansible-deploy:devture.com.svg?label=%23matrix-docker-ansible-deploy%3Adevture.com&logo=matrix&style=for-the-badge&server_fqdn=matrix.devture.com&fetchMode=summary)](https://matrix.to/#/#matrix-docker-ansible-deploy:devture.com) [![donate](https://liberapay.com/assets/widgets/donate.svg)](https://liberapay.com/s.pantaleev/donate) [![REUSE status](https://api.reuse.software/badge/github.com/spantaleev/matrix-docker-ansible-deploy)](https://api.reuse.software/info/github.com/spantaleev/matrix-docker-ansible-deploy) # Matrix (An open network for secure, decentralized communication) server setup using Ansible and Docker From 14aef55573f3894e1382a1824dcf1141a497c8b2 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 29 Apr 2025 10:30:42 +0300 Subject: [PATCH 045/404] Add `matrix_user_system` variable for controlling if `matrix` user is created as a system user This defaults to `true`, as before. --- roles/custom/matrix-base/defaults/main.yml | 1 + roles/custom/matrix-base/tasks/setup_matrix_user.yml | 2 +- 2 files changed, 2 insertions(+), 1 deletion(-) diff --git a/roles/custom/matrix-base/defaults/main.yml b/roles/custom/matrix-base/defaults/main.yml index 9679208aa..84b2707fb 100644 --- a/roles/custom/matrix-base/defaults/main.yml +++ b/roles/custom/matrix-base/defaults/main.yml @@ -177,6 +177,7 @@ matrix_container_global_registry_prefix_override: "" matrix_user_username: "matrix" matrix_user_groupname: "matrix" +matrix_user_system: true # By default, the playbook creates the user (`matrix_user_username`) # and group (`matrix_user_groupname`) with a random ID. diff --git a/roles/custom/matrix-base/tasks/setup_matrix_user.yml b/roles/custom/matrix-base/tasks/setup_matrix_user.yml index 146452302..37f5cdb99 100644 --- a/roles/custom/matrix-base/tasks/setup_matrix_user.yml +++ b/roles/custom/matrix-base/tasks/setup_matrix_user.yml @@ -20,7 +20,7 @@ group: "{{ matrix_user_groupname }}" home: "{{ matrix_base_data_path }}" create_home: false - system: true + system: "{{ matrix_user_system }}" register: matrix_user - name: Initialize matrix_user_uid and matrix_user_gid From a59383fcc7109bff0d7dd0d37162819bda332775 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 29 Apr 2025 10:31:12 +0300 Subject: [PATCH 046/404] Add `matrix_group_system` to configure whether the `matrix` group is also created as a system group We create the `matrix` user as a system user (smaller uid), so it makes sense to do the same for the `matrix` group. --- roles/custom/matrix-base/defaults/main.yml | 3 ++- roles/custom/matrix-base/tasks/setup_matrix_user.yml | 1 + 2 files changed, 3 insertions(+), 1 deletion(-) diff --git a/roles/custom/matrix-base/defaults/main.yml b/roles/custom/matrix-base/defaults/main.yml index 84b2707fb..589a3464d 100644 --- a/roles/custom/matrix-base/defaults/main.yml +++ b/roles/custom/matrix-base/defaults/main.yml @@ -176,8 +176,9 @@ matrix_debian_arch: "{{ 'armhf' if matrix_architecture == 'arm32' else matrix_ar matrix_container_global_registry_prefix_override: "" matrix_user_username: "matrix" -matrix_user_groupname: "matrix" matrix_user_system: true +matrix_user_groupname: "matrix" +matrix_group_system: true # By default, the playbook creates the user (`matrix_user_username`) # and group (`matrix_user_groupname`) with a random ID. diff --git a/roles/custom/matrix-base/tasks/setup_matrix_user.yml b/roles/custom/matrix-base/tasks/setup_matrix_user.yml index 37f5cdb99..f45936d14 100644 --- a/roles/custom/matrix-base/tasks/setup_matrix_user.yml +++ b/roles/custom/matrix-base/tasks/setup_matrix_user.yml @@ -10,6 +10,7 @@ name: "{{ matrix_user_groupname }}" gid: "{{ omit if matrix_user_gid is none else matrix_user_gid }}" state: present + system: "{{ matrix_group_system }}" register: matrix_group - name: Ensure Matrix user is created From 9fc5cdab33c042d8d1dbb97cefcd96237d17b6c1 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 29 Apr 2025 10:34:10 +0300 Subject: [PATCH 047/404] Rename variable (`matrix_user_username` -> `matrix_user_name`) --- docs/configuring-playbook-bridge-hookshot.md | 2 +- docs/configuring-playbook-sygnal.md | 2 +- group_vars/matrix_servers | 10 +++++----- .../matrix-alertmanager-receiver/tasks/install.yml | 8 ++++---- .../tasks/install.yml | 4 ++-- .../tasks/setup_install.yml | 10 +++++----- .../tasks/install.yml | 8 ++++---- .../tasks/syn2mas.yml | 2 +- .../tasks/util/prepare_key.yml | 2 +- roles/custom/matrix-base/defaults/main.yml | 4 ++-- .../custom/matrix-base/tasks/setup_matrix_base.yml | 2 +- .../custom/matrix-base/tasks/setup_matrix_user.yml | 2 +- roles/custom/matrix-base/tasks/validate_config.yml | 1 + roles/custom/matrix-bot-baibot/tasks/install.yml | 8 ++++---- .../matrix-bot-buscarron/tasks/setup_install.yml | 6 +++--- roles/custom/matrix-bot-chatgpt/tasks/install.yml | 6 +++--- .../matrix-bot-draupnir/tasks/setup_install.yml | 8 ++++---- roles/custom/matrix-bot-go-neb/tasks/install.yml | 6 +++--- .../matrix-bot-honoroit/tasks/setup_install.yml | 6 +++--- .../tasks/clean_cache.yml | 2 +- .../tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 6 +++--- .../matrix-bot-maubot/tasks/setup_install.yml | 10 +++++----- .../matrix-bot-mjolnir/tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 12 ++++++------ .../tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 14 +++++++------- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 6 +++--- .../matrix-bridge-hookshot/tasks/setup_install.yml | 14 +++++++------- .../tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 10 +++++----- .../tasks/install.yml | 10 +++++----- .../tasks/install.yml | 10 +++++----- .../tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 12 ++++++------ .../tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 12 ++++++------ .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 6 +++--- .../matrix-bridge-sms/tasks/setup_install.yml | 8 ++++---- .../custom/matrix-bridge-wechat/tasks/install.yml | 12 ++++++------ .../tasks/install.yml | 12 ++++++------ .../matrix-cactus-comments/tasks/setup_install.yml | 8 ++++---- .../matrix-client-cinny/tasks/setup_install.yml | 8 ++++---- .../matrix-client-element/tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 6 +++--- .../matrix-client-hydrogen/tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 10 +++++----- .../custom/matrix-conduit/tasks/setup_install.yml | 8 ++++---- roles/custom/matrix-conduwuit/tasks/install.yml | 8 ++++---- .../matrix-conduwuit/tasks/setup_install.yml | 8 ++++---- roles/custom/matrix-continuwuity/tasks/install.yml | 8 ++++---- .../tasks/migrate_from_conduwuit.yml | 4 ++-- .../matrix-continuwuity/tasks/setup_install.yml | 8 ++++---- .../custom/matrix-corporal/tasks/setup_install.yml | 8 ++++---- roles/custom/matrix-coturn/tasks/setup_install.yml | 8 ++++---- .../custom/matrix-dendrite/tasks/setup_install.yml | 12 ++++++------ .../matrix-dimension/tasks/setup_install.yml | 8 ++++---- .../matrix-dynamic-dns/tasks/setup_install.yml | 6 +++--- roles/custom/matrix-element-call/tasks/install.yml | 6 +++--- .../tasks/setup_install.yml | 8 ++++---- .../matrix-livekit-jwt-service/tasks/install.yml | 6 +++--- roles/custom/matrix-ma1sd/tasks/setup_install.yml | 12 ++++++------ .../matrix-media-repo/tasks/setup_install.yml | 10 +++++----- roles/custom/matrix-pantalaimon/tasks/install.yml | 6 +++--- .../tasks/setup_install.yml | 6 +++--- roles/custom/matrix-rageshake/tasks/install.yml | 8 ++++---- .../matrix-registration/tasks/setup_install.yml | 8 ++++---- roles/custom/matrix-sliding-sync/tasks/install.yml | 6 +++--- roles/custom/matrix-static-files/tasks/install.yml | 6 +++--- roles/custom/matrix-sygnal/tasks/install.yml | 6 +++--- .../matrix-synapse-admin/tasks/setup_install.yml | 8 ++++---- .../tasks/install.yml | 8 ++++---- .../tasks/setup_install.yml | 4 ++-- .../tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 6 +++--- 91 files changed, 352 insertions(+), 351 deletions(-) diff --git a/docs/configuring-playbook-bridge-hookshot.md b/docs/configuring-playbook-bridge-hookshot.md index fc637d853..07d2aea4c 100644 --- a/docs/configuring-playbook-bridge-hookshot.md +++ b/docs/configuring-playbook-bridge-hookshot.md @@ -126,7 +126,7 @@ aux_file_definitions: - dest: "{{ matrix_hookshot_base_path }}/{{ matrix_hookshot_github_private_key_file }}" content: "{{ lookup('file', '/path/to/your-github-private-key.pem') }}" mode: '0400' - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" ``` diff --git a/docs/configuring-playbook-sygnal.md b/docs/configuring-playbook-sygnal.md index 2bd800cdd..69c2aee18 100644 --- a/docs/configuring-playbook-sygnal.md +++ b/docs/configuring-playbook-sygnal.md @@ -49,7 +49,7 @@ aux_file_definitions: content here mode: '0600' - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" ``` diff --git a/group_vars/matrix_servers b/group_vars/matrix_servers index 45d2a81a4..5409e9220 100755 --- a/group_vars/matrix_servers +++ b/group_vars/matrix_servers @@ -73,10 +73,10 @@ matrix_federation_traefik_entrypoint_tls: "{{ traefik_config_entrypoint_web_secu # # ######################################################################## -aux_directory_default_owner: "{{ matrix_user_username }}" +aux_directory_default_owner: "{{ matrix_user_name }}" aux_directory_default_group: "{{ matrix_user_groupname }}" -aux_file_default_owner: "{{ matrix_user_username }}" +aux_file_default_owner: "{{ matrix_user_name }}" aux_file_default_group: "{{ matrix_user_groupname }}" ######################################################################## @@ -3314,7 +3314,7 @@ backup_borg_storage_archive_name_format: matrix-{now:%Y-%m-%d-%H%M%S} backup_borg_base_path: "{{ matrix_base_data_path }}/backup-borg" -backup_borg_username: "{{ matrix_user_username }}" +backup_borg_username: "{{ matrix_user_name }}" backup_borg_uid: "{{ matrix_user_uid }}" backup_borg_gid: "{{ matrix_user_gid }}" @@ -3743,7 +3743,7 @@ jitsi_base_path: "{{ matrix_base_data_path }}/jitsi" jitsi_uid: "{{ matrix_user_uid }}" jitsi_gid: "{{ matrix_user_gid }}" -jitsi_user_username: "{{ matrix_user_username }}" +jitsi_user_username: "{{ matrix_user_name }}" jitsi_web_container_image_registry_prefix_upstream: "{{ matrix_container_global_registry_prefix_override if matrix_container_global_registry_prefix_override else jitsi_web_container_image_registry_prefix_upstream_default }}" @@ -4795,7 +4795,7 @@ matrix_client_fluffychat_self_check_validate_certificates: "{{ matrix_playbook_s matrix_synapse_enabled: "{{ matrix_homeserver_implementation == 'synapse' }}" -matrix_synapse_username: "{{ matrix_user_username }}" +matrix_synapse_username: "{{ matrix_user_name }}" matrix_synapse_uid: "{{ matrix_user_uid }}" matrix_synapse_gid: "{{ matrix_user_gid }}" diff --git a/roles/custom/matrix-alertmanager-receiver/tasks/install.yml b/roles/custom/matrix-alertmanager-receiver/tasks/install.yml index a710fcdf3..c72689afb 100644 --- a/roles/custom/matrix-alertmanager-receiver/tasks/install.yml +++ b/roles/custom/matrix-alertmanager-receiver/tasks/install.yml @@ -10,7 +10,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - path: "{{ matrix_alertmanager_receiver_base_path }}" @@ -26,7 +26,7 @@ content: "{{ matrix_alertmanager_receiver_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_alertmanager_receiver_config_path }}/config.yml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-alertmanager-receiver support files installed @@ -34,7 +34,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_alertmanager_receiver_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels @@ -60,7 +60,7 @@ dest: "{{ matrix_alertmanager_receiver_container_src_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_alertmanager_receiver_git_pull_results - name: Ensure matrix-alertmanager-receiver container image is built diff --git a/roles/custom/matrix-appservice-double-puppet/tasks/install.yml b/roles/custom/matrix-appservice-double-puppet/tasks/install.yml index a0a427aae..d54c1b6a4 100644 --- a/roles/custom/matrix-appservice-double-puppet/tasks/install.yml +++ b/roles/custom/matrix-appservice-double-puppet/tasks/install.yml @@ -9,7 +9,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - path: "{{ matrix_appservice_double_puppet_base_path }}" @@ -23,5 +23,5 @@ content: "{{ matrix_appservice_double_puppet_registration_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_double_puppet_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" diff --git a/roles/custom/matrix-appservice-draupnir-for-all/tasks/setup_install.yml b/roles/custom/matrix-appservice-draupnir-for-all/tasks/setup_install.yml index 12781f5dc..c6fa3fbc8 100644 --- a/roles/custom/matrix-appservice-draupnir-for-all/tasks/setup_install.yml +++ b/roles/custom/matrix-appservice-draupnir-for-all/tasks/setup_install.yml @@ -16,7 +16,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_appservice_draupnir_for_all_base_path }}", when: true} @@ -44,7 +44,7 @@ version: "{{ matrix_appservice_draupnir_for_all_docker_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_appservice_draupnir_for_all_git_pull_results when: "matrix_appservice_draupnir_for_all_container_image_self_build | bool" @@ -64,7 +64,7 @@ content: "{{ matrix_appservice_draupnir_for_all_configuration_appservice | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_draupnir_for_all_config_path }}/production-appservice.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-appservice-draupnir-for-all bot config installed @@ -72,7 +72,7 @@ content: "{{ matrix_appservice_draupnir_for_all_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_draupnir_for_all_config_path }}/production-bots.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-appservice-draupnir-for-all registration.yaml installed @@ -80,7 +80,7 @@ content: "{{ matrix_appservice_draupnir_for_all_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_draupnir_for_all_config_path }}/draupnir-for-all-registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-appservice-draupnir-for-all container network is created diff --git a/roles/custom/matrix-authentication-service/tasks/install.yml b/roles/custom/matrix-authentication-service/tasks/install.yml index 2b04b6708..ad3a56d18 100644 --- a/roles/custom/matrix-authentication-service/tasks/install.yml +++ b/roles/custom/matrix-authentication-service/tasks/install.yml @@ -9,7 +9,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_authentication_service_base_path }}", when: true} @@ -38,7 +38,7 @@ content: "{{ matrix_authentication_service_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_authentication_service_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Matrix Authentication Service support files created @@ -46,7 +46,7 @@ src: "{{ item.src }}" dest: "{{ item.dest }}" mode: "{{ item.mode }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - src: "{{ role_path }}/templates/env.j2" @@ -83,7 +83,7 @@ dest: "{{ matrix_authentication_service_container_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" - name: Ensure Matrix Authentication Service container image is built ansible.builtin.command: diff --git a/roles/custom/matrix-authentication-service/tasks/syn2mas.yml b/roles/custom/matrix-authentication-service/tasks/syn2mas.yml index fd30158a4..0a09d5351 100644 --- a/roles/custom/matrix-authentication-service/tasks/syn2mas.yml +++ b/roles/custom/matrix-authentication-service/tasks/syn2mas.yml @@ -54,7 +54,7 @@ dest: "{{ matrix_authentication_service_container_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_authentication_service_git_pull_results - name: Ensure Matrix Authentication Service syn2mas container image is built diff --git a/roles/custom/matrix-authentication-service/tasks/util/prepare_key.yml b/roles/custom/matrix-authentication-service/tasks/util/prepare_key.yml index 1c1877ccd..bd487b201 100644 --- a/roles/custom/matrix-authentication-service/tasks/util/prepare_key.yml +++ b/roles/custom/matrix-authentication-service/tasks/util/prepare_key.yml @@ -13,4 +13,4 @@ cmd: "{{ private_key_definition.generation_command | replace('__KEY_FILE_PATH__', matrix_authentication_service_private_key_file_path) }}" creates: "{{ matrix_authentication_service_private_key_file_path }}" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" diff --git a/roles/custom/matrix-base/defaults/main.yml b/roles/custom/matrix-base/defaults/main.yml index 589a3464d..5571a3b06 100644 --- a/roles/custom/matrix-base/defaults/main.yml +++ b/roles/custom/matrix-base/defaults/main.yml @@ -175,12 +175,12 @@ matrix_debian_arch: "{{ 'armhf' if matrix_architecture == 'arm32' else matrix_ar # Example value: "registry.example.com/" (note the trailing `/`). matrix_container_global_registry_prefix_override: "" -matrix_user_username: "matrix" +matrix_user_name: "matrix" matrix_user_system: true matrix_user_groupname: "matrix" matrix_group_system: true -# By default, the playbook creates the user (`matrix_user_username`) +# By default, the playbook creates the user (`matrix_user_name`) # and group (`matrix_user_groupname`) with a random ID. # To use a specific user/group ID, override these variables. matrix_user_uid: ~ diff --git a/roles/custom/matrix-base/tasks/setup_matrix_base.yml b/roles/custom/matrix-base/tasks/setup_matrix_base.yml index 337017a46..0ab3f8602 100644 --- a/roles/custom/matrix-base/tasks/setup_matrix_base.yml +++ b/roles/custom/matrix-base/tasks/setup_matrix_base.yml @@ -17,7 +17,7 @@ path: "{{ item }}" state: directory mode: "{{ matrix_base_data_path_mode }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - "{{ matrix_base_data_path }}" diff --git a/roles/custom/matrix-base/tasks/setup_matrix_user.yml b/roles/custom/matrix-base/tasks/setup_matrix_user.yml index f45936d14..0d92bd31d 100644 --- a/roles/custom/matrix-base/tasks/setup_matrix_user.yml +++ b/roles/custom/matrix-base/tasks/setup_matrix_user.yml @@ -15,7 +15,7 @@ - name: Ensure Matrix user is created ansible.builtin.user: - name: "{{ matrix_user_username }}" + name: "{{ matrix_user_name }}" uid: "{{ omit if matrix_user_uid is none else matrix_user_uid }}" state: present group: "{{ matrix_user_groupname }}" diff --git a/roles/custom/matrix-base/tasks/validate_config.yml b/roles/custom/matrix-base/tasks/validate_config.yml index 78202331a..8a64d2973 100644 --- a/roles/custom/matrix-base/tasks/validate_config.yml +++ b/roles/custom/matrix-base/tasks/validate_config.yml @@ -32,6 +32,7 @@ - {'old': 'matrix_client_element_e2ee_secure_backup_required', 'new': 'matrix_static_files_file_matrix_client_property_io_element_e2ee_secure_backup_required'} - {'old': 'matrix_client_element_e2ee_secure_backup_setup_methods', 'new': 'matrix_static_files_file_matrix_client_property_io_element_e2ee_secure_backup_setup_methods'} - {'old': 'matrix_container_global_registry_prefix', 'new': ''} + - {'old': 'matrix_user_username', 'new': 'matrix_user_name'} # We have a dedicated check for this variable, because we'd like to have a custom (friendlier) message. - name: Fail if matrix_homeserver_generic_secret_key is undefined diff --git a/roles/custom/matrix-bot-baibot/tasks/install.yml b/roles/custom/matrix-bot-baibot/tasks/install.yml index c2d781e59..d8bb15314 100644 --- a/roles/custom/matrix-bot-baibot/tasks/install.yml +++ b/roles/custom/matrix-bot-baibot/tasks/install.yml @@ -10,7 +10,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_bot_baibot_base_path }}", when: true} @@ -24,14 +24,14 @@ content: "{{ matrix_bot_baibot_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_bot_baibot_config_path }}/config.yml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure baibot environment variables file created ansible.builtin.template: src: "{{ role_path }}/templates/env.j2" dest: "{{ matrix_bot_baibot_config_path }}/env" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0640 @@ -56,7 +56,7 @@ dest: "{{ matrix_bot_baibot_container_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_bot_baibot_git_pull_results - name: Ensure baibot container image is built diff --git a/roles/custom/matrix-bot-buscarron/tasks/setup_install.yml b/roles/custom/matrix-bot-buscarron/tasks/setup_install.yml index 35d583f8c..8dc7715e8 100644 --- a/roles/custom/matrix-bot-buscarron/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-buscarron/tasks/setup_install.yml @@ -39,7 +39,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_bot_buscarron_config_path }}", when: true} @@ -52,7 +52,7 @@ ansible.builtin.template: src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_bot_buscarron_config_path }}/{{ item }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0640 with_items: @@ -78,7 +78,7 @@ dest: "{{ matrix_bot_buscarron_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_bot_buscarron_git_pull_results when: "matrix_bot_buscarron_container_image_self_build | bool" diff --git a/roles/custom/matrix-bot-chatgpt/tasks/install.yml b/roles/custom/matrix-bot-chatgpt/tasks/install.yml index 1f2beae64..c25999ab9 100644 --- a/roles/custom/matrix-bot-chatgpt/tasks/install.yml +++ b/roles/custom/matrix-bot-chatgpt/tasks/install.yml @@ -10,7 +10,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_bot_chatgpt_config_path }}", when: true} @@ -22,7 +22,7 @@ ansible.builtin.template: src: "{{ role_path }}/templates/env.j2" dest: "{{ matrix_bot_chatgpt_config_path }}/env" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0640 @@ -47,7 +47,7 @@ dest: "{{ matrix_bot_chatgpt_container_src_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_bot_chatgpt_git_pull_results - name: Ensure chatgpt container image is built diff --git a/roles/custom/matrix-bot-draupnir/tasks/setup_install.yml b/roles/custom/matrix-bot-draupnir/tasks/setup_install.yml index 042fcbb9e..cb3a0e366 100644 --- a/roles/custom/matrix-bot-draupnir/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-draupnir/tasks/setup_install.yml @@ -16,7 +16,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_bot_draupnir_base_path }}", when: true} @@ -29,7 +29,7 @@ ansible.builtin.template: src: "{{ item.src }}" dest: "{{ item.dest }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0644 with_items: @@ -55,7 +55,7 @@ version: "{{ matrix_bot_draupnir_docker_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_bot_draupnir_git_pull_results when: "matrix_bot_draupnir_container_image_self_build | bool" @@ -75,7 +75,7 @@ content: "{{ matrix_bot_draupnir_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_bot_draupnir_config_path }}/production.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-bot-draupnir container network is created diff --git a/roles/custom/matrix-bot-go-neb/tasks/install.yml b/roles/custom/matrix-bot-go-neb/tasks/install.yml index d590bc999..5f15dc913 100644 --- a/roles/custom/matrix-bot-go-neb/tasks/install.yml +++ b/roles/custom/matrix-bot-go-neb/tasks/install.yml @@ -15,7 +15,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_bot_go_neb_config_path }}", when: true} @@ -28,7 +28,7 @@ content: "{{ matrix_bot_go_neb_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_bot_go_neb_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure go-neb support files installed @@ -36,7 +36,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_bot_go_neb_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - env diff --git a/roles/custom/matrix-bot-honoroit/tasks/setup_install.yml b/roles/custom/matrix-bot-honoroit/tasks/setup_install.yml index 18730e27c..be939b620 100644 --- a/roles/custom/matrix-bot-honoroit/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-honoroit/tasks/setup_install.yml @@ -41,7 +41,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_bot_honoroit_config_path }}", when: true} @@ -54,7 +54,7 @@ ansible.builtin.template: src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_bot_honoroit_config_path }}/{{ item }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0640 with_items: @@ -80,7 +80,7 @@ dest: "{{ matrix_bot_honoroit_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_bot_honoroit_git_pull_results when: "matrix_bot_honoroit_container_image_self_build | bool" diff --git a/roles/custom/matrix-bot-matrix-registration-bot/tasks/clean_cache.yml b/roles/custom/matrix-bot-matrix-registration-bot/tasks/clean_cache.yml index d5d590895..55a6bed5c 100644 --- a/roles/custom/matrix-bot-matrix-registration-bot/tasks/clean_cache.yml +++ b/roles/custom/matrix-bot-matrix-registration-bot/tasks/clean_cache.yml @@ -9,7 +9,7 @@ state: "{{ item }}" path: "{{ matrix_bot_matrix_registration_bot_data_path }}" mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - absent diff --git a/roles/custom/matrix-bot-matrix-registration-bot/tasks/setup_install.yml b/roles/custom/matrix-bot-matrix-registration-bot/tasks/setup_install.yml index c23ce719f..cc3ee82bb 100644 --- a/roles/custom/matrix-bot-matrix-registration-bot/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-matrix-registration-bot/tasks/setup_install.yml @@ -13,7 +13,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_bot_matrix_registration_bot_config_path }}", when: true} @@ -25,7 +25,7 @@ ansible.builtin.template: src: "{{ role_path }}/templates/config.yaml.j2" dest: "{{ matrix_bot_matrix_registration_bot_config_path }}/config.yaml" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0640 @@ -50,7 +50,7 @@ dest: "{{ matrix_bot_matrix_registration_bot_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_bot_matrix_registration_bot_git_pull_results - name: Ensure matrix-registration-bot image is built diff --git a/roles/custom/matrix-bot-matrix-reminder-bot/tasks/setup_install.yml b/roles/custom/matrix-bot-matrix-reminder-bot/tasks/setup_install.yml index ebe0815a2..4c8be3d4c 100644 --- a/roles/custom/matrix-bot-matrix-reminder-bot/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-matrix-reminder-bot/tasks/setup_install.yml @@ -43,7 +43,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_bot_matrix_reminder_bot_config_path }}", when: true} @@ -71,7 +71,7 @@ dest: "{{ matrix_bot_matrix_reminder_bot_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_bot_matrix_reminder_bot_git_pull_results when: "matrix_bot_matrix_reminder_bot_container_image_self_build | bool" @@ -92,7 +92,7 @@ content: "{{ matrix_bot_matrix_reminder_bot_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_bot_matrix_reminder_bot_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-reminder-bot container network is created diff --git a/roles/custom/matrix-bot-maubot/tasks/setup_install.yml b/roles/custom/matrix-bot-maubot/tasks/setup_install.yml index 973dff0c6..9f4a90270 100644 --- a/roles/custom/matrix-bot-maubot/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-maubot/tasks/setup_install.yml @@ -14,7 +14,7 @@ path: "{{ item.path }}" state: directory mode: 0755 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_bot_maubot_base_path }}", when: true} @@ -31,7 +31,7 @@ ansible.builtin.template: src: "{{ role_path }}/templates/config.yaml.j2" dest: "{{ matrix_bot_maubot_config_path }}/config.yaml" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: "u=rwx" @@ -56,7 +56,7 @@ dest: "{{ matrix_bot_maubot_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_bot_maubot_git_pull_results - name: Ensure maubot image is built @@ -76,7 +76,7 @@ ansible.builtin.template: src: "{{ role_path }}/templates/customizations/Dockerfile.j2" dest: "{{ matrix_bot_maubot_customized_docker_src_files_path }}/Dockerfile" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0640 register: matrix_bot_maubot_container_image_customizations_dockerfile_result @@ -96,7 +96,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_bot_maubot_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bot-mjolnir/tasks/setup_install.yml b/roles/custom/matrix-bot-mjolnir/tasks/setup_install.yml index c533948f4..5562a3e2e 100644 --- a/roles/custom/matrix-bot-mjolnir/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-mjolnir/tasks/setup_install.yml @@ -18,7 +18,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_bot_mjolnir_base_path }}", when: true} @@ -46,7 +46,7 @@ version: "{{ matrix_bot_mjolnir_docker_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_bot_mjolnir_git_pull_results when: "matrix_bot_mjolnir_container_image_self_build | bool" @@ -66,7 +66,7 @@ content: "{{ matrix_bot_mjolnir_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_bot_mjolnir_config_path }}/production.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-bot-mjolnir container network is created diff --git a/roles/custom/matrix-bridge-appservice-discord/tasks/setup_install.yml b/roles/custom/matrix-bridge-appservice-discord/tasks/setup_install.yml index 0fddef00e..0f1cb199f 100644 --- a/roles/custom/matrix-bridge-appservice-discord/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-appservice-discord/tasks/setup_install.yml @@ -56,7 +56,7 @@ path: "{{ item }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - "{{ matrix_appservice_discord_base_path }}" @@ -93,7 +93,7 @@ content: "{{ matrix_appservice_discord_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_discord_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure AppService Discord registration.yaml installed @@ -101,7 +101,7 @@ content: "{{ matrix_appservice_discord_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_discord_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" # If `matrix_appservice_discord_client_id` hasn't changed, the same invite link would be generated. diff --git a/roles/custom/matrix-bridge-appservice-irc/tasks/setup_install.yml b/roles/custom/matrix-bridge-appservice-irc/tasks/setup_install.yml index b4cb63c86..8e73c1b5d 100644 --- a/roles/custom/matrix-bridge-appservice-irc/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-appservice-irc/tasks/setup_install.yml @@ -22,7 +22,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_appservice_irc_base_path }}", when: true} @@ -97,7 +97,7 @@ dest: "{{ matrix_appservice_irc_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_appservice_irc_git_pull_results when: "matrix_appservice_irc_enabled | bool and matrix_appservice_irc_container_image_self_build | bool" @@ -118,7 +118,7 @@ content: "{{ matrix_appservice_irc_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_irc_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Generate Appservice IRC passkey if it doesn't exist @@ -126,7 +126,7 @@ cmd: "{{ matrix_host_command_openssl }} genpkey -out {{ matrix_appservice_irc_data_path }}/passkey.pem -outform PEM -algorithm RSA -pkeyopt rsa_keygen_bits:2048" creates: "{{ matrix_appservice_irc_data_path }}/passkey.pem" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" # In the past, we used to generate the passkey.pem file with root, so permissions may not be okay. # Fix it. @@ -134,7 +134,7 @@ ansible.builtin.file: path: "{{ matrix_appservice_irc_data_path }}/passkey.pem" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" # Ideally, we'd like to generate the final registration.yaml file by ourselves. @@ -198,7 +198,7 @@ content: "{{ matrix_appservice_irc_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_irc_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-appservice-irc container network is created diff --git a/roles/custom/matrix-bridge-appservice-kakaotalk/tasks/setup_install.yml b/roles/custom/matrix-bridge-appservice-kakaotalk/tasks/setup_install.yml index 3c3da6765..046b4a803 100644 --- a/roles/custom/matrix-bridge-appservice-kakaotalk/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-appservice-kakaotalk/tasks/setup_install.yml @@ -35,7 +35,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_appservice_kakaotalk_base_path }}", when: true} @@ -51,7 +51,7 @@ version: "{{ matrix_appservice_kakaotalk_container_image_self_build_repo_version }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_appservice_kakaotalk_git_pull_results when: "matrix_appservice_kakaotalk_container_image_self_build | bool" @@ -84,7 +84,7 @@ content: "{{ matrix_appservice_kakaotalk_node_configuration | to_nice_json }}" dest: "{{ matrix_appservice_kakaotalk_config_path }}/node-config.json" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-appservice-kakaotalk config.yaml installed @@ -92,7 +92,7 @@ content: "{{ matrix_appservice_kakaotalk_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_kakaotalk_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-appservice-kakaotalk registration.yaml installed @@ -100,7 +100,7 @@ content: "{{ matrix_appservice_kakaotalk_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_kakaotalk_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-appservice-kakaotalk container network is created diff --git a/roles/custom/matrix-bridge-appservice-slack/tasks/setup_install.yml b/roles/custom/matrix-bridge-appservice-slack/tasks/setup_install.yml index b556910f8..41a9f26d6 100644 --- a/roles/custom/matrix-bridge-appservice-slack/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-appservice-slack/tasks/setup_install.yml @@ -17,7 +17,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_appservice_slack_base_path }}", when: true} @@ -62,7 +62,7 @@ dest: "{{ matrix_appservice_slack_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_appservice_slack_git_pull_results when: "matrix_appservice_slack_container_image_self_build | bool" @@ -83,7 +83,7 @@ content: "{{ matrix_appservice_slack_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_slack_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure appservice-slack registration.yaml installed @@ -91,7 +91,7 @@ content: "{{ matrix_appservice_slack_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_slack_config_path }}/slack-registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-appservice-slack container network is created @@ -106,7 +106,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_appservice_slack_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-appservice-webhooks/tasks/setup_install.yml b/roles/custom/matrix-bridge-appservice-webhooks/tasks/setup_install.yml index 208399355..ccb8d31cd 100644 --- a/roles/custom/matrix-bridge-appservice-webhooks/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-appservice-webhooks/tasks/setup_install.yml @@ -17,7 +17,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_appservice_webhooks_base_path }}", when: true} @@ -47,7 +47,7 @@ version: "{{ matrix_appservice_webhooks_container_image_self_build_repo_version }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_appservice_webhooks_git_pull_results - name: Ensure matrix-appservice-webhooks container image is built @@ -66,7 +66,7 @@ content: "{{ matrix_appservice_webhooks_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_webhooks_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-appservice-webhooks schema.yml template exists @@ -74,7 +74,7 @@ src: "{{ role_path }}/templates/schema.yml.j2" dest: "{{ matrix_appservice_webhooks_config_path }}/schema.yml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-appservice-webhooks database.json template exists @@ -82,7 +82,7 @@ src: "{{ role_path }}/templates/database.json.j2" dest: "{{ matrix_appservice_webhooks_data_path }}/database.json" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure appservice-webhooks registration.yaml installed @@ -90,7 +90,7 @@ content: "{{ matrix_appservice_webhooks_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_appservice_webhooks_config_path }}/webhooks-registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-appservice-webhooks container network is created @@ -105,7 +105,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_appservice_webhooks_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-beeper-linkedin/tasks/setup_install.yml b/roles/custom/matrix-bridge-beeper-linkedin/tasks/setup_install.yml index e61dc18fb..016493665 100644 --- a/roles/custom/matrix-bridge-beeper-linkedin/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-beeper-linkedin/tasks/setup_install.yml @@ -16,7 +16,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_beeper_linkedin_base_path }}", when: true} @@ -30,7 +30,7 @@ content: "{{ matrix_beeper_linkedin_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_beeper_linkedin_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure beeper-linkedin registration.yaml installed @@ -38,7 +38,7 @@ content: "{{ matrix_beeper_linkedin_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_beeper_linkedin_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Beeper LinkedIn container image is pulled @@ -62,7 +62,7 @@ version: "{{ matrix_beeper_linkedin_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_beeper_linkedin_git_pull_results # Building the container image (using the default Dockerfile) requires that a docker-requirements.txt file be generated. diff --git a/roles/custom/matrix-bridge-go-skype-bridge/tasks/setup_install.yml b/roles/custom/matrix-bridge-go-skype-bridge/tasks/setup_install.yml index 5d05a3540..dc17fa5b8 100644 --- a/roles/custom/matrix-bridge-go-skype-bridge/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-go-skype-bridge/tasks/setup_install.yml @@ -40,7 +40,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_go_skype_bridge_base_path }}", when: true} @@ -68,7 +68,7 @@ version: "{{ matrix_go_skype_bridge_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_go_skype_bridge_git_pull_results when: "matrix_go_skype_bridge_container_image_self_build | bool" @@ -122,7 +122,7 @@ content: "{{ matrix_go_skype_bridge_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_go_skype_bridge_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure go-skype-bridge registration.yaml installed @@ -130,7 +130,7 @@ content: "{{ matrix_go_skype_bridge_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_go_skype_bridge_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-go-skype-bridge container network is created diff --git a/roles/custom/matrix-bridge-heisenbridge/tasks/setup_install.yml b/roles/custom/matrix-bridge-heisenbridge/tasks/setup_install.yml index a748464db..dd6ea070f 100644 --- a/roles/custom/matrix-bridge-heisenbridge/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-heisenbridge/tasks/setup_install.yml @@ -26,7 +26,7 @@ path: "{{ item }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - "{{ matrix_heisenbridge_base_path }}" @@ -36,7 +36,7 @@ content: "{{ matrix_heisenbridge_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_heisenbridge_base_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Heisenbridge support files installed @@ -44,7 +44,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_heisenbridge_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-hookshot/tasks/setup_install.yml b/roles/custom/matrix-bridge-hookshot/tasks/setup_install.yml index a44edff15..f24a31260 100644 --- a/roles/custom/matrix-bridge-hookshot/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-hookshot/tasks/setup_install.yml @@ -21,7 +21,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_hookshot_base_path }}", when: true} @@ -47,7 +47,7 @@ version: "{{ matrix_hookshot_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_hookshot_git_pull_results when: "matrix_hookshot_container_image_self_build | bool" @@ -73,7 +73,7 @@ cmd: "{{ matrix_host_command_openssl }} genpkey -out {{ matrix_hookshot_base_path }}/passkey.pem -outform PEM -algorithm RSA -pkeyopt rsa_keygen_bits:4096" creates: "{{ matrix_hookshot_base_path }}/passkey.pem" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" when: "not hookshot_passkey_file.stat.exists" - name: Ensure hookshot config.yml installed if provided @@ -81,7 +81,7 @@ content: "{{ matrix_hookshot_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_hookshot_base_path }}/config.yml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Validate hookshot config.yml @@ -107,7 +107,7 @@ content: "{{ matrix_hookshot_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_hookshot_base_path }}/registration.yml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure hookshot github private key file installed if github is enabled @@ -115,7 +115,7 @@ content: "{{ matrix_hookshot_github_private_key }}" dest: "{{ matrix_hookshot_base_path }}/{{ matrix_hookshot_github_private_key_file }}" mode: 0400 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" when: matrix_hookshot_github_enabled | bool and matrix_hookshot_github_private_key|length > 0 @@ -131,7 +131,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_hookshot_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-bluesky/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-bluesky/tasks/setup_install.yml index 305ac5730..ff650b28c 100644 --- a/roles/custom/matrix-bridge-mautrix-bluesky/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-bluesky/tasks/setup_install.yml @@ -24,7 +24,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_bluesky_base_path }}", when: true} @@ -40,7 +40,7 @@ dest: "{{ matrix_mautrix_bluesky_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_bluesky_git_pull_results when: "matrix_mautrix_bluesky_enabled | bool and matrix_mautrix_bluesky_container_image_self_build" @@ -60,7 +60,7 @@ content: "{{ matrix_mautrix_bluesky_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_bluesky_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-bluesky registration.yaml installed @@ -68,7 +68,7 @@ content: "{{ matrix_mautrix_bluesky_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_bluesky_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-bluesky support files installed @@ -76,7 +76,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_bluesky_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-discord/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-discord/tasks/setup_install.yml index e08b1c34c..05281e3ac 100644 --- a/roles/custom/matrix-bridge-mautrix-discord/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-discord/tasks/setup_install.yml @@ -40,7 +40,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_discord_base_path }}", when: true} @@ -68,7 +68,7 @@ version: "{{ matrix_mautrix_discord_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_discord_git_pull_results when: "matrix_mautrix_discord_container_image_self_build | bool" @@ -89,7 +89,7 @@ content: "{{ matrix_mautrix_discord_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_discord_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-discord registration.yaml installed @@ -97,7 +97,7 @@ content: "{{ matrix_mautrix_discord_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_discord_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-discord support files installed @@ -105,7 +105,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_discord_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-facebook/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-facebook/tasks/setup_install.yml index 36fe8fabb..f762595a5 100644 --- a/roles/custom/matrix-bridge-mautrix-facebook/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-facebook/tasks/setup_install.yml @@ -59,7 +59,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_facebook_base_path }}", when: true} @@ -75,7 +75,7 @@ version: "{{ matrix_mautrix_facebook_docker_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_facebook_git_pull_results when: "matrix_mautrix_facebook_container_image_self_build | bool" @@ -117,7 +117,7 @@ content: "{{ matrix_mautrix_facebook_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_facebook_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-facebook registration.yaml installed @@ -125,7 +125,7 @@ content: "{{ matrix_mautrix_facebook_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_facebook_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-facebook support files installed @@ -133,7 +133,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_facebook_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-gmessages/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-gmessages/tasks/setup_install.yml index 777dceab7..27edc3367 100644 --- a/roles/custom/matrix-bridge-mautrix-gmessages/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-gmessages/tasks/setup_install.yml @@ -40,7 +40,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_gmessages_base_path }}", when: true} @@ -68,7 +68,7 @@ version: "{{ matrix_mautrix_gmessages_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_gmessages_git_pull_results when: "matrix_mautrix_gmessages_container_image_self_build | bool" @@ -122,7 +122,7 @@ content: "{{ matrix_mautrix_gmessages_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_gmessages_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-gmessages registration.yaml installed @@ -130,7 +130,7 @@ content: "{{ matrix_mautrix_gmessages_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_gmessages_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-mautrix-gmessages.service installed @@ -144,7 +144,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_gmessages_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-googlechat/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-googlechat/tasks/setup_install.yml index d7cc1f1d5..7c29da69f 100644 --- a/roles/custom/matrix-bridge-mautrix-googlechat/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-googlechat/tasks/setup_install.yml @@ -54,7 +54,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_googlechat_base_path }}", when: true} @@ -70,7 +70,7 @@ dest: "{{ matrix_mautrix_googlechat_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_googlechat_git_pull_results when: "matrix_mautrix_googlechat_container_image_self_build | bool" @@ -112,7 +112,7 @@ content: "{{ matrix_mautrix_googlechat_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_googlechat_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-googlechat registration.yaml installed @@ -120,7 +120,7 @@ content: "{{ matrix_mautrix_googlechat_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_googlechat_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-googlechat support files installed @@ -128,7 +128,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_googlechat_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-instagram/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-instagram/tasks/setup_install.yml index 21e4e5f44..3209b4b87 100644 --- a/roles/custom/matrix-bridge-mautrix-instagram/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-instagram/tasks/setup_install.yml @@ -27,7 +27,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_instagram_base_path }}", when: true} @@ -43,7 +43,7 @@ dest: "{{ matrix_mautrix_instagram_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_instagram_git_pull_results when: "matrix_mautrix_instagram_container_image_self_build | bool" @@ -64,7 +64,7 @@ content: "{{ matrix_mautrix_instagram_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_instagram_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-instagram registration.yaml installed @@ -72,7 +72,7 @@ content: "{{ matrix_mautrix_instagram_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_instagram_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-instagram support files installed @@ -80,7 +80,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_instagram_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-meta-instagram/tasks/install.yml b/roles/custom/matrix-bridge-mautrix-meta-instagram/tasks/install.yml index 4f3749c1e..c517ef2cf 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-instagram/tasks/install.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-instagram/tasks/install.yml @@ -49,7 +49,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_meta_instagram_base_path }}", when: true} @@ -67,7 +67,7 @@ version: "{{ matrix_mautrix_meta_instagram_container_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_meta_instagram_git_pull_results - name: Ensure mautrix-meta-instagram container image is built @@ -86,7 +86,7 @@ content: "{{ matrix_mautrix_meta_instagram_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_meta_instagram_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-meta-instagram registration.yaml installed @@ -94,7 +94,7 @@ content: "{{ matrix_mautrix_meta_instagram_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_meta_instagram_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-meta-instagram support files installed @@ -102,7 +102,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_meta_instagram_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-meta-messenger/tasks/install.yml b/roles/custom/matrix-bridge-mautrix-meta-messenger/tasks/install.yml index ef09d425b..703fd5f31 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-messenger/tasks/install.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-messenger/tasks/install.yml @@ -49,7 +49,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_meta_messenger_base_path }}", when: true} @@ -67,7 +67,7 @@ version: "{{ matrix_mautrix_meta_messenger_container_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_meta_messenger_git_pull_results - name: Ensure mautrix-meta-messenger container image is built @@ -86,7 +86,7 @@ content: "{{ matrix_mautrix_meta_messenger_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_meta_messenger_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-meta-messenger registration.yaml installed @@ -94,7 +94,7 @@ content: "{{ matrix_mautrix_meta_messenger_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_meta_messenger_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-meta-messenger support files installed @@ -102,7 +102,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_meta_messenger_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-signal/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-signal/tasks/setup_install.yml index 55bcb2cb4..17f9beb93 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-signal/tasks/setup_install.yml @@ -45,7 +45,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_signal_base_path }}", when: true} @@ -73,7 +73,7 @@ version: "{{ matrix_mautrix_signal_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_signal_git_pull_results when: "matrix_mautrix_signal_container_image_self_build | bool" @@ -127,7 +127,7 @@ content: "{{ matrix_mautrix_signal_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_signal_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-signal registration.yaml installed @@ -135,7 +135,7 @@ content: "{{ matrix_mautrix_signal_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_signal_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-signal support files installed @@ -143,7 +143,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_signal_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-slack/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-slack/tasks/setup_install.yml index c5266dfff..ead4869bb 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-slack/tasks/setup_install.yml @@ -39,7 +39,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_slack_base_path }}", when: true} @@ -67,7 +67,7 @@ version: "{{ matrix_mautrix_slack_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_slack_git_pull_results when: "matrix_mautrix_slack_container_image_self_build | bool" @@ -88,7 +88,7 @@ content: "{{ matrix_mautrix_slack_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_slack_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-slack registration.yaml installed @@ -96,7 +96,7 @@ content: "{{ matrix_mautrix_slack_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_slack_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-mautrix-slack container network is created diff --git a/roles/custom/matrix-bridge-mautrix-telegram/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-telegram/tasks/setup_install.yml index f45cd306f..c0fd1e54a 100644 --- a/roles/custom/matrix-bridge-mautrix-telegram/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-telegram/tasks/setup_install.yml @@ -49,7 +49,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_telegram_base_path }}", when: true} @@ -77,7 +77,7 @@ dest: "{{ matrix_mautrix_telegram_lottieconverter_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_telegram_lottieconverter_git_pull_results when: "matrix_mautrix_telegram_lottieconverter_container_image_self_build | bool and matrix_mautrix_telegram_container_image_self_build | bool" @@ -100,7 +100,7 @@ dest: "{{ matrix_mautrix_telegram_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_telegram_git_pull_results when: "matrix_mautrix_telegram_container_image_self_build | bool" @@ -144,7 +144,7 @@ content: "{{ matrix_mautrix_telegram_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_telegram_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-telegram registration.yaml installed @@ -152,7 +152,7 @@ content: "{{ matrix_mautrix_telegram_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_telegram_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-telegram support files installed @@ -160,7 +160,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_telegram_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-twitter/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-twitter/tasks/setup_install.yml index 4e5b1d149..cd7ab9de5 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-twitter/tasks/setup_install.yml @@ -30,7 +30,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_twitter_base_path }}", when: true} @@ -46,7 +46,7 @@ dest: "{{ matrix_mautrix_twitter_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_twitter_git_pull_results when: "matrix_mautrix_twitter_enabled | bool and matrix_mautrix_twitter_container_image_self_build" @@ -66,7 +66,7 @@ content: "{{ matrix_mautrix_twitter_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_twitter_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-twitter registration.yaml installed @@ -74,7 +74,7 @@ content: "{{ matrix_mautrix_twitter_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_twitter_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-twitter support files installed @@ -82,7 +82,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_twitter_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-whatsapp/tasks/setup_install.yml index ecafc5a32..cdc1c6e74 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/tasks/setup_install.yml @@ -50,7 +50,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mautrix_whatsapp_base_path }}", when: true} @@ -78,7 +78,7 @@ version: "{{ matrix_mautrix_whatsapp_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mautrix_whatsapp_git_pull_results when: "matrix_mautrix_whatsapp_container_image_self_build | bool" @@ -132,7 +132,7 @@ content: "{{ matrix_mautrix_whatsapp_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_whatsapp_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-whatsapp registration.yaml installed @@ -140,7 +140,7 @@ content: "{{ matrix_mautrix_whatsapp_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mautrix_whatsapp_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-whatsapp support files installed @@ -148,7 +148,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_whatsapp_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-wsproxy/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-wsproxy/tasks/setup_install.yml index 9685df0e0..784df7b6c 100644 --- a/roles/custom/matrix-bridge-mautrix-wsproxy/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-wsproxy/tasks/setup_install.yml @@ -26,7 +26,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - path: "{{ matrix_mautrix_wsproxy_base_path }}" @@ -38,7 +38,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mautrix_wsproxy_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - syncproxy-env @@ -63,7 +63,7 @@ path: "{{ item }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - "{{ matrix_mautrix_wsproxy_base_path }}" @@ -79,7 +79,7 @@ content: "{{ matrix_mautrix_wsproxy_configuration | to_nice_yaml }}" dest: "{{ matrix_mautrix_wsproxy_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-androidsms registration.yaml installed @@ -87,7 +87,7 @@ content: "{{ matrix_mautrix_androidsms_registration | to_nice_yaml }}" dest: "{{ matrix_mautrix_wsproxy_config_path }}/androidsms-registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-imessage registration.yaml installed @@ -95,7 +95,7 @@ content: "{{ matrix_mautrix_imessage_registration | to_nice_yaml }}" dest: "{{ matrix_mautrix_wsproxy_config_path }}/imessage-registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mautrix-wsproxy container network is created diff --git a/roles/custom/matrix-bridge-mx-puppet-discord/tasks/setup_install.yml b/roles/custom/matrix-bridge-mx-puppet-discord/tasks/setup_install.yml index af1717a0f..0dba68c99 100644 --- a/roles/custom/matrix-bridge-mx-puppet-discord/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mx-puppet-discord/tasks/setup_install.yml @@ -16,7 +16,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mx_puppet_discord_base_path }}", when: true} @@ -91,7 +91,7 @@ force: "yes" version: "{{ matrix_mx_puppet_discord_container_image_self_build_version }}" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mx_puppet_discord_git_pull_results when: "matrix_mx_puppet_discord_enabled | bool and matrix_mx_puppet_discord_container_image_self_build" @@ -112,7 +112,7 @@ content: "{{ matrix_mx_puppet_discord_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mx_puppet_discord_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mx-puppet-discord discord-registration.yaml installed @@ -120,7 +120,7 @@ content: "{{ matrix_mx_puppet_discord_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mx_puppet_discord_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mx-puppet-discord container network is created diff --git a/roles/custom/matrix-bridge-mx-puppet-groupme/tasks/setup_install.yml b/roles/custom/matrix-bridge-mx-puppet-groupme/tasks/setup_install.yml index 5e09ca887..6ecf1a7c1 100644 --- a/roles/custom/matrix-bridge-mx-puppet-groupme/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mx-puppet-groupme/tasks/setup_install.yml @@ -15,7 +15,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mx_puppet_groupme_base_path }}", when: true} @@ -91,7 +91,7 @@ dest: "{{ matrix_mx_puppet_groupme_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mx_puppet_groupme_git_pull_results when: "matrix_mx_puppet_groupme_enabled | bool and matrix_mx_puppet_groupme_container_image_self_build" @@ -112,7 +112,7 @@ content: "{{ matrix_mx_puppet_groupme_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mx_puppet_groupme_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mx-puppet-groupme groupme-registration.yaml installed @@ -120,7 +120,7 @@ content: "{{ matrix_mx_puppet_groupme_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mx_puppet_groupme_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mx-puppet-groupme container network is created diff --git a/roles/custom/matrix-bridge-mx-puppet-instagram/tasks/setup_install.yml b/roles/custom/matrix-bridge-mx-puppet-instagram/tasks/setup_install.yml index 1846ede1f..93ffa15e2 100644 --- a/roles/custom/matrix-bridge-mx-puppet-instagram/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mx-puppet-instagram/tasks/setup_install.yml @@ -55,7 +55,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mx_puppet_instagram_base_path }}", when: true} @@ -71,7 +71,7 @@ dest: "{{ matrix_mx_puppet_instagram_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mx_puppet_instagram_git_pull_results when: "matrix_mx_puppet_instagram_enabled | bool and matrix_mx_puppet_instagram_container_image_self_build | bool" @@ -92,7 +92,7 @@ content: "{{ matrix_mx_puppet_instagram_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mx_puppet_instagram_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mx-puppet-instagram-registration.yaml installed @@ -100,7 +100,7 @@ content: "{{ matrix_mx_puppet_instagram_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mx_puppet_instagram_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mx-puppet-instagram container network is created diff --git a/roles/custom/matrix-bridge-mx-puppet-slack/tasks/setup_install.yml b/roles/custom/matrix-bridge-mx-puppet-slack/tasks/setup_install.yml index 55e0cdecf..c525a689a 100644 --- a/roles/custom/matrix-bridge-mx-puppet-slack/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mx-puppet-slack/tasks/setup_install.yml @@ -11,7 +11,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mx_puppet_slack_base_path }}", when: true} @@ -80,7 +80,7 @@ force: "yes" version: "{{ matrix_mx_puppet_slack_container_image_self_build_version }}" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mx_puppet_slack_git_pull_results when: "matrix_mx_puppet_slack_enabled | bool and matrix_mx_puppet_slack_container_image_self_build" @@ -108,7 +108,7 @@ content: "{{ matrix_mx_puppet_slack_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mx_puppet_slack_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mx-puppet-slack slack-registration.yaml installed @@ -116,7 +116,7 @@ content: "{{ matrix_mx_puppet_slack_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mx_puppet_slack_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mx-puppet-slack support files installed @@ -124,7 +124,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mx_puppet_slack_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mx-puppet-steam/tasks/setup_install.yml b/roles/custom/matrix-bridge-mx-puppet-steam/tasks/setup_install.yml index 298913aec..7b921d29a 100644 --- a/roles/custom/matrix-bridge-mx-puppet-steam/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mx-puppet-steam/tasks/setup_install.yml @@ -17,7 +17,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mx_puppet_steam_base_path }}", when: true} @@ -93,7 +93,7 @@ dest: "{{ matrix_mx_puppet_steam_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mx_puppet_steam_git_pull_results when: "matrix_mx_puppet_steam_enabled | bool and matrix_mx_puppet_steam_container_image_self_build" @@ -114,7 +114,7 @@ content: "{{ matrix_mx_puppet_steam_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mx_puppet_steam_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mx-puppet-steam steam-registration.yaml installed @@ -122,7 +122,7 @@ content: "{{ matrix_mx_puppet_steam_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mx_puppet_steam_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mx-puppet-steam container network is created diff --git a/roles/custom/matrix-bridge-mx-puppet-twitter/tasks/setup_install.yml b/roles/custom/matrix-bridge-mx-puppet-twitter/tasks/setup_install.yml index 2f6a7807e..d5ae0f73e 100644 --- a/roles/custom/matrix-bridge-mx-puppet-twitter/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mx-puppet-twitter/tasks/setup_install.yml @@ -16,7 +16,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_mx_puppet_twitter_base_path }}", when: true} @@ -92,7 +92,7 @@ dest: "{{ matrix_mx_puppet_twitter_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_mx_puppet_twitter_git_pull_results when: "matrix_mx_puppet_twitter_enabled | bool and matrix_mx_puppet_twitter_container_image_self_build" @@ -113,7 +113,7 @@ content: "{{ matrix_mx_puppet_twitter_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mx_puppet_twitter_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mx-puppet-twitter twitter-registration.yaml installed @@ -121,7 +121,7 @@ content: "{{ matrix_mx_puppet_twitter_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_mx_puppet_twitter_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure mx-puppet-twitter support files installed @@ -129,7 +129,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_mx_puppet_twitter_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-postmoogle/tasks/setup_install.yml b/roles/custom/matrix-bridge-postmoogle/tasks/setup_install.yml index 4dc78ddc7..f9b5af5c0 100644 --- a/roles/custom/matrix-bridge-postmoogle/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-postmoogle/tasks/setup_install.yml @@ -61,7 +61,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_postmoogle_config_path }}", when: true} @@ -73,7 +73,7 @@ ansible.builtin.template: src: "{{ role_path }}/templates/env.j2" dest: "{{ matrix_postmoogle_config_path }}/env" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0640 @@ -96,7 +96,7 @@ dest: "{{ matrix_postmoogle_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_postmoogle_git_pull_results when: "matrix_postmoogle_container_image_self_build | bool" diff --git a/roles/custom/matrix-bridge-sms/tasks/setup_install.yml b/roles/custom/matrix-bridge-sms/tasks/setup_install.yml index a46bc21dc..7b49eca78 100644 --- a/roles/custom/matrix-bridge-sms/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-sms/tasks/setup_install.yml @@ -24,7 +24,7 @@ path: "{{ item }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - "{{ matrix_sms_bridge_base_path }}" @@ -36,7 +36,7 @@ content: "{{ matrix_sms_bridge_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_sms_bridge_config_path }}/application.yml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-sms-bridge registration.yaml installed @@ -44,7 +44,7 @@ content: "{{ matrix_sms_bridge_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_sms_bridge_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure android-sms-gateway-server cert installed @@ -52,7 +52,7 @@ src: "{{ matrix_sms_bridge_provider_android_truststore_local_path }}" dest: "{{ matrix_sms_bridge_config_path }}/matrix-sms-gateway-server.p12" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" when: matrix_sms_bridge_provider_android_truststore_local_path != "" diff --git a/roles/custom/matrix-bridge-wechat/tasks/install.yml b/roles/custom/matrix-bridge-wechat/tasks/install.yml index 607ca780b..d9da1d2fc 100644 --- a/roles/custom/matrix-bridge-wechat/tasks/install.yml +++ b/roles/custom/matrix-bridge-wechat/tasks/install.yml @@ -10,7 +10,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_wechat_base_path }}", when: true} @@ -41,7 +41,7 @@ version: "{{ matrix_wechat_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_wechat_git_pull_results - name: Ensure WeChat Bridge container image is built @@ -76,7 +76,7 @@ version: "{{ matrix_wechat_agent_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_wechat_agent_git_pull_results - name: Ensure WeChat Agent container image is built @@ -95,7 +95,7 @@ content: "{{ matrix_wechat_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_wechat_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure WeChat registration.yaml installed @@ -103,7 +103,7 @@ content: "{{ matrix_wechat_registration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_wechat_config_path }}/registration.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Wechat Agent configuration installed @@ -111,7 +111,7 @@ content: "{{ matrix_wechat_agent_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_wechat_config_path }}/agent-config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-wechat container network is created diff --git a/roles/custom/matrix-cactus-comments-client/tasks/install.yml b/roles/custom/matrix-cactus-comments-client/tasks/install.yml index 6a86df4ce..b8c91241c 100644 --- a/roles/custom/matrix-cactus-comments-client/tasks/install.yml +++ b/roles/custom/matrix-cactus-comments-client/tasks/install.yml @@ -10,7 +10,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_cactus_comments_client_base_path }}", when: true} @@ -21,7 +21,7 @@ ansible.builtin.template: src: "{{ item.src }}" dest: "{{ item.dest }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0644 with_items: @@ -38,14 +38,14 @@ url: "{{ matrix_cactus_comments_client_webclient_js_url }}" dest: "{{ matrix_cactus_comments_client_public_path }}/cactus.js" mode: "{{ matrix_cactus_comments_client_public_path_file_permissions }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Download web client css ansible.builtin.get_url: url: "{{ matrix_cactus_comments_client_webclient_css_url }}" dest: "{{ matrix_cactus_comments_client_public_path }}/style.css" mode: "{{ matrix_cactus_comments_client_public_path_file_permissions }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - when: matrix_cactus_comments_client_local_dir | length > 0 @@ -55,14 +55,14 @@ src: "{{ matrix_cactus_comments_client_local_dir }}/src/cactus.js" dest: "{{ matrix_cactus_comments_client_public_path }}/cactus.js" mode: "{{ matrix_cactus_comments_client_public_path_file_permissions }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Upload locally distributed client CSS ansible.builtin.copy: src: "{{ matrix_cactus_comments_client_local_dir }}/src/style.css" dest: "{{ matrix_cactus_comments_client_public_path }}/style.css" mode: "{{ matrix_cactus_comments_client_public_path_file_permissions }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-cactus-comments-client container image is pulled diff --git a/roles/custom/matrix-cactus-comments/tasks/setup_install.yml b/roles/custom/matrix-cactus-comments/tasks/setup_install.yml index 5e6219746..2e0fca1b3 100644 --- a/roles/custom/matrix-cactus-comments/tasks/setup_install.yml +++ b/roles/custom/matrix-cactus-comments/tasks/setup_install.yml @@ -11,7 +11,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_cactus_comments_base_path }}", when: true} @@ -23,7 +23,7 @@ ansible.builtin.template: src: "{{ role_path }}/templates/env.j2" dest: "{{ matrix_cactus_comments_app_service_env_file }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0640 @@ -31,7 +31,7 @@ ansible.builtin.template: src: "{{ role_path }}/templates/cactus_appservice.yaml.j2" dest: "{{ matrix_cactus_comments_app_service_config_file }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0640 @@ -54,7 +54,7 @@ dest: "{{ matrix_cactus_comments_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_cactus_comments_git_pull_results when: "matrix_cactus_comments_container_image_self_build | bool" diff --git a/roles/custom/matrix-client-cinny/tasks/setup_install.yml b/roles/custom/matrix-client-cinny/tasks/setup_install.yml index 228aa0614..6eb32a5d9 100644 --- a/roles/custom/matrix-client-cinny/tasks/setup_install.yml +++ b/roles/custom/matrix-client-cinny/tasks/setup_install.yml @@ -13,7 +13,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_client_cinny_data_path }}", when: true} @@ -39,7 +39,7 @@ version: "{{ matrix_client_cinny_docker_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_client_cinny_git_pull_results when: "matrix_client_cinny_container_image_self_build | bool" @@ -48,7 +48,7 @@ content: "{{ matrix_client_cinny_configuration | to_nice_json }}" dest: "{{ matrix_client_cinny_data_path }}/config.json" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Cinny additional config files installed @@ -56,7 +56,7 @@ src: "{{ item.src }}" dest: "{{ matrix_client_cinny_data_path }}/{{ item.name }}" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {src: "{{ role_path }}/templates/nginx.conf.j2", name: "nginx.conf"} diff --git a/roles/custom/matrix-client-element/tasks/setup_install.yml b/roles/custom/matrix-client-element/tasks/setup_install.yml index 10a8b61ae..ad4218a3d 100644 --- a/roles/custom/matrix-client-element/tasks/setup_install.yml +++ b/roles/custom/matrix-client-element/tasks/setup_install.yml @@ -16,7 +16,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_client_element_data_path }}", when: true} @@ -42,7 +42,7 @@ version: "{{ matrix_client_element_docker_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_client_element_git_pull_results when: "matrix_client_element_container_image_self_build | bool" @@ -75,7 +75,7 @@ content: "{{ matrix_client_element_configuration | to_nice_json }}" dest: "{{ matrix_client_element_data_path }}/config.json" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Element location sharing map style installed @@ -84,7 +84,7 @@ content: "{{ matrix_client_element_location_sharing_map_style | to_nice_json }}" dest: "{{ matrix_client_element_data_path }}/map_style.json" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Element Web config files installed @@ -92,7 +92,7 @@ src: "{{ item.src }}" dest: "{{ matrix_client_element_data_path }}/{{ item.name }}" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {src: "{{ role_path }}/templates/labels.j2", name: "labels"} diff --git a/roles/custom/matrix-client-fluffychat/tasks/setup_install.yml b/roles/custom/matrix-client-fluffychat/tasks/setup_install.yml index a774ad724..f0744a54e 100644 --- a/roles/custom/matrix-client-fluffychat/tasks/setup_install.yml +++ b/roles/custom/matrix-client-fluffychat/tasks/setup_install.yml @@ -9,7 +9,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_client_fluffychat_data_path }}", when: true} @@ -37,7 +37,7 @@ version: "{{ matrix_client_fluffychat_container_image_self_build_version }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_client_fluffychat_git_pull_results - name: Ensure FluffyChat Web container image is built @@ -54,7 +54,7 @@ src: "{{ item.src }}" dest: "{{ matrix_client_fluffychat_data_path }}/{{ item.name }}" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {src: "{{ role_path }}/templates/labels.j2", name: "labels"} diff --git a/roles/custom/matrix-client-hydrogen/tasks/setup_install.yml b/roles/custom/matrix-client-hydrogen/tasks/setup_install.yml index f720fe5f5..e0c405aa9 100644 --- a/roles/custom/matrix-client-hydrogen/tasks/setup_install.yml +++ b/roles/custom/matrix-client-hydrogen/tasks/setup_install.yml @@ -16,7 +16,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_client_hydrogen_data_path }}", when: true} @@ -32,7 +32,7 @@ version: "{{ matrix_client_hydrogen_docker_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_client_hydrogen_git_pull_results - name: Check if Hydrogen Docker image exists @@ -73,7 +73,7 @@ content: "{{ matrix_client_hydrogen_configuration | to_nice_json }}" dest: "{{ matrix_client_hydrogen_data_path }}/config.json" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Hydrogen additional config files installed @@ -81,7 +81,7 @@ src: "{{ item.src }}" dest: "{{ matrix_client_hydrogen_data_path }}/{{ item.name }}" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {src: "{{ role_path }}/templates/nginx.conf.j2", name: "nginx.conf"} diff --git a/roles/custom/matrix-client-schildichat/tasks/setup_install.yml b/roles/custom/matrix-client-schildichat/tasks/setup_install.yml index 2a577df58..47d5f0fae 100644 --- a/roles/custom/matrix-client-schildichat/tasks/setup_install.yml +++ b/roles/custom/matrix-client-schildichat/tasks/setup_install.yml @@ -13,7 +13,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_client_schildichat_data_path }}", when: true} @@ -41,7 +41,7 @@ version: "{{ matrix_client_schildichat_container_image_self_build_version }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_client_schildichat_git_pull_results # See: @@ -72,7 +72,7 @@ content: "{{ matrix_client_schildichat_configuration | to_nice_json }}" dest: "{{ matrix_client_schildichat_data_path }}/config.json" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure SchildiChat location sharing map style installed @@ -81,7 +81,7 @@ content: "{{ matrix_client_schildichat_location_sharing_map_style | to_nice_json }}" dest: "{{ matrix_client_schildichat_data_path }}/map_style.json" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure SchildiChat Web config files installed @@ -89,7 +89,7 @@ src: "{{ item.src }}" dest: "{{ matrix_client_schildichat_data_path }}/{{ item.name }}" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {src: "{{ role_path }}/templates/labels.j2", name: "labels"} diff --git a/roles/custom/matrix-conduit/tasks/setup_install.yml b/roles/custom/matrix-conduit/tasks/setup_install.yml index a4a65b097..b82b94e85 100644 --- a/roles/custom/matrix-conduit/tasks/setup_install.yml +++ b/roles/custom/matrix-conduit/tasks/setup_install.yml @@ -13,7 +13,7 @@ path: "{{ matrix_conduit_config_path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Conduit data path exists @@ -21,7 +21,7 @@ path: "{{ matrix_conduit_data_path }}" state: directory mode: 0770 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Conduit configuration installed @@ -29,7 +29,7 @@ src: "{{ matrix_conduit_template_conduit_config }}" dest: "{{ matrix_conduit_config_path }}/conduit.toml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Conduit support files installed @@ -37,7 +37,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_conduit_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-conduwuit/tasks/install.yml b/roles/custom/matrix-conduwuit/tasks/install.yml index aa489386e..8b1e95a5a 100644 --- a/roles/custom/matrix-conduwuit/tasks/install.yml +++ b/roles/custom/matrix-conduwuit/tasks/install.yml @@ -9,7 +9,7 @@ path: "{{ matrix_conduwuit_config_path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure conduwuit data path exists @@ -17,7 +17,7 @@ path: "{{ matrix_conduwuit_data_path }}" state: directory mode: 0770 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure conduwuit configuration installed @@ -25,7 +25,7 @@ src: "{{ matrix_conduwuit_template_conduwuit_config }}" dest: "{{ matrix_conduwuit_config_path }}/conduwuit.toml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure conduwuit support files installed @@ -33,7 +33,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_conduwuit_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-conduwuit/tasks/setup_install.yml b/roles/custom/matrix-conduwuit/tasks/setup_install.yml index 4a5651fcf..6da4e27b0 100644 --- a/roles/custom/matrix-conduwuit/tasks/setup_install.yml +++ b/roles/custom/matrix-conduwuit/tasks/setup_install.yml @@ -9,7 +9,7 @@ path: "{{ matrix_conduwuit_config_path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure conduwuit data path exists @@ -17,7 +17,7 @@ path: "{{ matrix_conduwuit_data_path }}" state: directory mode: 0770 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure conduwuit configuration installed @@ -25,7 +25,7 @@ src: "{{ matrix_conduwuit_template_conduwuit_config }}" dest: "{{ matrix_conduwuit_config_path }}/conduwuit.toml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure conduwuit support files installed @@ -33,7 +33,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_conduwuit_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-continuwuity/tasks/install.yml b/roles/custom/matrix-continuwuity/tasks/install.yml index 19aaff4f2..11de27495 100644 --- a/roles/custom/matrix-continuwuity/tasks/install.yml +++ b/roles/custom/matrix-continuwuity/tasks/install.yml @@ -9,7 +9,7 @@ path: "{{ matrix_continuwuity_config_path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure continuwuity data path exists @@ -17,7 +17,7 @@ path: "{{ matrix_continuwuity_data_path }}" state: directory mode: 0770 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure continuwuity configuration installed @@ -25,7 +25,7 @@ src: "{{ matrix_continuwuity_template_continuwuity_config }}" dest: "{{ matrix_continuwuity_config_path }}/continuwuity.toml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure continuwuity support files installed @@ -33,7 +33,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_continuwuity_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml b/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml index 4f8bb6444..66352458f 100644 --- a/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml +++ b/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml @@ -63,7 +63,7 @@ ansible.builtin.file: path: "{{ matrix_base_data_path }}/continuwuity" state: directory - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" recurse: true @@ -71,7 +71,7 @@ ansible.builtin.file: path: "{{ matrix_base_data_path }}/continuwuity_old" state: directory - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" recurse: true diff --git a/roles/custom/matrix-continuwuity/tasks/setup_install.yml b/roles/custom/matrix-continuwuity/tasks/setup_install.yml index 8b86cb216..a258ae8d0 100644 --- a/roles/custom/matrix-continuwuity/tasks/setup_install.yml +++ b/roles/custom/matrix-continuwuity/tasks/setup_install.yml @@ -9,7 +9,7 @@ path: "{{ matrix_continuwuity_config_path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure continuwuity data path exists @@ -17,7 +17,7 @@ path: "{{ matrix_continuwuity_data_path }}" state: directory mode: 0770 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure continuwuity configuration installed @@ -25,7 +25,7 @@ src: "{{ matrix_continuwuity_template_continuwuity_config }}" dest: "{{ matrix_continuwuity_config_path }}/continuwuity.toml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure continuwuity support files installed @@ -33,7 +33,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_continuwuity_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-corporal/tasks/setup_install.yml b/roles/custom/matrix-corporal/tasks/setup_install.yml index cdbf3af87..e69617562 100644 --- a/roles/custom/matrix-corporal/tasks/setup_install.yml +++ b/roles/custom/matrix-corporal/tasks/setup_install.yml @@ -16,7 +16,7 @@ path: "{{ item }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - "{{ matrix_corporal_base_path }}" @@ -31,7 +31,7 @@ version: "{{ matrix_corporal_docker_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_corporal_git_pull_results when: matrix_corporal_container_image_self_build | bool @@ -64,7 +64,7 @@ content: "{{ matrix_corporal_configuration | to_nice_json }}" dest: "{{ matrix_corporal_config_dir_path }}/config.json" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Matrix Corporal support files installed @@ -72,7 +72,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_corporal_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-coturn/tasks/setup_install.yml b/roles/custom/matrix-coturn/tasks/setup_install.yml index 697edb4ee..888916080 100644 --- a/roles/custom/matrix-coturn/tasks/setup_install.yml +++ b/roles/custom/matrix-coturn/tasks/setup_install.yml @@ -51,7 +51,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_coturn_docker_src_files_path }}", when: "{{ matrix_coturn_container_image_self_build }}"} @@ -78,7 +78,7 @@ version: "{{ matrix_coturn_container_image_self_build_repo_version }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_coturn_git_pull_results - name: Ensure coturn Docker image is built @@ -97,7 +97,7 @@ path: "{{ matrix_coturn_base_path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure turnserver.conf installed @@ -105,7 +105,7 @@ src: "{{ role_path }}/templates/turnserver.conf.j2" dest: "{{ matrix_coturn_config_path }}" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure coturn network is created in Docker diff --git a/roles/custom/matrix-dendrite/tasks/setup_install.yml b/roles/custom/matrix-dendrite/tasks/setup_install.yml index 262f16d04..4d78a3ecc 100644 --- a/roles/custom/matrix-dendrite/tasks/setup_install.yml +++ b/roles/custom/matrix-dendrite/tasks/setup_install.yml @@ -15,7 +15,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - path: "{{ matrix_dendrite_config_dir_path }}" @@ -44,7 +44,7 @@ path: "{{ matrix_dendrite_media_store_path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" when: "not local_path_media_store_stat.failed and not local_path_media_store_stat.stat.exists" @@ -79,7 +79,7 @@ ansible.builtin.file: path: "{{ matrix_dendrite_config_dir_path }}/{{ matrix_server_fqn_matrix }}.signing.pem" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Dendrite configuration installed @@ -87,7 +87,7 @@ content: "{{ matrix_dendrite_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_dendrite_config_dir_path }}/dendrite.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - when: "matrix_dendrite_container_image_self_build | bool" @@ -99,7 +99,7 @@ version: "{{ matrix_dendrite_docker_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_dendrite_git_pull_results - name: Check if Dendrite Docker image exists @@ -130,7 +130,7 @@ src: "{{ item.src }}" dest: "{{ item.dest }}" mode: "{{ item.mode }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - src: labels.j2 diff --git a/roles/custom/matrix-dimension/tasks/setup_install.yml b/roles/custom/matrix-dimension/tasks/setup_install.yml index 5aaeb6d1e..de02329f1 100644 --- a/roles/custom/matrix-dimension/tasks/setup_install.yml +++ b/roles/custom/matrix-dimension/tasks/setup_install.yml @@ -87,7 +87,7 @@ path: "{{ matrix_dimension_base_path }}" state: directory mode: 0770 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_dimension_user_gid }}" - name: Ensure Dimension config installed @@ -95,7 +95,7 @@ content: "{{ matrix_dimension_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_dimension_base_path }}/config.yaml" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_dimension_user_gid }}" - name: Ensure Dimension labels installed @@ -103,7 +103,7 @@ src: "{{ role_path }}/templates/labels.j2" dest: "{{ matrix_dimension_base_path }}/labels" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Dimension image is pulled @@ -125,7 +125,7 @@ version: "{{ matrix_dimension_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" when: "matrix_dimension_container_image_self_build | bool" register: matrix_dimension_git_pull_results diff --git a/roles/custom/matrix-dynamic-dns/tasks/setup_install.yml b/roles/custom/matrix-dynamic-dns/tasks/setup_install.yml index 45eac171d..e1b4a091d 100644 --- a/roles/custom/matrix-dynamic-dns/tasks/setup_install.yml +++ b/roles/custom/matrix-dynamic-dns/tasks/setup_install.yml @@ -26,7 +26,7 @@ path: "{{ item.path }}" state: directory mode: 0751 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_dynamic_dns_base_path }}", when: true} @@ -41,7 +41,7 @@ dest: "{{ matrix_dynamic_dns_docker_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_dynamic_dns_git_pull_results when: "matrix_dynamic_dns_enabled | bool and matrix_dynamic_dns_container_image_self_build | bool" @@ -62,7 +62,7 @@ src: "{{ role_path }}/templates/ddclient.conf.j2" dest: "{{ matrix_dynamic_dns_config_path }}/ddclient.conf" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-dynamic-dns container network is created diff --git a/roles/custom/matrix-element-call/tasks/install.yml b/roles/custom/matrix-element-call/tasks/install.yml index 49c3078f8..021668afc 100644 --- a/roles/custom/matrix-element-call/tasks/install.yml +++ b/roles/custom/matrix-element-call/tasks/install.yml @@ -11,7 +11,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - path: "{{ matrix_element_call_base_path }}" @@ -21,7 +21,7 @@ src: "{{ role_path }}/templates/config.json.j2" dest: "{{ matrix_element_call_base_path }}/config.json" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Element Call container labels file is in place @@ -29,7 +29,7 @@ src: "{{ role_path }}/templates/labels.j2" dest: "{{ matrix_element_call_base_path }}/labels" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Element Call container image is pulled diff --git a/roles/custom/matrix-ldap-registration-proxy/tasks/setup_install.yml b/roles/custom/matrix-ldap-registration-proxy/tasks/setup_install.yml index e068a629b..779ff5cdb 100644 --- a/roles/custom/matrix-ldap-registration-proxy/tasks/setup_install.yml +++ b/roles/custom/matrix-ldap-registration-proxy/tasks/setup_install.yml @@ -13,7 +13,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_ldap_registration_proxy_config_path }}", when: true} @@ -27,7 +27,7 @@ version: "{{ matrix_ldap_registration_proxy_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_ldap_registration_proxy_git_pull_results - name: Ensure matrix_ldap_registration_proxy Docker image is built @@ -46,7 +46,7 @@ src: "{{ role_path }}/templates/ldap-registration-proxy.env.j2" dest: "{{ matrix_ldap_registration_proxy_config_path }}/ldap-registration-proxy.env" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-ldap-registration-proxy support files installed @@ -54,7 +54,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_ldap_registration_proxy_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-livekit-jwt-service/tasks/install.yml b/roles/custom/matrix-livekit-jwt-service/tasks/install.yml index 9193d6679..da8a0a970 100644 --- a/roles/custom/matrix-livekit-jwt-service/tasks/install.yml +++ b/roles/custom/matrix-livekit-jwt-service/tasks/install.yml @@ -11,7 +11,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - path: "{{ matrix_livekit_jwt_service_base_path }}" @@ -21,7 +21,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_livekit_jwt_service_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - env @@ -48,7 +48,7 @@ dest: "{{ matrix_livekit_jwt_service_container_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_livekit_jwt_service_git_pull_results - name: Ensure LiveKit JWT Service container image is built diff --git a/roles/custom/matrix-ma1sd/tasks/setup_install.yml b/roles/custom/matrix-ma1sd/tasks/setup_install.yml index 93aa2f14e..67f378d71 100644 --- a/roles/custom/matrix-ma1sd/tasks/setup_install.yml +++ b/roles/custom/matrix-ma1sd/tasks/setup_install.yml @@ -19,7 +19,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_ma1sd_config_path }}", when: true} @@ -78,7 +78,7 @@ version: "{{ matrix_ma1sd_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_ma1sd_git_pull_results - name: Ensure ma1sd container image is built @@ -95,7 +95,7 @@ content: "{{ matrix_ma1sd_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_ma1sd_config_path }}/ma1sd.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure custom view templates are installed, if any @@ -103,7 +103,7 @@ content: "{{ item.value }}" dest: "{{ matrix_ma1sd_config_path }}/{{ item.location }}" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {value: "{{ matrix_ma1sd_view_session_custom_onTokenSubmit_success_template }}", location: 'tokenSubmitSuccess.html'} @@ -115,7 +115,7 @@ content: "{{ item.value }}" dest: "{{ matrix_ma1sd_config_path }}/{{ item.location }}" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {value: "{{ matrix_ma1sd_threepid_medium_email_custom_invite_template }}", location: 'invite-template.eml'} @@ -141,7 +141,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_ma1sd_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-media-repo/tasks/setup_install.yml b/roles/custom/matrix-media-repo/tasks/setup_install.yml index 525df257f..488830626 100755 --- a/roles/custom/matrix-media-repo/tasks/setup_install.yml +++ b/roles/custom/matrix-media-repo/tasks/setup_install.yml @@ -12,7 +12,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - path: "{{ matrix_media_repo_base_path }}" @@ -30,7 +30,7 @@ src: "{{ role_path }}/templates/media-repo/{{ item }}.j2" dest: "{{ matrix_media_repo_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - env @@ -41,7 +41,7 @@ src: "{{ role_path }}/templates/media-repo/media-repo.yaml.j2" dest: "{{ matrix_media_repo_config_path }}/media-repo.yaml" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure media-repo Docker image is pulled @@ -65,7 +65,7 @@ version: "{{ matrix_media_repo_docker_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_media_repo_git_pull_results - name: Check if media-repo Docker image exists @@ -128,7 +128,7 @@ src: "{{ matrix_media_repo_homeserver_signing_key }}" dest: "{{ matrix_media_repo_homeserver_signing_key }}.{{ matrix_homeserver_implementation }}.backup" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Replace homeserver signing key with merged signing key diff --git a/roles/custom/matrix-pantalaimon/tasks/install.yml b/roles/custom/matrix-pantalaimon/tasks/install.yml index 256aa2f83..5cfe1cd3b 100644 --- a/roles/custom/matrix-pantalaimon/tasks/install.yml +++ b/roles/custom/matrix-pantalaimon/tasks/install.yml @@ -10,7 +10,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_pantalaimon_base_path }}", when: true} @@ -23,7 +23,7 @@ content: "{{ matrix_pantalaimon_configuration }}" dest: "{{ matrix_pantalaimon_data_path }}/pantalaimon.conf" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure pantalaimon container image is pulled @@ -45,7 +45,7 @@ dest: "{{ matrix_pantalaimon_container_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_pantalaimon_git_pull_results when: "matrix_pantalaimon_container_image_self_build | bool" diff --git a/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/setup_install.yml b/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/setup_install.yml index 702c65e3a..f46a685c7 100644 --- a/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/setup_install.yml +++ b/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/setup_install.yml @@ -22,7 +22,7 @@ path: "{{ item }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - "{{ matrix_prometheus_nginxlog_exporter_base_path }}" @@ -33,7 +33,7 @@ src: "{{ role_path }}/templates/prometheus-nginxlog-exporter.yaml.j2" dest: "{{ matrix_prometheus_nginxlog_exporter_config_path }}/prometheus-nginxlog-exporter.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure prometheus-nginxlog-exporter support files installed @@ -41,7 +41,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_prometheus_nginxlog_exporter_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-rageshake/tasks/install.yml b/roles/custom/matrix-rageshake/tasks/install.yml index 796adf852..6a7b0e72c 100644 --- a/roles/custom/matrix-rageshake/tasks/install.yml +++ b/roles/custom/matrix-rageshake/tasks/install.yml @@ -12,7 +12,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - path: "{{ matrix_rageshake_config_path }}" @@ -27,7 +27,7 @@ ansible.builtin.copy: content: "{{ matrix_rageshake_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_rageshake_config_path }}/config.yaml" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0640 @@ -36,7 +36,7 @@ src: "{{ role_path }}/templates/labels.j2" dest: "{{ matrix_rageshake_base_path }}/labels" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure rageshake image is pulled @@ -58,7 +58,7 @@ dest: "{{ matrix_rageshake_container_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_rageshake_git_pull_results when: "matrix_rageshake_container_image_self_build | bool" diff --git a/roles/custom/matrix-registration/tasks/setup_install.yml b/roles/custom/matrix-registration/tasks/setup_install.yml index 9a97c1704..95781a634 100644 --- a/roles/custom/matrix-registration/tasks/setup_install.yml +++ b/roles/custom/matrix-registration/tasks/setup_install.yml @@ -47,7 +47,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_registration_base_path }}", when: true} @@ -75,7 +75,7 @@ version: "{{ matrix_registration_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_registration_git_pull_results when: "matrix_registration_container_image_self_build | bool" @@ -104,7 +104,7 @@ content: "{{ matrix_registration_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_registration_config_path }}/config.yaml" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-registration support files installed @@ -112,7 +112,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_registration_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - labels diff --git a/roles/custom/matrix-sliding-sync/tasks/install.yml b/roles/custom/matrix-sliding-sync/tasks/install.yml index 50128b583..d23d2cdf7 100644 --- a/roles/custom/matrix-sliding-sync/tasks/install.yml +++ b/roles/custom/matrix-sliding-sync/tasks/install.yml @@ -10,7 +10,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - path: "{{ matrix_sliding_sync_base_path }}" @@ -24,7 +24,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_sliding_sync_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - env @@ -51,7 +51,7 @@ dest: "{{ matrix_sliding_sync_container_src_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_sliding_sync_git_pull_results - name: Ensure matrix-sliding-sync container image is built diff --git a/roles/custom/matrix-static-files/tasks/install.yml b/roles/custom/matrix-static-files/tasks/install.yml index dd467a38d..c8a752b4c 100644 --- a/roles/custom/matrix-static-files/tasks/install.yml +++ b/roles/custom/matrix-static-files/tasks/install.yml @@ -10,7 +10,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_static_files_base_path }}", when: true} @@ -30,7 +30,7 @@ ansible.builtin.template: src: "{{ item.src }}" dest: "{{ item.dest }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0644 with_items: @@ -48,7 +48,7 @@ content: "{{ item.content }}" dest: "{{ item.dest }}" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" when: item.when | bool with_items: diff --git a/roles/custom/matrix-sygnal/tasks/install.yml b/roles/custom/matrix-sygnal/tasks/install.yml index af6b88fe9..8ae6c875a 100644 --- a/roles/custom/matrix-sygnal/tasks/install.yml +++ b/roles/custom/matrix-sygnal/tasks/install.yml @@ -14,7 +14,7 @@ path: "{{ item }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - "{{ matrix_sygnal_base_path }}" @@ -26,7 +26,7 @@ content: "{{ matrix_sygnal_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_sygnal_config_path }}/sygnal.yaml" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Sygnal labels installed @@ -34,7 +34,7 @@ src: "{{ role_path }}/templates/labels.j2" dest: "{{ matrix_sygnal_base_path }}/labels" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure Sygnal image is pulled diff --git a/roles/custom/matrix-synapse-admin/tasks/setup_install.yml b/roles/custom/matrix-synapse-admin/tasks/setup_install.yml index 1c3fb8673..adaf66ea1 100644 --- a/roles/custom/matrix-synapse-admin/tasks/setup_install.yml +++ b/roles/custom/matrix-synapse-admin/tasks/setup_install.yml @@ -16,7 +16,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_synapse_admin_base_path }}", when: true} @@ -28,7 +28,7 @@ ansible.builtin.template: src: "{{ role_path }}/templates/labels.j2" dest: "{{ matrix_synapse_admin_base_path }}/labels" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0640 @@ -37,7 +37,7 @@ content: "{{ matrix_synapse_admin_configuration | to_nice_json }}" dest: "{{ matrix_synapse_admin_config_path }}/config.json" mode: 0644 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure matrix-synapse-admin image is pulled @@ -59,7 +59,7 @@ version: "{{ matrix_synapse_admin_docker_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_synapse_admin_git_pull_results when: matrix_synapse_admin_container_image_self_build | bool diff --git a/roles/custom/matrix-synapse-auto-compressor/tasks/install.yml b/roles/custom/matrix-synapse-auto-compressor/tasks/install.yml index 3e69d9f5d..6cd272c9e 100644 --- a/roles/custom/matrix-synapse-auto-compressor/tasks/install.yml +++ b/roles/custom/matrix-synapse-auto-compressor/tasks/install.yml @@ -11,7 +11,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" when: item.when | bool with_items: @@ -25,7 +25,7 @@ src: "{{ role_path }}/templates/env.j2" dest: "{{ matrix_synapse_auto_compressor_base_path }}/env" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure synapse-auto-compressor workaround script is installed @@ -33,7 +33,7 @@ src: "{{ role_path }}/templates/matrix-synapse-auto-compressor-fix.sh.j2" dest: "{{ matrix_synapse_auto_compressor_base_path }}/matrix-synapse-auto-compressor-fix.sh" mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" - name: Ensure synapse-auto-compressor image is pulled @@ -58,7 +58,7 @@ dest: "{{ matrix_synapse_auto_compressor_container_src_files_path }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_synapse_auto_compressor_git_pull_results - name: Check if synapse-auto-compressor image exists diff --git a/roles/custom/matrix-synapse-reverse-proxy-companion/tasks/setup_install.yml b/roles/custom/matrix-synapse-reverse-proxy-companion/tasks/setup_install.yml index 34ab589d8..67180bf37 100644 --- a/roles/custom/matrix-synapse-reverse-proxy-companion/tasks/setup_install.yml +++ b/roles/custom/matrix-synapse-reverse-proxy-companion/tasks/setup_install.yml @@ -10,7 +10,7 @@ path: "{{ item }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - "{{ matrix_synapse_reverse_proxy_companion_base_path }}" @@ -20,7 +20,7 @@ ansible.builtin.template: src: "{{ item.src }}" dest: "{{ item.dest }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0644 with_items: diff --git a/roles/custom/matrix-synapse-usage-exporter/tasks/setup_install.yml b/roles/custom/matrix-synapse-usage-exporter/tasks/setup_install.yml index 591e377e3..a2151bf81 100644 --- a/roles/custom/matrix-synapse-usage-exporter/tasks/setup_install.yml +++ b/roles/custom/matrix-synapse-usage-exporter/tasks/setup_install.yml @@ -10,7 +10,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - path: "{{ matrix_synapse_usage_exporter_base_path }}" @@ -24,7 +24,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_synapse_usage_exporter_base_path }}/{{ item }}" mode: 0640 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - env @@ -51,7 +51,7 @@ version: "{{ matrix_synapse_usage_exporter_container_image.split(':')[1] }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_synapse_usage_exporter_git_pull_results - name: Check if synapse-usage-exporter Docker image exists diff --git a/roles/custom/matrix-user-verification-service/tasks/setup_install.yml b/roles/custom/matrix-user-verification-service/tasks/setup_install.yml index a539168b5..b04f299cc 100644 --- a/roles/custom/matrix-user-verification-service/tasks/setup_install.yml +++ b/roles/custom/matrix-user-verification-service/tasks/setup_install.yml @@ -11,7 +11,7 @@ path: "{{ item.path }}" state: directory mode: 0750 - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" with_items: - {path: "{{ matrix_user_verification_service_config_path }}", when: true} @@ -37,7 +37,7 @@ version: "{{ matrix_user_verification_service_container_image_self_build_branch }}" force: "yes" become: true - become_user: "{{ matrix_user_username }}" + become_user: "{{ matrix_user_name }}" register: matrix_user_verification_service_git_pull_results when: "matrix_user_verification_service_container_image_self_build | bool" @@ -57,7 +57,7 @@ ansible.builtin.template: src: "{{ role_path }}/templates/.env.j2" dest: "{{ matrix_user_verification_service_config_env_file }}" - owner: "{{ matrix_user_username }}" + owner: "{{ matrix_user_name }}" group: "{{ matrix_user_groupname }}" mode: 0644 From 3ee7deb2d7ea00024848aefb067d7919aa062c2e Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 29 Apr 2025 10:35:26 +0300 Subject: [PATCH 048/404] Rename variable (`matrix_user_groupname` -> `matrix_group_name`) --- docs/configuring-playbook-bridge-hookshot.md | 2 +- docs/configuring-playbook-sygnal.md | 2 +- group_vars/matrix_servers | 4 ++-- .../matrix-alertmanager-receiver/tasks/install.yml | 6 +++--- .../tasks/install.yml | 4 ++-- .../tasks/setup_install.yml | 8 ++++---- .../matrix-authentication-service/tasks/install.yml | 6 +++--- roles/custom/matrix-base/defaults/main.yml | 4 ++-- roles/custom/matrix-base/tasks/setup_matrix_base.yml | 2 +- roles/custom/matrix-base/tasks/setup_matrix_user.yml | 4 ++-- roles/custom/matrix-base/tasks/validate_config.yml | 1 + roles/custom/matrix-bot-baibot/tasks/install.yml | 6 +++--- .../matrix-bot-buscarron/tasks/setup_install.yml | 4 ++-- roles/custom/matrix-bot-chatgpt/tasks/install.yml | 4 ++-- .../matrix-bot-draupnir/tasks/setup_install.yml | 6 +++--- roles/custom/matrix-bot-go-neb/tasks/install.yml | 6 +++--- .../matrix-bot-honoroit/tasks/setup_install.yml | 4 ++-- .../tasks/clean_cache.yml | 2 +- .../tasks/setup_install.yml | 4 ++-- .../tasks/setup_install.yml | 4 ++-- .../custom/matrix-bot-maubot/tasks/setup_install.yml | 8 ++++---- .../matrix-bot-mjolnir/tasks/setup_install.yml | 4 ++-- .../tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 12 ++++++------ .../tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 6 +++--- .../matrix-bridge-hookshot/tasks/setup_install.yml | 10 +++++----- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/install.yml | 8 ++++---- .../tasks/install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 12 ++++++------ .../tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 8 ++++---- .../tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 8 ++++---- .../matrix-bridge-postmoogle/tasks/setup_install.yml | 4 ++-- .../custom/matrix-bridge-sms/tasks/setup_install.yml | 8 ++++---- roles/custom/matrix-bridge-wechat/tasks/install.yml | 8 ++++---- .../matrix-cactus-comments-client/tasks/install.yml | 12 ++++++------ .../matrix-cactus-comments/tasks/setup_install.yml | 6 +++--- .../matrix-client-cinny/tasks/setup_install.yml | 6 +++--- .../matrix-client-element/tasks/setup_install.yml | 8 ++++---- .../matrix-client-fluffychat/tasks/setup_install.yml | 4 ++-- .../matrix-client-hydrogen/tasks/setup_install.yml | 6 +++--- .../tasks/setup_install.yml | 8 ++++---- roles/custom/matrix-conduit/tasks/setup_install.yml | 8 ++++---- roles/custom/matrix-conduwuit/tasks/install.yml | 8 ++++---- .../custom/matrix-conduwuit/tasks/setup_install.yml | 8 ++++---- roles/custom/matrix-continuwuity/tasks/install.yml | 8 ++++---- .../tasks/migrate_from_conduwuit.yml | 4 ++-- .../matrix-continuwuity/tasks/setup_install.yml | 8 ++++---- roles/custom/matrix-corporal/tasks/setup_install.yml | 6 +++--- roles/custom/matrix-coturn/tasks/setup_install.yml | 6 +++--- roles/custom/matrix-dendrite/tasks/setup_install.yml | 10 +++++----- .../custom/matrix-dimension/tasks/setup_install.yml | 2 +- .../matrix-dynamic-dns/tasks/setup_install.yml | 4 ++-- roles/custom/matrix-element-call/tasks/install.yml | 6 +++--- .../tasks/setup_install.yml | 6 +++--- .../matrix-livekit-jwt-service/tasks/install.yml | 4 ++-- roles/custom/matrix-ma1sd/tasks/setup_install.yml | 10 +++++----- .../custom/matrix-media-repo/tasks/setup_install.yml | 8 ++++---- roles/custom/matrix-pantalaimon/tasks/install.yml | 4 ++-- .../tasks/setup_install.yml | 6 +++--- roles/custom/matrix-rageshake/tasks/install.yml | 6 +++--- .../matrix-registration/tasks/setup_install.yml | 6 +++--- roles/custom/matrix-sliding-sync/tasks/install.yml | 4 ++-- roles/custom/matrix-static-files/tasks/install.yml | 6 +++--- roles/custom/matrix-sygnal/tasks/install.yml | 6 +++--- .../matrix-synapse-admin/tasks/setup_install.yml | 6 +++--- .../matrix-synapse-auto-compressor/tasks/install.yml | 6 +++--- .../tasks/setup_install.yml | 4 ++-- .../tasks/setup_install.yml | 4 ++-- .../tasks/setup_install.yml | 4 ++-- 89 files changed, 279 insertions(+), 278 deletions(-) diff --git a/docs/configuring-playbook-bridge-hookshot.md b/docs/configuring-playbook-bridge-hookshot.md index 07d2aea4c..47daebeac 100644 --- a/docs/configuring-playbook-bridge-hookshot.md +++ b/docs/configuring-playbook-bridge-hookshot.md @@ -127,7 +127,7 @@ aux_file_definitions: content: "{{ lookup('file', '/path/to/your-github-private-key.pem') }}" mode: '0400' owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" ``` For more information, see the documentation in the [default configuration of the aux role](https://github.com/mother-of-all-self-hosting/ansible-role-aux/blob/main/defaults/main.yml). diff --git a/docs/configuring-playbook-sygnal.md b/docs/configuring-playbook-sygnal.md index 69c2aee18..b746d2c62 100644 --- a/docs/configuring-playbook-sygnal.md +++ b/docs/configuring-playbook-sygnal.md @@ -50,7 +50,7 @@ aux_file_definitions: here mode: '0600' owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" ``` Configuring [GCM/FCM](https://firebase.google.com/docs/cloud-messaging/) is easier, as it only requires that you provide some config values. diff --git a/group_vars/matrix_servers b/group_vars/matrix_servers index 5409e9220..8970ac9b4 100755 --- a/group_vars/matrix_servers +++ b/group_vars/matrix_servers @@ -74,10 +74,10 @@ matrix_federation_traefik_entrypoint_tls: "{{ traefik_config_entrypoint_web_secu ######################################################################## aux_directory_default_owner: "{{ matrix_user_name }}" -aux_directory_default_group: "{{ matrix_user_groupname }}" +aux_directory_default_group: "{{ matrix_group_name }}" aux_file_default_owner: "{{ matrix_user_name }}" -aux_file_default_group: "{{ matrix_user_groupname }}" +aux_file_default_group: "{{ matrix_group_name }}" ######################################################################## # # diff --git a/roles/custom/matrix-alertmanager-receiver/tasks/install.yml b/roles/custom/matrix-alertmanager-receiver/tasks/install.yml index c72689afb..d47c27837 100644 --- a/roles/custom/matrix-alertmanager-receiver/tasks/install.yml +++ b/roles/custom/matrix-alertmanager-receiver/tasks/install.yml @@ -11,7 +11,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - path: "{{ matrix_alertmanager_receiver_base_path }}" when: true @@ -27,7 +27,7 @@ dest: "{{ matrix_alertmanager_receiver_config_path }}/config.yml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-alertmanager-receiver support files installed ansible.builtin.template: @@ -35,7 +35,7 @@ dest: "{{ matrix_alertmanager_receiver_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-appservice-double-puppet/tasks/install.yml b/roles/custom/matrix-appservice-double-puppet/tasks/install.yml index d54c1b6a4..794f0ba99 100644 --- a/roles/custom/matrix-appservice-double-puppet/tasks/install.yml +++ b/roles/custom/matrix-appservice-double-puppet/tasks/install.yml @@ -10,7 +10,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - path: "{{ matrix_appservice_double_puppet_base_path }}" when: true @@ -24,4 +24,4 @@ dest: "{{ matrix_appservice_double_puppet_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" diff --git a/roles/custom/matrix-appservice-draupnir-for-all/tasks/setup_install.yml b/roles/custom/matrix-appservice-draupnir-for-all/tasks/setup_install.yml index c6fa3fbc8..18e1d43d3 100644 --- a/roles/custom/matrix-appservice-draupnir-for-all/tasks/setup_install.yml +++ b/roles/custom/matrix-appservice-draupnir-for-all/tasks/setup_install.yml @@ -17,7 +17,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_appservice_draupnir_for_all_base_path }}", when: true} - {path: "{{ matrix_appservice_draupnir_for_all_config_path }}", when: true} @@ -65,7 +65,7 @@ dest: "{{ matrix_appservice_draupnir_for_all_config_path }}/production-appservice.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-appservice-draupnir-for-all bot config installed ansible.builtin.copy: @@ -73,7 +73,7 @@ dest: "{{ matrix_appservice_draupnir_for_all_config_path }}/production-bots.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-appservice-draupnir-for-all registration.yaml installed ansible.builtin.copy: @@ -81,7 +81,7 @@ dest: "{{ matrix_appservice_draupnir_for_all_config_path }}/draupnir-for-all-registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-appservice-draupnir-for-all container network is created community.general.docker_network: diff --git a/roles/custom/matrix-authentication-service/tasks/install.yml b/roles/custom/matrix-authentication-service/tasks/install.yml index ad3a56d18..89ee7943b 100644 --- a/roles/custom/matrix-authentication-service/tasks/install.yml +++ b/roles/custom/matrix-authentication-service/tasks/install.yml @@ -10,7 +10,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_authentication_service_base_path }}", when: true} - {path: "{{ matrix_authentication_service_bin_path }}", when: true} @@ -39,7 +39,7 @@ dest: "{{ matrix_authentication_service_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Matrix Authentication Service support files created ansible.builtin.template: @@ -47,7 +47,7 @@ dest: "{{ item.dest }}" mode: "{{ item.mode }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - src: "{{ role_path }}/templates/env.j2" dest: "{{ matrix_authentication_service_config_path }}/env" diff --git a/roles/custom/matrix-base/defaults/main.yml b/roles/custom/matrix-base/defaults/main.yml index 5571a3b06..9e678c771 100644 --- a/roles/custom/matrix-base/defaults/main.yml +++ b/roles/custom/matrix-base/defaults/main.yml @@ -177,11 +177,11 @@ matrix_container_global_registry_prefix_override: "" matrix_user_name: "matrix" matrix_user_system: true -matrix_user_groupname: "matrix" +matrix_group_name: "matrix" matrix_group_system: true # By default, the playbook creates the user (`matrix_user_name`) -# and group (`matrix_user_groupname`) with a random ID. +# and group (`matrix_group_name`) with a random ID. # To use a specific user/group ID, override these variables. matrix_user_uid: ~ matrix_user_gid: ~ diff --git a/roles/custom/matrix-base/tasks/setup_matrix_base.yml b/roles/custom/matrix-base/tasks/setup_matrix_base.yml index 0ab3f8602..472889708 100644 --- a/roles/custom/matrix-base/tasks/setup_matrix_base.yml +++ b/roles/custom/matrix-base/tasks/setup_matrix_base.yml @@ -18,7 +18,7 @@ state: directory mode: "{{ matrix_base_data_path_mode }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - "{{ matrix_base_data_path }}" - "{{ matrix_bin_path }}" diff --git a/roles/custom/matrix-base/tasks/setup_matrix_user.yml b/roles/custom/matrix-base/tasks/setup_matrix_user.yml index 0d92bd31d..a7a09f284 100644 --- a/roles/custom/matrix-base/tasks/setup_matrix_user.yml +++ b/roles/custom/matrix-base/tasks/setup_matrix_user.yml @@ -7,7 +7,7 @@ - name: Ensure Matrix group is created ansible.builtin.group: - name: "{{ matrix_user_groupname }}" + name: "{{ matrix_group_name }}" gid: "{{ omit if matrix_user_gid is none else matrix_user_gid }}" state: present system: "{{ matrix_group_system }}" @@ -18,7 +18,7 @@ name: "{{ matrix_user_name }}" uid: "{{ omit if matrix_user_uid is none else matrix_user_uid }}" state: present - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" home: "{{ matrix_base_data_path }}" create_home: false system: "{{ matrix_user_system }}" diff --git a/roles/custom/matrix-base/tasks/validate_config.yml b/roles/custom/matrix-base/tasks/validate_config.yml index 8a64d2973..c372ee03b 100644 --- a/roles/custom/matrix-base/tasks/validate_config.yml +++ b/roles/custom/matrix-base/tasks/validate_config.yml @@ -33,6 +33,7 @@ - {'old': 'matrix_client_element_e2ee_secure_backup_setup_methods', 'new': 'matrix_static_files_file_matrix_client_property_io_element_e2ee_secure_backup_setup_methods'} - {'old': 'matrix_container_global_registry_prefix', 'new': ''} - {'old': 'matrix_user_username', 'new': 'matrix_user_name'} + - {'old': 'matrix_user_groupname', 'new': 'matrix_group_name'} # We have a dedicated check for this variable, because we'd like to have a custom (friendlier) message. - name: Fail if matrix_homeserver_generic_secret_key is undefined diff --git a/roles/custom/matrix-bot-baibot/tasks/install.yml b/roles/custom/matrix-bot-baibot/tasks/install.yml index d8bb15314..13a13e797 100644 --- a/roles/custom/matrix-bot-baibot/tasks/install.yml +++ b/roles/custom/matrix-bot-baibot/tasks/install.yml @@ -11,7 +11,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_bot_baibot_base_path }}", when: true} - {path: "{{ matrix_bot_baibot_config_path }}", when: true} @@ -25,14 +25,14 @@ dest: "{{ matrix_bot_baibot_config_path }}/config.yml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure baibot environment variables file created ansible.builtin.template: src: "{{ role_path }}/templates/env.j2" dest: "{{ matrix_bot_baibot_config_path }}/env" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0640 - name: Ensure baibot container image is pulled diff --git a/roles/custom/matrix-bot-buscarron/tasks/setup_install.yml b/roles/custom/matrix-bot-buscarron/tasks/setup_install.yml index 8dc7715e8..89bf6d48f 100644 --- a/roles/custom/matrix-bot-buscarron/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-buscarron/tasks/setup_install.yml @@ -40,7 +40,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_bot_buscarron_config_path }}", when: true} - {path: "{{ matrix_bot_buscarron_data_path }}", when: true} @@ -53,7 +53,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_bot_buscarron_config_path }}/{{ item }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0640 with_items: - env diff --git a/roles/custom/matrix-bot-chatgpt/tasks/install.yml b/roles/custom/matrix-bot-chatgpt/tasks/install.yml index c25999ab9..ea22800d8 100644 --- a/roles/custom/matrix-bot-chatgpt/tasks/install.yml +++ b/roles/custom/matrix-bot-chatgpt/tasks/install.yml @@ -11,7 +11,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_bot_chatgpt_config_path }}", when: true} - {path: "{{ matrix_bot_chatgpt_data_path }}", when: true} @@ -23,7 +23,7 @@ src: "{{ role_path }}/templates/env.j2" dest: "{{ matrix_bot_chatgpt_config_path }}/env" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0640 - name: Ensure chatgpt container image is pulled diff --git a/roles/custom/matrix-bot-draupnir/tasks/setup_install.yml b/roles/custom/matrix-bot-draupnir/tasks/setup_install.yml index cb3a0e366..5693da0a0 100644 --- a/roles/custom/matrix-bot-draupnir/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-draupnir/tasks/setup_install.yml @@ -17,7 +17,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_bot_draupnir_base_path }}", when: true} - {path: "{{ matrix_bot_draupnir_config_path }}", when: true} @@ -30,7 +30,7 @@ src: "{{ item.src }}" dest: "{{ item.dest }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0644 with_items: - src: "{{ role_path }}/templates/labels.j2" @@ -76,7 +76,7 @@ dest: "{{ matrix_bot_draupnir_config_path }}/production.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-bot-draupnir container network is created community.general.docker_network: diff --git a/roles/custom/matrix-bot-go-neb/tasks/install.yml b/roles/custom/matrix-bot-go-neb/tasks/install.yml index 5f15dc913..54cdec680 100644 --- a/roles/custom/matrix-bot-go-neb/tasks/install.yml +++ b/roles/custom/matrix-bot-go-neb/tasks/install.yml @@ -16,7 +16,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_bot_go_neb_config_path }}", when: true} - {path: "{{ matrix_bot_go_neb_data_path }}", when: true} @@ -29,7 +29,7 @@ dest: "{{ matrix_bot_go_neb_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure go-neb support files installed ansible.builtin.template: @@ -37,7 +37,7 @@ dest: "{{ matrix_bot_go_neb_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - env - labels diff --git a/roles/custom/matrix-bot-honoroit/tasks/setup_install.yml b/roles/custom/matrix-bot-honoroit/tasks/setup_install.yml index be939b620..18b3e4932 100644 --- a/roles/custom/matrix-bot-honoroit/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-honoroit/tasks/setup_install.yml @@ -42,7 +42,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_bot_honoroit_config_path }}", when: true} - {path: "{{ matrix_bot_honoroit_data_path }}", when: true} @@ -55,7 +55,7 @@ src: "{{ role_path }}/templates/{{ item }}.j2" dest: "{{ matrix_bot_honoroit_config_path }}/{{ item }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0640 with_items: - env diff --git a/roles/custom/matrix-bot-matrix-registration-bot/tasks/clean_cache.yml b/roles/custom/matrix-bot-matrix-registration-bot/tasks/clean_cache.yml index 55a6bed5c..5e599ec50 100644 --- a/roles/custom/matrix-bot-matrix-registration-bot/tasks/clean_cache.yml +++ b/roles/custom/matrix-bot-matrix-registration-bot/tasks/clean_cache.yml @@ -10,7 +10,7 @@ path: "{{ matrix_bot_matrix_registration_bot_data_path }}" mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - absent - directory diff --git a/roles/custom/matrix-bot-matrix-registration-bot/tasks/setup_install.yml b/roles/custom/matrix-bot-matrix-registration-bot/tasks/setup_install.yml index cc3ee82bb..e9956a335 100644 --- a/roles/custom/matrix-bot-matrix-registration-bot/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-matrix-registration-bot/tasks/setup_install.yml @@ -14,7 +14,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_bot_matrix_registration_bot_config_path }}", when: true} - {path: "{{ matrix_bot_matrix_registration_bot_data_path }}", when: true} @@ -26,7 +26,7 @@ src: "{{ role_path }}/templates/config.yaml.j2" dest: "{{ matrix_bot_matrix_registration_bot_config_path }}/config.yaml" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0640 - name: Ensure matrix-registration-bot image is pulled diff --git a/roles/custom/matrix-bot-matrix-reminder-bot/tasks/setup_install.yml b/roles/custom/matrix-bot-matrix-reminder-bot/tasks/setup_install.yml index 4c8be3d4c..664b042a8 100644 --- a/roles/custom/matrix-bot-matrix-reminder-bot/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-matrix-reminder-bot/tasks/setup_install.yml @@ -44,7 +44,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_bot_matrix_reminder_bot_config_path }}", when: true} - {path: "{{ matrix_bot_matrix_reminder_bot_data_path }}", when: true} @@ -93,7 +93,7 @@ dest: "{{ matrix_bot_matrix_reminder_bot_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-reminder-bot container network is created community.general.docker_network: diff --git a/roles/custom/matrix-bot-maubot/tasks/setup_install.yml b/roles/custom/matrix-bot-maubot/tasks/setup_install.yml index 9f4a90270..75f710ad0 100644 --- a/roles/custom/matrix-bot-maubot/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-maubot/tasks/setup_install.yml @@ -15,7 +15,7 @@ state: directory mode: 0755 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_bot_maubot_base_path }}", when: true} - {path: "{{ matrix_bot_maubot_config_path }}", when: true} @@ -32,7 +32,7 @@ src: "{{ role_path }}/templates/config.yaml.j2" dest: "{{ matrix_bot_maubot_config_path }}/config.yaml" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: "u=rwx" - name: Ensure maubot image is pulled @@ -77,7 +77,7 @@ src: "{{ role_path }}/templates/customizations/Dockerfile.j2" dest: "{{ matrix_bot_maubot_customized_docker_src_files_path }}/Dockerfile" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0640 register: matrix_bot_maubot_container_image_customizations_dockerfile_result @@ -97,7 +97,7 @@ dest: "{{ matrix_bot_maubot_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bot-mjolnir/tasks/setup_install.yml b/roles/custom/matrix-bot-mjolnir/tasks/setup_install.yml index 5562a3e2e..8aea69a3c 100644 --- a/roles/custom/matrix-bot-mjolnir/tasks/setup_install.yml +++ b/roles/custom/matrix-bot-mjolnir/tasks/setup_install.yml @@ -19,7 +19,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_bot_mjolnir_base_path }}", when: true} - {path: "{{ matrix_bot_mjolnir_config_path }}", when: true} @@ -67,7 +67,7 @@ dest: "{{ matrix_bot_mjolnir_config_path }}/production.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-bot-mjolnir container network is created community.general.docker_network: diff --git a/roles/custom/matrix-bridge-appservice-discord/tasks/setup_install.yml b/roles/custom/matrix-bridge-appservice-discord/tasks/setup_install.yml index 0f1cb199f..578cb4b37 100644 --- a/roles/custom/matrix-bridge-appservice-discord/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-appservice-discord/tasks/setup_install.yml @@ -57,7 +57,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - "{{ matrix_appservice_discord_base_path }}" - "{{ matrix_appservice_discord_config_path }}" @@ -94,7 +94,7 @@ dest: "{{ matrix_appservice_discord_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure AppService Discord registration.yaml installed ansible.builtin.copy: @@ -102,7 +102,7 @@ dest: "{{ matrix_appservice_discord_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" # If `matrix_appservice_discord_client_id` hasn't changed, the same invite link would be generated. # We intentionally suppress Ansible changes. diff --git a/roles/custom/matrix-bridge-appservice-irc/tasks/setup_install.yml b/roles/custom/matrix-bridge-appservice-irc/tasks/setup_install.yml index 8e73c1b5d..79b51ab6f 100644 --- a/roles/custom/matrix-bridge-appservice-irc/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-appservice-irc/tasks/setup_install.yml @@ -23,7 +23,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_appservice_irc_base_path }}", when: true} - {path: "{{ matrix_appservice_irc_config_path }}", when: true} @@ -119,7 +119,7 @@ dest: "{{ matrix_appservice_irc_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Generate Appservice IRC passkey if it doesn't exist ansible.builtin.shell: @@ -135,7 +135,7 @@ path: "{{ matrix_appservice_irc_data_path }}/passkey.pem" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" # Ideally, we'd like to generate the final registration.yaml file by ourselves. # @@ -199,7 +199,7 @@ dest: "{{ matrix_appservice_irc_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-appservice-irc container network is created community.general.docker_network: diff --git a/roles/custom/matrix-bridge-appservice-kakaotalk/tasks/setup_install.yml b/roles/custom/matrix-bridge-appservice-kakaotalk/tasks/setup_install.yml index 046b4a803..291928df8 100644 --- a/roles/custom/matrix-bridge-appservice-kakaotalk/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-appservice-kakaotalk/tasks/setup_install.yml @@ -36,7 +36,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_appservice_kakaotalk_base_path }}", when: true} - {path: "{{ matrix_appservice_kakaotalk_config_path }}", when: true} @@ -85,7 +85,7 @@ dest: "{{ matrix_appservice_kakaotalk_config_path }}/node-config.json" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-appservice-kakaotalk config.yaml installed ansible.builtin.copy: @@ -93,7 +93,7 @@ dest: "{{ matrix_appservice_kakaotalk_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-appservice-kakaotalk registration.yaml installed ansible.builtin.copy: @@ -101,7 +101,7 @@ dest: "{{ matrix_appservice_kakaotalk_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-appservice-kakaotalk container network is created community.general.docker_network: diff --git a/roles/custom/matrix-bridge-appservice-slack/tasks/setup_install.yml b/roles/custom/matrix-bridge-appservice-slack/tasks/setup_install.yml index 41a9f26d6..496c4556e 100644 --- a/roles/custom/matrix-bridge-appservice-slack/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-appservice-slack/tasks/setup_install.yml @@ -18,7 +18,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_appservice_slack_base_path }}", when: true} - {path: "{{ matrix_appservice_slack_config_path }}", when: true} @@ -84,7 +84,7 @@ dest: "{{ matrix_appservice_slack_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure appservice-slack registration.yaml installed ansible.builtin.copy: @@ -92,7 +92,7 @@ dest: "{{ matrix_appservice_slack_config_path }}/slack-registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-appservice-slack container network is created community.general.docker_network: @@ -107,7 +107,7 @@ dest: "{{ matrix_appservice_slack_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-appservice-webhooks/tasks/setup_install.yml b/roles/custom/matrix-bridge-appservice-webhooks/tasks/setup_install.yml index ccb8d31cd..a68bbc805 100644 --- a/roles/custom/matrix-bridge-appservice-webhooks/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-appservice-webhooks/tasks/setup_install.yml @@ -18,7 +18,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_appservice_webhooks_base_path }}", when: true} - {path: "{{ matrix_appservice_webhooks_config_path }}", when: true} @@ -67,7 +67,7 @@ dest: "{{ matrix_appservice_webhooks_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-appservice-webhooks schema.yml template exists ansible.builtin.template: @@ -75,7 +75,7 @@ dest: "{{ matrix_appservice_webhooks_config_path }}/schema.yml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-appservice-webhooks database.json template exists ansible.builtin.template: @@ -83,7 +83,7 @@ dest: "{{ matrix_appservice_webhooks_data_path }}/database.json" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure appservice-webhooks registration.yaml installed ansible.builtin.copy: @@ -91,7 +91,7 @@ dest: "{{ matrix_appservice_webhooks_config_path }}/webhooks-registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-appservice-webhooks container network is created community.general.docker_network: @@ -106,7 +106,7 @@ dest: "{{ matrix_appservice_webhooks_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-beeper-linkedin/tasks/setup_install.yml b/roles/custom/matrix-bridge-beeper-linkedin/tasks/setup_install.yml index 016493665..5149ddf13 100644 --- a/roles/custom/matrix-bridge-beeper-linkedin/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-beeper-linkedin/tasks/setup_install.yml @@ -17,7 +17,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_beeper_linkedin_base_path }}", when: true} - {path: "{{ matrix_beeper_linkedin_config_path }}", when: true} @@ -31,7 +31,7 @@ dest: "{{ matrix_beeper_linkedin_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure beeper-linkedin registration.yaml installed ansible.builtin.copy: @@ -39,7 +39,7 @@ dest: "{{ matrix_beeper_linkedin_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Beeper LinkedIn container image is pulled community.docker.docker_image: diff --git a/roles/custom/matrix-bridge-go-skype-bridge/tasks/setup_install.yml b/roles/custom/matrix-bridge-go-skype-bridge/tasks/setup_install.yml index dc17fa5b8..e877e9dfd 100644 --- a/roles/custom/matrix-bridge-go-skype-bridge/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-go-skype-bridge/tasks/setup_install.yml @@ -41,7 +41,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_go_skype_bridge_base_path }}", when: true} - {path: "{{ matrix_go_skype_bridge_config_path }}", when: true} @@ -123,7 +123,7 @@ dest: "{{ matrix_go_skype_bridge_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure go-skype-bridge registration.yaml installed ansible.builtin.copy: @@ -131,7 +131,7 @@ dest: "{{ matrix_go_skype_bridge_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-go-skype-bridge container network is created community.general.docker_network: diff --git a/roles/custom/matrix-bridge-heisenbridge/tasks/setup_install.yml b/roles/custom/matrix-bridge-heisenbridge/tasks/setup_install.yml index dd6ea070f..cbc99b51e 100644 --- a/roles/custom/matrix-bridge-heisenbridge/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-heisenbridge/tasks/setup_install.yml @@ -27,7 +27,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - "{{ matrix_heisenbridge_base_path }}" @@ -37,7 +37,7 @@ dest: "{{ matrix_heisenbridge_base_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Heisenbridge support files installed ansible.builtin.template: @@ -45,7 +45,7 @@ dest: "{{ matrix_heisenbridge_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-hookshot/tasks/setup_install.yml b/roles/custom/matrix-bridge-hookshot/tasks/setup_install.yml index f24a31260..68e5ef920 100644 --- a/roles/custom/matrix-bridge-hookshot/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-hookshot/tasks/setup_install.yml @@ -22,7 +22,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_hookshot_base_path }}", when: true} - {path: "{{ matrix_hookshot_docker_src_files_path }}", when: "{{ matrix_hookshot_container_image_self_build }}"} @@ -82,7 +82,7 @@ dest: "{{ matrix_hookshot_base_path }}/config.yml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Validate hookshot config.yml ansible.builtin.command: @@ -108,7 +108,7 @@ dest: "{{ matrix_hookshot_base_path }}/registration.yml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure hookshot github private key file installed if github is enabled ansible.builtin.copy: @@ -116,7 +116,7 @@ dest: "{{ matrix_hookshot_base_path }}/{{ matrix_hookshot_github_private_key_file }}" mode: 0400 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" when: matrix_hookshot_github_enabled | bool and matrix_hookshot_github_private_key|length > 0 - name: Ensure matrix-hookshot container network is created @@ -132,7 +132,7 @@ dest: "{{ matrix_hookshot_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-bluesky/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-bluesky/tasks/setup_install.yml index ff650b28c..ed2f7e6b9 100644 --- a/roles/custom/matrix-bridge-mautrix-bluesky/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-bluesky/tasks/setup_install.yml @@ -25,7 +25,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_bluesky_base_path }}", when: true} - {path: "{{ matrix_mautrix_bluesky_config_path }}", when: true} @@ -61,7 +61,7 @@ dest: "{{ matrix_mautrix_bluesky_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-bluesky registration.yaml installed ansible.builtin.copy: @@ -69,7 +69,7 @@ dest: "{{ matrix_mautrix_bluesky_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-bluesky support files installed ansible.builtin.template: @@ -77,7 +77,7 @@ dest: "{{ matrix_mautrix_bluesky_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-discord/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-discord/tasks/setup_install.yml index 05281e3ac..58defde8a 100644 --- a/roles/custom/matrix-bridge-mautrix-discord/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-discord/tasks/setup_install.yml @@ -41,7 +41,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_discord_base_path }}", when: true} - {path: "{{ matrix_mautrix_discord_config_path }}", when: true} @@ -90,7 +90,7 @@ dest: "{{ matrix_mautrix_discord_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-discord registration.yaml installed ansible.builtin.copy: @@ -98,7 +98,7 @@ dest: "{{ matrix_mautrix_discord_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-discord support files installed ansible.builtin.template: @@ -106,7 +106,7 @@ dest: "{{ matrix_mautrix_discord_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-facebook/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-facebook/tasks/setup_install.yml index f762595a5..b3b8aeabc 100644 --- a/roles/custom/matrix-bridge-mautrix-facebook/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-facebook/tasks/setup_install.yml @@ -60,7 +60,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_facebook_base_path }}", when: true} - {path: "{{ matrix_mautrix_facebook_config_path }}", when: true} @@ -118,7 +118,7 @@ dest: "{{ matrix_mautrix_facebook_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-facebook registration.yaml installed ansible.builtin.copy: @@ -126,7 +126,7 @@ dest: "{{ matrix_mautrix_facebook_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-facebook support files installed ansible.builtin.template: @@ -134,7 +134,7 @@ dest: "{{ matrix_mautrix_facebook_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-gmessages/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-gmessages/tasks/setup_install.yml index 27edc3367..f1cb7af83 100644 --- a/roles/custom/matrix-bridge-mautrix-gmessages/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-gmessages/tasks/setup_install.yml @@ -41,7 +41,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_gmessages_base_path }}", when: true} - {path: "{{ matrix_mautrix_gmessages_config_path }}", when: true} @@ -123,7 +123,7 @@ dest: "{{ matrix_mautrix_gmessages_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-gmessages registration.yaml installed ansible.builtin.copy: @@ -131,7 +131,7 @@ dest: "{{ matrix_mautrix_gmessages_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-mautrix-gmessages.service installed ansible.builtin.template: @@ -145,7 +145,7 @@ dest: "{{ matrix_mautrix_gmessages_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-googlechat/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-googlechat/tasks/setup_install.yml index 7c29da69f..84b3ffcc5 100644 --- a/roles/custom/matrix-bridge-mautrix-googlechat/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-googlechat/tasks/setup_install.yml @@ -55,7 +55,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_googlechat_base_path }}", when: true} - {path: "{{ matrix_mautrix_googlechat_config_path }}", when: true} @@ -113,7 +113,7 @@ dest: "{{ matrix_mautrix_googlechat_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-googlechat registration.yaml installed ansible.builtin.copy: @@ -121,7 +121,7 @@ dest: "{{ matrix_mautrix_googlechat_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-googlechat support files installed ansible.builtin.template: @@ -129,7 +129,7 @@ dest: "{{ matrix_mautrix_googlechat_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-instagram/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-instagram/tasks/setup_install.yml index 3209b4b87..2058e9b61 100644 --- a/roles/custom/matrix-bridge-mautrix-instagram/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-instagram/tasks/setup_install.yml @@ -28,7 +28,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_instagram_base_path }}", when: true} - {path: "{{ matrix_mautrix_instagram_config_path }}", when: true} @@ -65,7 +65,7 @@ dest: "{{ matrix_mautrix_instagram_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-instagram registration.yaml installed ansible.builtin.copy: @@ -73,7 +73,7 @@ dest: "{{ matrix_mautrix_instagram_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-instagram support files installed ansible.builtin.template: @@ -81,7 +81,7 @@ dest: "{{ matrix_mautrix_instagram_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-meta-instagram/tasks/install.yml b/roles/custom/matrix-bridge-mautrix-meta-instagram/tasks/install.yml index c517ef2cf..c70949ccd 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-instagram/tasks/install.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-instagram/tasks/install.yml @@ -50,7 +50,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_meta_instagram_base_path }}", when: true} - {path: "{{ matrix_mautrix_meta_instagram_config_path }}", when: true} @@ -87,7 +87,7 @@ dest: "{{ matrix_mautrix_meta_instagram_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-meta-instagram registration.yaml installed ansible.builtin.copy: @@ -95,7 +95,7 @@ dest: "{{ matrix_mautrix_meta_instagram_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-meta-instagram support files installed ansible.builtin.template: @@ -103,7 +103,7 @@ dest: "{{ matrix_mautrix_meta_instagram_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-meta-messenger/tasks/install.yml b/roles/custom/matrix-bridge-mautrix-meta-messenger/tasks/install.yml index 703fd5f31..80235cc3a 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-messenger/tasks/install.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-messenger/tasks/install.yml @@ -50,7 +50,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_meta_messenger_base_path }}", when: true} - {path: "{{ matrix_mautrix_meta_messenger_config_path }}", when: true} @@ -87,7 +87,7 @@ dest: "{{ matrix_mautrix_meta_messenger_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-meta-messenger registration.yaml installed ansible.builtin.copy: @@ -95,7 +95,7 @@ dest: "{{ matrix_mautrix_meta_messenger_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-meta-messenger support files installed ansible.builtin.template: @@ -103,7 +103,7 @@ dest: "{{ matrix_mautrix_meta_messenger_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-signal/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-signal/tasks/setup_install.yml index 17f9beb93..82ef8229a 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-signal/tasks/setup_install.yml @@ -46,7 +46,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_signal_base_path }}", when: true} - {path: "{{ matrix_mautrix_signal_config_path }}", when: true} @@ -128,7 +128,7 @@ dest: "{{ matrix_mautrix_signal_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-signal registration.yaml installed ansible.builtin.copy: @@ -136,7 +136,7 @@ dest: "{{ matrix_mautrix_signal_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-signal support files installed ansible.builtin.template: @@ -144,7 +144,7 @@ dest: "{{ matrix_mautrix_signal_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-slack/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-slack/tasks/setup_install.yml index ead4869bb..51aff979f 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-slack/tasks/setup_install.yml @@ -40,7 +40,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_slack_base_path }}", when: true} - {path: "{{ matrix_mautrix_slack_config_path }}", when: true} @@ -89,7 +89,7 @@ dest: "{{ matrix_mautrix_slack_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-slack registration.yaml installed ansible.builtin.copy: @@ -97,7 +97,7 @@ dest: "{{ matrix_mautrix_slack_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-mautrix-slack container network is created community.general.docker_network: diff --git a/roles/custom/matrix-bridge-mautrix-telegram/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-telegram/tasks/setup_install.yml index c0fd1e54a..2b9113199 100644 --- a/roles/custom/matrix-bridge-mautrix-telegram/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-telegram/tasks/setup_install.yml @@ -50,7 +50,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_telegram_base_path }}", when: true} - {path: "{{ matrix_mautrix_telegram_config_path }}", when: true} @@ -145,7 +145,7 @@ dest: "{{ matrix_mautrix_telegram_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-telegram registration.yaml installed ansible.builtin.copy: @@ -153,7 +153,7 @@ dest: "{{ matrix_mautrix_telegram_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-telegram support files installed ansible.builtin.template: @@ -161,7 +161,7 @@ dest: "{{ matrix_mautrix_telegram_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-twitter/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-twitter/tasks/setup_install.yml index cd7ab9de5..ccadf7ef2 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-twitter/tasks/setup_install.yml @@ -31,7 +31,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_twitter_base_path }}", when: true} - {path: "{{ matrix_mautrix_twitter_config_path }}", when: true} @@ -67,7 +67,7 @@ dest: "{{ matrix_mautrix_twitter_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-twitter registration.yaml installed ansible.builtin.copy: @@ -75,7 +75,7 @@ dest: "{{ matrix_mautrix_twitter_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-twitter support files installed ansible.builtin.template: @@ -83,7 +83,7 @@ dest: "{{ matrix_mautrix_twitter_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-whatsapp/tasks/setup_install.yml index cdc1c6e74..7f85bc379 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/tasks/setup_install.yml @@ -51,7 +51,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mautrix_whatsapp_base_path }}", when: true} - {path: "{{ matrix_mautrix_whatsapp_config_path }}", when: true} @@ -133,7 +133,7 @@ dest: "{{ matrix_mautrix_whatsapp_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-whatsapp registration.yaml installed ansible.builtin.copy: @@ -141,7 +141,7 @@ dest: "{{ matrix_mautrix_whatsapp_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-whatsapp support files installed ansible.builtin.template: @@ -149,7 +149,7 @@ dest: "{{ matrix_mautrix_whatsapp_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mautrix-wsproxy/tasks/setup_install.yml b/roles/custom/matrix-bridge-mautrix-wsproxy/tasks/setup_install.yml index 784df7b6c..80c03a097 100644 --- a/roles/custom/matrix-bridge-mautrix-wsproxy/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mautrix-wsproxy/tasks/setup_install.yml @@ -27,7 +27,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - path: "{{ matrix_mautrix_wsproxy_base_path }}" when: true @@ -39,7 +39,7 @@ dest: "{{ matrix_mautrix_wsproxy_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - syncproxy-env - wsproxy-labels @@ -64,7 +64,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - "{{ matrix_mautrix_wsproxy_base_path }}" - "{{ matrix_mautrix_wsproxy_config_path }}" @@ -80,7 +80,7 @@ dest: "{{ matrix_mautrix_wsproxy_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-androidsms registration.yaml installed ansible.builtin.copy: @@ -88,7 +88,7 @@ dest: "{{ matrix_mautrix_wsproxy_config_path }}/androidsms-registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-imessage registration.yaml installed ansible.builtin.copy: @@ -96,7 +96,7 @@ dest: "{{ matrix_mautrix_wsproxy_config_path }}/imessage-registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mautrix-wsproxy container network is created community.general.docker_network: diff --git a/roles/custom/matrix-bridge-mx-puppet-discord/tasks/setup_install.yml b/roles/custom/matrix-bridge-mx-puppet-discord/tasks/setup_install.yml index 0dba68c99..d98a2628d 100644 --- a/roles/custom/matrix-bridge-mx-puppet-discord/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mx-puppet-discord/tasks/setup_install.yml @@ -17,7 +17,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mx_puppet_discord_base_path }}", when: true} - {path: "{{ matrix_mx_puppet_discord_config_path }}", when: true} @@ -113,7 +113,7 @@ dest: "{{ matrix_mx_puppet_discord_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mx-puppet-discord discord-registration.yaml installed ansible.builtin.copy: @@ -121,7 +121,7 @@ dest: "{{ matrix_mx_puppet_discord_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mx-puppet-discord container network is created community.general.docker_network: diff --git a/roles/custom/matrix-bridge-mx-puppet-groupme/tasks/setup_install.yml b/roles/custom/matrix-bridge-mx-puppet-groupme/tasks/setup_install.yml index 6ecf1a7c1..746471321 100644 --- a/roles/custom/matrix-bridge-mx-puppet-groupme/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mx-puppet-groupme/tasks/setup_install.yml @@ -16,7 +16,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mx_puppet_groupme_base_path }}", when: true} - {path: "{{ matrix_mx_puppet_groupme_config_path }}", when: true} @@ -113,7 +113,7 @@ dest: "{{ matrix_mx_puppet_groupme_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mx-puppet-groupme groupme-registration.yaml installed ansible.builtin.copy: @@ -121,7 +121,7 @@ dest: "{{ matrix_mx_puppet_groupme_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mx-puppet-groupme container network is created community.general.docker_network: diff --git a/roles/custom/matrix-bridge-mx-puppet-instagram/tasks/setup_install.yml b/roles/custom/matrix-bridge-mx-puppet-instagram/tasks/setup_install.yml index 93ffa15e2..fbed97693 100644 --- a/roles/custom/matrix-bridge-mx-puppet-instagram/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mx-puppet-instagram/tasks/setup_install.yml @@ -56,7 +56,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mx_puppet_instagram_base_path }}", when: true} - {path: "{{ matrix_mx_puppet_instagram_config_path }}", when: true} @@ -93,7 +93,7 @@ dest: "{{ matrix_mx_puppet_instagram_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mx-puppet-instagram-registration.yaml installed ansible.builtin.copy: @@ -101,7 +101,7 @@ dest: "{{ matrix_mx_puppet_instagram_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mx-puppet-instagram container network is created community.general.docker_network: diff --git a/roles/custom/matrix-bridge-mx-puppet-slack/tasks/setup_install.yml b/roles/custom/matrix-bridge-mx-puppet-slack/tasks/setup_install.yml index c525a689a..c817d293c 100644 --- a/roles/custom/matrix-bridge-mx-puppet-slack/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mx-puppet-slack/tasks/setup_install.yml @@ -12,7 +12,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mx_puppet_slack_base_path }}", when: true} - {path: "{{ matrix_mx_puppet_slack_config_path }}", when: true} @@ -109,7 +109,7 @@ dest: "{{ matrix_mx_puppet_slack_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mx-puppet-slack slack-registration.yaml installed ansible.builtin.copy: @@ -117,7 +117,7 @@ dest: "{{ matrix_mx_puppet_slack_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mx-puppet-slack support files installed ansible.builtin.template: @@ -125,7 +125,7 @@ dest: "{{ matrix_mx_puppet_slack_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-mx-puppet-steam/tasks/setup_install.yml b/roles/custom/matrix-bridge-mx-puppet-steam/tasks/setup_install.yml index 7b921d29a..9232c7d63 100644 --- a/roles/custom/matrix-bridge-mx-puppet-steam/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mx-puppet-steam/tasks/setup_install.yml @@ -18,7 +18,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mx_puppet_steam_base_path }}", when: true} - {path: "{{ matrix_mx_puppet_steam_config_path }}", when: true} @@ -115,7 +115,7 @@ dest: "{{ matrix_mx_puppet_steam_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mx-puppet-steam steam-registration.yaml installed ansible.builtin.copy: @@ -123,7 +123,7 @@ dest: "{{ matrix_mx_puppet_steam_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mx-puppet-steam container network is created community.general.docker_network: diff --git a/roles/custom/matrix-bridge-mx-puppet-twitter/tasks/setup_install.yml b/roles/custom/matrix-bridge-mx-puppet-twitter/tasks/setup_install.yml index d5ae0f73e..137d358c0 100644 --- a/roles/custom/matrix-bridge-mx-puppet-twitter/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-mx-puppet-twitter/tasks/setup_install.yml @@ -17,7 +17,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_mx_puppet_twitter_base_path }}", when: true} - {path: "{{ matrix_mx_puppet_twitter_config_path }}", when: true} @@ -114,7 +114,7 @@ dest: "{{ matrix_mx_puppet_twitter_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mx-puppet-twitter twitter-registration.yaml installed ansible.builtin.copy: @@ -122,7 +122,7 @@ dest: "{{ matrix_mx_puppet_twitter_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure mx-puppet-twitter support files installed ansible.builtin.template: @@ -130,7 +130,7 @@ dest: "{{ matrix_mx_puppet_twitter_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-bridge-postmoogle/tasks/setup_install.yml b/roles/custom/matrix-bridge-postmoogle/tasks/setup_install.yml index f9b5af5c0..85fe93862 100644 --- a/roles/custom/matrix-bridge-postmoogle/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-postmoogle/tasks/setup_install.yml @@ -62,7 +62,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_postmoogle_config_path }}", when: true} - {path: "{{ matrix_postmoogle_data_path }}", when: true} @@ -74,7 +74,7 @@ src: "{{ role_path }}/templates/env.j2" dest: "{{ matrix_postmoogle_config_path }}/env" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0640 - name: Ensure postmoogle image is pulled diff --git a/roles/custom/matrix-bridge-sms/tasks/setup_install.yml b/roles/custom/matrix-bridge-sms/tasks/setup_install.yml index 7b49eca78..46be38205 100644 --- a/roles/custom/matrix-bridge-sms/tasks/setup_install.yml +++ b/roles/custom/matrix-bridge-sms/tasks/setup_install.yml @@ -25,7 +25,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - "{{ matrix_sms_bridge_base_path }}" - "{{ matrix_sms_bridge_config_path }}" @@ -37,7 +37,7 @@ dest: "{{ matrix_sms_bridge_config_path }}/application.yml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-sms-bridge registration.yaml installed ansible.builtin.copy: @@ -45,7 +45,7 @@ dest: "{{ matrix_sms_bridge_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure android-sms-gateway-server cert installed ansible.builtin.copy: @@ -53,7 +53,7 @@ dest: "{{ matrix_sms_bridge_config_path }}/matrix-sms-gateway-server.p12" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" when: matrix_sms_bridge_provider_android_truststore_local_path != "" - name: Ensure matrix-sms-bridge container network is created diff --git a/roles/custom/matrix-bridge-wechat/tasks/install.yml b/roles/custom/matrix-bridge-wechat/tasks/install.yml index d9da1d2fc..d0bfbbace 100644 --- a/roles/custom/matrix-bridge-wechat/tasks/install.yml +++ b/roles/custom/matrix-bridge-wechat/tasks/install.yml @@ -11,7 +11,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_wechat_base_path }}", when: true} - {path: "{{ matrix_wechat_config_path }}", when: true} @@ -96,7 +96,7 @@ dest: "{{ matrix_wechat_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure WeChat registration.yaml installed ansible.builtin.copy: @@ -104,7 +104,7 @@ dest: "{{ matrix_wechat_config_path }}/registration.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Wechat Agent configuration installed ansible.builtin.copy: @@ -112,7 +112,7 @@ dest: "{{ matrix_wechat_config_path }}/agent-config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-wechat container network is created community.general.docker_network: diff --git a/roles/custom/matrix-cactus-comments-client/tasks/install.yml b/roles/custom/matrix-cactus-comments-client/tasks/install.yml index b8c91241c..f068fa8d3 100644 --- a/roles/custom/matrix-cactus-comments-client/tasks/install.yml +++ b/roles/custom/matrix-cactus-comments-client/tasks/install.yml @@ -11,7 +11,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_cactus_comments_client_base_path }}", when: true} - {path: "{{ matrix_cactus_comments_client_public_path }}", when: true} @@ -22,7 +22,7 @@ src: "{{ item.src }}" dest: "{{ item.dest }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0644 with_items: - src: "{{ role_path }}/templates/env.j2" @@ -39,14 +39,14 @@ dest: "{{ matrix_cactus_comments_client_public_path }}/cactus.js" mode: "{{ matrix_cactus_comments_client_public_path_file_permissions }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Download web client css ansible.builtin.get_url: url: "{{ matrix_cactus_comments_client_webclient_css_url }}" dest: "{{ matrix_cactus_comments_client_public_path }}/style.css" mode: "{{ matrix_cactus_comments_client_public_path_file_permissions }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - when: matrix_cactus_comments_client_local_dir | length > 0 block: @@ -56,14 +56,14 @@ dest: "{{ matrix_cactus_comments_client_public_path }}/cactus.js" mode: "{{ matrix_cactus_comments_client_public_path_file_permissions }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Upload locally distributed client CSS ansible.builtin.copy: src: "{{ matrix_cactus_comments_client_local_dir }}/src/style.css" dest: "{{ matrix_cactus_comments_client_public_path }}/style.css" mode: "{{ matrix_cactus_comments_client_public_path_file_permissions }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-cactus-comments-client container image is pulled community.docker.docker_image: diff --git a/roles/custom/matrix-cactus-comments/tasks/setup_install.yml b/roles/custom/matrix-cactus-comments/tasks/setup_install.yml index 2e0fca1b3..bf5ee0789 100644 --- a/roles/custom/matrix-cactus-comments/tasks/setup_install.yml +++ b/roles/custom/matrix-cactus-comments/tasks/setup_install.yml @@ -12,7 +12,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_cactus_comments_base_path }}", when: true} - {path: "{{ matrix_cactus_comments_container_tmp_path }}", when: true} @@ -24,7 +24,7 @@ src: "{{ role_path }}/templates/env.j2" dest: "{{ matrix_cactus_comments_app_service_env_file }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0640 - name: Ensure matrix-cactus-comments appservice file created @@ -32,7 +32,7 @@ src: "{{ role_path }}/templates/cactus_appservice.yaml.j2" dest: "{{ matrix_cactus_comments_app_service_config_file }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0640 - name: Ensure matrix-cactus-comments image is pulled diff --git a/roles/custom/matrix-client-cinny/tasks/setup_install.yml b/roles/custom/matrix-client-cinny/tasks/setup_install.yml index 6eb32a5d9..80bff534c 100644 --- a/roles/custom/matrix-client-cinny/tasks/setup_install.yml +++ b/roles/custom/matrix-client-cinny/tasks/setup_install.yml @@ -14,7 +14,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_client_cinny_data_path }}", when: true} - {path: "{{ matrix_client_cinny_docker_src_files_path }}", when: "{{ matrix_client_cinny_container_image_self_build }}"} @@ -49,7 +49,7 @@ dest: "{{ matrix_client_cinny_data_path }}/config.json" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Cinny additional config files installed ansible.builtin.template: @@ -57,7 +57,7 @@ dest: "{{ matrix_client_cinny_data_path }}/{{ item.name }}" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {src: "{{ role_path }}/templates/nginx.conf.j2", name: "nginx.conf"} - {src: "{{ role_path }}/templates/labels.j2", name: "labels"} diff --git a/roles/custom/matrix-client-element/tasks/setup_install.yml b/roles/custom/matrix-client-element/tasks/setup_install.yml index ad4218a3d..a226f5b8a 100644 --- a/roles/custom/matrix-client-element/tasks/setup_install.yml +++ b/roles/custom/matrix-client-element/tasks/setup_install.yml @@ -17,7 +17,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_client_element_data_path }}", when: true} - {path: "{{ matrix_client_element_docker_src_files_path }}", when: "{{ matrix_client_element_container_image_self_build }}"} @@ -76,7 +76,7 @@ dest: "{{ matrix_client_element_data_path }}/config.json" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Element location sharing map style installed when: matrix_client_element_location_sharing_enabled | bool @@ -85,7 +85,7 @@ dest: "{{ matrix_client_element_data_path }}/map_style.json" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Element Web config files installed ansible.builtin.template: @@ -93,7 +93,7 @@ dest: "{{ matrix_client_element_data_path }}/{{ item.name }}" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {src: "{{ role_path }}/templates/labels.j2", name: "labels"} - {src: "{{ role_path }}/templates/env.j2", name: "env"} diff --git a/roles/custom/matrix-client-fluffychat/tasks/setup_install.yml b/roles/custom/matrix-client-fluffychat/tasks/setup_install.yml index f0744a54e..3fd3e71af 100644 --- a/roles/custom/matrix-client-fluffychat/tasks/setup_install.yml +++ b/roles/custom/matrix-client-fluffychat/tasks/setup_install.yml @@ -10,7 +10,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_client_fluffychat_data_path }}", when: true} - {path: "{{ matrix_client_fluffychat_container_src_files_path }}", when: "{{ matrix_client_fluffychat_container_image_self_build }}"} @@ -55,7 +55,7 @@ dest: "{{ matrix_client_fluffychat_data_path }}/{{ item.name }}" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {src: "{{ role_path }}/templates/labels.j2", name: "labels"} when: "item.src is not none" diff --git a/roles/custom/matrix-client-hydrogen/tasks/setup_install.yml b/roles/custom/matrix-client-hydrogen/tasks/setup_install.yml index e0c405aa9..5b7304d01 100644 --- a/roles/custom/matrix-client-hydrogen/tasks/setup_install.yml +++ b/roles/custom/matrix-client-hydrogen/tasks/setup_install.yml @@ -17,7 +17,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_client_hydrogen_data_path }}", when: true} - {path: "{{ matrix_client_hydrogen_docker_src_files_path }}", when: "{{ matrix_client_hydrogen_container_image_self_build }}"} @@ -74,7 +74,7 @@ dest: "{{ matrix_client_hydrogen_data_path }}/config.json" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Hydrogen additional config files installed ansible.builtin.template: @@ -82,7 +82,7 @@ dest: "{{ matrix_client_hydrogen_data_path }}/{{ item.name }}" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {src: "{{ role_path }}/templates/nginx.conf.j2", name: "nginx.conf"} - {src: "{{ role_path }}/templates/labels.j2", name: "labels"} diff --git a/roles/custom/matrix-client-schildichat/tasks/setup_install.yml b/roles/custom/matrix-client-schildichat/tasks/setup_install.yml index 47d5f0fae..eb808d241 100644 --- a/roles/custom/matrix-client-schildichat/tasks/setup_install.yml +++ b/roles/custom/matrix-client-schildichat/tasks/setup_install.yml @@ -14,7 +14,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_client_schildichat_data_path }}", when: true} - {path: "{{ matrix_client_schildichat_container_src_files_path }}", when: "{{ matrix_client_schildichat_container_image_self_build }}"} @@ -73,7 +73,7 @@ dest: "{{ matrix_client_schildichat_data_path }}/config.json" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure SchildiChat location sharing map style installed when: matrix_client_schildichat_location_sharing_enabled | bool @@ -82,7 +82,7 @@ dest: "{{ matrix_client_schildichat_data_path }}/map_style.json" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure SchildiChat Web config files installed ansible.builtin.template: @@ -90,7 +90,7 @@ dest: "{{ matrix_client_schildichat_data_path }}/{{ item.name }}" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {src: "{{ role_path }}/templates/labels.j2", name: "labels"} - {src: "{{ matrix_client_schildichat_page_template_welcome_path }}", name: "welcome.html"} diff --git a/roles/custom/matrix-conduit/tasks/setup_install.yml b/roles/custom/matrix-conduit/tasks/setup_install.yml index b82b94e85..140cf4e52 100644 --- a/roles/custom/matrix-conduit/tasks/setup_install.yml +++ b/roles/custom/matrix-conduit/tasks/setup_install.yml @@ -14,7 +14,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Conduit data path exists ansible.builtin.file: @@ -22,7 +22,7 @@ state: directory mode: 0770 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Conduit configuration installed ansible.builtin.template: @@ -30,7 +30,7 @@ dest: "{{ matrix_conduit_config_path }}/conduit.toml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Conduit support files installed ansible.builtin.template: @@ -38,7 +38,7 @@ dest: "{{ matrix_conduit_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-conduwuit/tasks/install.yml b/roles/custom/matrix-conduwuit/tasks/install.yml index 8b1e95a5a..aa1e2941b 100644 --- a/roles/custom/matrix-conduwuit/tasks/install.yml +++ b/roles/custom/matrix-conduwuit/tasks/install.yml @@ -10,7 +10,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure conduwuit data path exists ansible.builtin.file: @@ -18,7 +18,7 @@ state: directory mode: 0770 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure conduwuit configuration installed ansible.builtin.template: @@ -26,7 +26,7 @@ dest: "{{ matrix_conduwuit_config_path }}/conduwuit.toml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure conduwuit support files installed ansible.builtin.template: @@ -34,7 +34,7 @@ dest: "{{ matrix_conduwuit_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels - env diff --git a/roles/custom/matrix-conduwuit/tasks/setup_install.yml b/roles/custom/matrix-conduwuit/tasks/setup_install.yml index 6da4e27b0..bc51bc3e5 100644 --- a/roles/custom/matrix-conduwuit/tasks/setup_install.yml +++ b/roles/custom/matrix-conduwuit/tasks/setup_install.yml @@ -10,7 +10,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure conduwuit data path exists ansible.builtin.file: @@ -18,7 +18,7 @@ state: directory mode: 0770 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure conduwuit configuration installed ansible.builtin.template: @@ -26,7 +26,7 @@ dest: "{{ matrix_conduwuit_config_path }}/conduwuit.toml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure conduwuit support files installed ansible.builtin.template: @@ -34,7 +34,7 @@ dest: "{{ matrix_conduwuit_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-continuwuity/tasks/install.yml b/roles/custom/matrix-continuwuity/tasks/install.yml index 11de27495..0a68b081e 100644 --- a/roles/custom/matrix-continuwuity/tasks/install.yml +++ b/roles/custom/matrix-continuwuity/tasks/install.yml @@ -10,7 +10,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure continuwuity data path exists ansible.builtin.file: @@ -18,7 +18,7 @@ state: directory mode: 0770 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure continuwuity configuration installed ansible.builtin.template: @@ -26,7 +26,7 @@ dest: "{{ matrix_continuwuity_config_path }}/continuwuity.toml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure continuwuity support files installed ansible.builtin.template: @@ -34,7 +34,7 @@ dest: "{{ matrix_continuwuity_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels - env diff --git a/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml b/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml index 66352458f..bd2eda127 100644 --- a/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml +++ b/roles/custom/matrix-continuwuity/tasks/migrate_from_conduwuit.yml @@ -64,7 +64,7 @@ path: "{{ matrix_base_data_path }}/continuwuity" state: directory owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" recurse: true - name: Set continuwuity_old ownership @@ -72,7 +72,7 @@ path: "{{ matrix_base_data_path }}/continuwuity_old" state: directory owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" recurse: true - name: Ensure matrix-continuwuity.service systemd service is started diff --git a/roles/custom/matrix-continuwuity/tasks/setup_install.yml b/roles/custom/matrix-continuwuity/tasks/setup_install.yml index a258ae8d0..4aae7c3ad 100644 --- a/roles/custom/matrix-continuwuity/tasks/setup_install.yml +++ b/roles/custom/matrix-continuwuity/tasks/setup_install.yml @@ -10,7 +10,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure continuwuity data path exists ansible.builtin.file: @@ -18,7 +18,7 @@ state: directory mode: 0770 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure continuwuity configuration installed ansible.builtin.template: @@ -26,7 +26,7 @@ dest: "{{ matrix_continuwuity_config_path }}/continuwuity.toml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure continuwuity support files installed ansible.builtin.template: @@ -34,7 +34,7 @@ dest: "{{ matrix_continuwuity_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-corporal/tasks/setup_install.yml b/roles/custom/matrix-corporal/tasks/setup_install.yml index e69617562..e79fa4c00 100644 --- a/roles/custom/matrix-corporal/tasks/setup_install.yml +++ b/roles/custom/matrix-corporal/tasks/setup_install.yml @@ -17,7 +17,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - "{{ matrix_corporal_base_path }}" - "{{ matrix_corporal_config_dir_path }}" @@ -65,7 +65,7 @@ dest: "{{ matrix_corporal_config_dir_path }}/config.json" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Matrix Corporal support files installed ansible.builtin.template: @@ -73,7 +73,7 @@ dest: "{{ matrix_corporal_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-coturn/tasks/setup_install.yml b/roles/custom/matrix-coturn/tasks/setup_install.yml index 888916080..d4702e40d 100644 --- a/roles/custom/matrix-coturn/tasks/setup_install.yml +++ b/roles/custom/matrix-coturn/tasks/setup_install.yml @@ -52,7 +52,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_coturn_docker_src_files_path }}", when: "{{ matrix_coturn_container_image_self_build }}"} when: "item.when | bool" @@ -98,7 +98,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure turnserver.conf installed ansible.builtin.template: @@ -106,7 +106,7 @@ dest: "{{ matrix_coturn_config_path }}" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure coturn network is created in Docker when: matrix_coturn_container_network not in ['', 'host'] diff --git a/roles/custom/matrix-dendrite/tasks/setup_install.yml b/roles/custom/matrix-dendrite/tasks/setup_install.yml index 4d78a3ecc..c5e5fba4b 100644 --- a/roles/custom/matrix-dendrite/tasks/setup_install.yml +++ b/roles/custom/matrix-dendrite/tasks/setup_install.yml @@ -16,7 +16,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - path: "{{ matrix_dendrite_config_dir_path }}" when: true @@ -45,7 +45,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" when: "not local_path_media_store_stat.failed and not local_path_media_store_stat.stat.exists" - name: Ensure Dendrite Docker image is pulled @@ -80,7 +80,7 @@ path: "{{ matrix_dendrite_config_dir_path }}/{{ matrix_server_fqn_matrix }}.signing.pem" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Dendrite configuration installed ansible.builtin.copy: @@ -88,7 +88,7 @@ dest: "{{ matrix_dendrite_config_dir_path }}/dendrite.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - when: "matrix_dendrite_container_image_self_build | bool" block: @@ -131,7 +131,7 @@ dest: "{{ item.dest }}" mode: "{{ item.mode }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - src: labels.j2 dest: "{{ matrix_dendrite_base_path }}/labels" diff --git a/roles/custom/matrix-dimension/tasks/setup_install.yml b/roles/custom/matrix-dimension/tasks/setup_install.yml index de02329f1..84bbfc897 100644 --- a/roles/custom/matrix-dimension/tasks/setup_install.yml +++ b/roles/custom/matrix-dimension/tasks/setup_install.yml @@ -104,7 +104,7 @@ dest: "{{ matrix_dimension_base_path }}/labels" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Dimension image is pulled community.docker.docker_image: diff --git a/roles/custom/matrix-dynamic-dns/tasks/setup_install.yml b/roles/custom/matrix-dynamic-dns/tasks/setup_install.yml index e1b4a091d..b8f94ae59 100644 --- a/roles/custom/matrix-dynamic-dns/tasks/setup_install.yml +++ b/roles/custom/matrix-dynamic-dns/tasks/setup_install.yml @@ -27,7 +27,7 @@ state: directory mode: 0751 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_dynamic_dns_base_path }}", when: true} - {path: "{{ matrix_dynamic_dns_config_path }}", when: true} @@ -63,7 +63,7 @@ dest: "{{ matrix_dynamic_dns_config_path }}/ddclient.conf" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-dynamic-dns container network is created community.general.docker_network: diff --git a/roles/custom/matrix-element-call/tasks/install.yml b/roles/custom/matrix-element-call/tasks/install.yml index 021668afc..5c0909591 100644 --- a/roles/custom/matrix-element-call/tasks/install.yml +++ b/roles/custom/matrix-element-call/tasks/install.yml @@ -12,7 +12,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - path: "{{ matrix_element_call_base_path }}" @@ -22,7 +22,7 @@ dest: "{{ matrix_element_call_base_path }}/config.json" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Element Call container labels file is in place ansible.builtin.template: @@ -30,7 +30,7 @@ dest: "{{ matrix_element_call_base_path }}/labels" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Element Call container image is pulled community.docker.docker_image: diff --git a/roles/custom/matrix-ldap-registration-proxy/tasks/setup_install.yml b/roles/custom/matrix-ldap-registration-proxy/tasks/setup_install.yml index 779ff5cdb..fbafc5497 100644 --- a/roles/custom/matrix-ldap-registration-proxy/tasks/setup_install.yml +++ b/roles/custom/matrix-ldap-registration-proxy/tasks/setup_install.yml @@ -14,7 +14,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_ldap_registration_proxy_config_path }}", when: true} - {path: "{{ matrix_ldap_registration_proxy_docker_src_files_path }}", when: true} @@ -47,7 +47,7 @@ dest: "{{ matrix_ldap_registration_proxy_config_path }}/ldap-registration-proxy.env" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-ldap-registration-proxy support files installed ansible.builtin.template: @@ -55,7 +55,7 @@ dest: "{{ matrix_ldap_registration_proxy_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-livekit-jwt-service/tasks/install.yml b/roles/custom/matrix-livekit-jwt-service/tasks/install.yml index da8a0a970..9736e2c55 100644 --- a/roles/custom/matrix-livekit-jwt-service/tasks/install.yml +++ b/roles/custom/matrix-livekit-jwt-service/tasks/install.yml @@ -12,7 +12,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - path: "{{ matrix_livekit_jwt_service_base_path }}" @@ -22,7 +22,7 @@ dest: "{{ matrix_livekit_jwt_service_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - env - labels diff --git a/roles/custom/matrix-ma1sd/tasks/setup_install.yml b/roles/custom/matrix-ma1sd/tasks/setup_install.yml index 67f378d71..273a65a8d 100644 --- a/roles/custom/matrix-ma1sd/tasks/setup_install.yml +++ b/roles/custom/matrix-ma1sd/tasks/setup_install.yml @@ -20,7 +20,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_ma1sd_config_path }}", when: true} - {path: "{{ matrix_ma1sd_data_path }}", when: true} @@ -96,7 +96,7 @@ dest: "{{ matrix_ma1sd_config_path }}/ma1sd.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure custom view templates are installed, if any ansible.builtin.copy: @@ -104,7 +104,7 @@ dest: "{{ matrix_ma1sd_config_path }}/{{ item.location }}" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {value: "{{ matrix_ma1sd_view_session_custom_onTokenSubmit_success_template }}", location: 'tokenSubmitSuccess.html'} - {value: "{{ matrix_ma1sd_view_session_custom_onTokenSubmit_failure_template }}", location: 'tokenSubmitFailure.html'} @@ -116,7 +116,7 @@ dest: "{{ matrix_ma1sd_config_path }}/{{ item.location }}" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {value: "{{ matrix_ma1sd_threepid_medium_email_custom_invite_template }}", location: 'invite-template.eml'} - {value: "{{ matrix_ma1sd_threepid_medium_email_custom_session_validation_template }}", location: 'validate-template.eml'} @@ -142,7 +142,7 @@ dest: "{{ matrix_ma1sd_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-media-repo/tasks/setup_install.yml b/roles/custom/matrix-media-repo/tasks/setup_install.yml index 488830626..bc45d8787 100755 --- a/roles/custom/matrix-media-repo/tasks/setup_install.yml +++ b/roles/custom/matrix-media-repo/tasks/setup_install.yml @@ -13,7 +13,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - path: "{{ matrix_media_repo_base_path }}" when: true @@ -31,7 +31,7 @@ dest: "{{ matrix_media_repo_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - env - labels @@ -42,7 +42,7 @@ dest: "{{ matrix_media_repo_config_path }}/media-repo.yaml" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure media-repo Docker image is pulled community.docker.docker_image: @@ -129,7 +129,7 @@ dest: "{{ matrix_media_repo_homeserver_signing_key }}.{{ matrix_homeserver_implementation }}.backup" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Replace homeserver signing key with merged signing key ansible.builtin.command: diff --git a/roles/custom/matrix-pantalaimon/tasks/install.yml b/roles/custom/matrix-pantalaimon/tasks/install.yml index 5cfe1cd3b..610dce0b0 100644 --- a/roles/custom/matrix-pantalaimon/tasks/install.yml +++ b/roles/custom/matrix-pantalaimon/tasks/install.yml @@ -11,7 +11,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_pantalaimon_base_path }}", when: true} - {path: "{{ matrix_pantalaimon_data_path }}", when: true} @@ -24,7 +24,7 @@ dest: "{{ matrix_pantalaimon_data_path }}/pantalaimon.conf" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure pantalaimon container image is pulled community.docker.docker_image: diff --git a/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/setup_install.yml b/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/setup_install.yml index f46a685c7..42591b383 100644 --- a/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/setup_install.yml +++ b/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/setup_install.yml @@ -23,7 +23,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - "{{ matrix_prometheus_nginxlog_exporter_base_path }}" - "{{ matrix_prometheus_nginxlog_exporter_config_path }}" @@ -34,7 +34,7 @@ dest: "{{ matrix_prometheus_nginxlog_exporter_config_path }}/prometheus-nginxlog-exporter.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure prometheus-nginxlog-exporter support files installed ansible.builtin.template: @@ -42,7 +42,7 @@ dest: "{{ matrix_prometheus_nginxlog_exporter_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-rageshake/tasks/install.yml b/roles/custom/matrix-rageshake/tasks/install.yml index 6a7b0e72c..0b64aa577 100644 --- a/roles/custom/matrix-rageshake/tasks/install.yml +++ b/roles/custom/matrix-rageshake/tasks/install.yml @@ -13,7 +13,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - path: "{{ matrix_rageshake_config_path }}" when: true @@ -28,7 +28,7 @@ content: "{{ matrix_rageshake_configuration | to_nice_yaml(indent=2, width=999999) }}" dest: "{{ matrix_rageshake_config_path }}/config.yaml" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0640 - name: Ensure rageshake labels installed @@ -37,7 +37,7 @@ dest: "{{ matrix_rageshake_base_path }}/labels" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure rageshake image is pulled community.docker.docker_image: diff --git a/roles/custom/matrix-registration/tasks/setup_install.yml b/roles/custom/matrix-registration/tasks/setup_install.yml index 95781a634..8db0011ea 100644 --- a/roles/custom/matrix-registration/tasks/setup_install.yml +++ b/roles/custom/matrix-registration/tasks/setup_install.yml @@ -48,7 +48,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_registration_base_path }}", when: true} - {path: "{{ matrix_registration_config_path }}", when: true} @@ -105,7 +105,7 @@ dest: "{{ matrix_registration_config_path }}/config.yaml" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-registration support files installed ansible.builtin.template: @@ -113,7 +113,7 @@ dest: "{{ matrix_registration_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - labels diff --git a/roles/custom/matrix-sliding-sync/tasks/install.yml b/roles/custom/matrix-sliding-sync/tasks/install.yml index d23d2cdf7..394091059 100644 --- a/roles/custom/matrix-sliding-sync/tasks/install.yml +++ b/roles/custom/matrix-sliding-sync/tasks/install.yml @@ -11,7 +11,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - path: "{{ matrix_sliding_sync_base_path }}" when: true @@ -25,7 +25,7 @@ dest: "{{ matrix_sliding_sync_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - env - labels diff --git a/roles/custom/matrix-static-files/tasks/install.yml b/roles/custom/matrix-static-files/tasks/install.yml index c8a752b4c..b60c45daf 100644 --- a/roles/custom/matrix-static-files/tasks/install.yml +++ b/roles/custom/matrix-static-files/tasks/install.yml @@ -11,7 +11,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_static_files_base_path }}", when: true} - {path: "{{ matrix_static_files_config_path }}", when: true} @@ -31,7 +31,7 @@ src: "{{ item.src }}" dest: "{{ item.dest }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0644 with_items: - src: "{{ role_path }}/templates/config.toml.j2" @@ -49,7 +49,7 @@ dest: "{{ item.dest }}" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" when: item.when | bool with_items: - content: "{{ matrix_static_files_file_matrix_client_configuration | to_nice_json }}" diff --git a/roles/custom/matrix-sygnal/tasks/install.yml b/roles/custom/matrix-sygnal/tasks/install.yml index 8ae6c875a..30ea8da1e 100644 --- a/roles/custom/matrix-sygnal/tasks/install.yml +++ b/roles/custom/matrix-sygnal/tasks/install.yml @@ -15,7 +15,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - "{{ matrix_sygnal_base_path }}" - "{{ matrix_sygnal_config_path }}" @@ -27,7 +27,7 @@ dest: "{{ matrix_sygnal_config_path }}/sygnal.yaml" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Sygnal labels installed ansible.builtin.template: @@ -35,7 +35,7 @@ dest: "{{ matrix_sygnal_base_path }}/labels" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure Sygnal image is pulled community.docker.docker_image: diff --git a/roles/custom/matrix-synapse-admin/tasks/setup_install.yml b/roles/custom/matrix-synapse-admin/tasks/setup_install.yml index adaf66ea1..baf76b29d 100644 --- a/roles/custom/matrix-synapse-admin/tasks/setup_install.yml +++ b/roles/custom/matrix-synapse-admin/tasks/setup_install.yml @@ -17,7 +17,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_synapse_admin_base_path }}", when: true} - {path: "{{ matrix_synapse_admin_config_path }}", when: true} @@ -29,7 +29,7 @@ src: "{{ role_path }}/templates/labels.j2" dest: "{{ matrix_synapse_admin_base_path }}/labels" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0640 - name: Ensure matrix-synapse-admin configuration installed @@ -38,7 +38,7 @@ dest: "{{ matrix_synapse_admin_config_path }}/config.json" mode: 0644 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure matrix-synapse-admin image is pulled community.docker.docker_image: diff --git a/roles/custom/matrix-synapse-auto-compressor/tasks/install.yml b/roles/custom/matrix-synapse-auto-compressor/tasks/install.yml index 6cd272c9e..cad13533a 100644 --- a/roles/custom/matrix-synapse-auto-compressor/tasks/install.yml +++ b/roles/custom/matrix-synapse-auto-compressor/tasks/install.yml @@ -12,7 +12,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" when: item.when | bool with_items: - path: "{{ matrix_synapse_auto_compressor_base_path }}" @@ -26,7 +26,7 @@ dest: "{{ matrix_synapse_auto_compressor_base_path }}/env" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure synapse-auto-compressor workaround script is installed ansible.builtin.template: @@ -34,7 +34,7 @@ dest: "{{ matrix_synapse_auto_compressor_base_path }}/matrix-synapse-auto-compressor-fix.sh" mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" - name: Ensure synapse-auto-compressor image is pulled community.docker.docker_image: diff --git a/roles/custom/matrix-synapse-reverse-proxy-companion/tasks/setup_install.yml b/roles/custom/matrix-synapse-reverse-proxy-companion/tasks/setup_install.yml index 67180bf37..4d732ad22 100644 --- a/roles/custom/matrix-synapse-reverse-proxy-companion/tasks/setup_install.yml +++ b/roles/custom/matrix-synapse-reverse-proxy-companion/tasks/setup_install.yml @@ -11,7 +11,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - "{{ matrix_synapse_reverse_proxy_companion_base_path }}" - "{{ matrix_synapse_reverse_proxy_companion_confd_path }}" @@ -21,7 +21,7 @@ src: "{{ item.src }}" dest: "{{ item.dest }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0644 with_items: - src: "{{ role_path }}/templates/nginx/nginx.conf.j2" diff --git a/roles/custom/matrix-synapse-usage-exporter/tasks/setup_install.yml b/roles/custom/matrix-synapse-usage-exporter/tasks/setup_install.yml index a2151bf81..993c6975b 100644 --- a/roles/custom/matrix-synapse-usage-exporter/tasks/setup_install.yml +++ b/roles/custom/matrix-synapse-usage-exporter/tasks/setup_install.yml @@ -11,7 +11,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - path: "{{ matrix_synapse_usage_exporter_base_path }}" when: true @@ -25,7 +25,7 @@ dest: "{{ matrix_synapse_usage_exporter_base_path }}/{{ item }}" mode: 0640 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - env - labels diff --git a/roles/custom/matrix-user-verification-service/tasks/setup_install.yml b/roles/custom/matrix-user-verification-service/tasks/setup_install.yml index b04f299cc..634761484 100644 --- a/roles/custom/matrix-user-verification-service/tasks/setup_install.yml +++ b/roles/custom/matrix-user-verification-service/tasks/setup_install.yml @@ -12,7 +12,7 @@ state: directory mode: 0750 owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" with_items: - {path: "{{ matrix_user_verification_service_config_path }}", when: true} - {path: "{{ matrix_user_verification_service_docker_src_files_path }}", when: "{{ matrix_user_verification_service_container_image_self_build }}"} @@ -58,7 +58,7 @@ src: "{{ role_path }}/templates/.env.j2" dest: "{{ matrix_user_verification_service_config_env_file }}" owner: "{{ matrix_user_name }}" - group: "{{ matrix_user_groupname }}" + group: "{{ matrix_group_name }}" mode: 0644 - name: Ensure matrix-user-verification-service container network is created From 51e961ce9f752dfe3e0d4968254f1e0b77cef2d9 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 29 Apr 2025 10:37:57 +0300 Subject: [PATCH 049/404] Add `matrix_user_shell` and default it to `/sbin/nologin` This is a backward-incompatible change. By default, Ansible creates users with (e.g.) `/bin/sh` on Linux, so changing to a no shell leads to different behavior. That said, it appears that using a shell-less user works OK with regard to Ansible execution and starting the systemd services/containers later on. --- roles/custom/matrix-base/defaults/main.yml | 2 ++ roles/custom/matrix-base/tasks/setup_matrix_user.yml | 1 + 2 files changed, 3 insertions(+) diff --git a/roles/custom/matrix-base/defaults/main.yml b/roles/custom/matrix-base/defaults/main.yml index 9e678c771..f30d416f0 100644 --- a/roles/custom/matrix-base/defaults/main.yml +++ b/roles/custom/matrix-base/defaults/main.yml @@ -177,6 +177,8 @@ matrix_container_global_registry_prefix_override: "" matrix_user_name: "matrix" matrix_user_system: true +matrix_user_shell: /sbin/nologin + matrix_group_name: "matrix" matrix_group_system: true diff --git a/roles/custom/matrix-base/tasks/setup_matrix_user.yml b/roles/custom/matrix-base/tasks/setup_matrix_user.yml index a7a09f284..b2512a437 100644 --- a/roles/custom/matrix-base/tasks/setup_matrix_user.yml +++ b/roles/custom/matrix-base/tasks/setup_matrix_user.yml @@ -22,6 +22,7 @@ home: "{{ matrix_base_data_path }}" create_home: false system: "{{ matrix_user_system }}" + shell: "{{ matrix_user_shell }}" register: matrix_user - name: Initialize matrix_user_uid and matrix_user_gid From 81b371e690e17ec5c26d8993ce051ccc233f1ecd Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 29 Apr 2025 10:53:31 +0300 Subject: [PATCH 050/404] Remove outdated warning about Postmoogle not working well with Matrix Authentication Service This probably got fixed with Matrix Authentication Service 0.15.0 though I'm not sure exactly which commit did it. Ref: https://github.com/element-hq/matrix-authentication-service/releases/tag/v0.15.0 --- docs/configuring-playbook-matrix-authentication-service.md | 4 ---- 1 file changed, 4 deletions(-) diff --git a/docs/configuring-playbook-matrix-authentication-service.md b/docs/configuring-playbook-matrix-authentication-service.md index eda09cc4b..92f6b1852 100644 --- a/docs/configuring-playbook-matrix-authentication-service.md +++ b/docs/configuring-playbook-matrix-authentication-service.md @@ -55,10 +55,6 @@ This section details what you can expect when switching to the Matrix Authentica - ❌ **Some services experience issues when authenticating via MAS**: - - [Postmoogle](./configuring-playbook-bridge-postmoogle.md) works the first time around, but it consistently fails after restarting: - - > cannot initialize matrix bot error="olm account is marked as shared, keys seem to have disappeared from the server" - - ❌ **Encrypted appservices** do not work yet (related to [MSC4190](https://github.com/matrix-org/matrix-spec-proposals/pull/4190) and [PR 17705 for Synapse](https://github.com/element-hq/synapse/pull/17705)), so all bridges/bots that rely on encryption will fail to start (see [this issue](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/3658) for Hookshot). You can use these bridges/bots only if you **keep end-to-bridge encryption disabled** (which is the default setting). - ⚠️ [Migrating an existing Synapse homeserver to Matrix Authentication Service](#migrating-an-existing-synapse-homeserver-to-matrix-authentication-service) is **possible**, but requires **some playbook-assisted manual work**. Migration is **reversible with no or minor issues if done quickly enough**, but as users start logging in (creating new login sessions) via the new MAS setup, disabling MAS and reverting back to the Synapse user database will cause these new sessions to break. From 32ca5bf55c048d935060d55fd915db795edc9a47 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 29 Apr 2025 11:01:43 +0300 Subject: [PATCH 051/404] Add warning about Reminder bot issues on Matrix Authentication Service docs page --- docs/configuring-playbook-matrix-authentication-service.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/docs/configuring-playbook-matrix-authentication-service.md b/docs/configuring-playbook-matrix-authentication-service.md index 92f6b1852..42c52b9c9 100644 --- a/docs/configuring-playbook-matrix-authentication-service.md +++ b/docs/configuring-playbook-matrix-authentication-service.md @@ -55,6 +55,8 @@ This section details what you can expect when switching to the Matrix Authentica - ❌ **Some services experience issues when authenticating via MAS**: + - [Reminder bot](configuring-playbook-bot-matrix-reminder-bot.md) seems to be losing some of its state on each restart and may reschedule old reminders once again + - ❌ **Encrypted appservices** do not work yet (related to [MSC4190](https://github.com/matrix-org/matrix-spec-proposals/pull/4190) and [PR 17705 for Synapse](https://github.com/element-hq/synapse/pull/17705)), so all bridges/bots that rely on encryption will fail to start (see [this issue](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/3658) for Hookshot). You can use these bridges/bots only if you **keep end-to-bridge encryption disabled** (which is the default setting). - ⚠️ [Migrating an existing Synapse homeserver to Matrix Authentication Service](#migrating-an-existing-synapse-homeserver-to-matrix-authentication-service) is **possible**, but requires **some playbook-assisted manual work**. Migration is **reversible with no or minor issues if done quickly enough**, but as users start logging in (creating new login sessions) via the new MAS setup, disabling MAS and reverting back to the Synapse user database will cause these new sessions to break. From 37a7af52ab6a803e5fec72d37b0411a6c1a3ddb7 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 29 Apr 2025 15:13:33 +0300 Subject: [PATCH 052/404] Upgrade prometheus-node-exporter (v1.9.1-0 -> v1.9.1-1) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index e171ed1d3..98a58d03f 100644 --- a/requirements.yml +++ b/requirements.yml @@ -52,7 +52,7 @@ version: v2.55.1-3 name: prometheus - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-node-exporter.git - version: v1.9.1-0 + version: v1.9.1-1 name: prometheus_node_exporter - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-postgres-exporter.git version: v0.14.0-9 From 7fb0bff47d40a73f39ec6a0bb010ab815cf507ad Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 29 Apr 2025 22:27:29 +0300 Subject: [PATCH 053/404] Upgrade prometheus-postgres-exporter (v0.14.0-9 -> v0.17.1-0) and adapt variables --- group_vars/matrix_servers | 2 +- requirements.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/group_vars/matrix_servers b/group_vars/matrix_servers index 8970ac9b4..effaa716d 100755 --- a/group_vars/matrix_servers +++ b/group_vars/matrix_servers @@ -5376,7 +5376,7 @@ prometheus_postgres_exporter_gid: "{{ matrix_user_gid }}" prometheus_postgres_exporter_hostname: "{{ matrix_server_fqn_matrix }}" -prometheus_postgres_exporter_docker_image_registry_prefix_upstream: "{{ matrix_container_global_registry_prefix_override if matrix_container_global_registry_prefix_override else prometheus_postgres_exporter_docker_image_registry_prefix_upstream_default }}" +prometheus_postgres_exporter_container_image_registry_prefix_upstream: "{{ matrix_container_global_registry_prefix_override if matrix_container_global_registry_prefix_override else prometheus_postgres_exporter_container_image_registry_prefix_upstream_default }}" prometheus_postgres_exporter_container_network: "{{ matrix_monitoring_container_network }}" diff --git a/requirements.yml b/requirements.yml index 98a58d03f..6a86de924 100644 --- a/requirements.yml +++ b/requirements.yml @@ -55,7 +55,7 @@ version: v1.9.1-1 name: prometheus_node_exporter - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-postgres-exporter.git - version: v0.14.0-9 + version: v0.17.1-0 name: prometheus_postgres_exporter - src: git+https://github.com/devture/com.devture.ansible.role.systemd_docker_base.git version: v1.4.0-0 From 0a6490ad466a75857f556d740e4c373cd2d6cbc3 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Wed, 30 Apr 2025 08:46:53 +0300 Subject: [PATCH 054/404] Upgrade prometheus-postgres-exporter (v0.17.1-0 -> v0.17.1-1) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 6a86de924..d4c85b295 100644 --- a/requirements.yml +++ b/requirements.yml @@ -55,7 +55,7 @@ version: v1.9.1-1 name: prometheus_node_exporter - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-postgres-exporter.git - version: v0.17.1-0 + version: v0.17.1-1 name: prometheus_postgres_exporter - src: git+https://github.com/devture/com.devture.ansible.role.systemd_docker_base.git version: v1.4.0-0 From 63c2e831a8f5c7a026b3ff1615af5d58b9f02eaf Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 30 Apr 2025 02:04:48 +0000 Subject: [PATCH 055/404] Update dependency setuptools to v80.0.1 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 2a3977695..0ae7f2e2b 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -17,7 +17,7 @@ packaging==25.0 Pygments==2.19.1 PyYAML==6.0.2 requests==2.32.3 -setuptools==80.0.0 +setuptools==80.0.1 snowballstemmer==2.2.0 Sphinx==8.2.3 sphinx-intl==2.3.1 From 03672a3a524713319923b7458617c1d6462181fd Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Florian=20Schr=C3=B6n?= Date: Tue, 29 Apr 2025 11:45:47 +0000 Subject: [PATCH 056/404] fix http-404 for element web with tmpfs refers to commit e65d19884 Run Element Web in tightened/read-only mode without a custom nginx config and issue https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/4199 --- .../templates/systemd/matrix-client-element.service.j2 | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-element/templates/systemd/matrix-client-element.service.j2 b/roles/custom/matrix-client-element/templates/systemd/matrix-client-element.service.j2 index 9a1475b49..b245baccc 100644 --- a/roles/custom/matrix-client-element/templates/systemd/matrix-client-element.service.j2 +++ b/roles/custom/matrix-client-element/templates/systemd/matrix-client-element.service.j2 @@ -34,7 +34,7 @@ ExecStartPre={{ devture_systemd_docker_base_host_command_docker }} create \ --tmpfs=/var/cache/nginx:rw,mode=777 \ --tmpfs=/var/run:rw,mode=777 \ --tmpfs=/tmp/element-web-config:rw,mode=777 \ - --tmpfs=/etc/nginx/conf.d:rw,mode=777 \ + --tmpfs=/etc/nginx/conf.d:rw,mode=777,uid={{ matrix_user_uid }} \ --mount type=bind,src={{ matrix_client_element_data_path }}/config.json,dst=/app/config.json,ro \ --mount type=bind,src={{ matrix_client_element_data_path }}/config.json,dst=/app/config.{{ matrix_server_fqn_element }}.json,ro \ {% if matrix_client_element_location_sharing_enabled %} From 20133def86564acab3da6d371b7d99e7603cadc0 Mon Sep 17 00:00:00 2001 From: Andreas Fischer Date: Wed, 30 Apr 2025 08:46:22 +0200 Subject: [PATCH 057/404] Indicate that responsibility for system updates is out-of-scope for this playbook --- docs/installing.md | 2 ++ 1 file changed, 2 insertions(+) diff --git a/docs/installing.md b/docs/installing.md index f63f0fdcb..7b6dc33ef 100644 --- a/docs/installing.md +++ b/docs/installing.md @@ -157,6 +157,8 @@ The upstream projects, which this playbook makes use of, occasionally if not oft Since it is unsafe to keep outdated services running on the server connected to the internet, please consider to update the playbook and re-run it periodically, in order to keep the services up-to-date. +Also, do not forget to update your system regularly. While this playbook may install basic services, such as Docker, it will not interfere further with system maintenance. Keeping the system itself up-to-date is out of scope for this playbook. + For more information about upgrading or maintaining services with the playbook, take a look at this page: [Upgrading the Matrix services](maintenance-upgrading-services.md) Feel free to **re-run the setup command any time** you think something is wrong with the server configuration. Ansible will take your configuration and update your server to match. From 0a6be12878d9694c3273d1e13d031d6e19866fbd Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 30 Apr 2025 19:11:39 +0000 Subject: [PATCH 058/404] Update dependency setuptools to v80.1.0 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 0ae7f2e2b..1593374de 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -17,7 +17,7 @@ packaging==25.0 Pygments==2.19.1 PyYAML==6.0.2 requests==2.32.3 -setuptools==80.0.1 +setuptools==80.1.0 snowballstemmer==2.2.0 Sphinx==8.2.3 sphinx-intl==2.3.1 From a638565580306766d99ad4fdc032e2cae6f5e94f Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Thu, 1 May 2025 09:58:45 +0300 Subject: [PATCH 059/404] Upgrade Prometheus (v2.55.1-3 -> v3.3.0-0) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index d4c85b295..67b88e9d9 100644 --- a/requirements.yml +++ b/requirements.yml @@ -49,7 +49,7 @@ version: v17-3 name: postgres_backup - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus.git - version: v2.55.1-3 + version: v3.3.0-0 name: prometheus - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-node-exporter.git version: v1.9.1-1 From ae58880f0cdfaa006d5c7d3753f2d7c19bbbec1d Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Thu, 1 May 2025 10:04:41 +0300 Subject: [PATCH 060/404] Upgrade prometheus-node-exporter (v1.9.1-1 -> v1.9.1-3) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 67b88e9d9..257c14462 100644 --- a/requirements.yml +++ b/requirements.yml @@ -52,7 +52,7 @@ version: v3.3.0-0 name: prometheus - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-node-exporter.git - version: v1.9.1-1 + version: v1.9.1-3 name: prometheus_node_exporter - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-postgres-exporter.git version: v0.17.1-1 From 882b528c96c88003a4379f4e006e02b2920340b2 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Thu, 1 May 2025 10:30:05 +0300 Subject: [PATCH 061/404] `prometheus_node_exporter_docker_image_registry_prefix_upstream*` -> `prometheus_node_exporter_container_image_registry_prefix_upstream*` --- group_vars/matrix_servers | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/group_vars/matrix_servers b/group_vars/matrix_servers index effaa716d..d513b2935 100755 --- a/group_vars/matrix_servers +++ b/group_vars/matrix_servers @@ -5338,7 +5338,7 @@ prometheus_node_exporter_gid: "{{ matrix_user_gid }}" prometheus_node_exporter_hostname: "{{ matrix_server_fqn_matrix }}" -prometheus_node_exporter_docker_image_registry_prefix_upstream: "{{ matrix_container_global_registry_prefix_override if matrix_container_global_registry_prefix_override else prometheus_node_exporter_docker_image_registry_prefix_upstream_default }}" +prometheus_node_exporter_container_image_registry_prefix_upstream: "{{ matrix_container_global_registry_prefix_override if matrix_container_global_registry_prefix_override else prometheus_node_exporter_container_image_registry_prefix_upstream_default }}" prometheus_node_exporter_container_network: "{{ matrix_monitoring_container_network }}" From f6725a9bfed12851d6c2fd0d69a1d7956641413d Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Thu, 1 May 2025 14:32:10 +0300 Subject: [PATCH 062/404] Upgrade Grafana (v11.6.0-security-01-0 -> v11.6.1-0) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 257c14462..5af7de5a7 100644 --- a/requirements.yml +++ b/requirements.yml @@ -22,7 +22,7 @@ version: v4.98.1-r0-2-0 name: exim_relay - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-grafana.git - version: v11.6.0-security-01-0 + version: v11.6.1-0 name: grafana - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-jitsi.git version: v10184-0 From 9a1f7165c2092e3f669a4c678db6dbaabb8dd6c0 Mon Sep 17 00:00:00 2001 From: Aine Date: Thu, 1 May 2025 17:10:12 +0300 Subject: [PATCH 063/404] fix grafana version var --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 5af7de5a7..628e2165a 100644 --- a/requirements.yml +++ b/requirements.yml @@ -22,7 +22,7 @@ version: v4.98.1-r0-2-0 name: exim_relay - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-grafana.git - version: v11.6.1-0 + version: v11.6.1-1 name: grafana - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-jitsi.git version: v10184-0 From cfc02b542db2a1072efb9e1011cd4100a606145a Mon Sep 17 00:00:00 2001 From: Aine Date: Thu, 1 May 2025 17:19:36 +0300 Subject: [PATCH 064/404] fix container image registry prefix for element call, livekit server, and livekit jwt service --- group_vars/matrix_servers | 6 ++++++ 1 file changed, 6 insertions(+) diff --git a/group_vars/matrix_servers b/group_vars/matrix_servers index d513b2935..b2c2b82a1 100755 --- a/group_vars/matrix_servers +++ b/group_vars/matrix_servers @@ -6332,6 +6332,8 @@ matrix_element_call_scheme: "{{ 'https' if matrix_playbook_ssl_enabled else 'htt matrix_element_call_container_network: "{{ matrix_addons_container_network }}" +matrix_element_call_container_image_registry_prefix_upstream: "{{ matrix_container_global_registry_prefix_override if matrix_container_global_registry_prefix_override else matrix_element_call_container_image_registry_prefix_upstream_default }}" + matrix_element_call_container_additional_networks_auto: "{{ [matrix_playbook_reverse_proxyable_services_additional_network] if (matrix_element_call_container_labels_traefik_enabled and matrix_playbook_reverse_proxyable_services_additional_network) else [] }}" matrix_element_call_container_labels_traefik_enabled: "{{ matrix_playbook_reverse_proxy_type in ['playbook-managed-traefik', 'other-traefik-container'] }}" @@ -6367,6 +6369,8 @@ livekit_server_path_prefix: "/livekit-server" livekit_server_container_image_self_build: "{{ matrix_architecture not in ['arm64', 'amd64'] }}" +livekit_server_container_image_registry_prefix_upstream: "{{ matrix_container_global_registry_prefix_override if matrix_container_global_registry_prefix_override else livekit_server_container_image_registry_prefix_upstream_default }}" + livekit_server_container_network: "{{ matrix_addons_container_network }}" livekit_server_container_additional_networks_auto: "{{ [matrix_playbook_reverse_proxyable_services_additional_network] if (livekit_server_container_labels_traefik_enabled and matrix_playbook_reverse_proxyable_services_additional_network) else [] }}" @@ -6470,6 +6474,8 @@ matrix_livekit_jwt_service_path_prefix: "/livekit-jwt-service" matrix_livekit_jwt_service_container_image_self_build: "{{ matrix_architecture not in ['amd64', 'arm64'] }}" +matrix_livekit_jwt_service_container_image_registry_prefix_upstream: "{{ matrix_container_global_registry_prefix_override if matrix_container_global_registry_prefix_override else matrix_livekit_jwt_service_container_image_registry_prefix_upstream_default }}" + matrix_livekit_jwt_service_container_network: "{{ matrix_addons_container_network }}" matrix_livekit_jwt_service_container_additional_networks_auto: | From 99221c35d8a515303cd862d4a348465dda1dbc81 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Thu, 1 May 2025 21:36:05 +0300 Subject: [PATCH 065/404] Upgrade Grafana (v11.6.1-1 -> v11.6.1-2) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 628e2165a..d6e53d21a 100644 --- a/requirements.yml +++ b/requirements.yml @@ -22,7 +22,7 @@ version: v4.98.1-r0-2-0 name: exim_relay - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-grafana.git - version: v11.6.1-1 + version: v11.6.1-2 name: grafana - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-jitsi.git version: v10184-0 From 47ca615931fa2205fa2508e1f8030e0df8c8fee8 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 2 May 2025 10:49:25 +0000 Subject: [PATCH 066/404] Update dependency charset-normalizer to v3.4.2 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 1593374de..d2af46ab6 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -1,7 +1,7 @@ alabaster==1.0.0 babel==2.17.0 certifi==2025.4.26 -charset-normalizer==3.4.1 +charset-normalizer==3.4.2 click==8.1.8 docutils==0.21.2 idna==3.10 From 4599fd715961d497f4fc971b10f3ea7f89c82f63 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Sat, 3 May 2025 08:41:01 +0300 Subject: [PATCH 067/404] Upgrade Prometheus (v3.3.0-0 -> v3.3.1-0) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index d6e53d21a..80f4011c7 100644 --- a/requirements.yml +++ b/requirements.yml @@ -49,7 +49,7 @@ version: v17-3 name: postgres_backup - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus.git - version: v3.3.0-0 + version: v3.3.1-0 name: prometheus - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-node-exporter.git version: v1.9.1-3 From 026f4b328201c37dc3a7350b7d4d16a565bd603b Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 3 May 2025 05:41:41 +0000 Subject: [PATCH 068/404] Update dependency setuptools to v80.2.0 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index d2af46ab6..e868fc6c5 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -17,7 +17,7 @@ packaging==25.0 Pygments==2.19.1 PyYAML==6.0.2 requests==2.32.3 -setuptools==80.1.0 +setuptools==80.2.0 snowballstemmer==2.2.0 Sphinx==8.2.3 sphinx-intl==2.3.1 From 381b987e997fd571308426c729271a9740919269 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 3 May 2025 10:20:18 +0000 Subject: [PATCH 069/404] Update dependency setuptools to v80.3.0 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index e868fc6c5..98bf3f83c 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -17,7 +17,7 @@ packaging==25.0 Pygments==2.19.1 PyYAML==6.0.2 requests==2.32.3 -setuptools==80.2.0 +setuptools==80.3.0 snowballstemmer==2.2.0 Sphinx==8.2.3 sphinx-intl==2.3.1 From 0b4b21660cc29c06be31901ba4bc5c37749587b5 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sun, 4 May 2025 22:32:38 +0000 Subject: [PATCH 070/404] Update dependency setuptools to v80.3.1 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 98bf3f83c..f29d78b9d 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -17,7 +17,7 @@ packaging==25.0 Pygments==2.19.1 PyYAML==6.0.2 requests==2.32.3 -setuptools==80.3.0 +setuptools==80.3.1 snowballstemmer==2.2.0 Sphinx==8.2.3 sphinx-intl==2.3.1 From 9f83f52ea93fbdb19b576920aae808ed6bfa1d29 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 5 May 2025 22:06:54 +0000 Subject: [PATCH 071/404] Update dock.mau.dev/maubot/maubot Docker tag to v0.5.2 --- roles/custom/matrix-bot-maubot/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bot-maubot/defaults/main.yml b/roles/custom/matrix-bot-maubot/defaults/main.yml index 64e717219..e6e6694e9 100644 --- a/roles/custom/matrix-bot-maubot/defaults/main.yml +++ b/roles/custom/matrix-bot-maubot/defaults/main.yml @@ -30,7 +30,7 @@ matrix_bot_maubot_docker_repo: "https://mau.dev/maubot/maubot.git" matrix_bot_maubot_docker_repo_version: "{{ 'master' if matrix_bot_maubot_version == 'latest' else matrix_bot_maubot_version }}" # renovate: datasource=docker depName=dock.mau.dev/maubot/maubot -matrix_bot_maubot_version: v0.5.1 +matrix_bot_maubot_version: v0.5.2 matrix_bot_maubot_docker_image: "{{ matrix_bot_maubot_docker_image_registry_prefix }}maubot/maubot:{{ matrix_bot_maubot_version }}" matrix_bot_maubot_docker_image_registry_prefix: "{{ 'localhost/' if matrix_bot_maubot_container_image_self_build else matrix_bot_maubot_docker_image_registry_prefix_upstream }}" matrix_bot_maubot_docker_image_registry_prefix_upstream: "{{ matrix_bot_maubot_docker_image_registry_prefix_upstream_default }}" From 025909e05beecba35803f83f783ce1afbe48b1f5 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 6 May 2025 16:34:26 +0000 Subject: [PATCH 072/404] Update ghcr.io/element-hq/element-web Docker tag to v1.11.100 --- roles/custom/matrix-client-element/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-element/defaults/main.yml b/roles/custom/matrix-client-element/defaults/main.yml index 2267bf137..2690ab2e2 100644 --- a/roles/custom/matrix-client-element/defaults/main.yml +++ b/roles/custom/matrix-client-element/defaults/main.yml @@ -29,7 +29,7 @@ matrix_client_element_container_image_self_build_repo: "https://github.com/eleme matrix_client_element_container_image_self_build_low_memory_system_patch_enabled: "{{ ansible_memtotal_mb < 4096 }}" # renovate: datasource=docker depName=ghcr.io/element-hq/element-web -matrix_client_element_version: v1.11.99 +matrix_client_element_version: v1.11.100 matrix_client_element_docker_image: "{{ matrix_client_element_docker_image_registry_prefix }}element-hq/element-web:{{ matrix_client_element_version }}" matrix_client_element_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_element_container_image_self_build else matrix_client_element_docker_image_registry_prefix_upstream }}" From d1329edf71feba9ea937906cc8337aa445ff738d Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 6 May 2025 22:06:01 +0000 Subject: [PATCH 073/404] Update ghcr.io/element-hq/synapse Docker tag to v1.129.0 --- roles/custom/matrix-synapse/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse/defaults/main.yml b/roles/custom/matrix-synapse/defaults/main.yml index 8250c0c64..c251ae38e 100644 --- a/roles/custom/matrix-synapse/defaults/main.yml +++ b/roles/custom/matrix-synapse/defaults/main.yml @@ -16,7 +16,7 @@ matrix_synapse_enabled: true matrix_synapse_github_org_and_repo: element-hq/synapse # renovate: datasource=docker depName=ghcr.io/element-hq/synapse -matrix_synapse_version: v1.128.0 +matrix_synapse_version: v1.129.0 matrix_synapse_username: '' matrix_synapse_uid: '' From 43cb86ac8a4a5ea4ee3d5211ad03d2451a385aab Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Wed, 7 May 2025 09:03:08 +0300 Subject: [PATCH 074/404] Upgrade Traefik (v3.3.6-1 -> v3.4.0-0) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 80f4011c7..9a3bb3a87 100644 --- a/requirements.yml +++ b/requirements.yml @@ -67,7 +67,7 @@ version: v1.0.0-0 name: timesync - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik.git - version: v3.3.6-1 + version: v3.4.0-0 name: traefik - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik-certs-dumper.git version: v2.10.0-0 From 95ef383ef7cf850c594241fdea459e2d248e0bd2 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Wed, 7 May 2025 16:37:41 +0300 Subject: [PATCH 075/404] Add `matrix_synapse_cas_config_enabled` variable to make `cas_confg` non-null This works around an issue with Matrix Authentication Service's `syn2mas` sub-command (at version v0.16.0), which chokes with an error: > Error: Failed to load Synapse configuration > Caused by: > invalid type: found unit, expected struct EnableableSection for key "default.cas_config" in homeserver.yaml YAML file This issue is likely to be fixed in MAS v0.16.1 or v0.17.0. --- roles/custom/matrix-synapse/defaults/main.yml | 3 +++ .../custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse/defaults/main.yml b/roles/custom/matrix-synapse/defaults/main.yml index c251ae38e..2de8884ff 100644 --- a/roles/custom/matrix-synapse/defaults/main.yml +++ b/roles/custom/matrix-synapse/defaults/main.yml @@ -725,6 +725,9 @@ matrix_synapse_oidc_providers: [] # Note: internally, this uses the `--mount` flag for mounting the specified volumes. matrix_synapse_container_additional_volumes: [] +# Controls whether cas_config is enabled +matrix_synapse_cas_config_enabled: false + # A list of additional loggers to register in synapse.log.config. # This list gets populated dynamically based on Synapse extensions that have been enabled. # Contains definition objects like this: `{"name": "..", "level": "DEBUG"} diff --git a/roles/custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 b/roles/custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 index 69e6e0b01..738dbaeae 100644 --- a/roles/custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 +++ b/roles/custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 @@ -2136,7 +2136,7 @@ cas_config: # Uncomment the following to enable authorization against a CAS server. # Defaults to false. # - #enabled: true + enabled: {{ matrix_synapse_cas_config_enabled | to_json }} # The URL of the CAS authorization endpoint. # From 19ccd491fba2da9426aab7f6a6f90cf0e52ede14 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Wed, 7 May 2025 17:33:55 +0300 Subject: [PATCH 076/404] Upgrade Matrix Authentication Service (v0.15.0 -> v0.16.0) and adapt for the new `syn2mas` subcommand Fixes https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/4297 Supersedes https://github.com/spantaleev/matrix-docker-ansible-deploy/pull/4300 --- ...-playbook-matrix-authentication-service.md | 41 ++++------ group_vars/matrix_servers | 2 - ...-playbook-matrix-authentication-service.po | 4 +- ...-playbook-matrix-authentication-service.po | 4 +- ...playbook-matrix-authentication-service.pot | 4 +- .../defaults/main.yml | 37 +++++---- .../tasks/main.yml | 17 +++- .../{syn2mas.yml => mas_cli_syn2mas.yml} | 78 +++++++------------ .../tasks/validate_config.yml | 8 ++ 9 files changed, 90 insertions(+), 105 deletions(-) rename roles/custom/matrix-authentication-service/tasks/{syn2mas.yml => mas_cli_syn2mas.yml} (52%) diff --git a/docs/configuring-playbook-matrix-authentication-service.md b/docs/configuring-playbook-matrix-authentication-service.md index 42c52b9c9..ba3c43b8c 100644 --- a/docs/configuring-playbook-matrix-authentication-service.md +++ b/docs/configuring-playbook-matrix-authentication-service.md @@ -157,6 +157,10 @@ matrix_authentication_service_config_upstream_oauth2_providers: - # A unique identifier for the provider # Must be a valid ULID id: 01HFVBY12TMNTYTBV8W921M5FA + # This can be set if you're migrating an existing (legacy) Synapse OIDC configuration. + # The value used here would most likely be "oidc" or "oidc-provider". + # See: https://element-hq.github.io/matrix-authentication-service/setup/migration.html#map-any-upstream-sso-providers + synapse_idp_id: null # The issuer URL, which will be used to discover the provider's configuration. # If discovery is enabled, this *must* exactly match the `issuer` field # advertised in `/.well-known/openid-configuration`. @@ -304,7 +308,7 @@ ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start Our migration guide is loosely based on the upstream [Migrating an existing homeserver](https://element-hq.github.io/matrix-authentication-service/setup/migration.html) guide. -Migration is done via a tool called `syn2mas`, which the playbook could run for you (in a container). +Migration is done via a sub-command called `syn2mas`, which the playbook could run for you (in a container). The installation + migration steps are like this: @@ -320,7 +324,7 @@ The installation + migration steps are like this: - The `matrix-user-creator` role would be suppressed, so that it doesn't automatically attempt to create users (for bots, etc.) in the MAS database. These user accounts likely already exist in Synapse's user database and could be migrated over (via syn2mas, as per the steps below), so creating them in the MAS database would have been unnecessary and potentially problematic (conflicts during the syn2mas migration). -3. Consider taking a full [backup of your Postgres database](./maintenance-postgres.md#backing-up-postgresql). This is done just in case. The **syn2mas migration tool does not delete any data**, so it should be possible to revert to your previous setup by merely disabling MAS and re-running the playbook (no need to restore a Postgres backup). However, do note that as users start logging in (creating new login sessions) via the new MAS setup, disabling MAS and reverting back to the Synapse user database will cause these new sessions to break. +3. Consider taking a full [backup of your Postgres database](./maintenance-postgres.md#backing-up-postgresql). This is done just in case. The **syn2mas migration command does not delete any data**, so it should be possible to revert to your previous setup by merely disabling MAS and re-running the playbook (no need to restore a Postgres backup). However, do note that as users start logging in (creating new login sessions) via the new MAS setup, disabling MAS and reverting back to the Synapse user database will cause these new sessions to break. 4. [Migrate your data from Synapse to Matrix Authentication Service using syn2mas](#migrate-your-data-from-synapse-to-matrix-authentication-service-using-syn2mas) @@ -340,9 +344,7 @@ The installation + migration steps are like this: ### Migrate your data from Synapse to Matrix Authentication Service using syn2mas -We **don't** ask you to [run the `syn2mas` migration advisor command](https://element-hq.github.io/matrix-authentication-service/setup/migration.html#run-the-migration-advisor), because it only gives you the green light if your Synapse configuration (`homeserver.yaml`) is configured in a way that's compatible with MAS (delegating authentication to MAS; disabling Synapse's password config; etc.). Until we migrate your data with the `syn2mas` tool, we intentionally avoid doing these changes to allow existing user sessions to work. - -You can invoke the `syn2mas` tool via the playbook by running the playbook's `matrix-authentication-service-syn2mas` tag. We recommend first doing a [dry-run](#performing-a-syn2mas-dry-run) and then a [real migration](#performing-a-real-syn2mas-migration). +You can invoke the `syn2mas` tool via the playbook by running the playbook's `matrix-authentication-service-mas-cli-syn2mas` tag. We recommend first doing a [dry-run](#performing-a-syn2mas-dry-run) and then a [real migration](#performing-a-real-syn2mas-migration). #### Configuring syn2mas @@ -354,26 +356,9 @@ When you're done with potentially configuring `syn2mas`, proceed to doing a [dry ##### Configuring upstream OIDC provider mapping for syn2mas -If you have existing OIDC users in your Synapse user database (which will be the case if when using [OIDC with Synapse](./configuring-playbook-synapse.md#synapse--openid-connect-for-single-sign-on)), you may need to pass an additional `--upstreamProviderMapping` argument to the `syn2mas` tool to tell it which provider (on the Synapse side) maps to which other provider on the MAS side. - -If you don't do this, `syn2mas` would report errors like this one: - -> [FATAL] migrate - [Failed to import external id 4264b0f0-4f11-4ddd-aedb-b500e4d07c25 with oidc-keycloak for user @alice:example.com: Error: Unknown upstream provider oidc-keycloak] - -Below is an example situation and a guide for how to solve it. - -If in `matrix_synapse_oidc_providers` your provider `idp_id` is (was) named `keycloak`, in the Synapse database users would be associated with the `oidc-keycloak` provider (note the `oidc-` prefix that was added automatically by Synapse to your `idp_id` value). +Since Matrix Authentication Service v0.16.0 (which replaced the standalone `syn2mas` tool with a `mas-cli syn2mas` sub-command), OIDC configuration (mapping from your old OIDC configuration to your new one, etc) is meant to be configured in the Matrix Authentication Service configuration (via `matrix_authentication_service_config_upstream_oauth2_providers`) as a `synapse_idp_id` property for each provider. -The same OIDC provider may have an `id` of `01HFVBY12TMNTYTBV8W921M5FA` on the MAS side, as defined in `matrix_authentication_service_config_upstream_oauth2_providers` (see the [Upstream OAuth2 configuration](#upstream-oauth2-configuration) section above). - -To tell `syn2mas` how the Synapse-configured OIDC provider maps to the new MAS-configured OIDC provider, add this additional configuration to your `vars.yml` file: - -```yaml -# Adjust the mapping below to match your provider IDs on the Synapse side and the MAS side. -# Don't forget that Synapse automatically adds an `oidc-` prefix to provider ids defined in its configuration. -matrix_authentication_service_syn2mas_process_extra_arguments: - - "--upstreamProviderMapping oidc-keycloak:01HFVBY12TMNTYTBV8W921M5FA" -``` +You can refer to the [Map any upstream SSO providers](https://element-hq.github.io/matrix-authentication-service/setup/migration.html#map-any-upstream-sso-providers) section of the MAS documentation for figuring out how to set the `synapse_idp_id` value in `matrix_authentication_service_config_upstream_oauth2_providers` correctly. #### Performing a syn2mas dry-run @@ -384,7 +369,7 @@ A dry-run would not cause downtime, because it avoids stopping Synapse. To perform a dry-run, run: ```sh -just run-tags matrix-authentication-service-syn2mas -e matrix_authentication_service_syn2mas_dry_run=true +just run-tags matrix-authentication-service-mas-cli-syn2mas -e matrix_authentication_service_syn2mas_migrate_dry_run=true ``` Observe the command output (especially the last line of the the syn2mas output). If you are confident that the migration will work out as expected, you can proceed with a [real migration](#performing-a-real-syn2mas-migration). @@ -403,13 +388,13 @@ Before performing a real migration make sure: - you've performed a [syn2mas dry-run](#performing-a-syn2mas-dry-run) and don't see any issues in its output -To perform a real migration, run the `matrix-authentication-service-syn2mas` tag **without** the `matrix_authentication_service_syn2mas_dry_run` variable: +To perform a real migration, run the `matrix-authentication-service-mas-cli-syn2mas` tag **without** the `matrix_authentication_service_syn2mas_migrate_dry_run` variable: ```sh -just run-tags matrix-authentication-service-syn2mas +just run-tags matrix-authentication-service-mas-cli-syn2mas ``` -Having performed a `syn2mas` migration once, trying to do it again will report errors for users that were already migrated (e.g. "Error: Unknown upstream provider oauth-delegated"). +Having performed a `syn2mas` migration once, trying to do it again will report errors (e.g. "Error: The MAS database is not empty: rows found in at least `users`. Please drop and recreate the database, then try again."). ## Verify that Matrix Authentication Service is installed correctly diff --git a/group_vars/matrix_servers b/group_vars/matrix_servers index b2c2b82a1..a62a2f387 100755 --- a/group_vars/matrix_servers +++ b/group_vars/matrix_servers @@ -688,8 +688,6 @@ matrix_authentication_service_config_email_from_address: "{{ exim_relay_sender_a matrix_authentication_service_container_image_registry_prefix_upstream: "{{ matrix_container_global_registry_prefix_override if matrix_container_global_registry_prefix_override else matrix_authentication_service_container_image_registry_prefix_upstream_default }}" -matrix_authentication_service_syn2mas_container_image_registry_prefix_upstream: "{{ matrix_container_global_registry_prefix_override if matrix_container_global_registry_prefix_override else matrix_authentication_service_syn2mas_container_image_registry_prefix_upstream_default }}" - matrix_authentication_service_container_image_self_build: "{{ matrix_architecture not in ['amd64', 'arm64'] }}" matrix_authentication_service_container_network: "{{ matrix_homeserver_container_network }}" diff --git a/i18n/locales/bg/LC_MESSAGES/docs/configuring-playbook-matrix-authentication-service.po b/i18n/locales/bg/LC_MESSAGES/docs/configuring-playbook-matrix-authentication-service.po index 0b1dda626..554766af6 100644 --- a/i18n/locales/bg/LC_MESSAGES/docs/configuring-playbook-matrix-authentication-service.po +++ b/i18n/locales/bg/LC_MESSAGES/docs/configuring-playbook-matrix-authentication-service.po @@ -435,7 +435,7 @@ msgid "We **don't** ask you to [run the `syn2mas` migration advisor command](htt msgstr "" #: ../../../docs/configuring-playbook-matrix-authentication-service.md:340 -msgid "You can invoke the `syn2mas` tool via the playbook by running the playbook's `matrix-authentication-service-syn2mas` tag. We recommend first doing a [dry-run](#performing-a-syn2mas-dry-run) and then a [real migration](#performing-a-real-syn2mas-migration)." +msgid "You can invoke the `syn2mas` tool via the playbook by running the playbook's `matrix-authentication-service-mas-cli-syn2mas` tag. We recommend first doing a [dry-run](#performing-a-syn2mas-dry-run) and then a [real migration](#performing-a-real-syn2mas-migration)." msgstr "" #: ../../../docs/configuring-playbook-matrix-authentication-service.md:342 @@ -535,7 +535,7 @@ msgid "you've performed a [syn2mas dry-run](#performing-a-syn2mas-dry-run) and d msgstr "" #: ../../../docs/configuring-playbook-matrix-authentication-service.md:401 -msgid "To perform a real migration, run the `matrix-authentication-service-syn2mas` tag **without** the `matrix_authentication_service_syn2mas_dry_run` variable:" +msgid "To perform a real migration, run the `matrix-authentication-service-mas-cli-syn2mas` tag **without** the `matrix_authentication_service_syn2mas_migrate_dry_run` variable:" msgstr "" #: ../../../docs/configuring-playbook-matrix-authentication-service.md:407 diff --git a/i18n/locales/jp/LC_MESSAGES/docs/configuring-playbook-matrix-authentication-service.po b/i18n/locales/jp/LC_MESSAGES/docs/configuring-playbook-matrix-authentication-service.po index 776945591..84baf5f02 100644 --- a/i18n/locales/jp/LC_MESSAGES/docs/configuring-playbook-matrix-authentication-service.po +++ b/i18n/locales/jp/LC_MESSAGES/docs/configuring-playbook-matrix-authentication-service.po @@ -434,7 +434,7 @@ msgid "We **don't** ask you to [run the `syn2mas` migration advisor command](htt msgstr "" #: ../../../docs/configuring-playbook-matrix-authentication-service.md:340 -msgid "You can invoke the `syn2mas` tool via the playbook by running the playbook's `matrix-authentication-service-syn2mas` tag. We recommend first doing a [dry-run](#performing-a-syn2mas-dry-run) and then a [real migration](#performing-a-real-syn2mas-migration)." +msgid "You can invoke the `syn2mas` tool via the playbook by running the playbook's `matrix-authentication-service-mas-cli-syn2mas` tag. We recommend first doing a [dry-run](#performing-a-syn2mas-dry-run) and then a [real migration](#performing-a-real-syn2mas-migration)." msgstr "" #: ../../../docs/configuring-playbook-matrix-authentication-service.md:342 @@ -534,7 +534,7 @@ msgid "you've performed a [syn2mas dry-run](#performing-a-syn2mas-dry-run) and d msgstr "" #: ../../../docs/configuring-playbook-matrix-authentication-service.md:401 -msgid "To perform a real migration, run the `matrix-authentication-service-syn2mas` tag **without** the `matrix_authentication_service_syn2mas_dry_run` variable:" +msgid "To perform a real migration, run the `matrix-authentication-service-mas-cli-syn2mas` tag **without** the `matrix_authentication_service_syn2mas_migrate_dry_run` variable:" msgstr "" #: ../../../docs/configuring-playbook-matrix-authentication-service.md:407 diff --git a/i18n/translation-templates/docs/configuring-playbook-matrix-authentication-service.pot b/i18n/translation-templates/docs/configuring-playbook-matrix-authentication-service.pot index 3e94a3a36..da5f99e98 100644 --- a/i18n/translation-templates/docs/configuring-playbook-matrix-authentication-service.pot +++ b/i18n/translation-templates/docs/configuring-playbook-matrix-authentication-service.pot @@ -430,7 +430,7 @@ msgid "We **don't** ask you to [run the `syn2mas` migration advisor command](htt msgstr "" #: ../../../docs/configuring-playbook-matrix-authentication-service.md:340 -msgid "You can invoke the `syn2mas` tool via the playbook by running the playbook's `matrix-authentication-service-syn2mas` tag. We recommend first doing a [dry-run](#performing-a-syn2mas-dry-run) and then a [real migration](#performing-a-real-syn2mas-migration)." +msgid "You can invoke the `syn2mas` tool via the playbook by running the playbook's `matrix-authentication-service-mas-cli-syn2mas` tag. We recommend first doing a [dry-run](#performing-a-syn2mas-dry-run) and then a [real migration](#performing-a-real-syn2mas-migration)." msgstr "" #: ../../../docs/configuring-playbook-matrix-authentication-service.md:342 @@ -530,7 +530,7 @@ msgid "you've performed a [syn2mas dry-run](#performing-a-syn2mas-dry-run) and d msgstr "" #: ../../../docs/configuring-playbook-matrix-authentication-service.md:401 -msgid "To perform a real migration, run the `matrix-authentication-service-syn2mas` tag **without** the `matrix_authentication_service_syn2mas_dry_run` variable:" +msgid "To perform a real migration, run the `matrix-authentication-service-mas-cli-syn2mas` tag **without** the `matrix_authentication_service_syn2mas_migrate_dry_run` variable:" msgstr "" #: ../../../docs/configuring-playbook-matrix-authentication-service.md:407 diff --git a/roles/custom/matrix-authentication-service/defaults/main.yml b/roles/custom/matrix-authentication-service/defaults/main.yml index ba9ccd662..45981618d 100644 --- a/roles/custom/matrix-authentication-service/defaults/main.yml +++ b/roles/custom/matrix-authentication-service/defaults/main.yml @@ -22,7 +22,7 @@ matrix_authentication_service_container_repo_version: "{{ 'main' if matrix_authe matrix_authentication_service_container_src_files_path: "{{ matrix_base_data_path }}/matrix-authentication-service/container-src" # renovate: datasource=docker depName=ghcr.io/element-hq/matrix-authentication-service -matrix_authentication_service_version: 0.15.0 +matrix_authentication_service_version: 0.16.0 matrix_authentication_service_container_image_registry_prefix: "{{ 'localhost/' if matrix_authentication_service_container_image_self_build else matrix_authentication_service_container_image_registry_prefix_upstream }}" matrix_authentication_service_container_image_registry_prefix_upstream: "{{ matrix_authentication_service_container_image_registry_prefix_upstream_default }}" matrix_authentication_service_container_image_registry_prefix_upstream_default: "ghcr.io/" @@ -559,29 +559,34 @@ matrix_authentication_service_container_labels_additional_labels: '' matrix_authentication_service_syn2mas_start_wait_time_seconds: 5 -matrix_authentication_service_syn2mas_dry_run: false +# The syn2mas sub-command to run. +# Valid values: migrate, check +matrix_authentication_service_syn2mas_subcommand: migrate -# renovate: datasource=docker depName=ghcr.io/element-hq/matrix-authentication-service/syn2mas -matrix_authentication_service_syn2mas_version: 0.15.0 -matrix_authentication_service_syn2mas_container_image: "{{ matrix_authentication_service_syn2mas_container_image_registry_prefix }}element-hq/matrix-authentication-service/syn2mas:{{ matrix_authentication_service_syn2mas_version }}" -matrix_authentication_service_syn2mas_container_image_registry_prefix: "{{ 'localhost/' if matrix_authentication_service_container_image_self_build else matrix_authentication_service_syn2mas_container_image_registry_prefix_upstream }}" -matrix_authentication_service_syn2mas_container_image_registry_prefix_upstream: "{{ matrix_authentication_service_syn2mas_container_image_registry_prefix_upstream_default }}" -matrix_authentication_service_syn2mas_container_image_registry_prefix_upstream_default: ghcr.io/ -matrix_authentication_service_syn2mas_container_image_force_pull: "{{ matrix_authentication_service_syn2mas_container_image.endswith(':latest') }}" +# Whether to pass a `--dry-run` flag to the 'migrate' sub-command. +# See `matrix_authentication_service_syn2mas_subcommand` +matrix_authentication_service_syn2mas_migrate_dry_run: false -matrix_authentication_service_syn2mas_container_image_self_build: "{{ matrix_authentication_service_container_image_self_build }}" +# Path to Synapse's homeserver.yaml configuration file. +matrix_authentication_service_syn2mas_synapse_homeserver_config_path: "" matrix_authentication_service_syn2mas_container_network: "{{ matrix_authentication_service_container_network }}" -# Path to Synapse's homeserver.yaml configuration file. -matrix_authentication_service_syn2mas_synapse_homeserver_config_path: "" +# Additional options passed to the syn2mas sub-command (e.g. `mas-cli syn2mas [OPTIONS] migrate|check`). +# Also see: `matrix_authentication_service_syn2mas_subcommand_extra_options` +# +# Example: +# matrix_authentication_service_syn2mas_command_extra_options: +# - "--something" +matrix_authentication_service_syn2mas_command_extra_options: [] -# Additional arguments passed to the syn2mas process. +# Additional options passed to the syn2mas sub-command (e.g. `mas-cli syn2mas migrate|check [OPTIONS]`). +# Also see: `matrix_authentication_service_syn2mas_command_extra_options` # # Example: -# matrix_authentication_service_syn2mas_process_extra_arguments: -# - "--upstreamProviderMapping oidc-keycloak:01H8PKNWKKRPCBW4YGH1RWV279" -matrix_authentication_service_syn2mas_process_extra_arguments: [] +# matrix_authentication_service_syn2mas_subcommand_extra_options: +# - "--dry-run" +matrix_authentication_service_syn2mas_subcommand_extra_options: [] ######################################################################################## # # diff --git a/roles/custom/matrix-authentication-service/tasks/main.yml b/roles/custom/matrix-authentication-service/tasks/main.yml index 6b6a07718..95c40fea7 100644 --- a/roles/custom/matrix-authentication-service/tasks/main.yml +++ b/roles/custom/matrix-authentication-service/tasks/main.yml @@ -9,18 +9,33 @@ - setup-matrix-authentication-service - install-all - install-matrix-authentication-service + - matrix-authentication-service-mas-cli-syn2mas block: - when: matrix_authentication_service_enabled | bool ansible.builtin.include_tasks: "{{ role_path }}/tasks/validate_config.yml" +- tags: + - setup-all + - setup-matrix-authentication-service + - install-all + - install-matrix-authentication-service + block: - when: matrix_authentication_service_enabled | bool ansible.builtin.include_tasks: "{{ role_path }}/tasks/install.yml" +# The tag 'matrix-authentication-service-syn2mas' has been replaced by the tag 'matrix-authentication-service-mas-cli-syn2mas'. - tags: - matrix-authentication-service-syn2mas + block: + - name: Warn about deprecated tag + ansible.builtin.fail: + msg: "WARNING: The 'matrix-authentication-service-syn2mas' tag has been replaced by 'matrix-authentication-service-mas-cli-syn2mas'. Please update your command." + +- tags: + - matrix-authentication-service-mas-cli-syn2mas block: - when: matrix_authentication_service_enabled | bool - ansible.builtin.include_tasks: "{{ role_path }}/tasks/syn2mas.yml" + ansible.builtin.include_tasks: "{{ role_path }}/tasks/mas_cli_syn2mas.yml" - tags: - matrix-authentication-service-mas-cli-doctor diff --git a/roles/custom/matrix-authentication-service/tasks/syn2mas.yml b/roles/custom/matrix-authentication-service/tasks/mas_cli_syn2mas.yml similarity index 52% rename from roles/custom/matrix-authentication-service/tasks/syn2mas.yml rename to roles/custom/matrix-authentication-service/tasks/mas_cli_syn2mas.yml index 0a09d5351..90cb9ab74 100644 --- a/roles/custom/matrix-authentication-service/tasks/syn2mas.yml +++ b/roles/custom/matrix-authentication-service/tasks/mas_cli_syn2mas.yml @@ -6,7 +6,7 @@ --- - ansible.builtin.set_fact: - matrix_authentication_service_syn2mas_dry_run: "{{ matrix_authentication_service_syn2mas_dry_run | bool }}" + matrix_authentication_service_syn2mas_migrate_dry_run: "{{ matrix_authentication_service_syn2mas_migrate_dry_run | bool }}" - name: Abort, if not using Synapse when: not matrix_synapse_enabled | bool @@ -33,41 +33,8 @@ msg: "The Synapse homeserver config file does not exist at the specified path: {{ matrix_authentication_service_syn2mas_synapse_homeserver_config_path }}" when: not matrix_authentication_service_syn2mas_synapse_config_stat.stat.exists -- name: Ensure Matrix Authentication Service syn2mas container image is pulled - community.docker.docker_image: - name: "{{ matrix_authentication_service_syn2mas_container_image }}" - source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" - force_source: "{{ matrix_authentication_service_syn2mas_container_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" - force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_authentication_service_syn2mas_container_image_force_pull }}" - when: "not matrix_authentication_service_syn2mas_container_image_self_build | bool" - register: result - retries: "{{ devture_playbook_help_container_retries_count }}" - delay: "{{ devture_playbook_help_container_retries_delay }}" - until: result is not failed - -- when: "matrix_authentication_service_syn2mas_container_image_self_build | bool" - block: - - name: Ensure Matrix Authentication Service repository is present on self-build - ansible.builtin.git: - repo: "{{ matrix_authentication_service_container_repo }}" - version: "{{ matrix_authentication_service_container_repo_version }}" - dest: "{{ matrix_authentication_service_container_src_files_path }}" - force: "yes" - become: true - become_user: "{{ matrix_user_name }}" - register: matrix_authentication_service_git_pull_results - - - name: Ensure Matrix Authentication Service syn2mas container image is built - ansible.builtin.command: - cmd: |- - {{ devture_systemd_docker_base_host_command_docker }} buildx build - --tag={{ matrix_authentication_service_syn2mas_container_image }} - --file={{ matrix_authentication_service_container_src_files_path }}/tools/syn2mas/Dockerfile - {{ matrix_authentication_service_container_src_files_path }}/tools/syn2mas - changed_when: true - - name: Ensure Synapse is stopped - when: not matrix_authentication_service_syn2mas_dry_run | bool + when: not matrix_authentication_service_syn2mas_migrate_dry_run | bool ansible.builtin.service: name: matrix-synapse state: stopped @@ -81,14 +48,19 @@ # # Still, it's probably safer to stop it anyway. - name: Ensure Matrix Authentication Service is stopped + when: not matrix_authentication_service_syn2mas_migrate_dry_run | bool ansible.builtin.service: name: matrix-authentication-service state: stopped register: matrix_authentication_service_mas_ensure_stopped_result +# This is similar to the command found in the systemd service file. +# +# We cannot use `docker exec` with the existing Matrix Authentication Service container here, +# because we need an additional mount (the Synapse homeserver config). - name: Generate syn2mas migration command ansible.builtin.set_fact: - matrix_authentication_service_syn2mas_migration_command: >- + matrix_authentication_service_mas_cli_syn2mas_command: >- {{ devture_systemd_docker_base_host_command_docker }} run --rm --name=matrix-authentication-service-syn2mas @@ -96,14 +68,16 @@ --user={{ matrix_authentication_service_uid }}:{{ matrix_authentication_service_gid }} --cap-drop=ALL --network={{ matrix_authentication_service_syn2mas_container_network }} + --mount type=bind,src={{ matrix_authentication_service_config_path }}/config.yaml,dst=/config.yaml,ro + --mount type=bind,src={{ matrix_authentication_service_data_keys_path }},dst=/keys,ro --mount type=bind,src={{ matrix_authentication_service_syn2mas_synapse_homeserver_config_path }},dst=/homeserver.yaml,ro - --mount type=bind,src={{ matrix_authentication_service_config_path }}/config.yaml,dst=/mas-config.yaml,ro - {{ matrix_authentication_service_syn2mas_container_image }} - --command=migrate - --synapseConfigFile=/homeserver.yaml - --masConfigFile=/mas-config.yaml - {{ matrix_authentication_service_syn2mas_process_extra_arguments | join(' ') }} - {% if matrix_authentication_service_syn2mas_dry_run | bool %}--dryRun{% endif %} + {{ matrix_authentication_service_container_image }} + syn2mas + --synapse-config=/homeserver.yaml + {{ matrix_authentication_service_syn2mas_command_extra_options | join(' ') }} + {{ matrix_authentication_service_syn2mas_subcommand }} + {{ '--dry-run' if matrix_authentication_service_syn2mas_migrate_dry_run and matrix_authentication_service_syn2mas_subcommand == 'migrate' else '' }} + {{ matrix_authentication_service_syn2mas_subcommand_extra_options | join(' ') }} tags: - skip_ansible_lint @@ -111,33 +85,33 @@ # See: https://ansibledaily.com/print-to-standard-output-without-escaping/ # # We want to run `debug: msg=".."`, but that dumps it as JSON and escapes double quotes within it, -# which ruins the command (`matrix_authentication_service_syn2mas_migration_command`). +# which ruins the command (`matrix_authentication_service_mas_cli_syn2mas_command`). - name: Note about syn2mas migration ansible.builtin.set_fact: dummy: true with_items: - >- - Running syn2mas migration using the following command: `{{ matrix_authentication_service_syn2mas_migration_command }}`. - If this crashes, you can stop Synapse (`systemctl stop matrix-synapse`) and run the command manually. + Running syn2mas migration using the following command: `{{ matrix_authentication_service_mas_cli_syn2mas_command }}`. + If this crashes, you can stop Synapse (`systemctl stop matrix-synapse`), start Matrix Authentication Service (`systemctl start matrix-authentication-service`) and run the command manually. - name: Perform syn2mas migration ansible.builtin.command: - cmd: "{{ matrix_authentication_service_syn2mas_migration_command }}" - register: matrix_authentication_service_syn2mas_migration_command_result - changed_when: matrix_authentication_service_syn2mas_migration_command_result.rc == 0 + cmd: "{{ matrix_authentication_service_mas_cli_syn2mas_command }}" + register: matrix_authentication_service_mas_cli_syn2mas_command_result + changed_when: matrix_authentication_service_mas_cli_syn2mas_command_result.rc == 0 - name: Print syn2mas migration command result ansible.builtin.debug: - var: matrix_authentication_service_syn2mas_migration_command_result + var: matrix_authentication_service_mas_cli_syn2mas_command_result - name: Ensure Synapse is started (if it previously was) - when: "not matrix_authentication_service_syn2mas_dry_run and matrix_authentication_service_synapse_ensure_stopped_result.changed" + when: "not matrix_authentication_service_syn2mas_migrate_dry_run and matrix_authentication_service_mas_cli_syn2mas_command_result.changed" ansible.builtin.service: name: matrix-synapse state: started - name: Ensure Matrix Authentication Service is started (if it previously was) - when: "not matrix_authentication_service_syn2mas_dry_run and matrix_authentication_service_mas_ensure_stopped_result.changed" + when: "not matrix_authentication_service_syn2mas_migrate_dry_run and matrix_authentication_service_mas_ensure_stopped_result.changed" ansible.builtin.service: name: matrix-authentication-service state: started diff --git a/roles/custom/matrix-authentication-service/tasks/validate_config.yml b/roles/custom/matrix-authentication-service/tasks/validate_config.yml index 7a0f50b83..d3c47844f 100644 --- a/roles/custom/matrix-authentication-service/tasks/validate_config.yml +++ b/roles/custom/matrix-authentication-service/tasks/validate_config.yml @@ -44,3 +44,11 @@ with_items: - {'old': 'matrix_authentication_service_container_image_name_prefix', 'new': 'matrix_authentication_service_container_image_registry_prefix'} - {'old': 'matrix_authentication_service_syn2mas_container_image_name_prefix', 'new': 'matrix_authentication_service_syn2mas_container_image_registry_prefix'} + - {'old': 'matrix_authentication_service_syn2mas_container_image', 'new': ''} + - {'old': 'matrix_authentication_service_syn2mas_container_image_registry_prefix', 'new': ''} + - {'old': 'matrix_authentication_service_syn2mas_container_image_registry_prefix_upstream', 'new': ''} + - {'old': 'matrix_authentication_service_syn2mas_container_image_registry_prefix_upstream_default', 'new': ''} + - {'old': 'matrix_authentication_service_syn2mas_container_image_force_pull', 'new': ''} + - {'old': 'matrix_authentication_service_syn2mas_container_image_self_build', 'new': ''} + - {'old': 'matrix_authentication_service_syn2mas_process_extra_arguments', 'new': 'matrix_authentication_service_syn2mas_command_extra_options or matrix_authentication_service_syn2mas_subcommand_extra_options'} + - {'old': 'matrix_authentication_service_syn2mas_dry_run', 'new': 'matrix_authentication_service_syn2mas_migrate_dry_run'} From ae87a3bb191225216c7f63b704205971d53f8af3 Mon Sep 17 00:00:00 2001 From: Jay Rogers Date: Wed, 7 May 2025 09:41:13 -0500 Subject: [PATCH 077/404] Fix port label to reflect proper protocol --- docs/prerequisites.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/prerequisites.md b/docs/prerequisites.md index 6ee8239e5..18368af39 100644 --- a/docs/prerequisites.md +++ b/docs/prerequisites.md @@ -60,7 +60,7 @@ We will be using `example.com` as the domain in the following instruction. Pleas - `80/tcp`: HTTP webserver - `443/tcp` and `443/udp`: HTTPS webserver - `3478/tcp`: STUN/TURN over TCP (used by [coturn](./configuring-playbook-turn.md)) - - `3478/udp`: STUN/TURN over TCP (used by [coturn](./configuring-playbook-turn.md)) + - `3478/udp`: STUN/TURN over UDP (used by [coturn](./configuring-playbook-turn.md)) - `5349/tcp`: TURN over TCP (used by [coturn](./configuring-playbook-turn.md)) - `5349/udp`: TURN over UDP (used by [coturn](./configuring-playbook-turn.md)) - `8448/tcp` and `8448/udp`: Matrix Federation API HTTPS webserver. Some components like [Matrix User Verification Service](configuring-playbook-user-verification-service.md#open-matrix-federation-port) require this port to be opened **even with federation disabled**. From 465df3a9493011ffdf38cf1fc31485330efb5278 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Thu, 8 May 2025 10:03:53 +0300 Subject: [PATCH 078/404] Add support for synapse-http-antispam and integrate it with Draupnir Supersedes https://github.com/spantaleev/matrix-docker-ansible-deploy/pull/4284 --- docs/configuring-playbook-bot-draupnir.md | 14 +++++++ group_vars/matrix_servers | 12 ++++++ .../matrix-bot-draupnir/defaults/main.yml | 33 ++++++++++++++++- .../matrix-bot-draupnir/templates/labels.j2 | 2 +- .../templates/production.yaml.j2 | 14 ++++++- .../systemd/matrix-bot-draupnir.service.j2 | 2 +- roles/custom/matrix-synapse/defaults/main.yml | 32 ++++++++++++++++ .../tasks/ext/setup_install.yml | 13 +++++++ .../synapse-http-antispam/setup_install.yml | 37 +++++++++++++++++++ .../synapse-http-antispam/setup_uninstall.yml | 11 ++++++ .../synapse-http-antispam/validate_config.yml | 21 +++++++++++ 11 files changed, 187 insertions(+), 4 deletions(-) create mode 100644 roles/custom/matrix-synapse/tasks/ext/synapse-http-antispam/setup_install.yml create mode 100644 roles/custom/matrix-synapse/tasks/ext/synapse-http-antispam/setup_uninstall.yml create mode 100644 roles/custom/matrix-synapse/tasks/ext/synapse-http-antispam/validate_config.yml diff --git a/docs/configuring-playbook-bot-draupnir.md b/docs/configuring-playbook-bot-draupnir.md index 623cabe98..de2dfb44b 100644 --- a/docs/configuring-playbook-bot-draupnir.md +++ b/docs/configuring-playbook-bot-draupnir.md @@ -145,6 +145,20 @@ The bot can intercept the report API endpoint of the client-server API, which re matrix_bot_draupnir_config_web_abuseReporting: true ``` +### Enabling synapse-http-antispam support + +Certain protections in Draupnir require the [synapse-http-antispam](https://github.com/maunium/synapse-http-antispam) module and a Synapse homeserver plus homeserver admin status to function. This module can be enabled in the playbook via setting `matrix_bot_draupnir_config_web_synapseHTTPAntispam_enabled` to `true` and making sure that Draupnir admin API access is enabled. + +```yaml +# Enables the integration between Draupnir and synapse-http-antispam module. +matrix_bot_draupnir_config_web_synapseHTTPAntispam_enabled: true + +# Enables draupnir to access Synapse admin APIs. This is required for the module functionality to take full effect. +matrix_bot_draupnir_admin_api_enabled: true +``` + +These protections need to be manually activated and consulting the [enabling protections](#enabling-built-in-protections) guide can be helpful or consulting upstream documentation. + +## ⬇️ Installation guides There are two installation guides available for beginners and advanced users. diff --git a/docs/ansible.md b/docs/ansible.md index ff0398374..4a09af812 100644 --- a/docs/ansible.md +++ b/docs/ansible.md @@ -117,7 +117,7 @@ Then, to be asked for the password whenever running an `ansible-playbook` comman #### Resolve directory ownership issues -Because you're `root` in the container running Ansible and this likely differs fom the owner (your regular user account) of the playbook directory outside of the container, certain playbook features which use `git` locally may report warnings such as: +Because you're `root` in the container running Ansible and this likely differs from the owner (your regular user account) of the playbook directory outside of the container, certain playbook features which use `git` locally may report warnings such as: > fatal: unsafe repository ('/work' is owned by someone else) > To add an exception for this directory, call: diff --git a/docs/configuring-playbook-appservice-draupnir-for-all.md b/docs/configuring-playbook-appservice-draupnir-for-all.md index 0f2362f47..8827f759c 100644 --- a/docs/configuring-playbook-appservice-draupnir-for-all.md +++ b/docs/configuring-playbook-appservice-draupnir-for-all.md @@ -95,13 +95,13 @@ ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start ## Usage -If you made it through all the steps above and your main control room was joined by a user called `@draupnir-main:example.com` you have succesfully installed Draupnir for All and can now start using it. +If you made it through all the steps above and your main control room was joined by a user called `@draupnir-main:example.com` you have successfully installed Draupnir for All and can now start using it. The installation of Draupnir for all in this playbook is very much Alpha quality. Usage-wise, Draupnir for all is almost identical to Draupnir bot mode. ### Granting Users the ability to use D4A -Draupnir for all includes several security measures like that it only allows users that are on its allow list to ask for a bot. To add a user to this list we have 2 primary options. Using the chat to tell Draupnir to do this for us or if you want to automatically do it by sending `m.policy.rule.user` events that target the subject you want to allow provisioning for with the `org.matrix.mjolnir.allow` recomendation. Using the chat is recomended. +Draupnir for all includes several security measures like that it only allows users that are on its allow list to ask for a bot. To add a user to this list we have 2 primary options. Using the chat to tell Draupnir to do this for us or if you want to automatically do it by sending `m.policy.rule.user` events that target the subject you want to allow provisioning for with the `org.matrix.mjolnir.allow` recommendation. Using the chat is recommended. The bot requires a powerlevel of 50 in the management room to control who is allowed to use the bot. The bot does currently not say anything if this is true or false. (This is considered a bug and is documented in issue [#297](https://github.com/the-draupnir-project/Draupnir/issues/297)) diff --git a/docs/configuring-playbook-bot-chatgpt.md b/docs/configuring-playbook-bot-chatgpt.md index 903fa658f..9b8b9a28b 100644 --- a/docs/configuring-playbook-bot-chatgpt.md +++ b/docs/configuring-playbook-bot-chatgpt.md @@ -57,7 +57,7 @@ matrix_bot_chatgpt_openai_api_key: 'API_KEY_HERE' matrix_bot_chatgpt_matrix_access_token: 'ACCESS_TOKEN_HERE' -# Configuring the system promt used, needed if the bot is used for special tasks. +# Configuring the system prompt used, needed if the bot is used for special tasks. # More information: https://github.com/mustvlad/ChatGPT-System-Prompts matrix_bot_chatgpt_matrix_bot_prompt_prefix: 'Instructions:\nYou are ChatGPT, a large language model trained by OpenAI.' ``` diff --git a/docs/configuring-playbook-bot-draupnir.md b/docs/configuring-playbook-bot-draupnir.md index de2dfb44b..d855c4059 100644 --- a/docs/configuring-playbook-bot-draupnir.md +++ b/docs/configuring-playbook-bot-draupnir.md @@ -242,7 +242,7 @@ For Draupnir to do its job, you need to [give it permissions](https://the-draupn We recommend **subscribing to a public [policy list](https://the-draupnir-project.github.io/draupnir-documentation/concepts/policy-lists)** using the [watch command](https://the-draupnir-project.github.io/draupnir-documentation/moderator/managing-policy-lists#using-draupnirs-watch-command-to-subscribe-to-policy-rooms). -Polcy lists are maintained in Matrix rooms. A popular policy list is maintained in the public `#community-moderation-effort-bl:neko.dev` room. +Policy lists are maintained in Matrix rooms. A popular policy list is maintained in the public `#community-moderation-effort-bl:neko.dev` room. You can tell Draupnir to subscribe to it by sending the following command to the Management Room: `!draupnir watch #community-moderation-effort-bl:neko.dev` diff --git a/docs/configuring-playbook-bot-matrix-registration-bot.md b/docs/configuring-playbook-bot-matrix-registration-bot.md index c171b733a..dc468ec04 100644 --- a/docs/configuring-playbook-bot-matrix-registration-bot.md +++ b/docs/configuring-playbook-bot-matrix-registration-bot.md @@ -77,7 +77,7 @@ Send `help` to the bot to see the available commands. You can also refer to the upstream [Usage documentation](https://github.com/moan0s/matrix-registration-bot#supported-commands). -If you have any questions, or if you need help setting it up, read the [troublshooting guide](https://github.com/moan0s/matrix-registration-bot/blob/main/docs/troubleshooting.md) or join [#matrix-registration-bot:hyteck.de](https://matrix.to/#/#matrix-registration-bot:hyteck.de). +If you have any questions, or if you need help setting it up, read the [troubleshooting guide](https://github.com/moan0s/matrix-registration-bot/blob/main/docs/troubleshooting.md) or join [#matrix-registration-bot:hyteck.de](https://matrix.to/#/#matrix-registration-bot:hyteck.de). To clean the cache (session & encryption data) after you changed the bot's username, changed the login method from access_token to password etc… you can use: diff --git a/docs/configuring-playbook-bridge-hookshot.md b/docs/configuring-playbook-bridge-hookshot.md index 2b24f898a..f1816ab44 100644 --- a/docs/configuring-playbook-bridge-hookshot.md +++ b/docs/configuring-playbook-bridge-hookshot.md @@ -167,7 +167,7 @@ To `matrix_hookshot_container_labels_metrics_middleware_basic_auth_users`, set t #### Enable Grafana (optional) -Probably you wish to enable Grafana along with Prometheus for generating graphs of the metics. +Probably you wish to enable Grafana along with Prometheus for generating graphs of the metrics. To enable Grafana, see [this section](configuring-playbook-prometheus-grafana.md#adjusting-the-playbook-configuration-grafana) for instructions. diff --git a/docs/configuring-playbook-bridge-mautrix-wsproxy.md b/docs/configuring-playbook-bridge-mautrix-wsproxy.md index a9159f2d2..a0d95d68b 100644 --- a/docs/configuring-playbook-bridge-mautrix-wsproxy.md +++ b/docs/configuring-playbook-bridge-mautrix-wsproxy.md @@ -70,7 +70,7 @@ The shortcut commands with the [`just` program](just.md) are also available: `ju ## Usage -Follow the [mautrix-imessage documenation](https://docs.mau.fi/bridges/go/imessage/index.html) for running `android-sms` and/or `matrix-imessage` on your device(s). +Follow the [mautrix-imessage documentation](https://docs.mau.fi/bridges/go/imessage/index.html) for running `android-sms` and/or `matrix-imessage` on your device(s). ## Troubleshooting diff --git a/docs/configuring-playbook-element-call.md b/docs/configuring-playbook-element-call.md index cc88bec70..fed49ade9 100644 --- a/docs/configuring-playbook-element-call.md +++ b/docs/configuring-playbook-element-call.md @@ -30,7 +30,7 @@ These **clients will use their own embedded Element Call frontend**, so **self-h 💡 A reason you may wish to continue installing the Element Call frontend (despite Matrix clients not making use of it), is if you need to use it standalone - directly via a browser (without a Matrix client). Note that unless you [allow guest accounts to use Element Call](#allowing-guests-to-use-element-call-optional), you will still need a Matrix user account **on the same homeserver** to be able to use Element Call. -The playbook makes a distiction between enabling Element Call (`matrix_element_call_enabled`) and enabling the Matrix RTC Stack (`matrix_rtc_enabled`). Enabling Element Call automatically enables the Matrix RTC stack. Because installing the Element Call frontend is now unnecessary, **we recommend only installing the Matrix RTC stack, without the Element Call frontend**. +The playbook makes a distinction between enabling Element Call (`matrix_element_call_enabled`) and enabling the Matrix RTC Stack (`matrix_rtc_enabled`). Enabling Element Call automatically enables the Matrix RTC stack. Because installing the Element Call frontend is now unnecessary, **we recommend only installing the Matrix RTC stack, without the Element Call frontend**. | Description / Variable | Element Call frontend | [LiveKit Server](configuring-playbook-livekit-server.md) | [LiveKit JWT Service](configuring-playbook-livekit-jwt-service.md) | |------------------------|-----------------------|----------------|---------------------| diff --git a/docs/configuring-playbook-matrix-authentication-service.md b/docs/configuring-playbook-matrix-authentication-service.md index ba3c43b8c..9173bd399 100644 --- a/docs/configuring-playbook-matrix-authentication-service.md +++ b/docs/configuring-playbook-matrix-authentication-service.md @@ -41,7 +41,7 @@ Below, we'll try to **highlight some potential reasons for switching** to Matrix ## Prerequisites -- ⚠️ the [Synapse](configuring-playbook-synapse.md) homeserver implementation (which is the default for this playbook). Other homeserver implementations ([Dendrite](./configuring-playbook-dendrite.md), [Conduit](./configuring-playbook-conduit.md), etc.) do not support integrating wtih Matrix Authentication Service yet. +- ⚠️ the [Synapse](configuring-playbook-synapse.md) homeserver implementation (which is the default for this playbook). Other homeserver implementations ([Dendrite](./configuring-playbook-dendrite.md), [Conduit](./configuring-playbook-conduit.md), etc.) do not support integrating with Matrix Authentication Service yet. - ❌ **disabling all password providers** for Synapse (things like [shared-secret-auth](./configuring-playbook-shared-secret-auth.md), [rest-auth](./configuring-playbook-rest-auth.md), [LDAP auth](./configuring-playbook-ldap-auth.md), etc.) More details about this are available in the [Expectations](#expectations) section below. @@ -61,7 +61,7 @@ This section details what you can expect when switching to the Matrix Authentica - ⚠️ [Migrating an existing Synapse homeserver to Matrix Authentication Service](#migrating-an-existing-synapse-homeserver-to-matrix-authentication-service) is **possible**, but requires **some playbook-assisted manual work**. Migration is **reversible with no or minor issues if done quickly enough**, but as users start logging in (creating new login sessions) via the new MAS setup, disabling MAS and reverting back to the Synapse user database will cause these new sessions to break. -- ⚠️ Delegating user authentication to MAS causes **your Synapse server to be completely dependant on one more service** for its operations. MAS is quick & lightweight and should be stable enough already, but this is something to keep in mind when making the switch. +- ⚠️ Delegating user authentication to MAS causes **your Synapse server to be completely dependent on one more service** for its operations. MAS is quick & lightweight and should be stable enough already, but this is something to keep in mind when making the switch. - ⚠️ If you've got [OIDC configured in Synapse](./configuring-playbook-synapse.md#synapse--openid-connect-for-single-sign-on), you will need to migrate your OIDC configuration to MAS by adding an [Upstream OAuth2 configuration](#upstream-oauth2-configuration). @@ -85,7 +85,7 @@ For new homeservers (which don't have any users in their Synapse database yet), ### Existing homeserver -Other homeserver implementations ([Dendrite](./configuring-playbook-dendrite.md), [Conduit](./configuring-playbook-conduit.md), etc.) do not support integrating wtih Matrix Authentication Service yet. +Other homeserver implementations ([Dendrite](./configuring-playbook-dendrite.md), [Conduit](./configuring-playbook-conduit.md), etc.) do not support integrating with Matrix Authentication Service yet. For existing Synapse homeservers: diff --git a/docs/configuring-playbook-matrix-corporal.md b/docs/configuring-playbook-matrix-corporal.md index 34c80fe6b..8f3438292 100644 --- a/docs/configuring-playbook-matrix-corporal.md +++ b/docs/configuring-playbook-matrix-corporal.md @@ -13,7 +13,7 @@ SPDX-License-Identifier: AGPL-3.0-or-later The playbook can install and configure [matrix-corporal](https://github.com/devture/matrix-corporal) for you. -In short, it's a sort of automation and firewalling service, which is helpful if you're instaling Matrix services in a controlled corporate environment. +In short, it's a sort of automation and firewalling service, which is helpful if you're installing Matrix services in a controlled corporate environment. See the project's [documentation](https://github.com/devture/matrix-corporal/blob/main/README.md) to learn what it does and why it might be useful to you. diff --git a/docs/configuring-playbook-matrix-media-repo.md b/docs/configuring-playbook-matrix-media-repo.md index e660d434d..acadf8cf2 100644 --- a/docs/configuring-playbook-matrix-media-repo.md +++ b/docs/configuring-playbook-matrix-media-repo.md @@ -60,7 +60,7 @@ To `matrix_media_repo_container_labels_traefik_metrics_middleware_basic_auth_use #### Enable Grafana (optional) -Probably you wish to enable Grafana along with Prometheus for generating graphs of the metics. +Probably you wish to enable Grafana along with Prometheus for generating graphs of the metrics. To enable Grafana, see [this section](configuring-playbook-prometheus-grafana.md#adjusting-the-playbook-configuration-grafana) for instructions. diff --git a/docs/configuring-playbook-ntfy.md b/docs/configuring-playbook-ntfy.md index 866f4bc96..872385ca8 100644 --- a/docs/configuring-playbook-ntfy.md +++ b/docs/configuring-playbook-ntfy.md @@ -115,7 +115,7 @@ The shortcut commands with the [`just` program](just.md) are also available: `ju ## Usage -To receive push notifications with UnifiedPush from the ntfy server, you need to **install [the ntfy Android app](https://docs.ntfy.sh/subscribe/phone/)** which works as the Distrubutor, **log in to the account on the ntfy app** if you have enabled the access control, and then **configure a UnifiedPush-compatible Matrix client**. After setting up the ntfy Android app, the Matrix client listens to it, and push notitications are "distributed" from it. +To receive push notifications with UnifiedPush from the ntfy server, you need to **install [the ntfy Android app](https://docs.ntfy.sh/subscribe/phone/)** which works as the Distributor, **log in to the account on the ntfy app** if you have enabled the access control, and then **configure a UnifiedPush-compatible Matrix client**. After setting up the ntfy Android app, the Matrix client listens to it, and push notifications are "distributed" from it. For details about installing and configuring the ntfy Android app, take a look at [this section](https://github.com/mother-of-all-self-hosting/ansible-role-ntfy/blob/main/docs/configuring-ntfy.md#install-the-ntfy-androidios-app) on the role's documentation. diff --git a/docs/configuring-playbook-ssl-certificates.md b/docs/configuring-playbook-ssl-certificates.md index f6889f803..277d29f8b 100644 --- a/docs/configuring-playbook-ssl-certificates.md +++ b/docs/configuring-playbook-ssl-certificates.md @@ -15,7 +15,7 @@ By default, the playbook retrieves and automatically renews free SSL certificate **Notes**: - This guide is intended to be referred for configuring the integrated Traefik server with regard to SSL certificates retrieval. If you're using [your own webserver](configuring-playbook-own-webserver.md), consult its documentation about how to configure it. -- Let's Encrypt ends the expiration notification email service on June 4, 2025 (see: [the official announcement](https://letsencrypt.org/2025/01/22/ending-expiration-emails/)), and it recommends using a third party service for those who want to receive expiriation notifications. If you are looking for a self-hosting service, you may be interested in a monitoring tool such as [Update Kuma](https://github.com/louislam/uptime-kuma/). +- Let's Encrypt ends the expiration notification email service on June 4, 2025 (see: [the official announcement](https://letsencrypt.org/2025/01/22/ending-expiration-emails/)), and it recommends using a third party service for those who want to receive expiration notifications. If you are looking for a self-hosting service, you may be interested in a monitoring tool such as [Update Kuma](https://github.com/louislam/uptime-kuma/). The [Mother-of-All-Self-Hosting (MASH)](https://github.com/mother-of-all-self-hosting/mash-playbook) Ansible playbook can be used to install and manage an Uptime Kuma instance. See [this page](https://github.com/mother-of-all-self-hosting/mash-playbook/blob/main/docs/services/uptime-kuma.md) for the instruction to install it with the MASH playbook. If you are wondering how to use the MASH playbook for your Matrix server, refer [this page](https://github.com/mother-of-all-self-hosting/mash-playbook/blob/main/docs/setting-up-services-on-mdad-server.md). diff --git a/docs/configuring-playbook-synapse.md b/docs/configuring-playbook-synapse.md index 4a15ef701..dbb6ef0d6 100644 --- a/docs/configuring-playbook-synapse.md +++ b/docs/configuring-playbook-synapse.md @@ -53,7 +53,7 @@ You may also consider [tweaking the number of workers of each type](#controlling ##### Specialized workers -The playbook now supports a smarter **specialized load-balancing** inspired by [Tom Foster](https://github.com/tcpipuk)'s [Synapse homeserver guide](https://tcpipuk.github.io/synapse/index.html). Instead of routing requests to one or more [generic workers](#generic-workers) based only on the requestor's IP adddress, specialized load-balancing routes to **4 different types of specialized workers** based on **smarter criteria** — the access token (username) of the requestor and/or on the resource (room, etc.) being requested. +The playbook now supports a smarter **specialized load-balancing** inspired by [Tom Foster](https://github.com/tcpipuk)'s [Synapse homeserver guide](https://tcpipuk.github.io/synapse/index.html). Instead of routing requests to one or more [generic workers](#generic-workers) based only on the requester's IP address, specialized load-balancing routes to **4 different types of specialized workers** based on **smarter criteria** — the access token (username) of the requester and/or on the resource (room, etc.) being requested. The playbook supports these **4 types** of specialized workers: diff --git a/docs/faq.md b/docs/faq.md index 9f1ddc6e3..898a1c1f6 100644 --- a/docs/faq.md +++ b/docs/faq.md @@ -235,7 +235,7 @@ Running Matrix on a server with 1GB of memory is possible (especially if you dis **We recommend starting with a server having at least 2GB of memory** and even then using it sparingly. If you know for sure you'll be joining various large rooms, etc., then going for 4GB of memory or more is a good idea. -Besides the regular Matrix stuff, we also support things like video-conferencing using [Jitsi](configuring-playbook-jitsi.md) and other additional services which (when installed) may use up a lot of memory. Things do add up. Besides the Synapse Matrix server, Jitsi is especially notorious for consuming a lot of resources. If you plan on running Jitsi, we recommend a server with at least 2GB of memory (preferrably more). See our [Jitsi documentation page](configuring-playbook-jitsi.md) to learn how to optimize its memory/CPU usage. +Besides the regular Matrix stuff, we also support things like video-conferencing using [Jitsi](configuring-playbook-jitsi.md) and other additional services which (when installed) may use up a lot of memory. Things do add up. Besides the Synapse Matrix server, Jitsi is especially notorious for consuming a lot of resources. If you plan on running Jitsi, we recommend a server with at least 2GB of memory (preferably more). See our [Jitsi documentation page](configuring-playbook-jitsi.md) to learn how to optimize its memory/CPU usage. ### Can I run this in an LXC container? @@ -362,7 +362,7 @@ Configuration variables are defined in multiple places in this playbook and are You can discover the variables you can override in each role (`roles/*/*/defaults/main.yml`). -As described in [How is the effective configuration determined?](#how-is-the-effective-configuration-determined), these role-defaults may be overriden by values defined in `group_vars/matrix_servers`. +As described in [How is the effective configuration determined?](#how-is-the-effective-configuration-determined), these role-defaults may be overridden by values defined in `group_vars/matrix_servers`. Refer to both of these for inspiration. Still, as mentioned in [Configuring the playbook](configuring-playbook.md), you're only ever supposed to edit your own `inventory/host_vars/matrix.example.com/vars.yml` file and nothing else inside the playbook (unless you're meaning to contribute new features). diff --git a/docs/howto-srv-server-delegation.md b/docs/howto-srv-server-delegation.md index 9d03588c7..da6d0727a 100644 --- a/docs/howto-srv-server-delegation.md +++ b/docs/howto-srv-server-delegation.md @@ -42,7 +42,7 @@ This is because with SRV federation, some servers / tools (one of which being th ### Tell Traefik which certificate to serve for the federation endpoint -Now that the federation endpoint is not bound to a domain anymore we need to explicitely tell Traefik to use a wildcard certificate in addition to one containing the base name. +Now that the federation endpoint is not bound to a domain anymore we need to explicitly tell Traefik to use a wildcard certificate in addition to one containing the base name. This is because the Matrix specification expects the federation endpoint to be served using a certificate compatible with the base domain, however, the other resources on the endpoint still need a valid certificate to work. diff --git a/examples/reverse-proxies/nginx-proxy-manager/README.md b/examples/reverse-proxies/nginx-proxy-manager/README.md index dad498435..f7042e84e 100644 --- a/examples/reverse-proxies/nginx-proxy-manager/README.md +++ b/examples/reverse-proxies/nginx-proxy-manager/README.md @@ -23,7 +23,7 @@ If Matrix federation is enabled, then you will need to make changes to [NPM's Do You'll need to create two proxy hosts in NPM for Matrix web and federation traffic. -Open the 'Proxy Hosts' page in the NPM web interface and select `Add Proxy Host`, the first being for Matrix web traffic. Apply the proxys configuration like this: +Open the 'Proxy Hosts' page in the NPM web interface and select `Add Proxy Host`, the first being for Matrix web traffic. Apply the proxies configuration like this: ```md # Details @@ -44,7 +44,7 @@ Custom Nginx Configuration: client_max_body_size 50M; ``` -Again, under the 'Proxy Hosts' page select `Add Proxy Host`, this time for your federation traffic. Apply the proxys configuration like this: +Again, under the 'Proxy Hosts' page select `Add Proxy Host`, this time for your federation traffic. Apply the proxies configuration like this: ```md # Details diff --git a/group_vars/matrix_servers b/group_vars/matrix_servers index 0f56508b7..7ed301ade 100755 --- a/group_vars/matrix_servers +++ b/group_vars/matrix_servers @@ -5721,7 +5721,7 @@ matrix_registration_api_validate_certs: "{{ matrix_playbook_ssl_enabled }}" # Postgres is the default, except if not using internal Postgres server matrix_registration_database_engine: "{{ 'postgres' if postgres_enabled else 'sqlite' }}" matrix_registration_database_hostname: "{{ postgres_connection_hostname if postgres_enabled else '' }}" -matrix_registration_database_password: "{{ '%s' | format(matrix_homeserver_generic_secret_key) | password_hash('sha512', 'mx.registr.db', rounds=655555) | to_uuid }}" +matrix_registration_database_password: "{{ '%s' | format(matrix_homeserver_generic_secret_key) | password_hash('sha512', 'mx.register.db', rounds=655555) | to_uuid }}" ###################################################################### # diff --git a/i18n/README.md b/i18n/README.md index 94cf013e4..b0934b3ef 100644 --- a/i18n/README.md +++ b/i18n/README.md @@ -20,7 +20,7 @@ Currently, we support translation of: Organization of this `i18n` directory is as follows: - [PUBLISHED_LANGUAGES](PUBLISHED_LANGUAGES): a list of languages that we publish translations for (in the [translations/](translations/) directory) -- [.gitignore](.gitignore): a list of files and directories to ignore in the `i18n` directory. We intentionaly ignore translated results (`translations/` directories) for languages taht are still in progress. We only [publish translations in a new language](#publish-translations-in-a-new-language) when the translation progresses beyond a certain threshold. +- [.gitignore](.gitignore): a list of files and directories to ignore in the `i18n` directory. We intentionally ignore translated results (`translations/` directories) for languages that are still in progress. We only [publish translations in a new language](#publish-translations-in-a-new-language) when the translation progresses beyond a certain threshold. - [justfile](justfile): a list of recipes for [just](https://github.com/casey/just) command runner - [requirements.txt](requirements.txt): a list of Python packages required to work with translations - [translation-templates/](translation-templates/): a list of English translation templates - strings extracted from Markdown files diff --git a/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml b/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml index b8b6de00b..89935ee2b 100644 --- a/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml +++ b/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml @@ -50,7 +50,7 @@ matrix_appservice_draupnir_for_all_systemd_wanted_services_list: [] # anyone in this room can use the bot - secure your room! # This should be a room alias - not a matrix.to URL. # Note: Draupnir is fairly verbose - expect a lot of messages from it. -# This room is diffrent for Appservice Mode compared to normal mode. +# This room is different for Appservice Mode compared to normal mode. # In Appservice mode it provides functions like user management. matrix_appservice_draupnir_for_all_config_adminRoom: "" # noqa var-naming diff --git a/roles/custom/matrix-base/defaults/main.yml b/roles/custom/matrix-base/defaults/main.yml index f30d416f0..bf3947983 100644 --- a/roles/custom/matrix-base/defaults/main.yml +++ b/roles/custom/matrix-base/defaults/main.yml @@ -217,7 +217,7 @@ matrix_homeserver_container_url: "http://{{ matrix_homeserver_container_client_a # Specifies where the homeserver's Client-Server API is on the container network (matrix_homeserver_container_network). # Where this is depends on whether there's a reverse-proxy in front of the homeserver, which homeserver it is, etc. -# This likely gets overriden elsewhere. +# This likely gets overridden elsewhere. matrix_homeserver_container_client_api_endpoint: "" # Specifies where the homeserver's Federation API is on the container network (matrix_homeserver_container_network). @@ -225,7 +225,7 @@ matrix_homeserver_container_federation_url: "http://{{ matrix_homeserver_contain # Specifies where the homeserver's Federation API is on the container network (matrix_homeserver_container_network). # Where this is depends on whether there's a reverse-proxy in front of the homeserver, which homeserver it is, etc. -# This likely gets overriden elsewhere. +# This likely gets overridden elsewhere. matrix_homeserver_container_federation_api_endpoint: "" # Specifies the public url of the Sync v3 (sliding-sync) API. diff --git a/roles/custom/matrix-base/tasks/validate_config.yml b/roles/custom/matrix-base/tasks/validate_config.yml index c372ee03b..f3f4eb166 100644 --- a/roles/custom/matrix-base/tasks/validate_config.yml +++ b/roles/custom/matrix-base/tasks/validate_config.yml @@ -104,7 +104,7 @@ msg: >- Your configuration enables both the old mautrix-instagram bridge and the new mautrix-meta-instagram bridge. By default, both bridges are configured to use the same bridge bot username (`@{{ matrix_mautrix_meta_instagram_appservice_username }}:{{ matrix_domain }}`) which is a conflict. - We recommend that you disable at least one of the bridges (preferrably the old mautrix-instagram bridge), or to resolve the conflict in another way. + We recommend that you disable at least one of the bridges (preferably the old mautrix-instagram bridge), or to resolve the conflict in another way. To resolve the conflict without disabling a bridge, consider adjusting one of `matrix_mautrix_instagram_appservice_bot_username` or `matrix_mautrix_meta_instagram_appservice_username` - they both have a value of {{ matrix_mautrix_meta_instagram_appservice_username }} right now. when: - matrix_mautrix_instagram_enabled | bool diff --git a/roles/custom/matrix-bot-chatgpt/tasks/validate_config.yml b/roles/custom/matrix-bot-chatgpt/tasks/validate_config.yml index d9c266dad..0c7a36ba6 100644 --- a/roles/custom/matrix-bot-chatgpt/tasks/validate_config.yml +++ b/roles/custom/matrix-bot-chatgpt/tasks/validate_config.yml @@ -20,7 +20,7 @@ - name: Fail if OpenAI configuration not up-to-date. ansible.builtin.fail: msg: >- - Your configuration contains a varible that is no longer used. + Your configuration contains a variable that is no longer used. Please change your configuration to remove the variable (`{{ item.name }}`). when: "item.name in vars" with_items: diff --git a/roles/custom/matrix-bot-draupnir/tasks/validate_config.yml b/roles/custom/matrix-bot-draupnir/tasks/validate_config.yml index 9f903f5ee..fd7ddca2b 100644 --- a/roles/custom/matrix-bot-draupnir/tasks/validate_config.yml +++ b/roles/custom/matrix-bot-draupnir/tasks/validate_config.yml @@ -63,7 +63,7 @@ ansible.builtin.fail: msg: >- Your configuration is trying to enable matrix_bot_draupnir_config_experimentalRustCrypto and matrix_bot_draupnir_pantalaimon_use at the same time. - These settings are mutually incompatible and therefore cant be used at the same time. + These settings are mutually incompatible and therefore can't be used at the same time. when: - matrix_bot_draupnir_pantalaimon_use - matrix_bot_draupnir_config_experimentalRustCrypto diff --git a/roles/custom/matrix-bridge-appservice-discord/templates/config.yaml.j2 b/roles/custom/matrix-bridge-appservice-discord/templates/config.yaml.j2 index a304a4f24..9d6974678 100644 --- a/roles/custom/matrix-bridge-appservice-discord/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-appservice-discord/templates/config.yaml.j2 @@ -2,7 +2,7 @@ bridge: # Domain part of the bridge, e.g. matrix.org domain: {{ matrix_appservice_discord_bridge_domain|to_json }} - # This should be your publically facing URL because Discord may use it to + # This should be your publicly facing URL because Discord may use it to # fetch media from the media store. homeserverUrl: {{ matrix_appservice_discord_bridge_homeserverUrl|to_json }} # Interval at which to process users in the 'presence queue'. If you have diff --git a/roles/custom/matrix-bridge-appservice-irc/defaults/main.yml b/roles/custom/matrix-bridge-appservice-irc/defaults/main.yml index 3ce0a176d..7ea0ee4cc 100644 --- a/roles/custom/matrix-bridge-appservice-irc/defaults/main.yml +++ b/roles/custom/matrix-bridge-appservice-irc/defaults/main.yml @@ -358,7 +358,7 @@ matrix_appservice_irc_ircService_servers: [] # noqa var-naming # # not apply an idle timeout. This value is ignored if this IRC server is # # mirroring Matrix membership lists to IRC. Default: 172800 (48 hours) # idleTimeout: 10800 -# # The number of millseconds to wait between consecutive reconnections if a +# # The number of milliseconds to wait between consecutive reconnections if a # # client gets disconnected. Setting to 0 will cause the scheduling to be # # disabled, i.e. it will be scheduled immediately (with jitter. # # Otherwise, the scheduling interval will be used such that one client diff --git a/roles/custom/matrix-bridge-go-skype-bridge/templates/config.yaml.j2 b/roles/custom/matrix-bridge-go-skype-bridge/templates/config.yaml.j2 index 6e5ac7f52..2bd1c2c7d 100644 --- a/roles/custom/matrix-bridge-go-skype-bridge/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-go-skype-bridge/templates/config.yaml.j2 @@ -224,7 +224,7 @@ logging: # The directory for log files. Will be created if not found. directory: ./logs # Available variables: .Date for the file date and .Index for different log files on the same day. - # empy/null = journal logging only + # empty/null = journal logging only file_name_format: # Date format for file names in the Go time format: https://golang.org/pkg/time/#pkg-constants file_date_format: "2006-01-02" diff --git a/roles/custom/matrix-bridge-mautrix-slack/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-slack/tasks/validate_config.yml index 8265ee865..d4b8edf32 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-slack/tasks/validate_config.yml @@ -22,7 +22,7 @@ when: matrix_appservice_slack_enabled | default(False) | bool and matrix_mautrix_slack_appservice_bot_username == matrix_appservice_slack_bot_name | default ('') ansible.builtin.fail: msg: | - The appservice-slack and mautrix-slack components are both enabled and use the same bot username ({{ matrix_mautrix_slack_appservice_bot_username }}), as per their default configuration, which causes a conflcit. + The appservice-slack and mautrix-slack components are both enabled and use the same bot username ({{ matrix_mautrix_slack_appservice_bot_username }}), as per their default configuration, which causes a conflict. To resolve the conflict, make one of these components use a different username. Consider either changing `matrix_mautrix_slack_appservice_bot_username` (the bot username for the mautrix-slack component) or `matrix_appservice_slack_bot_name` (the bot username for the appservice-slack component). We recommend that you change the username for the newly-added (and yet unused) component. diff --git a/roles/custom/matrix-conduwuit/templates/conduwuit.toml.j2 b/roles/custom/matrix-conduwuit/templates/conduwuit.toml.j2 index 0438a2d97..91ee6760f 100644 --- a/roles/custom/matrix-conduwuit/templates/conduwuit.toml.j2 +++ b/roles/custom/matrix-conduwuit/templates/conduwuit.toml.j2 @@ -586,7 +586,7 @@ trusted_servers = {{ matrix_conduwuit_trusted_servers | to_json }} # specifically on room joins. This option limits the exposure to a # compromised trusted server to room joins only. The join operation # requires gathering keys from many origin servers which can cause -# significant delays. Therefor this defaults to true to mitigate +# significant delays. Therefore this defaults to true to mitigate # unexpected delays out-of-the-box. The security-paranoid or those willing # to tolerate delays are advised to set this to false. Note that setting # query_trusted_key_servers_first to true causes this option to be @@ -597,7 +597,7 @@ trusted_servers = {{ matrix_conduwuit_trusted_servers | to_json }} # Only query trusted servers for keys and never the origin server. This is # intended for clusters or custom deployments using their trusted_servers # as forwarding-agents to cache and deduplicate requests. Notary servers -# do not act as forwarding-agents by default, therefor do not enable this +# do not act as forwarding-agents by default, therefore do not enable this # unless you know exactly what you are doing. # #only_query_trusted_key_servers = false diff --git a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 index 46b78a2aa..75d2f1d38 100644 --- a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 +++ b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 @@ -586,7 +586,7 @@ trusted_servers = {{ matrix_continuwuity_trusted_servers | to_json }} # specifically on room joins. This option limits the exposure to a # compromised trusted server to room joins only. The join operation # requires gathering keys from many origin servers which can cause -# significant delays. Therefor this defaults to true to mitigate +# significant delays. Therefore this defaults to true to mitigate # unexpected delays out-of-the-box. The security-paranoid or those willing # to tolerate delays are advised to set this to false. Note that setting # query_trusted_key_servers_first to true causes this option to be @@ -597,7 +597,7 @@ trusted_servers = {{ matrix_continuwuity_trusted_servers | to_json }} # Only query trusted servers for keys and never the origin server. This is # intended for clusters or custom deployments using their trusted_servers # as forwarding-agents to cache and deduplicate requests. Notary servers -# do not act as forwarding-agents by default, therefor do not enable this +# do not act as forwarding-agents by default, therefore do not enable this # unless you know exactly what you are doing. # #only_query_trusted_key_servers = false diff --git a/roles/custom/matrix-coturn/defaults/main.yml b/roles/custom/matrix-coturn/defaults/main.yml index 84e1d42c2..d3616f1b5 100644 --- a/roles/custom/matrix-coturn/defaults/main.yml +++ b/roles/custom/matrix-coturn/defaults/main.yml @@ -34,7 +34,7 @@ matrix_coturn_docker_image_force_pull: "{{ matrix_coturn_docker_image.endswith(' # The Docker network that coturn would be put into. # # Because coturn relays traffic to unvalidated IP addresses, -# using a dedicated network, isolated from other Docker (and local) services is preferrable. +# using a dedicated network, isolated from other Docker (and local) services is preferable. # # Setting up deny/allow rules with `matrix_coturn_allowed_peer_ips`/`matrix_coturn_denied_peer_ips` is also # possible for achieving such isolation, but is more complicated due to the dynamic nature of Docker networking. diff --git a/roles/custom/matrix-dendrite/defaults/main.yml b/roles/custom/matrix-dendrite/defaults/main.yml index d4b1bab79..c84c98656 100644 --- a/roles/custom/matrix-dendrite/defaults/main.yml +++ b/roles/custom/matrix-dendrite/defaults/main.yml @@ -355,7 +355,7 @@ matrix_dendrite_user_api_auto_join_rooms: [] # name, number of active users and some information on your deployment config. matrix_dendrite_report_stats: false -# Contorls whether thumbnails for media content are generated dynamically +# Controls whether thumbnails for media content are generated dynamically matrix_dendrite_media_api_dynamic_thumbnails: false matrix_dendrite_media_api_max_thumbnail_generators: 10 diff --git a/roles/custom/matrix-dynamic-dns/defaults/main.yml b/roles/custom/matrix-dynamic-dns/defaults/main.yml index 2c5214edd..90505efec 100644 --- a/roles/custom/matrix-dynamic-dns/defaults/main.yml +++ b/roles/custom/matrix-dynamic-dns/defaults/main.yml @@ -36,7 +36,7 @@ matrix_dynamic_dns_container_additional_networks: "{{ matrix_dynamic_dns_contain matrix_dynamic_dns_container_additional_networks_auto: [] matrix_dynamic_dns_container_additional_networks_custom: [] -# List of extra arguments to pass to the ontainer mode +# List of extra arguments to pass to the container mode matrix_dynamic_dns_container_extra_arguments: [] # List of wanted services when running in mode diff --git a/roles/custom/matrix-ma1sd/defaults/main.yml b/roles/custom/matrix-ma1sd/defaults/main.yml index 05be4717e..3a9c738fa 100644 --- a/roles/custom/matrix-ma1sd/defaults/main.yml +++ b/roles/custom/matrix-ma1sd/defaults/main.yml @@ -150,7 +150,7 @@ matrix_ma1sd_database_name: 'matrix_ma1sd' matrix_ma1sd_database_connection_string: 'postgresql://{{ matrix_ma1sd_database_username }}:{{ matrix_ma1sd_database_password }}@{{ matrix_ma1sd_database_hostname }}:{{ matrix_ma1sd_database_port }}/{{ matrix_ma1sd_database_name }}' -# ma1sd has serveral supported identity stores. +# ma1sd has several supported identity stores. # One of them is storing identities directly in Synapse's database. # Learn more here: https://github.com/ma1uta/ma1sd/blob/master/docs/stores/synapse.md matrix_ma1sd_synapsesql_enabled: false diff --git a/roles/custom/matrix-media-repo/templates/grafana/media-repo.json b/roles/custom/matrix-media-repo/templates/grafana/media-repo.json index d3dca38c0..cfb5cb652 100644 --- a/roles/custom/matrix-media-repo/templates/grafana/media-repo.json +++ b/roles/custom/matrix-media-repo/templates/grafana/media-repo.json @@ -131,7 +131,7 @@ "refId": "B" } ], - "title": "HTTP Requsts", + "title": "HTTP Requests", "type": "timeseries" }, { diff --git a/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/validate_config.yml b/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/validate_config.yml index 67668dc7e..4137efc24 100644 --- a/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/validate_config.yml +++ b/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/validate_config.yml @@ -16,7 +16,7 @@ - {'old': 'matrix_prometheus_nginxlog_exporter_container_hostname', 'new': 'matrix_prometheus_nginxlog_exporter_identifier'} - {'old': 'matrix_prometheus_nginxlog_exporter_docker_image_name_prefix', 'new': 'matrix_prometheus_nginxlog_exporter_docker_image_registry_prefix'} -- name: Fail if docker image not availble for arch +- name: Fail if docker image not available for arch ansible.builtin.fail: msg: > 'prometheus-nginxlog-exporter' docker image is not available for your arch '{{ matrix_architecture }}'. diff --git a/roles/custom/matrix-synapse/defaults/main.yml b/roles/custom/matrix-synapse/defaults/main.yml index c1b2409ee..d291a448e 100644 --- a/roles/custom/matrix-synapse/defaults/main.yml +++ b/roles/custom/matrix-synapse/defaults/main.yml @@ -501,7 +501,7 @@ matrix_synapse_tls_federation_listener_enabled: true matrix_synapse_tls_certificate_path: "/data/{{ matrix_server_fqn_matrix }}.tls.crt" matrix_synapse_tls_private_key_path: "/data/{{ matrix_server_fqn_matrix }}.tls.key" -# Resource names used by the unsecure HTTP listener. Here only the Client API +# Resource names used by the insecure HTTP listener. Here only the Client API # is defined, see the homeserver config for a full list of valid resource # names. matrix_synapse_http_listener_resource_names: ["client"] @@ -835,7 +835,7 @@ matrix_synapse_workers_enabled: false # Specifies worker configuration that should be used when workers are enabled. # -# The posible values (as seen in `matrix_synapse_workers_presets`) are: +# The possible values (as seen in `matrix_synapse_workers_presets`) are: # - "little-federation-helper" - a very minimal worker configuration to improve federation performance # - "one-of-each" - one worker of each supported type + a generic worker # - "specialized-workers" - one worker of each supported type + specialized workers @@ -1458,7 +1458,7 @@ matrix_synapse_ext_encryption_disabler_deny_encryption_for_rooms_of: ["{{ matrix # Specifies whether the power levels event (setting) provided during room creation should be patched. # This makes it impossible for anybody (locally or over federation) from enabling room encryption # for the lifetime of rooms created while this setting is enabled (irreversible). -# Enabling this may have incompatiblity consequences with servers / clients. +# Enabling this may have incompatibility consequences with servers / clients. # Familiarize yourself with the caveats upstream: https://github.com/digitalentity/matrix_encryption_disabler matrix_synapse_ext_encryption_disabler_patch_power_levels: false matrix_synapse_ext_encryption_config: "{{ matrix_synapse_ext_encryption_config_yaml | from_yaml }}" diff --git a/roles/custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 b/roles/custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 index 738dbaeae..6eb6df116 100644 --- a/roles/custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 +++ b/roles/custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 @@ -305,7 +305,7 @@ listeners: compress: false {% endif %} - # Unsecure HTTP listener (Client API): for when Matrix traffic passes through a reverse proxy + # Insecure HTTP listener (Client API): for when Matrix traffic passes through a reverse proxy # that unwraps TLS. - port: {{ matrix_synapse_container_client_api_port|to_json }} tls: false @@ -318,7 +318,7 @@ listeners: compress: false {% if matrix_synapse_federation_port_enabled %} - # Unsecure HTTP listener (Federation API): for when Matrix traffic passes through a reverse proxy + # Insecure HTTP listener (Federation API): for when Matrix traffic passes through a reverse proxy # that unwraps TLS. - port: {{ matrix_synapse_container_federation_api_plain_port|to_json }} tls: false @@ -1709,7 +1709,7 @@ old_signing_keys: # Additional security can be provided by configuring a `verify key`, which # will make synapse check that the response is signed by that key. # -# This setting supercedes an older setting named `perspectives`. The old format +# This setting supersedes an older setting named `perspectives`. The old format # is still supported for backwards-compatibility, but it is deprecated. # # 'trusted_key_servers' defaults to matrix.org, but using it will generate a diff --git a/roles/custom/matrix-user-creator/tasks/main.yml b/roles/custom/matrix-user-creator/tasks/main.yml index 8f166bb1c..976f34067 100644 --- a/roles/custom/matrix-user-creator/tasks/main.yml +++ b/roles/custom/matrix-user-creator/tasks/main.yml @@ -7,7 +7,7 @@ - tags: # This role intentionally doesn't do work on a `setup-all` tag. - # If it did, the initial installation (`--tags=setup-all`) would also potentially polute the database with data, + # If it did, the initial installation (`--tags=setup-all`) would also potentially pollute the database with data, # which would make importing a database dump problematic. # # See the variable "matrix_user_creator_users_auto" on group_vars/matrix_servers for actual values of users which running these tags can create with this role by default. diff --git a/roles/custom/matrix_playbook_migration/defaults/main.yml b/roles/custom/matrix_playbook_migration/defaults/main.yml index 2cac16e45..78898231a 100644 --- a/roles/custom/matrix_playbook_migration/defaults/main.yml +++ b/roles/custom/matrix_playbook_migration/defaults/main.yml @@ -81,7 +81,7 @@ matrix_playbook_migration_matrix_nginx_proxy_leftover_variable_validation_checks matrix_playbook_migration_matrix_ssl_leftover_variable_checks_enabled: true # Controls whether this role will delete old files left over from `matrix-nginx-proxy`. -# Regardless of this value, if discovered, a `matrix-nginx-proxy.service` systemd serivce will be stopped and removed. +# Regardless of this value, if discovered, a `matrix-nginx-proxy.service` systemd service will be stopped and removed. matrix_playbook_migration_matrix_nginx_proxy_uninstallation_enabled: true # Controls whether this role will try to detect and clean up the /matrix/ssl files. diff --git a/roles/custom/matrix_playbook_migration/tasks/docker_daemon_options_file_cleanup.yml b/roles/custom/matrix_playbook_migration/tasks/docker_daemon_options_file_cleanup.yml index e7636161e..6a26c9e29 100644 --- a/roles/custom/matrix_playbook_migration/tasks/docker_daemon_options_file_cleanup.yml +++ b/roles/custom/matrix_playbook_migration/tasks/docker_daemon_options_file_cleanup.yml @@ -15,7 +15,7 @@ # Later, when they stopped setting these options, they were stuck with the configuration file that still retained them. # # Here, we make the file go away of no options are set. -# Idealy, this task would be part of the `ansible-role-docker` role, but it's not (yet). +# Ideally, this task would be part of the `ansible-role-docker` role, but it's not (yet). # See: https://github.com/geerlingguy/ansible-role-docker/pull/498 - name: Ensure the Docker daemon options file is deleted when no longer needed when: matrix_playbook_docker_installation_daemon_options.keys() | length == 0 From c9dfb1c8770451b3e4d59c7a3281fc7fb1b36b47 Mon Sep 17 00:00:00 2001 From: Suguru Hirahara Date: Mon, 2 Jun 2025 22:39:56 +0900 Subject: [PATCH 136/404] Replace "proxies" with "proxy's" Signed-off-by: Suguru Hirahara --- examples/reverse-proxies/nginx-proxy-manager/README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/examples/reverse-proxies/nginx-proxy-manager/README.md b/examples/reverse-proxies/nginx-proxy-manager/README.md index f7042e84e..1047ed615 100644 --- a/examples/reverse-proxies/nginx-proxy-manager/README.md +++ b/examples/reverse-proxies/nginx-proxy-manager/README.md @@ -23,7 +23,7 @@ If Matrix federation is enabled, then you will need to make changes to [NPM's Do You'll need to create two proxy hosts in NPM for Matrix web and federation traffic. -Open the 'Proxy Hosts' page in the NPM web interface and select `Add Proxy Host`, the first being for Matrix web traffic. Apply the proxies configuration like this: +Open the 'Proxy Hosts' page in the NPM web interface and select `Add Proxy Host`, the first being for Matrix web traffic. Apply the proxy's configuration like this: ```md # Details @@ -44,7 +44,7 @@ Custom Nginx Configuration: client_max_body_size 50M; ``` -Again, under the 'Proxy Hosts' page select `Add Proxy Host`, this time for your federation traffic. Apply the proxies configuration like this: +Again, under the 'Proxy Hosts' page select `Add Proxy Host`, this time for your federation traffic. Apply the proxy's configuration like this: ```md # Details From 95f6347974c49ecc6803753ad6f21481d0dd2398 Mon Sep 17 00:00:00 2001 From: Suguru Hirahara Date: Mon, 2 Jun 2025 22:44:45 +0900 Subject: [PATCH 137/404] Revert "register" to "registr" Signed-off-by: Suguru Hirahara --- .codespellrc | 2 +- group_vars/matrix_servers | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/.codespellrc b/.codespellrc index 0029bad68..83ec2578c 100644 --- a/.codespellrc +++ b/.codespellrc @@ -1,2 +1,2 @@ [codespell] -ignore-words-list = aNULL,brose,doub,Udo,re-use,re-used +ignore-words-list = aNULL,brose,doub,Udo,re-use,re-used,registr diff --git a/group_vars/matrix_servers b/group_vars/matrix_servers index 7ed301ade..0f56508b7 100755 --- a/group_vars/matrix_servers +++ b/group_vars/matrix_servers @@ -5721,7 +5721,7 @@ matrix_registration_api_validate_certs: "{{ matrix_playbook_ssl_enabled }}" # Postgres is the default, except if not using internal Postgres server matrix_registration_database_engine: "{{ 'postgres' if postgres_enabled else 'sqlite' }}" matrix_registration_database_hostname: "{{ postgres_connection_hostname if postgres_enabled else '' }}" -matrix_registration_database_password: "{{ '%s' | format(matrix_homeserver_generic_secret_key) | password_hash('sha512', 'mx.register.db', rounds=655555) | to_uuid }}" +matrix_registration_database_password: "{{ '%s' | format(matrix_homeserver_generic_secret_key) | password_hash('sha512', 'mx.registr.db', rounds=655555) | to_uuid }}" ###################################################################### # From 25c20f16d4cf987d1056263baa854022561b2fa7 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 3 Jun 2025 15:16:17 +0000 Subject: [PATCH 138/404] Update ghcr.io/element-hq/synapse Docker tag to v1.131.0 --- roles/custom/matrix-synapse/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse/defaults/main.yml b/roles/custom/matrix-synapse/defaults/main.yml index d291a448e..159fa0020 100644 --- a/roles/custom/matrix-synapse/defaults/main.yml +++ b/roles/custom/matrix-synapse/defaults/main.yml @@ -16,7 +16,7 @@ matrix_synapse_enabled: true matrix_synapse_github_org_and_repo: element-hq/synapse # renovate: datasource=docker depName=ghcr.io/element-hq/synapse -matrix_synapse_version: v1.130.0 +matrix_synapse_version: v1.131.0 matrix_synapse_username: '' matrix_synapse_uid: '' From f9f51829196bd66715b5a0cf74ef1e5a77368a21 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 3 Jun 2025 18:45:33 +0000 Subject: [PATCH 139/404] Update ghcr.io/element-hq/element-web Docker tag to v1.11.102 --- roles/custom/matrix-client-element/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-element/defaults/main.yml b/roles/custom/matrix-client-element/defaults/main.yml index f14da5885..7c66e887e 100644 --- a/roles/custom/matrix-client-element/defaults/main.yml +++ b/roles/custom/matrix-client-element/defaults/main.yml @@ -29,7 +29,7 @@ matrix_client_element_container_image_self_build_repo: "https://github.com/eleme matrix_client_element_container_image_self_build_low_memory_system_patch_enabled: "{{ ansible_memtotal_mb < 4096 }}" # renovate: datasource=docker depName=ghcr.io/element-hq/element-web -matrix_client_element_version: v1.11.101 +matrix_client_element_version: v1.11.102 matrix_client_element_docker_image: "{{ matrix_client_element_docker_image_registry_prefix }}element-hq/element-web:{{ matrix_client_element_version }}" matrix_client_element_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_element_container_image_self_build else matrix_client_element_docker_image_registry_prefix_upstream }}" From 3edad9d8d42c7d3aa3f4347c3fc794a5a100d789 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 3 Jun 2025 22:24:39 +0000 Subject: [PATCH 140/404] Update joseluisq/static-web-server Docker tag to v2.37.0 --- roles/custom/matrix-cactus-comments-client/defaults/main.yml | 2 +- roles/custom/matrix-static-files/defaults/main.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/roles/custom/matrix-cactus-comments-client/defaults/main.yml b/roles/custom/matrix-cactus-comments-client/defaults/main.yml index b753a6c24..a6f488d44 100644 --- a/roles/custom/matrix-cactus-comments-client/defaults/main.yml +++ b/roles/custom/matrix-cactus-comments-client/defaults/main.yml @@ -18,7 +18,7 @@ matrix_cactus_comments_client_public_path: "{{ matrix_cactus_comments_client_bas matrix_cactus_comments_client_public_path_file_permissions: "0644" # renovate: datasource=docker depName=joseluisq/static-web-server -matrix_cactus_comments_client_version: 2.36.1 +matrix_cactus_comments_client_version: 2.37.0 matrix_cactus_comments_client_container_image: "{{ matrix_cactus_comments_client_container_image_registry_prefix }}joseluisq/static-web-server:{{ matrix_cactus_comments_client_container_image_tag }}" matrix_cactus_comments_client_container_image_registry_prefix: "{{ matrix_cactus_comments_client_container_image_registry_prefix_upstream }}" diff --git a/roles/custom/matrix-static-files/defaults/main.yml b/roles/custom/matrix-static-files/defaults/main.yml index 768442001..701011650 100644 --- a/roles/custom/matrix-static-files/defaults/main.yml +++ b/roles/custom/matrix-static-files/defaults/main.yml @@ -13,7 +13,7 @@ matrix_static_files_enabled: true matrix_static_files_identifier: matrix-static-files # renovate: datasource=docker depName=joseluisq/static-web-server -matrix_static_files_version: 2.36.1 +matrix_static_files_version: 2.37.0 matrix_static_files_base_path: "{{ matrix_base_data_path }}/{{ 'static-files' if matrix_static_files_identifier == 'matrix-static-files' else matrix_static_files_identifier }}" matrix_static_files_config_path: "{{ matrix_static_files_base_path }}/config" From cabedeae73d11597207254515ebbe31937bb828a Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 5 Jun 2025 11:30:33 +0000 Subject: [PATCH 141/404] Update dependency livekit_server to v1.9.0-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 8b4b2a4e7..2575d80f5 100644 --- a/requirements.yml +++ b/requirements.yml @@ -28,7 +28,7 @@ version: v10184-0 name: jitsi - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-livekit-server.git - version: v1.8.4-5 + version: v1.9.0-0 name: livekit_server - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-ntfy.git version: v2.11.0-5 From 5701ce5054561a40cfe8eaf0454b34978b026f03 Mon Sep 17 00:00:00 2001 From: adam-kress Date: Thu, 5 Jun 2025 17:48:45 -0400 Subject: [PATCH 142/404] =?UTF-8?q?Upgrade=20Jitsi=20(v10184-0=20=E2=86=92?= =?UTF-8?q?=20v10314-0)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 2575d80f5..2184187ef 100644 --- a/requirements.yml +++ b/requirements.yml @@ -25,7 +25,7 @@ version: v11.6.2-0 name: grafana - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-jitsi.git - version: v10184-0 + version: v10314-0 name: jitsi - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-livekit-server.git version: v1.9.0-0 From 9b8dab89dfbaed529fec452b8ecc1e25133a3909 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 6 Jun 2025 05:15:47 +0000 Subject: [PATCH 143/404] Update ghcr.io/element-hq/element-call Docker tag to v0.12.2 --- roles/custom/matrix-element-call/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-element-call/defaults/main.yml b/roles/custom/matrix-element-call/defaults/main.yml index ff9e121e4..6292e2fdf 100644 --- a/roles/custom/matrix-element-call/defaults/main.yml +++ b/roles/custom/matrix-element-call/defaults/main.yml @@ -21,7 +21,7 @@ matrix_element_call_enabled: false matrix_rtc_enabled: "{{ matrix_element_call_enabled }}" # renovate: datasource=docker depName=ghcr.io/element-hq/element-call -matrix_element_call_version: v0.12.0 +matrix_element_call_version: v0.12.2 matrix_element_call_scheme: https From 01c8b55c6f08d0b6f33cf1ff8e840cb539c5347d Mon Sep 17 00:00:00 2001 From: Aine <97398200+aine-etke@users.noreply.github.com> Date: Fri, 6 Jun 2025 14:46:01 +0300 Subject: [PATCH 144/404] FluffyChat v1.27.0 --- roles/custom/matrix-client-fluffychat/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-fluffychat/defaults/main.yml b/roles/custom/matrix-client-fluffychat/defaults/main.yml index 8cace7a69..4b45249e7 100644 --- a/roles/custom/matrix-client-fluffychat/defaults/main.yml +++ b/roles/custom/matrix-client-fluffychat/defaults/main.yml @@ -13,7 +13,7 @@ matrix_client_fluffychat_container_image_self_build_repo: "https://github.com/et matrix_client_fluffychat_container_image_self_build_version: "{{ 'main' if matrix_client_fluffychat_version == 'latest' else matrix_client_fluffychat_version }}" # renovate: datasource=docker depName=ghcr.io/etkecc/fluffychat-web -matrix_client_fluffychat_version: v1.26.1 +matrix_client_fluffychat_version: v1.27.0 matrix_client_fluffychat_docker_image: "{{ matrix_client_fluffychat_docker_image_registry_prefix }}etkecc/fluffychat-web:{{ matrix_client_fluffychat_version }}" matrix_client_fluffychat_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_fluffychat_container_image_self_build else matrix_client_fluffychat_docker_image_registry_prefix_upstream }}" matrix_client_fluffychat_docker_image_registry_prefix_upstream: "{{ matrix_client_fluffychat_docker_image_registry_prefix_upstream_default }}" From 5def3b176fa9fa472342a054750d00fc8bd40259 Mon Sep 17 00:00:00 2001 From: Aine Date: Sat, 7 Jun 2025 13:22:27 +0300 Subject: [PATCH 145/404] make hookshot honor the matrix_bridges_encryption_enabled var --- roles/custom/matrix-bridge-hookshot/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-hookshot/defaults/main.yml b/roles/custom/matrix-bridge-hookshot/defaults/main.yml index e48ff2c17..606562877 100644 --- a/roles/custom/matrix-bridge-hookshot/defaults/main.yml +++ b/roles/custom/matrix-bridge-hookshot/defaults/main.yml @@ -74,7 +74,7 @@ matrix_hookshot_cache_redisUri: "{{ ('redis://' + matrix_hookshot_cache_redis_ho # - support to also be enabled in the homeserver, see the documentation of Hookshot. # - Hookshot to be pointed at a Redis instance via the `matrix_hookshot_cache_redis*` variables. # See: https://matrix-org.github.io/matrix-hookshot/latest/advanced/encryption.html -matrix_hookshot_encryption_enabled: false +matrix_hookshot_encryption_enabled: "{{ matrix_bridges_encryption_enabled }}" # Controls whether metrics are enabled in the bridge configuration. # Enabling them is usually enough for a local (in-container) Prometheus to consume them. From 7aca61c5dd02c63acd2bc4683db994a2bd8796f9 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 10 Jun 2025 10:28:34 +0000 Subject: [PATCH 146/404] Update dependency requests to v2.32.4 [SECURITY] --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index ad717b5dd..106ee5860 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -16,7 +16,7 @@ myst-parser==4.0.1 packaging==25.0 Pygments==2.19.1 PyYAML==6.0.2 -requests==2.32.3 +requests==2.32.4 setuptools==80.9.0 snowballstemmer==3.0.1 Sphinx==8.2.3 From 5dcdf8e9e2ee76f0aeed0a7ea2c9f74c9fe45a4a Mon Sep 17 00:00:00 2001 From: Catalan Lover <48515417+FSG-Cat@users.noreply.github.com> Date: Mon, 9 Jun 2025 16:08:20 +0200 Subject: [PATCH 147/404] Update default room version to 11 in line with the specification. --- roles/custom/matrix-synapse/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse/defaults/main.yml b/roles/custom/matrix-synapse/defaults/main.yml index 159fa0020..112091b08 100644 --- a/roles/custom/matrix-synapse/defaults/main.yml +++ b/roles/custom/matrix-synapse/defaults/main.yml @@ -1562,7 +1562,7 @@ matrix_synapse_room_list_publication_rules: room_id: "*" action: allow -matrix_synapse_default_room_version: "10" +matrix_synapse_default_room_version: "11" # Controls whether leaving a room will automatically forget it. # The upstream default is `false`, but we try to make Synapse less wasteful of resources, so we do things differently. From 20e98fbb33eb5e7c5a7fad490587cb5b42516b0b Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 10 Jun 2025 12:31:20 +0000 Subject: [PATCH 148/404] Update ghcr.io/element-hq/element-web Docker tag to v1.11.103 --- roles/custom/matrix-client-element/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-element/defaults/main.yml b/roles/custom/matrix-client-element/defaults/main.yml index 7c66e887e..8fe967c69 100644 --- a/roles/custom/matrix-client-element/defaults/main.yml +++ b/roles/custom/matrix-client-element/defaults/main.yml @@ -29,7 +29,7 @@ matrix_client_element_container_image_self_build_repo: "https://github.com/eleme matrix_client_element_container_image_self_build_low_memory_system_patch_enabled: "{{ ansible_memtotal_mb < 4096 }}" # renovate: datasource=docker depName=ghcr.io/element-hq/element-web -matrix_client_element_version: v1.11.102 +matrix_client_element_version: v1.11.103 matrix_client_element_docker_image: "{{ matrix_client_element_docker_image_registry_prefix }}element-hq/element-web:{{ matrix_client_element_version }}" matrix_client_element_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_element_container_image_self_build else matrix_client_element_docker_image_registry_prefix_upstream }}" From adef9702390020ae27e0c314981b0d0925a7183d Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 10 Jun 2025 15:35:07 +0300 Subject: [PATCH 149/404] Upgrade baibot (v1.7.2 -> v1.7.3) --- roles/custom/matrix-bot-baibot/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bot-baibot/defaults/main.yml b/roles/custom/matrix-bot-baibot/defaults/main.yml index 9bb949d21..e1415bfe1 100644 --- a/roles/custom/matrix-bot-baibot/defaults/main.yml +++ b/roles/custom/matrix-bot-baibot/defaults/main.yml @@ -17,7 +17,7 @@ matrix_bot_baibot_container_repo_version: "{{ 'main' if matrix_bot_baibot_versio matrix_bot_baibot_container_src_files_path: "{{ matrix_base_data_path }}/baibot/container-src" # renovate: datasource=docker depName=ghcr.io/etkecc/baibot -matrix_bot_baibot_version: v1.7.2 +matrix_bot_baibot_version: v1.7.3 matrix_bot_baibot_container_image: "{{ matrix_bot_baibot_container_image_registry_prefix }}etkecc/baibot:{{ matrix_bot_baibot_version }}" matrix_bot_baibot_container_image_registry_prefix: "{{ 'localhost/' if matrix_bot_baibot_container_image_self_build else matrix_bot_baibot_container_image_registry_prefix_upstream }}" matrix_bot_baibot_container_image_registry_prefix_upstream: "{{ matrix_bot_baibot_container_image_registry_prefix_upstream_default }}" From db8bee548d9812988225fe74373b8099cb732167 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 10 Jun 2025 15:35:44 +0300 Subject: [PATCH 150/404] Update OpenAI model in sample baibot config (gpt-4o -> gpt-4.1) Related to 69d6111354a2afede26b016fe97bc8238d0eed60 --- docs/configuring-playbook-bot-baibot.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/configuring-playbook-bot-baibot.md b/docs/configuring-playbook-bot-baibot.md index 2e8a66961..60d9bd94e 100644 --- a/docs/configuring-playbook-bot-baibot.md +++ b/docs/configuring-playbook-bot-baibot.md @@ -242,7 +242,7 @@ matrix_bot_baibot_config_agents_static_definitions_openai_config_api_key: "YOUR_ # matrix_bot_baibot_config_agents_static_definitions_openai_config_text_generation_prompt: "{{ matrix_bot_baibot_config_agents_static_definitions_prompt }}" # If you'd like to use another text-generation agent, uncomment and adjust: -# matrix_bot_baibot_config_agents_static_definitions_openai_config_text_generation_model_id: gpt-4o +# matrix_bot_baibot_config_agents_static_definitions_openai_config_text_generation_model_id: gpt-4.1 ``` Because this is a [statically](https://github.com/etkecc/baibot/blob/main/docs/configuration/README.md#static-configuration)-defined agent, it will be given a `static/` ID prefix and will be named `static/openai`. From e76b50a0b7c8011d5a39f0aeb882b83e8ab2c379 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 10 Jun 2025 16:40:02 +0300 Subject: [PATCH 151/404] Upgrade baibot (v1.7.3 -> v1.7.4) --- roles/custom/matrix-bot-baibot/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bot-baibot/defaults/main.yml b/roles/custom/matrix-bot-baibot/defaults/main.yml index e1415bfe1..f8c9d736c 100644 --- a/roles/custom/matrix-bot-baibot/defaults/main.yml +++ b/roles/custom/matrix-bot-baibot/defaults/main.yml @@ -17,7 +17,7 @@ matrix_bot_baibot_container_repo_version: "{{ 'main' if matrix_bot_baibot_versio matrix_bot_baibot_container_src_files_path: "{{ matrix_base_data_path }}/baibot/container-src" # renovate: datasource=docker depName=ghcr.io/etkecc/baibot -matrix_bot_baibot_version: v1.7.3 +matrix_bot_baibot_version: v1.7.4 matrix_bot_baibot_container_image: "{{ matrix_bot_baibot_container_image_registry_prefix }}etkecc/baibot:{{ matrix_bot_baibot_version }}" matrix_bot_baibot_container_image_registry_prefix: "{{ 'localhost/' if matrix_bot_baibot_container_image_self_build else matrix_bot_baibot_container_image_registry_prefix_upstream }}" matrix_bot_baibot_container_image_registry_prefix_upstream: "{{ matrix_bot_baibot_container_image_registry_prefix_upstream_default }}" From 27c0fa55f405b1f8512e9dc8129090b1cf245119 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 10 Jun 2025 19:04:20 +0000 Subject: [PATCH 152/404] Update ajbura/cinny Docker tag to v4.8.1 --- roles/custom/matrix-client-cinny/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-cinny/defaults/main.yml b/roles/custom/matrix-client-cinny/defaults/main.yml index 78e743149..0c901899f 100644 --- a/roles/custom/matrix-client-cinny/defaults/main.yml +++ b/roles/custom/matrix-client-cinny/defaults/main.yml @@ -17,7 +17,7 @@ matrix_client_cinny_container_image_self_build: false matrix_client_cinny_container_image_self_build_repo: "https://github.com/ajbura/cinny.git" # renovate: datasource=docker depName=ajbura/cinny -matrix_client_cinny_version: v4.8.0 +matrix_client_cinny_version: v4.8.1 matrix_client_cinny_docker_image: "{{ matrix_client_cinny_docker_image_registry_prefix }}ajbura/cinny:{{ matrix_client_cinny_version }}" matrix_client_cinny_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_cinny_container_image_self_build else matrix_client_cinny_docker_image_registry_prefix_upstream }}" matrix_client_cinny_docker_image_registry_prefix_upstream: "{{ matrix_client_cinny_docker_image_registry_prefix_upstream_default }}" From eb9af8fe321fde2faa90ae2759c313118a41c0d8 Mon Sep 17 00:00:00 2001 From: Aine <97398200+aine-etke@users.noreply.github.com> Date: Wed, 11 Jun 2025 10:26:59 +0300 Subject: [PATCH 153/404] SchildiChat v1.11.103-sc.0.test.0 --- roles/custom/matrix-client-schildichat/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-schildichat/defaults/main.yml b/roles/custom/matrix-client-schildichat/defaults/main.yml index 4619af27c..1c2598d11 100644 --- a/roles/custom/matrix-client-schildichat/defaults/main.yml +++ b/roles/custom/matrix-client-schildichat/defaults/main.yml @@ -19,7 +19,7 @@ matrix_client_schildichat_container_image_self_build_version: "{{ 'lite' if matr matrix_client_schildichat_container_image_self_build_low_memory_system_patch_enabled: "{{ ansible_memtotal_mb < 4096 }}" # renovate: datasource=docker depName=ghcr.io/etkecc/schildichat-web -matrix_client_schildichat_version: 1.11.86-sc.0.test.0 +matrix_client_schildichat_version: 1.11.103-sc.0.test.0 matrix_client_schildichat_docker_image: "{{ matrix_client_schildichat_docker_image_registry_prefix }}etkecc/schildichat-web:{{ matrix_client_schildichat_version }}" matrix_client_schildichat_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_schildichat_container_image_self_build else matrix_client_schildichat_docker_image_registry_prefix_upstream }}" matrix_client_schildichat_docker_image_registry_prefix_upstream: "{{ matrix_client_schildichat_docker_image_registry_prefix_upstream_default }}" From 868ee4d688a646d355e430f27d420da254759588 Mon Sep 17 00:00:00 2001 From: Aine <97398200+aine-etke@users.noreply.github.com> Date: Wed, 11 Jun 2025 15:16:04 +0300 Subject: [PATCH 154/404] Synapse Admin v0.11.1-etke44 --- roles/custom/matrix-synapse-admin/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse-admin/defaults/main.yml b/roles/custom/matrix-synapse-admin/defaults/main.yml index f8c8a5f8f..0a9be79fb 100644 --- a/roles/custom/matrix-synapse-admin/defaults/main.yml +++ b/roles/custom/matrix-synapse-admin/defaults/main.yml @@ -25,7 +25,7 @@ matrix_synapse_admin_container_image_self_build: false matrix_synapse_admin_container_image_self_build_repo: "https://github.com/etkecc/synapse-admin.git" # renovate: datasource=docker depName=ghcr.io/etkecc/synapse-admin -matrix_synapse_admin_version: v0.10.4-etke41 +matrix_synapse_admin_version: v0.11.1-etke44 matrix_synapse_admin_docker_image: "{{ matrix_synapse_admin_docker_image_registry_prefix }}etkecc/synapse-admin:{{ matrix_synapse_admin_version }}" matrix_synapse_admin_docker_image_registry_prefix: "{{ 'localhost/' if matrix_synapse_admin_container_image_self_build else matrix_synapse_admin_docker_image_registry_prefix_upstream }}" matrix_synapse_admin_docker_image_registry_prefix_upstream: "{{ matrix_synapse_admin_docker_image_registry_prefix_upstream_default }}" From 3508c87aeede98bdb063f3bb1e45caa622e2064e Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 12 Jun 2025 07:33:22 +0000 Subject: [PATCH 155/404] Update dependency valkey to v8.1.2-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 2184187ef..9ee1aa3ec 100644 --- a/requirements.yml +++ b/requirements.yml @@ -73,5 +73,5 @@ version: v2.10.0-0 name: traefik_certs_dumper - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-valkey.git - version: v8.1.1-0 + version: v8.1.2-0 name: valkey From 57428003297d0790840f5921f39327bcb5ce5d92 Mon Sep 17 00:00:00 2001 From: Suguru Hirahara Date: Thu, 12 Jun 2025 18:24:45 +0900 Subject: [PATCH 156/404] Fix looking up docker package error with Renovate Signed-off-by: Suguru Hirahara --- roles/custom/matrix-conduwuit/defaults/main.yml | 1 - 1 file changed, 1 deletion(-) diff --git a/roles/custom/matrix-conduwuit/defaults/main.yml b/roles/custom/matrix-conduwuit/defaults/main.yml index 37db36882..17507c824 100644 --- a/roles/custom/matrix-conduwuit/defaults/main.yml +++ b/roles/custom/matrix-conduwuit/defaults/main.yml @@ -13,7 +13,6 @@ matrix_conduwuit_enabled: true matrix_conduwuit_hostname: '' matrix_conduwuit_docker_image: "{{ matrix_conduwuit_docker_image_registry_prefix }}girlbossceo/conduwuit:{{ matrix_conduwuit_docker_image_tag }}" -# renovate: datasource=docker depName=ghcr.io/girlbossceo/conduwuit matrix_conduwuit_docker_image_tag: v0.4.6-8f7ade4c22533a3177bfd8f175e178573ba6c1d4 matrix_conduwuit_docker_image_force_pull: "{{ matrix_conduwuit_docker_image.endswith(':latest') }}" matrix_conduwuit_docker_image_registry_prefix: "{{ matrix_conduwuit_docker_image_registry_prefix_upstream }}" From 13d22af9db18a79ff3e6e7cccd7f1d084ae00743 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sun, 15 Jun 2025 04:30:45 +0000 Subject: [PATCH 157/404] Update dependency certifi to v2025.6.15 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 106ee5860..3e7e44473 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -1,6 +1,6 @@ alabaster==1.0.0 babel==2.17.0 -certifi==2025.4.26 +certifi==2025.6.15 charset-normalizer==3.4.2 click==8.2.1 docutils==0.21.2 From 15ed07d970d3711502f0c490e3319f714e3192ed Mon Sep 17 00:00:00 2001 From: Benjamin Blacher Date: Mon, 16 Jun 2025 21:09:21 +0200 Subject: [PATCH 158/404] Update mautrix-discord, add support for msc4190 --- roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml | 5 ++++- .../matrix-bridge-mautrix-discord/templates/config.yaml.j2 | 5 +++++ 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml index 1b7dede9f..81d1c5084 100644 --- a/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml @@ -21,7 +21,7 @@ matrix_mautrix_discord_container_image_self_build_repo: "https://mau.dev/mautrix matrix_mautrix_discord_container_image_self_build_branch: "{{ 'main' if matrix_mautrix_discord_version == 'latest' else matrix_mautrix_discord_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/discord -matrix_mautrix_discord_version: v0.7.3 +matrix_mautrix_discord_version: v0.7.4 # See: https://mau.dev/mautrix/discord/container_registry matrix_mautrix_discord_docker_image: "{{ matrix_mautrix_discord_docker_image_registry_prefix }}mautrix/discord:{{ matrix_mautrix_discord_version }}" @@ -39,6 +39,8 @@ matrix_mautrix_discord_homeserver_address: "" matrix_mautrix_discord_homeserver_domain: "{{ matrix_domain }}" matrix_mautrix_discord_appservice_address: "http://matrix-mautrix-discord:8080" +matrix_mautrix_discord_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" + matrix_mautrix_discord_bridge_command_prefix: "!discord" # Publicly accessible base URL that Discord can use to reach the bridge, used for avatars in relay mode. @@ -225,6 +227,7 @@ matrix_mautrix_discord_registration_yaml: | regex: '^@{{ matrix_mautrix_discord_appservice_bot_username | regex_escape }}:{{ matrix_mautrix_discord_homeserver_domain | regex_escape }}$' de.sorunome.msc2409.push_ephemeral: true receive_ephemeral: true + io.element.msc4190: {{ matrix_mautrix_discord_msc4190_enabled | to_json }} matrix_mautrix_discord_registration: "{{ matrix_mautrix_discord_registration_yaml | from_yaml }}" diff --git a/roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2 index 21f018cf3..c88209ae0 100644 --- a/roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2 @@ -268,6 +268,11 @@ bridge: appservice: {{ matrix_mautrix_discord_bridge_encryption_appservice | to_json}} # Require encryption, drop any unencrypted messages. require: {{ matrix_mautrix_discord_bridge_encryption_require | to_json }} + # Whether to use MSC4190 instead of appservice login to create the bridge bot device. + # Requires the homeserver to support MSC4190 and the device masquerading parts of MSC3202. + # Only relevant when using end-to-bridge encryption, required when using encryption with next-gen auth (MSC3861). + # Changing this option requires updating the appservice registration file. + msc4190: {{ matrix_mautrix_discord_msc4190_enabled | to_json }} # Enable key sharing? If enabled, key requests for rooms where users are in will be fulfilled. # You must use a client that supports requesting keys from other users to use this feature. allow_key_sharing: {{ matrix_mautrix_discord_bridge_encryption_key_sharing_allow | to_json }} From 30875764c53d028dbc0011afcf0a98858409f01c Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 16 Jun 2025 20:00:52 +0000 Subject: [PATCH 159/404] Update dock.mau.dev/mautrix/gmessages Docker tag to v0.6.3 --- roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml index be96a8c78..900fa38f2 100644 --- a/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml @@ -18,7 +18,7 @@ matrix_mautrix_gmessages_container_image_self_build_repo: "https://github.com/ma matrix_mautrix_gmessages_container_image_self_build_branch: "{{ 'main' if matrix_mautrix_gmessages_version == 'latest' else matrix_mautrix_gmessages_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/gmessages -matrix_mautrix_gmessages_version: v0.6.2 +matrix_mautrix_gmessages_version: v0.6.3 # See: https://mau.dev/mautrix/gmessages/container_registry matrix_mautrix_gmessages_docker_image: "{{ matrix_mautrix_gmessages_docker_image_registry_prefix }}mautrix/gmessages:{{ matrix_mautrix_gmessages_version }}" From 6a1ebe6e913a437dd918efd731a4c59cda1993f8 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 16 Jun 2025 20:00:57 +0000 Subject: [PATCH 160/404] Update dock.mau.dev/mautrix/signal Docker tag to v0.8.4 --- roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml index c6d270c19..d61140d19 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml @@ -25,7 +25,7 @@ matrix_mautrix_signal_container_image_self_build_repo: "https://mau.dev/mautrix/ matrix_mautrix_signal_container_image_self_build_branch: "{{ 'main' if matrix_mautrix_signal_version == 'latest' else matrix_mautrix_signal_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/signal -matrix_mautrix_signal_version: v0.8.3 +matrix_mautrix_signal_version: v0.8.4 # See: https://mau.dev/mautrix/signal/container_registry matrix_mautrix_signal_docker_image: "{{ matrix_mautrix_signal_docker_image_registry_prefix }}mautrix/signal:{{ matrix_mautrix_signal_docker_image_tag }}" From 779eb0fc9ac81187a079f9679bf7e32271b28770 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 16 Jun 2025 20:42:03 +0000 Subject: [PATCH 161/404] Update dock.mau.dev/mautrix/twitter Docker tag to v0.4.2 --- roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml index 0ff7a2fb8..998ae1554 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml @@ -22,7 +22,7 @@ matrix_mautrix_twitter_container_image_self_build_repo: "https://github.com/maut matrix_mautrix_twitter_container_image_self_build_repo_version: "{{ 'master' if matrix_mautrix_twitter_version == 'latest' else matrix_mautrix_twitter_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/twitter -matrix_mautrix_twitter_version: v0.4.1 +matrix_mautrix_twitter_version: v0.4.2 # See: https://mau.dev/tulir/mautrix-twitter/container_registry matrix_mautrix_twitter_docker_image: "{{ matrix_mautrix_twitter_docker_image_registry_prefix }}mautrix/twitter:{{ matrix_mautrix_twitter_version }}" matrix_mautrix_twitter_docker_image_registry_prefix: "{{ 'localhost/' if matrix_mautrix_twitter_container_image_self_build else matrix_mautrix_twitter_docker_image_registry_prefix_upstream }}" From 048b8eb918adc713594c0b663fb73daf80a1ab2e Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 16 Jun 2025 20:42:07 +0000 Subject: [PATCH 162/404] Update dock.mau.dev/mautrix/whatsapp Docker tag to v0.12.2 --- roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml index 241bea007..545792108 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml @@ -28,7 +28,7 @@ matrix_mautrix_whatsapp_container_image_self_build_repo: "https://mau.dev/mautri matrix_mautrix_whatsapp_container_image_self_build_branch: "{{ 'master' if matrix_mautrix_whatsapp_version == 'latest' else matrix_mautrix_whatsapp_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/whatsapp -matrix_mautrix_whatsapp_version: v0.12.1 +matrix_mautrix_whatsapp_version: v0.12.2 # See: https://mau.dev/mautrix/whatsapp/container_registry matrix_mautrix_whatsapp_docker_image: "{{ matrix_mautrix_whatsapp_docker_image_registry_prefix }}mautrix/whatsapp:{{ matrix_mautrix_whatsapp_version }}" From 3092037a7e7051fe3bf5060e7f6c225e71540f1f Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 16 Jun 2025 20:42:11 +0000 Subject: [PATCH 163/404] Update dock.mau.dev/mautrix/meta Docker tag to v0.5.1 --- .../matrix-bridge-mautrix-meta-instagram/defaults/main.yml | 2 +- .../matrix-bridge-mautrix-meta-messenger/defaults/main.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml index 1960ae986..e74ba2ea3 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml @@ -20,7 +20,7 @@ matrix_mautrix_meta_instagram_enabled: true matrix_mautrix_meta_instagram_identifier: matrix-mautrix-meta-instagram # renovate: datasource=docker depName=dock.mau.dev/mautrix/meta -matrix_mautrix_meta_instagram_version: v0.4.6 +matrix_mautrix_meta_instagram_version: v0.5.1 matrix_mautrix_meta_instagram_base_path: "{{ matrix_base_data_path }}/mautrix-meta-instagram" matrix_mautrix_meta_instagram_config_path: "{{ matrix_mautrix_meta_instagram_base_path }}/config" diff --git a/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml index 4aaee719c..7c3786e32 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml @@ -20,7 +20,7 @@ matrix_mautrix_meta_messenger_enabled: true matrix_mautrix_meta_messenger_identifier: matrix-mautrix-meta-messenger # renovate: datasource=docker depName=dock.mau.dev/mautrix/meta -matrix_mautrix_meta_messenger_version: v0.4.6 +matrix_mautrix_meta_messenger_version: v0.5.1 matrix_mautrix_meta_messenger_base_path: "{{ matrix_base_data_path }}/mautrix-meta-messenger" matrix_mautrix_meta_messenger_config_path: "{{ matrix_mautrix_meta_messenger_base_path }}/config" From 3b425908da9bc742c56b981bcf4e97f72b01a84d Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 17 Jun 2025 12:31:48 +0000 Subject: [PATCH 164/404] Update dependency grafana to v11.6.3-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 9ee1aa3ec..8a4d38b65 100644 --- a/requirements.yml +++ b/requirements.yml @@ -22,7 +22,7 @@ version: v4.98.1-r0-2-0 name: exim_relay - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-grafana.git - version: v11.6.2-0 + version: v11.6.3-0 name: grafana - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-jitsi.git version: v10314-0 From aada2d255fa2102655580cd168b682a41140a0d9 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 17 Jun 2025 19:02:43 +0300 Subject: [PATCH 165/404] Upgrade Synapse (v1.131.0 -> v1.132.0) --- roles/custom/matrix-synapse/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse/defaults/main.yml b/roles/custom/matrix-synapse/defaults/main.yml index 112091b08..22fb3e6d1 100644 --- a/roles/custom/matrix-synapse/defaults/main.yml +++ b/roles/custom/matrix-synapse/defaults/main.yml @@ -16,7 +16,7 @@ matrix_synapse_enabled: true matrix_synapse_github_org_and_repo: element-hq/synapse # renovate: datasource=docker depName=ghcr.io/element-hq/synapse -matrix_synapse_version: v1.131.0 +matrix_synapse_version: v1.132.0 matrix_synapse_username: '' matrix_synapse_uid: '' From 8f0ac84721168c969639351f37ec6905bd58faef Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 17 Jun 2025 19:14:33 +0000 Subject: [PATCH 166/404] Update ghcr.io/element-hq/element-web Docker tag to v1.11.104 --- roles/custom/matrix-client-element/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-element/defaults/main.yml b/roles/custom/matrix-client-element/defaults/main.yml index 8fe967c69..e9b9096cb 100644 --- a/roles/custom/matrix-client-element/defaults/main.yml +++ b/roles/custom/matrix-client-element/defaults/main.yml @@ -29,7 +29,7 @@ matrix_client_element_container_image_self_build_repo: "https://github.com/eleme matrix_client_element_container_image_self_build_low_memory_system_patch_enabled: "{{ ansible_memtotal_mb < 4096 }}" # renovate: datasource=docker depName=ghcr.io/element-hq/element-web -matrix_client_element_version: v1.11.103 +matrix_client_element_version: v1.11.104 matrix_client_element_docker_image: "{{ matrix_client_element_docker_image_registry_prefix }}element-hq/element-web:{{ matrix_client_element_version }}" matrix_client_element_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_element_container_image_self_build else matrix_client_element_docker_image_registry_prefix_upstream }}" From b046292c10f43a5d732e7f196c24bc1fd87693a7 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 17 Jun 2025 19:14:38 +0000 Subject: [PATCH 167/404] Update ghcr.io/element-hq/matrix-authentication-service Docker tag to v0.17.1 --- roles/custom/matrix-authentication-service/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-authentication-service/defaults/main.yml b/roles/custom/matrix-authentication-service/defaults/main.yml index 45981618d..97cd12b64 100644 --- a/roles/custom/matrix-authentication-service/defaults/main.yml +++ b/roles/custom/matrix-authentication-service/defaults/main.yml @@ -22,7 +22,7 @@ matrix_authentication_service_container_repo_version: "{{ 'main' if matrix_authe matrix_authentication_service_container_src_files_path: "{{ matrix_base_data_path }}/matrix-authentication-service/container-src" # renovate: datasource=docker depName=ghcr.io/element-hq/matrix-authentication-service -matrix_authentication_service_version: 0.16.0 +matrix_authentication_service_version: 0.17.1 matrix_authentication_service_container_image_registry_prefix: "{{ 'localhost/' if matrix_authentication_service_container_image_self_build else matrix_authentication_service_container_image_registry_prefix_upstream }}" matrix_authentication_service_container_image_registry_prefix_upstream: "{{ matrix_authentication_service_container_image_registry_prefix_upstream_default }}" matrix_authentication_service_container_image_registry_prefix_upstream_default: "ghcr.io/" From cb2586f8b47fcdcbf90d0371611a2ebcb959625d Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Wed, 18 Jun 2025 06:58:43 +0300 Subject: [PATCH 168/404] Upgrade Traefik (v3.4.1-0 -> v3.4.1-1) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 8a4d38b65..4f357fa86 100644 --- a/requirements.yml +++ b/requirements.yml @@ -67,7 +67,7 @@ version: v1.0.0-0 name: timesync - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik.git - version: v3.4.1-0 + version: v3.4.1-1 name: traefik - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik-certs-dumper.git version: v2.10.0-0 From 279de764c8949e4e76025094705829b7ea12c742 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Wed, 18 Jun 2025 08:08:03 +0300 Subject: [PATCH 169/404] Update Prerequisites to mention why `sudo` is required in all cases --- docs/prerequisites.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/prerequisites.md b/docs/prerequisites.md index 18368af39..bd0ad4316 100644 --- a/docs/prerequisites.md +++ b/docs/prerequisites.md @@ -49,7 +49,7 @@ We will be using `example.com` as the domain in the following instruction. Pleas - [Python](https://www.python.org/). Most distributions install Python by default, but some don't (e.g. Ubuntu 18.04) and require manual installation (something like `apt-get install python3`). On some distros, Ansible may incorrectly [detect the Python version](https://docs.ansible.com/ansible/latest/reference_appendices/interpreter_discovery.html) (2 vs 3) and you may need to explicitly specify the interpreter path in `inventory/hosts` during installation (e.g. `ansible_python_interpreter=/usr/bin/python3`) -- [sudo](https://www.sudo.ws/), even when you've configured Ansible to log in as `root`. Some distributions, like a minimal Debian net install, do not include the `sudo` package by default. +- [sudo](https://www.sudo.ws/), even when you've configured Ansible to log in as `root`, because this Ansible playbook sometimes uses the Ansible [become](https://docs.ansible.com/ansible/latest/playbook_guide/playbooks_privilege_escalation.html) module to perform tasks as another user (e.g. `matrix`) and the `become` module's default implementation uses `sudo`. Some distributions, like a minimal Debian net install, do not include the `sudo` package by default. - An HTTPS-capable web server at the base domain name (`example.com`) which is capable of serving static files. Unless you decide to [Serve the base domain from the Matrix server](configuring-playbook-base-domain-serving.md) or alternatively, to use DNS SRV records for [Server Delegation](howto-server-delegation.md). From 92898596730b28ddf2934e359a8cb7378772de87 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 18 Jun 2025 16:26:56 +0000 Subject: [PATCH 170/404] Update dependency urllib3 to v2.5.0 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 3e7e44473..76c0d764e 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -30,4 +30,4 @@ sphinxcontrib-qthelp==2.0.0 sphinxcontrib-serializinghtml==2.0.0 tabulate==0.9.0 uc-micro-py==1.0.3 -urllib3==2.4.0 +urllib3==2.5.0 From 185f9b5765b81a33b1eb3cb095ce72a4d23df14a Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 21 Jun 2025 00:11:45 +0000 Subject: [PATCH 171/404] Update ghcr.io/etkecc/fluffychat-web Docker tag to v2 --- roles/custom/matrix-client-fluffychat/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-fluffychat/defaults/main.yml b/roles/custom/matrix-client-fluffychat/defaults/main.yml index 4b45249e7..03a8bd613 100644 --- a/roles/custom/matrix-client-fluffychat/defaults/main.yml +++ b/roles/custom/matrix-client-fluffychat/defaults/main.yml @@ -13,7 +13,7 @@ matrix_client_fluffychat_container_image_self_build_repo: "https://github.com/et matrix_client_fluffychat_container_image_self_build_version: "{{ 'main' if matrix_client_fluffychat_version == 'latest' else matrix_client_fluffychat_version }}" # renovate: datasource=docker depName=ghcr.io/etkecc/fluffychat-web -matrix_client_fluffychat_version: v1.27.0 +matrix_client_fluffychat_version: v2.0.0 matrix_client_fluffychat_docker_image: "{{ matrix_client_fluffychat_docker_image_registry_prefix }}etkecc/fluffychat-web:{{ matrix_client_fluffychat_version }}" matrix_client_fluffychat_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_fluffychat_container_image_self_build else matrix_client_fluffychat_docker_image_registry_prefix_upstream }}" matrix_client_fluffychat_docker_image_registry_prefix_upstream: "{{ matrix_client_fluffychat_docker_image_registry_prefix_upstream_default }}" From 772c24873397d6e492d8a05cb025ba8a0164e255 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 21 Jun 2025 14:24:41 +0000 Subject: [PATCH 172/404] Update dependency Pygments to v2.19.2 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 76c0d764e..4b26d1146 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -14,7 +14,7 @@ mdit-py-plugins==0.4.2 mdurl==0.1.2 myst-parser==4.0.1 packaging==25.0 -Pygments==2.19.1 +Pygments==2.19.2 PyYAML==6.0.2 requests==2.32.4 setuptools==80.9.0 From 91817e8335945b80808f961f91df19c369a5c371 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 23 Jun 2025 11:53:56 +0000 Subject: [PATCH 173/404] Update gnuxie/draupnir Docker tag to v2.4.0 --- .../custom/matrix-appservice-draupnir-for-all/defaults/main.yml | 2 +- roles/custom/matrix-bot-draupnir/defaults/main.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml b/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml index 89935ee2b..1ec84a312 100644 --- a/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml +++ b/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml @@ -12,7 +12,7 @@ matrix_appservice_draupnir_for_all_enabled: true # renovate: datasource=docker depName=gnuxie/draupnir -matrix_appservice_draupnir_for_all_version: "v2.3.1" +matrix_appservice_draupnir_for_all_version: "v2.4.0" matrix_appservice_draupnir_for_all_container_image_self_build: false matrix_appservice_draupnir_for_all_container_image_self_build_repo: "https://github.com/the-draupnir-project/Draupnir.git" diff --git a/roles/custom/matrix-bot-draupnir/defaults/main.yml b/roles/custom/matrix-bot-draupnir/defaults/main.yml index 2b254a07a..fa0031926 100644 --- a/roles/custom/matrix-bot-draupnir/defaults/main.yml +++ b/roles/custom/matrix-bot-draupnir/defaults/main.yml @@ -12,7 +12,7 @@ matrix_bot_draupnir_enabled: true # renovate: datasource=docker depName=gnuxie/draupnir -matrix_bot_draupnir_version: "v2.3.1" +matrix_bot_draupnir_version: "v2.4.0" matrix_bot_draupnir_container_image_self_build: false matrix_bot_draupnir_container_image_self_build_repo: "https://github.com/the-draupnir-project/Draupnir.git" From 3be0449c3544eeaa7fd6f6e7008e881e8c982079 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 23 Jun 2025 17:31:13 +0000 Subject: [PATCH 174/404] Update matrixconduit/matrix-conduit Docker tag to v0.10.5 --- roles/custom/matrix-conduit/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-conduit/defaults/main.yml b/roles/custom/matrix-conduit/defaults/main.yml index 3e65a0cc5..a50ce14a3 100644 --- a/roles/custom/matrix-conduit/defaults/main.yml +++ b/roles/custom/matrix-conduit/defaults/main.yml @@ -19,7 +19,7 @@ matrix_conduit_docker_image_registry_prefix: "{{ matrix_conduit_docker_image_reg matrix_conduit_docker_image_registry_prefix_upstream: "{{ matrix_conduit_docker_image_registry_prefix_upstream_default }}" matrix_conduit_docker_image_registry_prefix_upstream_default: docker.io/ # renovate: datasource=docker depName=matrixconduit/matrix-conduit -matrix_conduit_docker_image_tag: "v0.10.4" +matrix_conduit_docker_image_tag: "v0.10.5" matrix_conduit_docker_image_force_pull: "{{ matrix_conduit_docker_image.endswith(':latest') }}" matrix_conduit_base_path: "{{ matrix_base_data_path }}/conduit" From 93fffee6a41ec5bc4b8d26e814f1397594d53b7d Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 23 Jun 2025 22:54:23 +0000 Subject: [PATCH 175/404] Update gnuxie/draupnir Docker tag to v2.4.1 --- .../custom/matrix-appservice-draupnir-for-all/defaults/main.yml | 2 +- roles/custom/matrix-bot-draupnir/defaults/main.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml b/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml index 1ec84a312..b6a732cd9 100644 --- a/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml +++ b/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml @@ -12,7 +12,7 @@ matrix_appservice_draupnir_for_all_enabled: true # renovate: datasource=docker depName=gnuxie/draupnir -matrix_appservice_draupnir_for_all_version: "v2.4.0" +matrix_appservice_draupnir_for_all_version: "v2.4.1" matrix_appservice_draupnir_for_all_container_image_self_build: false matrix_appservice_draupnir_for_all_container_image_self_build_repo: "https://github.com/the-draupnir-project/Draupnir.git" diff --git a/roles/custom/matrix-bot-draupnir/defaults/main.yml b/roles/custom/matrix-bot-draupnir/defaults/main.yml index fa0031926..b67389f27 100644 --- a/roles/custom/matrix-bot-draupnir/defaults/main.yml +++ b/roles/custom/matrix-bot-draupnir/defaults/main.yml @@ -12,7 +12,7 @@ matrix_bot_draupnir_enabled: true # renovate: datasource=docker depName=gnuxie/draupnir -matrix_bot_draupnir_version: "v2.4.0" +matrix_bot_draupnir_version: "v2.4.1" matrix_bot_draupnir_container_image_self_build: false matrix_bot_draupnir_container_image_self_build_repo: "https://github.com/the-draupnir-project/Draupnir.git" From b8ebe57558b58b7ed8fbbd1a576f917da47b869b Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Wed, 25 Jun 2025 06:32:45 +0300 Subject: [PATCH 176/404] Reference local `configuring-playbook-user-verification-service.md` docs file locally --- docs/configuring-playbook-jitsi.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/configuring-playbook-jitsi.md b/docs/configuring-playbook-jitsi.md index 3a494d083..6c035dee4 100644 --- a/docs/configuring-playbook-jitsi.md +++ b/docs/configuring-playbook-jitsi.md @@ -70,7 +70,7 @@ By default the Jitsi Meet instance **does not require for anyone to log in, and If you would like to control who is allowed to start meetings on your instance, you'd need to enable Jitsi's authentication and optionally guests mode. -See [this section](https://github.com/mother-of-all-self-hosting/ansible-role-jitsi/blob/main/docs/configuring-jitsi.md#configure-jitsi-authentication-and-guests-mode-optional) on the role's documentation for details about how to configure the authentication and guests mode. The recommended authentication method is `internal` as it also works in federated rooms. If you want to enable authentication with Matrix OpenID making use of [Matrix User Verification Service (UVS)](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/master/docs/configuring-playbook-user-verification-service.md), see [here](https://github.com/mother-of-all-self-hosting/ansible-role-jitsi/blob/main/docs/configuring-jitsi.md#authenticate-using-matrix-openid-auth-type-matrix) for details about how to set it up. +See [this section](https://github.com/mother-of-all-self-hosting/ansible-role-jitsi/blob/main/docs/configuring-jitsi.md#configure-jitsi-authentication-and-guests-mode-optional) on the role's documentation for details about how to configure the authentication and guests mode. The recommended authentication method is `internal` as it also works in federated rooms. If you want to enable authentication with Matrix OpenID making use of [Matrix User Verification Service (UVS)](configuring-playbook-user-verification-service.md), see [here](https://github.com/mother-of-all-self-hosting/ansible-role-jitsi/blob/main/docs/configuring-jitsi.md#authenticate-using-matrix-openid-auth-type-matrix) for details about how to set it up. ### Enable Gravatar (optional) From bebaac886e3861fbeccf5423a4e888ee97893a4e Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Wed, 25 Jun 2025 06:58:09 +0300 Subject: [PATCH 177/404] Upgrade Jitsi (v10314-0 -> v10314-1) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 4f357fa86..5cc1a4da0 100644 --- a/requirements.yml +++ b/requirements.yml @@ -25,7 +25,7 @@ version: v11.6.3-0 name: grafana - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-jitsi.git - version: v10314-0 + version: v10314-1 name: jitsi - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-livekit-server.git version: v1.9.0-0 From 133ba6437553ed902f4c7603d507c42de4458c16 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 25 Jun 2025 01:49:36 +0000 Subject: [PATCH 178/404] Update nginx Docker tag to v1.29.0 --- .../matrix-synapse-reverse-proxy-companion/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse-reverse-proxy-companion/defaults/main.yml b/roles/custom/matrix-synapse-reverse-proxy-companion/defaults/main.yml index 47dbdce7c..7cda398cc 100644 --- a/roles/custom/matrix-synapse-reverse-proxy-companion/defaults/main.yml +++ b/roles/custom/matrix-synapse-reverse-proxy-companion/defaults/main.yml @@ -24,7 +24,7 @@ matrix_synapse_reverse_proxy_companion_enabled: true # renovate: datasource=docker depName=nginx -matrix_synapse_reverse_proxy_companion_version: 1.28.0-alpine +matrix_synapse_reverse_proxy_companion_version: 1.29.0-alpine matrix_synapse_reverse_proxy_companion_base_path: "{{ matrix_synapse_base_path }}/reverse-proxy-companion" matrix_synapse_reverse_proxy_companion_confd_path: "{{ matrix_synapse_reverse_proxy_companion_base_path }}/conf.d" From acf244ea264a5351ef175be25671d469905391f9 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 25 Jun 2025 07:07:34 +0000 Subject: [PATCH 179/404] Update docker.io/metio/matrix-alertmanager-receiver Docker tag to v2025.6.25 --- roles/custom/matrix-alertmanager-receiver/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-alertmanager-receiver/defaults/main.yml b/roles/custom/matrix-alertmanager-receiver/defaults/main.yml index f98a8dff8..3d47918d6 100644 --- a/roles/custom/matrix-alertmanager-receiver/defaults/main.yml +++ b/roles/custom/matrix-alertmanager-receiver/defaults/main.yml @@ -11,7 +11,7 @@ matrix_alertmanager_receiver_enabled: true # renovate: datasource=docker depName=docker.io/metio/matrix-alertmanager-receiver -matrix_alertmanager_receiver_version: 2025.5.21 +matrix_alertmanager_receiver_version: 2025.6.25 matrix_alertmanager_receiver_scheme: https From 34878abd67f142d193dfcbac2a50905e41a56770 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 27 Jun 2025 08:36:39 +0000 Subject: [PATCH 180/404] Update dependency traefik to v3.4.3-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 5cc1a4da0..e1baf8e31 100644 --- a/requirements.yml +++ b/requirements.yml @@ -67,7 +67,7 @@ version: v1.0.0-0 name: timesync - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik.git - version: v3.4.1-1 + version: v3.4.3-0 name: traefik - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik-certs-dumper.git version: v2.10.0-0 From 39d13a826a9cdc0111b8fdf2a23ee059f05892e4 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 27 Jun 2025 08:36:33 +0000 Subject: [PATCH 181/404] Update dependency prometheus to v3.4.2-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index e1baf8e31..ed1170323 100644 --- a/requirements.yml +++ b/requirements.yml @@ -49,7 +49,7 @@ version: v17-3 name: postgres_backup - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus.git - version: v3.4.1-0 + version: v3.4.2-0 name: prometheus - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-node-exporter.git version: v1.9.1-3 From 018f3f44087ab3abf2f3c74acfa9857980303290 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Fri, 27 Jun 2025 16:48:08 +0300 Subject: [PATCH 182/404] Upgrade baibot (v1.7.4 -> v1.7.5) --- roles/custom/matrix-bot-baibot/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bot-baibot/defaults/main.yml b/roles/custom/matrix-bot-baibot/defaults/main.yml index f8c9d736c..e33d591fe 100644 --- a/roles/custom/matrix-bot-baibot/defaults/main.yml +++ b/roles/custom/matrix-bot-baibot/defaults/main.yml @@ -17,7 +17,7 @@ matrix_bot_baibot_container_repo_version: "{{ 'main' if matrix_bot_baibot_versio matrix_bot_baibot_container_src_files_path: "{{ matrix_base_data_path }}/baibot/container-src" # renovate: datasource=docker depName=ghcr.io/etkecc/baibot -matrix_bot_baibot_version: v1.7.4 +matrix_bot_baibot_version: v1.7.5 matrix_bot_baibot_container_image: "{{ matrix_bot_baibot_container_image_registry_prefix }}etkecc/baibot:{{ matrix_bot_baibot_version }}" matrix_bot_baibot_container_image_registry_prefix: "{{ 'localhost/' if matrix_bot_baibot_container_image_self_build else matrix_bot_baibot_container_image_registry_prefix_upstream }}" matrix_bot_baibot_container_image_registry_prefix_upstream: "{{ matrix_bot_baibot_container_image_registry_prefix_upstream_default }}" From b13ba5b909f0a269697241614fa6f73f5de65210 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Fri, 27 Jun 2025 17:34:04 +0300 Subject: [PATCH 183/404] Use `ansible.builtin.package` instead of `ansible.builtin.yum` `ansible.builtin.yum` is no longer available in newer Ansible versions. We may use `ansible.builtin.dnf` instead, but `ansible.builting.package` seems like a safer bet that should work in both older & newer RHEL-based distros. Ref: https://github.com/ansible/ansible-lint/issues/4251 --- roles/custom/matrix-base/tasks/ensure_fuse_installed_redhat.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-base/tasks/ensure_fuse_installed_redhat.yml b/roles/custom/matrix-base/tasks/ensure_fuse_installed_redhat.yml index be2888030..1a86fd2bb 100644 --- a/roles/custom/matrix-base/tasks/ensure_fuse_installed_redhat.yml +++ b/roles/custom/matrix-base/tasks/ensure_fuse_installed_redhat.yml @@ -5,6 +5,6 @@ --- - name: Ensure fuse installed (RedHat) - ansible.builtin.yum: + ansible.builtin.package: name: fuse state: present From f8142a0c377d929798d18770db5a34933d8cc09a Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Fri, 27 Jun 2025 17:38:43 +0300 Subject: [PATCH 184/404] Switch from (now-missing) `ansible-community/ansible-lint-action` to `ansible/ansible-lint` --- .github/workflows/matrix.yml | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/.github/workflows/matrix.yml b/.github/workflows/matrix.yml index eccdec3bd..3e31f0334 100644 --- a/.github/workflows/matrix.yml +++ b/.github/workflows/matrix.yml @@ -24,10 +24,14 @@ jobs: steps: - name: Check out uses: actions/checkout@v4 + - name: Run ansible-lint - uses: ansible-community/ansible-lint-action@v6.17.0 + uses: ansible/ansible-lint@v25.6.1 with: - path: roles/custom + args: "roles/custom" + setup_python: "true" + working_directory: "" + requirements_file: requirements.yml precommit: name: Run pre-commit runs-on: ubuntu-latest From 29607f442dfa7970e4b01518e3f4a2901dff8ddb Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 27 Jun 2025 14:26:16 +0000 Subject: [PATCH 185/404] Update dependency maunium/synapse-http-antispam to v0.5.0 --- roles/custom/matrix-synapse/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse/defaults/main.yml b/roles/custom/matrix-synapse/defaults/main.yml index 22fb3e6d1..0d56446d6 100644 --- a/roles/custom/matrix-synapse/defaults/main.yml +++ b/roles/custom/matrix-synapse/defaults/main.yml @@ -1417,7 +1417,7 @@ matrix_synapse_ext_spam_checker_mjolnir_antispam_config: matrix_synapse_ext_synapse_http_antispam_enabled: false matrix_synapse_ext_synapse_http_antispam_git_repository_url: "https://github.com/maunium/synapse-http-antispam" # renovate: datasource=github-releases depName=maunium/synapse-http-antispam -matrix_synapse_ext_synapse_http_antispam_git_version: "v0.4.0" +matrix_synapse_ext_synapse_http_antispam_git_version: "v0.5.0" # Where Synapse can locate the consumer of the antispam API. Currently # Draupnir is the only consumer of this API that is playbook supported. # But https://github.com/maunium/meowlnir also supports the API. From 1a6a75bdabc3146c0788eca8fc9d60200c780724 Mon Sep 17 00:00:00 2001 From: Catalan Lover Date: Fri, 27 Jun 2025 19:58:41 +0200 Subject: [PATCH 186/404] Add support for do_ping to synapse-http-antispam This defaults to true for end user comfort as it helps assure them the modules connection to the consumer is working or is definitively not working. (As far as i have been told it retries until success) --- roles/custom/matrix-synapse/defaults/main.yml | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/roles/custom/matrix-synapse/defaults/main.yml b/roles/custom/matrix-synapse/defaults/main.yml index 0d56446d6..00717af96 100644 --- a/roles/custom/matrix-synapse/defaults/main.yml +++ b/roles/custom/matrix-synapse/defaults/main.yml @@ -1426,6 +1426,10 @@ matrix_synapse_ext_synapse_http_antispam_config_base_url: '' # homeserver a lot like how AS authentication is done. This is fully managed # the same way AS authentication is by the playbook. matrix_synapse_ext_synapse_http_antispam_config_authorization: '' +# This controls if the module will ping the consumer or not for ease of troubleshooting. This defaults +# to enabled to help assure users that the connection is working. +# Due to that its only a single log line per worker per startup this default is deemed acceptable. +matrix_synapse_ext_synapse_http_antispam_config_do_ping: true # This controls what callbacks are activated. This list is fully dependent on what consumer is in play. # And what capabilities said consumer should or shouldn't have. There are also performance implications # to these choices. @@ -1440,6 +1444,7 @@ matrix_synapse_ext_synapse_http_antispam_config: "{{ matrix_synapse_ext_synapse_ matrix_synapse_ext_synapse_http_antispam_config_yaml: | base_url: {{ matrix_synapse_ext_synapse_http_antispam_config_base_url | to_json }} authorization: {{ matrix_synapse_ext_synapse_http_antispam_config_authorization | to_json }} + do_ping: {{ matrix_synapse_ext_synapse_http_antispam_config_do_ping | to_json }} enabled_callbacks: {{ matrix_synapse_ext_synapse_http_antispam_config_enabled_callbacks | to_json }} fail_open: {{ matrix_synapse_ext_synapse_http_antispam_config_fail_open | to_json }} async: {{ matrix_synapse_ext_synapse_http_antispam_config_async | to_json }} From 31a7f4367cea8b7ad2237a624f02d867833efdf9 Mon Sep 17 00:00:00 2001 From: Catalan Lover <48515417+FSG-Cat@users.noreply.github.com> Date: Sat, 28 Jun 2025 09:49:37 +0200 Subject: [PATCH 187/404] Update Draupnir role Synapse-http-antispam config to match upstream. (#4392) --- roles/custom/matrix-bot-draupnir/defaults/main.yml | 5 +---- 1 file changed, 1 insertion(+), 4 deletions(-) diff --git a/roles/custom/matrix-bot-draupnir/defaults/main.yml b/roles/custom/matrix-bot-draupnir/defaults/main.yml index b67389f27..44b04f7c7 100644 --- a/roles/custom/matrix-bot-draupnir/defaults/main.yml +++ b/roles/custom/matrix-bot-draupnir/defaults/main.yml @@ -148,17 +148,14 @@ matrix_bot_draupnir_synapse_http_antispam_config_base_url: "{{ matrix_bot_draupn # Therefore the module is configured from Draupnir because the consumer of the module determines what settings are relevant. matrix_bot_draupnir_synapse_http_antispam_config_enabled_callbacks: - - check_event_for_spam - user_may_invite - user_may_join_room matrix_bot_draupnir_synapse_http_antispam_config_fail_open: - check_event_for_spam: true user_may_invite: true user_may_join_room: true -matrix_bot_draupnir_synapse_http_antispam_config_async: - check_event_for_spam: true +matrix_bot_draupnir_synapse_http_antispam_config_async: {} # Default configuration template which covers the generic use case. # You can customize it by controlling the various variables inside it. From 4e8aa53e277edebc0748df9b78c713e2ff95b41e Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 1 Jul 2025 16:13:24 +0000 Subject: [PATCH 188/404] Update ghcr.io/element-hq/element-web Docker tag to v1.11.105 --- roles/custom/matrix-client-element/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-element/defaults/main.yml b/roles/custom/matrix-client-element/defaults/main.yml index e9b9096cb..7348c31b4 100644 --- a/roles/custom/matrix-client-element/defaults/main.yml +++ b/roles/custom/matrix-client-element/defaults/main.yml @@ -29,7 +29,7 @@ matrix_client_element_container_image_self_build_repo: "https://github.com/eleme matrix_client_element_container_image_self_build_low_memory_system_patch_enabled: "{{ ansible_memtotal_mb < 4096 }}" # renovate: datasource=docker depName=ghcr.io/element-hq/element-web -matrix_client_element_version: v1.11.104 +matrix_client_element_version: v1.11.105 matrix_client_element_docker_image: "{{ matrix_client_element_docker_image_registry_prefix }}element-hq/element-web:{{ matrix_client_element_version }}" matrix_client_element_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_element_container_image_self_build else matrix_client_element_docker_image_registry_prefix_upstream }}" From c0269b71b847b8c37c19f1d7a3c66f004a21f180 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 1 Jul 2025 17:12:43 +0000 Subject: [PATCH 189/404] Update ghcr.io/element-hq/synapse Docker tag to v1.133.0 --- roles/custom/matrix-synapse/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse/defaults/main.yml b/roles/custom/matrix-synapse/defaults/main.yml index 00717af96..4f1176133 100644 --- a/roles/custom/matrix-synapse/defaults/main.yml +++ b/roles/custom/matrix-synapse/defaults/main.yml @@ -16,7 +16,7 @@ matrix_synapse_enabled: true matrix_synapse_github_org_and_repo: element-hq/synapse # renovate: datasource=docker depName=ghcr.io/element-hq/synapse -matrix_synapse_version: v1.132.0 +matrix_synapse_version: v1.133.0 matrix_synapse_username: '' matrix_synapse_uid: '' From 24d1875d38dec820cadae212def3ccbb782c5595 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 1 Jul 2025 17:12:39 +0000 Subject: [PATCH 190/404] Update ghcr.io/element-hq/matrix-authentication-service Docker tag to v0.18.0 --- roles/custom/matrix-authentication-service/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-authentication-service/defaults/main.yml b/roles/custom/matrix-authentication-service/defaults/main.yml index 97cd12b64..1a8996ba5 100644 --- a/roles/custom/matrix-authentication-service/defaults/main.yml +++ b/roles/custom/matrix-authentication-service/defaults/main.yml @@ -22,7 +22,7 @@ matrix_authentication_service_container_repo_version: "{{ 'main' if matrix_authe matrix_authentication_service_container_src_files_path: "{{ matrix_base_data_path }}/matrix-authentication-service/container-src" # renovate: datasource=docker depName=ghcr.io/element-hq/matrix-authentication-service -matrix_authentication_service_version: 0.17.1 +matrix_authentication_service_version: 0.18.0 matrix_authentication_service_container_image_registry_prefix: "{{ 'localhost/' if matrix_authentication_service_container_image_self_build else matrix_authentication_service_container_image_registry_prefix_upstream }}" matrix_authentication_service_container_image_registry_prefix_upstream: "{{ matrix_authentication_service_container_image_registry_prefix_upstream_default }}" matrix_authentication_service_container_image_registry_prefix_upstream_default: "ghcr.io/" From 9adfd8fc0d4b30ba441885a3fcde0bcbd3ddab87 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 1 Jul 2025 16:13:28 +0000 Subject: [PATCH 191/404] Update ghcr.io/element-hq/element-call Docker tag to v0.13.0 --- roles/custom/matrix-element-call/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-element-call/defaults/main.yml b/roles/custom/matrix-element-call/defaults/main.yml index 6292e2fdf..cf32f1c4a 100644 --- a/roles/custom/matrix-element-call/defaults/main.yml +++ b/roles/custom/matrix-element-call/defaults/main.yml @@ -21,7 +21,7 @@ matrix_element_call_enabled: false matrix_rtc_enabled: "{{ matrix_element_call_enabled }}" # renovate: datasource=docker depName=ghcr.io/element-hq/element-call -matrix_element_call_version: v0.12.2 +matrix_element_call_version: v0.13.0 matrix_element_call_scheme: https From d2164d7a48b2d8e4e2802555f6b274dd39aa8091 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 2 Jul 2025 06:48:33 +0000 Subject: [PATCH 192/404] Update docker.io/metio/matrix-alertmanager-receiver Docker tag to v2025.7.2 --- roles/custom/matrix-alertmanager-receiver/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-alertmanager-receiver/defaults/main.yml b/roles/custom/matrix-alertmanager-receiver/defaults/main.yml index 3d47918d6..897daee55 100644 --- a/roles/custom/matrix-alertmanager-receiver/defaults/main.yml +++ b/roles/custom/matrix-alertmanager-receiver/defaults/main.yml @@ -11,7 +11,7 @@ matrix_alertmanager_receiver_enabled: true # renovate: datasource=docker depName=docker.io/metio/matrix-alertmanager-receiver -matrix_alertmanager_receiver_version: 2025.6.25 +matrix_alertmanager_receiver_version: 2025.7.2 matrix_alertmanager_receiver_scheme: https From 5987bc5b5e96fd337269a836645a884aef643848 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 3 Jul 2025 16:43:50 +0000 Subject: [PATCH 193/404] Update ghcr.io/element-hq/element-call Docker tag to v0.13.1 --- roles/custom/matrix-element-call/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-element-call/defaults/main.yml b/roles/custom/matrix-element-call/defaults/main.yml index cf32f1c4a..676bb1ee6 100644 --- a/roles/custom/matrix-element-call/defaults/main.yml +++ b/roles/custom/matrix-element-call/defaults/main.yml @@ -21,7 +21,7 @@ matrix_element_call_enabled: false matrix_rtc_enabled: "{{ matrix_element_call_enabled }}" # renovate: datasource=docker depName=ghcr.io/element-hq/element-call -matrix_element_call_version: v0.13.0 +matrix_element_call_version: v0.13.1 matrix_element_call_scheme: https From 613f685f54df1127ff1dde81120f9bad6043272e Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Fri, 4 Jul 2025 17:08:26 +0200 Subject: [PATCH 194/404] add matrix_continuwuity_url_preview_domain_contains_allowlist variable --- roles/custom/matrix-continuwuity/defaults/main.yml | 3 +++ .../custom/matrix-continuwuity/templates/continuwuity.toml.j2 | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/roles/custom/matrix-continuwuity/defaults/main.yml b/roles/custom/matrix-continuwuity/defaults/main.yml index a9046e94f..82e8b3a03 100644 --- a/roles/custom/matrix-continuwuity/defaults/main.yml +++ b/roles/custom/matrix-continuwuity/defaults/main.yml @@ -196,3 +196,6 @@ matrix_continuwuity_environment_variables_extension: '' matrix_continuwuity_forbidden_remote_server_names: [] matrix_continuwuity_forbidden_remote_room_directory_server_names: [] + +# Controls the `url_preview_domain_contains_allowlist` setting. +matrix_continuwuity_url_preview_domain_contains_allowlist: [] diff --git a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 index 75d2f1d38..25072fae8 100644 --- a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 +++ b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 @@ -1215,7 +1215,7 @@ forbidden_remote_room_directory_server_names = {{ matrix_continuwuity_forbidden_ # attack surface to your server, you are expected to be aware of the risks # by doing so. # -#url_preview_domain_contains_allowlist = [] +url_preview_domain_contains_allowlist = {{ matrix_continuwuity_url_preview_domain_contains_allowlist | to_json }} # Vector list of explicit domains allowed to send requests to for URL # previews. From 25498851a0a7c3db1cccf81259294a90b35cedc7 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Fri, 4 Jul 2025 20:39:20 +0300 Subject: [PATCH 195/404] Add some relay-related variables to mautrix-slack role --- .../custom/matrix-bridge-mautrix-slack/defaults/main.yml | 9 +++++++++ .../matrix-bridge-mautrix-slack/templates/config.yaml.j2 | 6 +++--- 2 files changed, 12 insertions(+), 3 deletions(-) diff --git a/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml index 3a9fceff3..91f6c942c 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml @@ -168,3 +168,12 @@ matrix_mautrix_slack_bridge_encryption_pickle_key: maunium.net/go/mautrix-whatsa matrix_mautrix_slack_provisioning_shared_secret: '' matrix_mautrix_slack_public_media_signing_key: '' + +# Controls whether relay mode is enabled +matrix_mautrix_slack_bridge_relay_enabled: false + +# Controls whether only admins can set themselves as relay users +matrix_mautrix_slack_bridge_relay_admin_only: true + +# List of user login IDs which anyone can set as a relay, as long as the relay user is in the room +matrix_mautrix_slack_bridge_relay_default_relays: [] diff --git a/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 index 5b231afa8..5ff9ffbf5 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 @@ -113,12 +113,12 @@ bridge: relay: # Whether relay mode should be allowed. If allowed, the set-relay command can be used to turn any # authenticated user into a relaybot for that chat. - enabled: false + enabled: {{ matrix_mautrix_slack_bridge_relay_enabled | to_json }} # Should only admins be allowed to set themselves as relay users? # If true, non-admins can only set users listed in default_relays as relays in a room. - admin_only: true + admin_only: {{ matrix_mautrix_slack_bridge_relay_admin_only | to_json }} # List of user login IDs which anyone can set as a relay, as long as the relay user is in the room. - default_relays: [] + default_relays: {{ matrix_mautrix_slack_bridge_relay_default_relays | to_json }} # The formats to use when sending messages via the relaybot. # Available variables: # .Sender.UserID - The Matrix user ID of the sender. From bdec7c646dc8568878703f9b3f1a4aa8f2e114d1 Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Fri, 4 Jul 2025 21:07:46 +0200 Subject: [PATCH 196/404] update continuwuity.toml --- .../templates/continuwuity.toml.j2 | 362 +++++++++++++----- 1 file changed, 258 insertions(+), 104 deletions(-) diff --git a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 index 25072fae8..eadecd34f 100644 --- a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 +++ b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 @@ -7,8 +7,8 @@ SPDX-License-Identifier: AGPL-3.0-or-later #} ### continuwuity Configuration -### See: -### https://continuwuity.org/configuration +### For more information, see: +### https://continuwuity.org/configuration.html [global] @@ -16,7 +16,7 @@ SPDX-License-Identifier: AGPL-3.0-or-later # suffix for user and room IDs/aliases. # # See the docs for reverse proxying and delegation: -# https://continuwuity.org/deploying/generic#setting-up-the-reverse-proxy +# https://continuwuity.org/deploying/generic.html#setting-up-the-reverse-proxy # # Also see the `[global.well_known]` config section at the very bottom. # @@ -27,7 +27,7 @@ SPDX-License-Identifier: AGPL-3.0-or-later # YOU NEED TO EDIT THIS. THIS CANNOT BE CHANGED AFTER WITHOUT A DATABASE # WIPE. # -# example: "continuwuity.woof" +# example: "continuwuity.org" # server_name = {{ matrix_continuwuity_config_server_name | to_json }} @@ -44,7 +44,7 @@ address = "0.0.0.0" # The port(s) continuwuity will listen on. # # For reverse proxying, see: -# https://continuwuity.org/deploying/generic#setting-up-the-reverse-proxy +# https://continuwuity.org/deploying/generic.html#setting-up-the-reverse-proxy # # If you are using Docker, don't change this, you'll need to map an # external port to this. @@ -59,8 +59,9 @@ port = {{ matrix_continuwuity_config_port_number }} # listening on a UNIX socket, you MUST remove/comment the `address` key. # # Remember to make sure that your reverse proxy has access to this socket -# file, either by adding your reverse proxy to the 'continuwuity' group or -# granting world R/W permissions with `unix_socket_perms` (666 minimum). +# file, either by adding your reverse proxy to the appropriate user group +# or granting world R/W permissions with `unix_socket_perms` (666 +# minimum). # # example: "/run/continuwuity/continuwuity.sock" # @@ -70,8 +71,8 @@ port = {{ matrix_continuwuity_config_port_number }} # #unix_socket_perms = 660 -# This is the only directory where continuwuity will save its data, including -# media. Note: this was previously "/var/lib/matrix-conduit". +# This is the only directory where continuwuity will save its data, +# including media. Note: this was previously "/var/lib/matrix-conduit". # # YOU NEED TO EDIT THIS. # @@ -79,9 +80,9 @@ port = {{ matrix_continuwuity_config_port_number }} # database_path = "/var/lib/continuwuity" -# continuwuity supports online database backups using RocksDB's Backup engine -# API. To use this, set a database backup path that continuwuity can write -# to. +# continuwuity supports online database backups using RocksDB's Backup +# engine API. To use this, set a database backup path that continuwuity +# can write to. # # For more information, see: # https://continuwuity.org/maintenance.html#backups @@ -108,17 +109,13 @@ database_path = "/var/lib/continuwuity" new_user_displayname_suffix = {{ matrix_continuwuity_config_new_user_displayname_suffix | to_json }} # If enabled, continuwuity will send a simple GET request periodically to -# `https://pupbrain.dev/check-for-updates/stable` for any new -# announcements made. Despite the name, this is not an update check -# endpoint, it is simply an announcement check endpoint. -# -# This is disabled by default as this is rarely used except for security -# updates or major updates. +# `https://continuwuity.org/.well-known/continuwuity/announcements` for any new +# announcements or major updates. This is not an update check endpoint. # allow_check_for_updates = {{ matrix_continuwuity_config_allow_check_for_updates | to_json }} -# Set this to any float value to multiply continuwuity's in-memory LRU caches -# with such as "auth_chain_cache_capacity". +# Set this to any float value to multiply continuwuity's in-memory LRU +# caches with such as "auth_chain_cache_capacity". # # May be useful if you have significant memory to spare to increase # performance. @@ -190,14 +187,6 @@ allow_check_for_updates = {{ matrix_continuwuity_config_allow_check_for_updates # #servernameevent_data_cache_capacity = varies by system -# This item is undocumented. Please contribute documentation for it. -# -#server_visibility_cache_capacity = varies by system - -# This item is undocumented. Please contribute documentation for it. -# -#user_visibility_cache_capacity = varies by system - # This item is undocumented. Please contribute documentation for it. # #stateinfo_cache_capacity = varies by system @@ -259,7 +248,7 @@ allow_check_for_updates = {{ matrix_continuwuity_config_allow_check_for_updates # # If you are running continuwuity in a container environment, this config # option may need to be enabled. For more details, see: -# https://continuwuity.org/troubleshooting#potential-dns-issues-when-using-docker +# https://continuwuity.org/troubleshooting.html#potential-dns-issues-when-using-docker # #query_over_tcp_only = false @@ -372,6 +361,26 @@ max_request_size = {{ matrix_continuwuity_config_max_request_size }} # #pusher_idle_timeout = 15 +# Maximum time to receive a request from a client (seconds). +# +#client_receive_timeout = 75 + +# Maximum time to process a request received from a client (seconds). +# +#client_request_timeout = 180 + +# Maximum time to transmit a response to a client (seconds) +# +#client_response_timeout = 120 + +# Grace period for clean shutdown of client requests (seconds). +# +#client_shutdown_timeout = 10 + +# Grace period for clean shutdown of federation requests (seconds). +# +#sender_shutdown_timeout = 5 + # Enables registration. If set to false, no users can register on this # server. # @@ -384,17 +393,27 @@ max_request_size = {{ matrix_continuwuity_config_max_request_size }} # allow_registration = {{ matrix_continuwuity_config_allow_registration | to_json }} -yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse = {{ matrix_continuwuity_config_yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse | to_json }} - -allow_federation = {{ matrix_continuwuity_config_allow_federation | to_json }} +# If registration is enabled, and this setting is true, new users +# registered after the first admin user will be automatically suspended +# and will require an admin to run `!admin users unsuspend `. +# +# Suspended users are still able to read messages, make profile updates, +# leave rooms, and deactivate their account, however cannot send messages, +# invites, or create/join or otherwise modify rooms. +# They are effectively read-only. +# +#suspend_on_register = false -# This item is undocumented. Please contribute documentation for it. +# Enabling this setting opens registration to anyone without restrictions. +# This makes your server vulnerable to abuse # -#yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse = false +yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse = {{ matrix_continuwuity_config_yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse | to_json }} # A static registration token that new users will have to provide when # creating an account. If unset and `allow_registration` is true, -# registration is open without any condition. +# you must set +# `yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse` +# to true to allow open registration without any conditions. # # YOU NEED TO EDIT THIS OR USE registration_token_file. # @@ -402,8 +421,9 @@ allow_federation = {{ matrix_continuwuity_config_allow_federation | to_json }} # registration_token = {{ matrix_continuwuity_config_registration_token | to_json }} -# Path to a file on the system that gets read for the registration token. -# this config option takes precedence/priority over "registration_token". +# Path to a file on the system that gets read for additional registration +# tokens. Multiple tokens can be added if you separate them with +# whitespace # # continuwuity must be able to access the file, and it must not be empty # @@ -418,12 +438,21 @@ registration_token = {{ matrix_continuwuity_config_registration_token | to_json # Controls whether federation is allowed or not. It is not recommended to # disable this after the fact due to potential federation breakage. # -#allow_federation = true +allow_federation = {{ matrix_continuwuity_config_allow_federation | to_json }} -# This item is undocumented. Please contribute documentation for it. +# Allows federation requests to be made to itself +# +# This isn't intended and is very likely a bug if federation requests are +# being sent to yourself. This currently mainly exists for development +# purposes. # #federation_loopback = false +# Always calls /forget on behalf of the user if leaving a room. This is a +# part of MSC4267 "Automatically forgetting rooms on leave" +# +#forget_forced_upon_leave = false + # Set this to true to require authentication on the normally # unauthenticated profile retrieval endpoints (GET) # "/_matrix/client/v3/profile/{userId}". @@ -501,9 +530,9 @@ registration_token = {{ matrix_continuwuity_config_registration_token | to_json # Default room version continuwuity will create rooms with. # -# Per spec, room version 10 is the default. +# Per spec, room version 11 is the default. # -#default_room_version = 10 +#default_room_version = 11 # This item is undocumented. Please contribute documentation for it. # @@ -568,7 +597,7 @@ registration_token = {{ matrix_continuwuity_config_registration_token | to_json # Currently, continuwuity doesn't support inbound batched key requests, so # this list should only contain other Synapse servers. # -# example: ["matrix.org", "envs.net", "constellatory.net", "tchncs.de"] +# example: ["matrix.org", "tchncs.de"] # trusted_servers = {{ matrix_continuwuity_trusted_servers | to_json }} @@ -586,7 +615,7 @@ trusted_servers = {{ matrix_continuwuity_trusted_servers | to_json }} # specifically on room joins. This option limits the exposure to a # compromised trusted server to room joins only. The join operation # requires gathering keys from many origin servers which can cause -# significant delays. Therefore this defaults to true to mitigate +# significant delays. Therefor this defaults to true to mitigate # unexpected delays out-of-the-box. The security-paranoid or those willing # to tolerate delays are advised to set this to false. Note that setting # query_trusted_key_servers_first to true causes this option to be @@ -597,7 +626,7 @@ trusted_servers = {{ matrix_continuwuity_trusted_servers | to_json }} # Only query trusted servers for keys and never the origin server. This is # intended for clusters or custom deployments using their trusted_servers # as forwarding-agents to cache and deduplicate requests. Notary servers -# do not act as forwarding-agents by default, therefore do not enable this +# do not act as forwarding-agents by default, therefor do not enable this # unless you know exactly what you are doing. # #only_query_trusted_key_servers = false @@ -627,8 +656,9 @@ log = {{ matrix_continuwuity_config_log | to_json }} # #log_span_events = "none" -# Configures whether continuwuity_LOG EnvFilter matches values using regular -# expressions. See the tracing_subscriber documentation on Directives. +# Configures whether CONTINUWUITY_LOG EnvFilter matches values using +# regular expressions. See the tracing_subscriber documentation on +# Directives. # #log_filter_regex = true @@ -664,13 +694,17 @@ log = {{ matrix_continuwuity_config_log | to_json }} # ("turn_secret"), It is recommended to use a shared secret over static # credentials. # -#turn_username = false +{% if matrix_continuwuity_config_turn_username != '' %} +turn_username = {{ matrix_continuwuity_config_turn_username | to_json }} +{% endif %} # Static TURN password to provide the client if not using a shared secret # ("turn_secret"). It is recommended to use a shared secret over static # credentials. # -#turn_password = false +{% if matrix_continuwuity_config_turn_password != '' %} +turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} +{% endif %} # Vector list of TURN URIs/servers to use. # @@ -689,18 +723,10 @@ turn_uris = {{ matrix_continuwuity_config_turn_uris | to_json }} # This is more secure, but if needed you can use traditional static # username/password credentials. # -#turn_secret = false {% if matrix_continuwuity_config_turn_secret != '' %} turn_secret = {{ matrix_continuwuity_config_turn_secret | to_json }} {% endif %} -# If you have your TURN server configured to use a username and password -# you can provide these information too. In this case comment out `turn_secret above`! -{% if matrix_continuwuity_config_turn_username != '' or matrix_continuwuity_config_turn_password != '' %} -turn_username = {{ matrix_continuwuity_config_turn_username | to_json }} -turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} -{% endif %} - # TURN secret to use that's read from the file path specified. # # This takes priority over "turn_secret" first, and falls back to @@ -714,12 +740,12 @@ turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} # #turn_ttl = 86400 -# List/vector of room IDs or room aliases that continuwuity will make newly -# registered users join. The rooms specified must be rooms that you have -# joined at least once on the server, and must be public. +# List/vector of room IDs or room aliases that continuwuity will make +# newly registered users join. The rooms specified must be rooms that you +# have joined at least once on the server, and must be public. # -# example: ["#continuwuity:puppygock.gay", -# "!eoIzvAvVwY23LPDay8:puppygock.gay"] +# example: ["#continuwuity:continuwuity.org", +# "!main-1:continuwuity.org"] # #auto_join_rooms = [] @@ -742,10 +768,10 @@ turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} # #auto_deactivate_banned_room_attempts = false -# RocksDB log level. This is not the same as continuwuity's log level. This -# is the log level for the RocksDB engine/library which show up in your -# database folder/path as `LOG` files. continuwuity will log RocksDB errors -# as normal through tracing or panics if severe for safety. +# RocksDB log level. This is not the same as continuwuity's log level. +# This is the log level for the RocksDB engine/library which show up in +# your database folder/path as `LOG` files. continuwuity will log RocksDB +# errors as normal through tracing or panics if severe for safety. # #rocksdb_log_level = "error" @@ -806,7 +832,7 @@ turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} # Type of RocksDB database compression to use. # -# Available options are "zstd", "zlib", "bz2", "lz4", or "none". +# Available options are "zstd", "bz2", "lz4", or "none". # # It is best to use ZSTD as an overall good balance between # speed/performance, storage, IO amplification, and CPU usage. For more @@ -827,6 +853,9 @@ turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} # magic number and translated to the library's default compression level # as they all differ. See their `kDefaultCompressionLevel`. # +# Note when using the default value we may override it with a setting +# tailored specifically for continuwuity. +# #rocksdb_compression_level = 32767 # Level of compression the specified compression algorithm for the @@ -840,6 +869,9 @@ turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} # less likely for this data to be used. Research your chosen compression # algorithm. # +# Note when using the default value we may override it with a setting +# tailored specifically for continuwuity. +# #rocksdb_bottommost_compression_level = 32767 # Whether to enable RocksDB's "bottommost_compression". @@ -851,7 +883,7 @@ turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} # # See https://github.com/facebook/rocksdb/wiki/Compression for more details. # -#rocksdb_bottommost_compression = false +#rocksdb_bottommost_compression = true # Database recovery mode (for RocksDB WAL corruption). # @@ -878,7 +910,7 @@ turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} # 0 = AbsoluteConsistency # 1 = TolerateCorruptedTailRecords (default) # 2 = PointInTime (use me if trying to recover) -# 3 = SkipAnyCorruptedRecord (you now voided your continuwuity warranty) +# 3 = SkipAnyCorruptedRecord (you now voided your Continuwuity warranty) # # For more information on these modes, see: # https://github.com/facebook/rocksdb/wiki/WAL-Recovery-Modes @@ -897,6 +929,20 @@ turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} # #rocksdb_paranoid_file_checks = false +# Enables or disables checksum verification in rocksdb at runtime. +# Checksums are usually hardware accelerated with low overhead; they are +# enabled in rocksdb by default. Older or slower platforms may see gains +# from disabling. +# +#rocksdb_checksums = true + +# Enables the "atomic flush" mode in rocksdb. This option is not intended +# for users. It may be removed or ignored in future versions. Atomic flush +# may be enabled by the paranoid to possibly improve database integrity at +# the cost of performance. +# +#rocksdb_atomic_flush = false + # Database repair mode (for RocksDB SST corruption). # # Use this option when the server reports corruption while running or @@ -934,10 +980,10 @@ turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} # #rocksdb_compaction_ioprio_idle = true -# Disables RocksDB compaction. You should never ever have to set this -# option to true. If you for some reason find yourself needing to use this -# option as part of troubleshooting or a bug, please reach out to us in -# the continuwuity Matrix room with information and details. +# Enables RocksDB compaction. You should never ever have to set this +# option to false. If you for some reason find yourself needing to use +# this option as part of troubleshooting or a bug, please reach out to us +# in the continuwuity Matrix room with information and details. # # Disabling compaction will lead to a significantly bloated and # explosively large database, gradually poor performance, unnecessarily @@ -970,7 +1016,9 @@ turn_password = {{ matrix_continuwuity_config_turn_password | to_json }} # # example: "F670$2CP@Hw8mG7RY1$%!#Ic7YA" # +{% if matrix_continuwuity_config_emergency_password != '' %} emergency_password = {{ matrix_continuwuity_config_emergency_password | to_json }} +{% endif %} # This item is undocumented. Please contribute documentation for it. # @@ -978,8 +1026,8 @@ emergency_password = {{ matrix_continuwuity_config_emergency_password | to_json # Allow local (your server only) presence updates/requests. # -# Note that presence on continuwuity is very fast unlike Synapse's. If using -# outgoing presence, this MUST be enabled. +# Note that presence on continuwuity is very fast unlike Synapse's. If +# using outgoing presence, this MUST be enabled. # #allow_local_presence = true @@ -995,8 +1043,8 @@ emergency_password = {{ matrix_continuwuity_config_emergency_password | to_json # # This option sends presence updates to other servers, but does not # receive any unless `allow_incoming_presence` is true. Note that presence -# on continuwuity is very fast unlike Synapse's. If using outgoing presence, -# you MUST enable `allow_local_presence` as well. +# on continuwuity is very fast unlike Synapse's. If using outgoing +# presence, you MUST enable `allow_local_presence` as well. # #allow_outgoing_presence = true @@ -1115,7 +1163,7 @@ emergency_password = {{ matrix_continuwuity_config_emergency_password | to_json # Check consistency of the media directory at startup: # 1. When `media_compat_file_link` is enabled, this check will upgrade -# media when switching back and forth between Conduit and continuwuity. +# media when switching back and forth between Conduit and conduwuit. # Both options must be enabled to handle this. # 2. When media is deleted from the directory, this check will also delete # its database entry. @@ -1150,28 +1198,72 @@ emergency_password = {{ matrix_continuwuity_config_emergency_password | to_json # #prune_missing_media = false -# Vector list of servers that continuwuity will refuse to download remote -# media from. +# List of forbidden server names via regex patterns that we will block +# incoming AND outgoing federation with, and block client room joins / +# remote user invites. # -#prevent_media_downloads_from = [] - -# List of forbidden server names that we will block incoming AND outgoing -# federation with, and block client room joins / remote user invites. +# Note that your messages can still make it to forbidden servers through +# backfilling. Events we receive from forbidden servers via backfill +# from servers we *do* federate with will be stored in the database. # # This check is applied on the room ID, room alias, sender server name, # sender user's server name, inbound federation X-Matrix origin, and # outbound federation handler. # -# Basically "global" ACLs. +# You can set this to ["*"] to block all servers by default, and then +# use `allowed_remote_server_names` to allow only specific servers. +# +# example: ["badserver\\.tld$", "badphrase", "19dollarfortnitecards"] # forbidden_remote_server_names = {{ matrix_continuwuity_forbidden_remote_server_names | to_json }} -# List of forbidden server names that we will block all outgoing federated -# room directory requests for. Useful for preventing our users from -# wandering into bad servers or spaces. +# List of allowed server names via regex patterns that we will allow, +# regardless of if they match `forbidden_remote_server_names`. +# +# This option has no effect if `forbidden_remote_server_names` is empty. +# +# example: ["goodserver\\.tld$", "goodphrase"] +# +#allowed_remote_server_names = [] + +# Vector list of regex patterns of server names that continuwuity will +# refuse to download remote media from. +# +# example: ["badserver\.tld$", "badphrase", "19dollarfortnitecards"] +# +#prevent_media_downloads_from = [] + +# List of forbidden server names via regex patterns that we will block all +# outgoing federated room directory requests for. Useful for preventing +# our users from wandering into bad servers or spaces. +# +# example: ["badserver\.tld$", "badphrase", "19dollarfortnitecards"] # forbidden_remote_room_directory_server_names = {{ matrix_continuwuity_forbidden_remote_room_directory_server_names | to_json }} +# Vector list of regex patterns of server names that continuwuity will not +# send messages to the client from. +# +# Note that there is no way for clients to receive messages once a server +# has become unignored without doing a full sync. This is a protocol +# limitation with the current sync protocols. This means this is somewhat +# of a nuclear option. +# +# example: ["reallybadserver\.tld$", "reallybadphrase", +# "69dollarfortnitecards"] +# +#ignore_messages_from_server_names = [] + +# Send messages from users that the user has ignored to the client. +# +# There is no way for clients to receive messages sent while a user was +# ignored without doing a full sync. This is a protocol limitation with +# the current sync protocols. Disabling this option will move +# responsibility of ignoring messages to the client, which can avoid this +# limitation. +# +#send_messages_from_ignored_users_to_client = false + # Vector list of IPv4 and IPv6 CIDR ranges / subnets *in quotes* that you # do not want continuwuity to send outbound requests to. Defaults to # RFC1918, unroutable, loopback, multicast, and testnet addresses for @@ -1279,7 +1371,7 @@ url_preview_domain_contains_allowlist = {{ matrix_continuwuity_url_preview_domai # used, and startup as warnings if any room aliases in your database have # a forbidden room alias/ID. # -# example: ["19dollarfortnitecards", "b[4a]droom"] +# example: ["19dollarfortnitecards", "b[4a]droom", "badphrase"] # #forbidden_alias_names = [] @@ -1292,7 +1384,7 @@ url_preview_domain_contains_allowlist = {{ matrix_continuwuity_url_preview_domai # startup as warnings if any local users in your database have a forbidden # username. # -# example: ["administrator", "b[a4]dusernam[3e]"] +# example: ["administrator", "b[a4]dusernam[3e]", "badphrase"] # #forbidden_usernames = [] @@ -1323,8 +1415,8 @@ url_preview_domain_contains_allowlist = {{ matrix_continuwuity_url_preview_domai # Allow admins to enter commands in rooms other than "#admins" (admin # room) by prefixing your message with "\!admin" or "\\!admin" followed up -# a normal continuwuity admin command. The reply will be publicly visible to -# the room, originating from the sender. +# a normal continuwuity admin command. The reply will be publicly visible +# to the room, originating from the sender. # # example: \\!admin debug ping puppygock.gay # @@ -1341,8 +1433,8 @@ url_preview_domain_contains_allowlist = {{ matrix_continuwuity_url_preview_domai # This option can also be configured with the `--execute` continuwuity # argument and can take standard shell commands and environment variables # -# For example: `./continuwuity --execute "server admin-notice continuwuity has -# started up at $(date)"` +# For example: `./continuwuity --execute "server admin-notice continuwuity +# has started up at $(date)"` # # example: admin_execute = ["debug ping puppygock.gay", "debug echo hi"]` # @@ -1355,6 +1447,13 @@ url_preview_domain_contains_allowlist = {{ matrix_continuwuity_url_preview_domai # #admin_execute_errors_ignore = false +# List of admin commands to execute on SIGUSR2. +# +# Similar to admin_execute, but these commands are executed when the +# server receives SIGUSR2 on supporting platforms. +# +#admin_signal_execute = [] + # Controls the max log level for admin command log captures (logs # generated from running admin commands). Defaults to "info" on release # builds, else "debug" on debug builds. @@ -1364,21 +1463,20 @@ url_preview_domain_contains_allowlist = {{ matrix_continuwuity_url_preview_domai # The default room tag to apply on the admin room. # # On some clients like Element, the room tag "m.server_notice" is a -# special pinned room at the very bottom of your room list. The continuwuity -# admin room can be pinned here so you always have an easy-to-access -# shortcut dedicated to your admin room. +# special pinned room at the very bottom of your room list. The +# continuwuity admin room can be pinned here so you always have an +# easy-to-access shortcut dedicated to your admin room. # #admin_room_tag = "m.server_notice" # Sentry.io crash/panic reporting, performance monitoring/metrics, etc. -# This is NOT enabled by default. continuwuity's default Sentry reporting -# endpoint domain is `o4506996327251968.ingest.us.sentry.io`. +# This is NOT enabled by default. # #sentry = false # Sentry reporting URL, if a custom one is desired. # -#sentry_endpoint = "https://fe2eb4536aa04949e28eff3128d64757@o4506996327251968.ingest.us.sentry.io/4506996334657536" +#sentry_endpoint = "" # Report your continuwuity server_name in Sentry.io crash reports and # metrics. @@ -1512,6 +1610,34 @@ url_preview_domain_contains_allowlist = {{ matrix_continuwuity_url_preview_domai # #sender_workers = 0 +# Enables listener sockets; can be set to false to disable listening. This +# option is intended for developer/diagnostic purposes only. +# +#listening = true + +# Enables configuration reload when the server receives SIGUSR1 on +# supporting platforms. +# +#config_reload_signal = true + +[global.tls] + +# Path to a valid TLS certificate file. +# +# example: "/path/to/my/certificate.crt" +# +#certs = + +# Path to a valid TLS certificate private key. +# +# example: "/path/to/my/certificate.key" +# +#key = + +# Whether to listen and allow for HTTP and HTTPS connections (insecure!) +# +#dual_protocol = false + [global.well_known] # The server URL that the client well-known file will serve. This should @@ -1529,18 +1655,46 @@ url_preview_domain_contains_allowlist = {{ matrix_continuwuity_url_preview_domai # #server = -# This item is undocumented. Please contribute documentation for it. +# URL to a support page for the server, which will be served as part of +# the MSC1929 server support endpoint at /.well-known/matrix/support. +# Will be included alongside any contact information # #support_page = -# This item is undocumented. Please contribute documentation for it. +# Role string for server support contacts, to be served as part of the +# MSC1929 server support endpoint at /.well-known/matrix/support. # -#support_role = +#support_role = "m.role.admin" -# This item is undocumented. Please contribute documentation for it. +# Email address for server support contacts, to be served as part of the +# MSC1929 server support endpoint. +# This will be used along with support_mxid if specified. # #support_email = -# This item is undocumented. Please contribute documentation for it. +# Matrix ID for server support contacts, to be served as part of the +# MSC1929 server support endpoint. +# This will be used along with support_email if specified. +# +# If no email or mxid is specified, all of the server's admins will be +# listed. # #support_mxid = + +[global.blurhashing] + +# blurhashing x component, 4 is recommended by https://blurha.sh/ +# +#components_x = 4 + +# blurhashing y component, 3 is recommended by https://blurha.sh/ +# +#components_y = 3 + +# Max raw size that the server will blurhash, this is the size of the +# image after converting it to raw data, it should be higher than the +# upload limit but not too high. The higher it is the higher the +# potential load will be for clients requesting blurhashes. The default +# is 33.55MB. Setting it to 0 disables blurhashing. +# +#blurhash_max_raw_size = 33554432 From 4632628b740f551a5516c8122bd267b07b530bab Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Fri, 4 Jul 2025 21:10:29 +0200 Subject: [PATCH 197/404] move main.yml variables --- roles/custom/matrix-continuwuity/defaults/main.yml | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/roles/custom/matrix-continuwuity/defaults/main.yml b/roles/custom/matrix-continuwuity/defaults/main.yml index 82e8b3a03..5fea7540d 100644 --- a/roles/custom/matrix-continuwuity/defaults/main.yml +++ b/roles/custom/matrix-continuwuity/defaults/main.yml @@ -184,6 +184,13 @@ matrix_continuwuity_config_turn_password: '' # Controls whether the self-check feature should validate SSL certificates. matrix_continuwuity_self_check_validate_certificates: true +# Controls server defederation settings. +matrix_continuwuity_forbidden_remote_server_names: [] +matrix_continuwuity_forbidden_remote_room_directory_server_names: [] + +# Controls the `url_preview_domain_contains_allowlist` setting. +matrix_continuwuity_url_preview_domain_contains_allowlist: [] + # Additional environment variables to pass to the container. # # Environment variables take priority over settings in the configuration file. @@ -193,9 +200,3 @@ matrix_continuwuity_self_check_validate_certificates: true # continuwuity_MAX_REQUEST_SIZE=50000000 # continuwuity_REQUEST_TIMEOUT=60 matrix_continuwuity_environment_variables_extension: '' - -matrix_continuwuity_forbidden_remote_server_names: [] -matrix_continuwuity_forbidden_remote_room_directory_server_names: [] - -# Controls the `url_preview_domain_contains_allowlist` setting. -matrix_continuwuity_url_preview_domain_contains_allowlist: [] From 8eb5bbf2c138b3680468cca81799b6226aa285ba Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Fri, 4 Jul 2025 21:13:49 +0200 Subject: [PATCH 198/404] add missing comments on main.yml settings --- roles/custom/matrix-continuwuity/defaults/main.yml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/roles/custom/matrix-continuwuity/defaults/main.yml b/roles/custom/matrix-continuwuity/defaults/main.yml index 5fea7540d..bb0bd7f23 100644 --- a/roles/custom/matrix-continuwuity/defaults/main.yml +++ b/roles/custom/matrix-continuwuity/defaults/main.yml @@ -169,9 +169,11 @@ matrix_continuwuity_config_emergency_password: '' # Controls the `allow_federation` setting. matrix_continuwuity_config_allow_federation: true +# Controls the `matrix_continuwuity_trusted_servers`` setting. matrix_continuwuity_trusted_servers: - "matrix.org" +# Controls the `matrix_continuwuity_config_log` setting. matrix_continuwuity_config_log: "info,state_res=warn,rocket=off,_=off,sled=off" # TURN integration. From e81330931128d3c0953eadccdd1a40d2cbf2d4ab Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Fri, 4 Jul 2025 21:19:20 +0200 Subject: [PATCH 199/404] fix spelling --- .../custom/matrix-continuwuity/templates/continuwuity.toml.j2 | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 index eadecd34f..9ee764e9d 100644 --- a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 +++ b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 @@ -615,7 +615,7 @@ trusted_servers = {{ matrix_continuwuity_trusted_servers | to_json }} # specifically on room joins. This option limits the exposure to a # compromised trusted server to room joins only. The join operation # requires gathering keys from many origin servers which can cause -# significant delays. Therefor this defaults to true to mitigate +# significant delays. Therefore this defaults to true to mitigate # unexpected delays out-of-the-box. The security-paranoid or those willing # to tolerate delays are advised to set this to false. Note that setting # query_trusted_key_servers_first to true causes this option to be @@ -626,7 +626,7 @@ trusted_servers = {{ matrix_continuwuity_trusted_servers | to_json }} # Only query trusted servers for keys and never the origin server. This is # intended for clusters or custom deployments using their trusted_servers # as forwarding-agents to cache and deduplicate requests. Notary servers -# do not act as forwarding-agents by default, therefor do not enable this +# do not act as forwarding-agents by default, therefore do not enable this # unless you know exactly what you are doing. # #only_query_trusted_key_servers = false From 1b2b6ddaa367661d664227dd42024b810d5cac93 Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Fri, 4 Jul 2025 21:38:32 +0200 Subject: [PATCH 200/404] add more defederation variables --- roles/custom/matrix-continuwuity/defaults/main.yml | 5 ++++- .../matrix-continuwuity/templates/continuwuity.toml.j2 | 6 +++--- 2 files changed, 7 insertions(+), 4 deletions(-) diff --git a/roles/custom/matrix-continuwuity/defaults/main.yml b/roles/custom/matrix-continuwuity/defaults/main.yml index bb0bd7f23..3a14700e3 100644 --- a/roles/custom/matrix-continuwuity/defaults/main.yml +++ b/roles/custom/matrix-continuwuity/defaults/main.yml @@ -186,9 +186,12 @@ matrix_continuwuity_config_turn_password: '' # Controls whether the self-check feature should validate SSL certificates. matrix_continuwuity_self_check_validate_certificates: true -# Controls server defederation settings. +# Controls server (de)federation settings. +matrix_continuwuity_allowed_remote_server_names: [] matrix_continuwuity_forbidden_remote_server_names: [] matrix_continuwuity_forbidden_remote_room_directory_server_names: [] +matrix_continuwuity_prevent_media_downloads_from: [] +matrix_continuwuity_ignore_messages_from_server_names: [] # Controls the `url_preview_domain_contains_allowlist` setting. matrix_continuwuity_url_preview_domain_contains_allowlist: [] diff --git a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 index 9ee764e9d..ca3fc62be 100644 --- a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 +++ b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 @@ -1224,14 +1224,14 @@ forbidden_remote_server_names = {{ matrix_continuwuity_forbidden_remote_server_n # # example: ["goodserver\\.tld$", "goodphrase"] # -#allowed_remote_server_names = [] +allowed_remote_server_names = {{ matrix_continuwuity_allowed_remote_server_names | to_json }} # Vector list of regex patterns of server names that continuwuity will # refuse to download remote media from. # # example: ["badserver\.tld$", "badphrase", "19dollarfortnitecards"] # -#prevent_media_downloads_from = [] +prevent_media_downloads_from = {{ matrix_continuwuity_prevent_media_downloads_from | to_json }} # List of forbidden server names via regex patterns that we will block all # outgoing federated room directory requests for. Useful for preventing @@ -1252,7 +1252,7 @@ forbidden_remote_room_directory_server_names = {{ matrix_continuwuity_forbidden_ # example: ["reallybadserver\.tld$", "reallybadphrase", # "69dollarfortnitecards"] # -#ignore_messages_from_server_names = [] +ignore_messages_from_server_names = {{ matrix_continuwuity_ignore_messages_from_server_names | to_json }} # Send messages from users that the user has ignored to the client. # From d1796978ca81a39902d58fca2049e0bfb253392c Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Fri, 4 Jul 2025 21:44:50 +0200 Subject: [PATCH 201/404] add matrix_continuwuity_config_suspend_on_register --- roles/custom/matrix-continuwuity/defaults/main.yml | 3 +++ .../custom/matrix-continuwuity/templates/continuwuity.toml.j2 | 2 +- 2 files changed, 4 insertions(+), 1 deletion(-) diff --git a/roles/custom/matrix-continuwuity/defaults/main.yml b/roles/custom/matrix-continuwuity/defaults/main.yml index 3a14700e3..822f8b79c 100644 --- a/roles/custom/matrix-continuwuity/defaults/main.yml +++ b/roles/custom/matrix-continuwuity/defaults/main.yml @@ -143,6 +143,9 @@ matrix_continuwuity_config_max_request_size: 20_000_000 # Enables registration. If set to false, no users can register on this server. matrix_continuwuity_config_allow_registration: false +# Controls if newly registered users are automatically suspended, requiring admin approval. +matrix_continuwuity_config_suspend_on_register: false + # Controls the `yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse` setting. # This is only used when `matrix_continuwuity_config_allow_registration` is set to true and no registration token is configured. matrix_continuwuity_config_yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse: false diff --git a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 index ca3fc62be..47706b282 100644 --- a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 +++ b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 @@ -402,7 +402,7 @@ allow_registration = {{ matrix_continuwuity_config_allow_registration | to_json # invites, or create/join or otherwise modify rooms. # They are effectively read-only. # -#suspend_on_register = false +suspend_on_register = {{ matrix_continuwuity_config_suspend_on_register | to_json }} # Enabling this setting opens registration to anyone without restrictions. # This makes your server vulnerable to abuse From c04dfe23849edc078ac385fe9ebf72bafbd764cc Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Fri, 4 Jul 2025 21:50:31 +0200 Subject: [PATCH 202/404] add missing _config_ to some variable names --- .../matrix-continuwuity/defaults/main.yml | 18 ++++++++---------- .../templates/continuwuity.toml.j2 | 14 +++++++------- 2 files changed, 15 insertions(+), 17 deletions(-) diff --git a/roles/custom/matrix-continuwuity/defaults/main.yml b/roles/custom/matrix-continuwuity/defaults/main.yml index 822f8b79c..40378c401 100644 --- a/roles/custom/matrix-continuwuity/defaults/main.yml +++ b/roles/custom/matrix-continuwuity/defaults/main.yml @@ -169,11 +169,8 @@ matrix_continuwuity_config_allow_check_for_updates: false # Controls the `emergency_password` setting. matrix_continuwuity_config_emergency_password: '' -# Controls the `allow_federation` setting. -matrix_continuwuity_config_allow_federation: true - # Controls the `matrix_continuwuity_trusted_servers`` setting. -matrix_continuwuity_trusted_servers: +matrix_continuwuity_config_trusted_servers: - "matrix.org" # Controls the `matrix_continuwuity_config_log` setting. @@ -190,14 +187,15 @@ matrix_continuwuity_config_turn_password: '' matrix_continuwuity_self_check_validate_certificates: true # Controls server (de)federation settings. -matrix_continuwuity_allowed_remote_server_names: [] -matrix_continuwuity_forbidden_remote_server_names: [] -matrix_continuwuity_forbidden_remote_room_directory_server_names: [] -matrix_continuwuity_prevent_media_downloads_from: [] -matrix_continuwuity_ignore_messages_from_server_names: [] +matrix_continuwuity_config_allow_federation: true +matrix_continuwuity_config_allowed_remote_server_names: [] +matrix_continuwuity_config_forbidden_remote_server_names: [] +matrix_continuwuity_config_forbidden_remote_room_directory_server_names: [] +matrix_continuwuity_config_prevent_media_downloads_from: [] +matrix_continuwuity_config_ignore_messages_from_server_names: [] # Controls the `url_preview_domain_contains_allowlist` setting. -matrix_continuwuity_url_preview_domain_contains_allowlist: [] +matrix_continuwuity_config_url_preview_domain_contains_allowlist: [] # Additional environment variables to pass to the container. # diff --git a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 index 47706b282..04329810c 100644 --- a/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 +++ b/roles/custom/matrix-continuwuity/templates/continuwuity.toml.j2 @@ -599,7 +599,7 @@ allow_federation = {{ matrix_continuwuity_config_allow_federation | to_json }} # # example: ["matrix.org", "tchncs.de"] # -trusted_servers = {{ matrix_continuwuity_trusted_servers | to_json }} +trusted_servers = {{ matrix_continuwuity_config_trusted_servers | to_json }} # Whether to query the servers listed in trusted_servers first or query # the origin server first. For best security, querying the origin server @@ -1215,7 +1215,7 @@ emergency_password = {{ matrix_continuwuity_config_emergency_password | to_json # # example: ["badserver\\.tld$", "badphrase", "19dollarfortnitecards"] # -forbidden_remote_server_names = {{ matrix_continuwuity_forbidden_remote_server_names | to_json }} +forbidden_remote_server_names = {{ matrix_continuwuity_config_forbidden_remote_server_names | to_json }} # List of allowed server names via regex patterns that we will allow, # regardless of if they match `forbidden_remote_server_names`. @@ -1224,14 +1224,14 @@ forbidden_remote_server_names = {{ matrix_continuwuity_forbidden_remote_server_n # # example: ["goodserver\\.tld$", "goodphrase"] # -allowed_remote_server_names = {{ matrix_continuwuity_allowed_remote_server_names | to_json }} +allowed_remote_server_names = {{ matrix_continuwuity_config_allowed_remote_server_names | to_json }} # Vector list of regex patterns of server names that continuwuity will # refuse to download remote media from. # # example: ["badserver\.tld$", "badphrase", "19dollarfortnitecards"] # -prevent_media_downloads_from = {{ matrix_continuwuity_prevent_media_downloads_from | to_json }} +prevent_media_downloads_from = {{ matrix_continuwuity_config_prevent_media_downloads_from | to_json }} # List of forbidden server names via regex patterns that we will block all # outgoing federated room directory requests for. Useful for preventing @@ -1239,7 +1239,7 @@ prevent_media_downloads_from = {{ matrix_continuwuity_prevent_media_downloads_fr # # example: ["badserver\.tld$", "badphrase", "19dollarfortnitecards"] # -forbidden_remote_room_directory_server_names = {{ matrix_continuwuity_forbidden_remote_room_directory_server_names | to_json }} +forbidden_remote_room_directory_server_names = {{ matrix_continuwuity_config_forbidden_remote_room_directory_server_names | to_json }} # Vector list of regex patterns of server names that continuwuity will not # send messages to the client from. @@ -1252,7 +1252,7 @@ forbidden_remote_room_directory_server_names = {{ matrix_continuwuity_forbidden_ # example: ["reallybadserver\.tld$", "reallybadphrase", # "69dollarfortnitecards"] # -ignore_messages_from_server_names = {{ matrix_continuwuity_ignore_messages_from_server_names | to_json }} +ignore_messages_from_server_names = {{ matrix_continuwuity_config_ignore_messages_from_server_names | to_json }} # Send messages from users that the user has ignored to the client. # @@ -1307,7 +1307,7 @@ ignore_messages_from_server_names = {{ matrix_continuwuity_ignore_messages_from_ # attack surface to your server, you are expected to be aware of the risks # by doing so. # -url_preview_domain_contains_allowlist = {{ matrix_continuwuity_url_preview_domain_contains_allowlist | to_json }} +url_preview_domain_contains_allowlist = {{ matrix_continuwuity_config_url_preview_domain_contains_allowlist | to_json }} # Vector list of explicit domains allowed to send requests to for URL # previews. From 3997244190413035974456bf72f92c5d59eefcd0 Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Sat, 5 Jul 2025 09:52:44 +0200 Subject: [PATCH 203/404] capitalise CONTINUWUITY --- docs/configuring-playbook-continuwuity.md | 4 ++-- roles/custom/matrix-continuwuity/defaults/main.yml | 4 ++-- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/docs/configuring-playbook-continuwuity.md b/docs/configuring-playbook-continuwuity.md index 2f645c4d7..13d30707e 100644 --- a/docs/configuring-playbook-continuwuity.md +++ b/docs/configuring-playbook-continuwuity.md @@ -50,8 +50,8 @@ If a specific setting you'd like to change does not have a dedicated Ansible var ```yaml matrix_continuwuity_environment_variables_extension: | - continuwuity_MAX_REQUEST_SIZE=50000000 - continuwuity_REQUEST_TIMEOUT=60 + CONTINUWUITY_MAX_REQUEST_SIZE=50000000 + CONTINUWUITY_REQUEST_TIMEOUT=60 ``` ## Creating the first user account diff --git a/roles/custom/matrix-continuwuity/defaults/main.yml b/roles/custom/matrix-continuwuity/defaults/main.yml index 40378c401..b9c124928 100644 --- a/roles/custom/matrix-continuwuity/defaults/main.yml +++ b/roles/custom/matrix-continuwuity/defaults/main.yml @@ -203,6 +203,6 @@ matrix_continuwuity_config_url_preview_domain_contains_allowlist: [] # # Example: # matrix_continuwuity_environment_variables_extension: | -# continuwuity_MAX_REQUEST_SIZE=50000000 -# continuwuity_REQUEST_TIMEOUT=60 +# CONTINUWUITY_MAX_REQUEST_SIZE=50000000 +# CONTINUWUITY_REQUEST_TIMEOUT=60 matrix_continuwuity_environment_variables_extension: '' From f08bc17273a81373bcead01d2d91992bbb8d57f5 Mon Sep 17 00:00:00 2001 From: Virkkunen Date: Sat, 5 Jul 2025 09:57:33 +0200 Subject: [PATCH 204/404] add validation for changed continuwuity variable names --- .../matrix-continuwuity/tasks/validate_config.yml | 15 +++++++++++++++ 1 file changed, 15 insertions(+) diff --git a/roles/custom/matrix-continuwuity/tasks/validate_config.yml b/roles/custom/matrix-continuwuity/tasks/validate_config.yml index e4c199bfb..a5859d948 100644 --- a/roles/custom/matrix-continuwuity/tasks/validate_config.yml +++ b/roles/custom/matrix-continuwuity/tasks/validate_config.yml @@ -13,3 +13,18 @@ - {'name': 'matrix_continuwuity_hostname', when: true} - {'name': 'matrix_continuwuity_container_network', when: true} - {'name': 'matrix_continuwuity_container_labels_internal_client_api_traefik_entrypoints', when: "{{ matrix_continuwuity_container_labels_internal_client_api_enabled }}"} + +- name: (Deprecation) Catch and report renamed Continuwuity settings + ansible.builtin.fail: + msg: >- + Your configuration contains a variable, which now has a different name. + Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). + when: "item.old in vars" + with_items: + - {'old': 'matrix_continuwuity_allowed_remote_server_names', 'new': 'matrix_continuwuity_config_allowed_remote_server_names'} + - {'old': 'matrix_continuwuity_forbidden_remote_room_directory_server_names', 'new': 'matrix_continuwuity_config_forbidden_remote_room_directory_server_names'} + - {'old': 'matrix_continuwuity_forbidden_remote_server_names', 'new': 'matrix_continuwuity_config_forbidden_remote_server_names'} + - {'old': 'matrix_continuwuity_ignore_messages_from_server_names', 'new': 'matrix_continuwuity_config_ignore_messages_from_server_names'} + - {'old': 'matrix_continuwuity_prevent_media_downloads_from', 'new': 'matrix_continuwuity_config_prevent_media_downloads_from'} + - {'old': 'matrix_continuwuity_trusted_servers', 'new': 'matrix_continuwuity_config_trusted_servers'} + - {'old': 'matrix_continuwuity_url_preview_domain_contains_allowlist', 'new': 'matrix_continuwuity_config_url_preview_domain_contains_allowlist'} From 78a3bf42f3b8abbe2b1865b11daa0fa3725051d8 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 7 Jul 2025 16:31:52 +0000 Subject: [PATCH 205/404] Update matrixconduit/matrix-conduit Docker tag to v0.10.6 --- roles/custom/matrix-conduit/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-conduit/defaults/main.yml b/roles/custom/matrix-conduit/defaults/main.yml index a50ce14a3..f93727a66 100644 --- a/roles/custom/matrix-conduit/defaults/main.yml +++ b/roles/custom/matrix-conduit/defaults/main.yml @@ -19,7 +19,7 @@ matrix_conduit_docker_image_registry_prefix: "{{ matrix_conduit_docker_image_reg matrix_conduit_docker_image_registry_prefix_upstream: "{{ matrix_conduit_docker_image_registry_prefix_upstream_default }}" matrix_conduit_docker_image_registry_prefix_upstream_default: docker.io/ # renovate: datasource=docker depName=matrixconduit/matrix-conduit -matrix_conduit_docker_image_tag: "v0.10.5" +matrix_conduit_docker_image_tag: "v0.10.6" matrix_conduit_docker_image_force_pull: "{{ matrix_conduit_docker_image.endswith(':latest') }}" matrix_conduit_base_path: "{{ matrix_base_data_path }}/conduit" From f4306be183ddd58d7e6daa01afedc9eddcdda50f Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 8 Jul 2025 06:31:55 +0300 Subject: [PATCH 206/404] Extract mautrix-whatsapp's `network.displayname_template` configuration into a variable (`matrix_mautrix_whatsapp_network_displayname_template`) --- .../matrix-bridge-mautrix-whatsapp/defaults/main.yml | 7 +++++++ .../templates/config.yaml.j2 | 2 +- 2 files changed, 8 insertions(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml index 545792108..70565a31a 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml @@ -161,6 +161,13 @@ matrix_mautrix_whatsapp_double_puppet_secrets: "{{ matrix_mautrix_whatsapp_doubl matrix_mautrix_whatsapp_double_puppet_secrets_auto: {} matrix_mautrix_whatsapp_double_puppet_secrets_custom: {} +# Displayname template for WhatsApp users. +# {{.PushName}} - nickname set by the WhatsApp user +# {{.BusinessName}} - validated WhatsApp business name +# {{.Phone}} - phone number (international format) +# {{.FullName}} - Name you set in the contacts list +matrix_mautrix_whatsapp_network_displayname_template: '{% raw %}{{or .BusinessName .PushName .Phone}} (WA){% endraw %}' + # Enable End-to-bridge encryption matrix_mautrix_whatsapp_bridge_encryption_allow: "{{ matrix_bridges_encryption_enabled }}" matrix_mautrix_whatsapp_bridge_encryption_default: "{{ matrix_bridges_encryption_default }}" diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 index 612e358f3..0cb5fb582 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 @@ -22,7 +22,7 @@ network: # {{.Phone}} - phone number (international format) # {{.FullName}} - Name you set in the contacts list # {% endraw %} - displayname_template: "{% raw %}{{or .BusinessName .PushName .Phone}} (WA){% endraw %}" + displayname_template: {{ matrix_mautrix_whatsapp_network_displayname_template | to_json }} # Should incoming calls send a message to the Matrix room? call_start_notices: true From 1813c856e6e06d005c09e9f9bea679b22fe8ed05 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 8 Jul 2025 06:33:57 +0300 Subject: [PATCH 207/404] Extract mautrix-signal's `network.displayname_template` configuration into a variable (`matrix_mautrix_signal_network_displayname_template`) --- .../custom/matrix-bridge-mautrix-signal/defaults/main.yml | 8 ++++++++ .../matrix-bridge-mautrix-signal/templates/config.yaml.j2 | 2 +- 2 files changed, 9 insertions(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml index d61140d19..d9ce5bbee 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml @@ -48,6 +48,14 @@ matrix_mautrix_signal_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" matrix_mautrix_signal_command_prefix: "!signal" +# Displayname template for Signal users. +# {{.ProfileName}} - The Signal profile name set by the user. +# {{.ContactName}} - The name for the user from your phone's contact list. This is not safe on multi-user instances. +# {{.PhoneNumber}} - The phone number of the user. +# {{.UUID}} - The UUID of the Signal user. +# {{.AboutEmoji}} - The emoji set by the user in their profile. +matrix_mautrix_signal_network_displayname_template: "{% raw %}{{or .ProfileName .PhoneNumber 'Unknown user'}} (Signal){% endraw %}" + matrix_mautrix_signal_bridge_permissions: | {{ {'*': 'relay', matrix_mautrix_signal_homeserver_domain: 'user'} diff --git a/roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2 index d890d66f2..971f102c8 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2 @@ -9,7 +9,7 @@ network: # {{.UUID}} - The UUID of the Signal user. # {{.AboutEmoji}} - The emoji set by the user in their profile. # {% endraw %} - displayname_template: "{% raw %}{{or .ProfileName .PhoneNumber 'Unknown user'}} (Signal){% endraw %}" + displayname_template: {{ matrix_mautrix_signal_network_displayname_template | to_json }} # Should avatars from the user's contact list be used? This is not safe on multi-user instances. use_contact_avatars: false # Should the bridge request the user's contact list from the phone on startup? From 1ccb6c822a78d0a7b4e66e029058c778f0865b82 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 8 Jul 2025 06:35:20 +0300 Subject: [PATCH 208/404] Extract mautrix-bluesky's `network.displayname_template` configuration into a variable (`matrix_mautrix_bluesky_network_displayname_template`) --- roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml | 5 +++++ .../matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 | 2 +- 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml index 6f39551a2..f02ee3ad4 100644 --- a/roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml @@ -36,6 +36,11 @@ matrix_mautrix_bluesky_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" # A public address that external services can use to reach this appservice. matrix_mautrix_bluesky_appservice_public_address: '' +# Displayname template for Bluesky users. +# {{ .DisplayName }} is replaced with the display name of the Bluesky user. +# {{ .Username }} is replaced with the username of the Bluesky user. +matrix_mautrix_bluesky_network_displayname_template: "{% raw %}{{ .DisplayName }}{% endraw %} (Bluesky)" + matrix_mautrix_bluesky_bridge_command_prefix: "!bs" matrix_mautrix_bluesky_bridge_permissions: | diff --git a/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 index a631b4872..20b398fce 100644 --- a/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 @@ -11,7 +11,7 @@ network: # {{ .DisplayName }} is replaced with the display name of the Bluesky user. # {{ .Username }} is replaced with the username of the Bluesky user. # {% endraw %} - displayname_template: "{% raw %}{{ .DisplayName }}{% endraw %} (Bluesky)" + displayname_template: {{ matrix_mautrix_bluesky_network_displayname_template | to_json }} # Maximum number of conversations to sync on startup conversation_sync_limit: 20 From 9e31a254d8e05a77a746f8db7d8b002ed1dfb02f Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 8 Jul 2025 06:36:55 +0300 Subject: [PATCH 209/404] Extract mautrix-slack's `network.displayname_template` configuration into a variable (`matrix_mautrix_slack_network_displayname_template`) --- .../defaults/main.yml | 21 +++++++++++++++++++ .../templates/config.yaml.j2 | 2 +- 2 files changed, 22 insertions(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml index 91f6c942c..681d082ea 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml @@ -36,6 +36,27 @@ matrix_mautrix_slack_appservice_address: "http://matrix-mautrix-slack:8080" matrix_mautrix_slack_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" +# Displayname template for Slack users. Available variables: +# .Name - The username of the user +# .Team.Name - The name of the team the channel is in +# .Team.Domain - The Slack subdomain of the team the channel is in +# .ID - The internal ID of the user +# .IsBot - Whether the user is a bot +# .Profile.DisplayName - The username or real name of the user (depending on settings) +# Variables only available for users (not bots): +# .TeamID - The internal ID of the workspace the user is in +# .TZ - The timezone region of the user (e.g. Europe/London) +# .TZLabel - The label of the timezone of the user (e.g. Greenwich Mean Time) +# .TZOffset - The UTC offset of the timezone of the user (e.g. 0) +# .Profile.RealName - The real name of the user +# .Profile.FirstName - The first name of the user +# .Profile.LastName - The last name of the user +# .Profile.Title - The job title of the user +# .Profile.Pronouns - The pronouns of the user +# .Profile.Email - The email address of the user +# .Profile.Phone - The formatted phone number of the user +matrix_mautrix_slack_network_displayname_template: '{% raw %}{{or .Profile.DisplayName .Profile.RealName .Name}}{{if .IsBot}} (bot){{end}}{% endraw %}' + matrix_mautrix_slack_command_prefix: "!slack" matrix_mautrix_slack_bridge_permissions: | diff --git a/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 index 5ff9ffbf5..7a9fbd89b 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 @@ -20,7 +20,7 @@ network: # .Profile.Pronouns - The pronouns of the user # .Profile.Email - The email address of the user # .Profile.Phone - The formatted phone number of the user - displayname_template: '{% raw %}{{or .Profile.DisplayName .Profile.RealName .Name}}{{if .IsBot}} (bot){{end}}{% endraw %}' + displayname_template: {{ matrix_mautrix_slack_network_displayname_template | to_json }} # Channel name template for Slack channels (all types). Available variables: # .Name - The name of the channel # .Team.Name - The name of the team the channel is in From c399c6ff109ab95f98a61bf21b850d68ce7ad458 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 8 Jul 2025 06:38:51 +0300 Subject: [PATCH 210/404] Extract mautrix-twitter's `network.displayname_template` configuration into a variable (`matrix_mautrix_twitter_network_displayname_template`) --- roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml | 5 +++++ .../matrix-bridge-mautrix-twitter/templates/config.yaml.j2 | 2 +- 2 files changed, 6 insertions(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml index 998ae1554..3b5e479c8 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml @@ -44,6 +44,11 @@ matrix_mautrix_twitter_msc4190_enabled: "{{ matrix_bridges_msc4190_enabled }}" # A public address that external services can use to reach this appservice. matrix_mautrix_twitter_appservice_public_address: '' +# Displayname template for Twitter users. +# {{ .DisplayName }} is replaced with the display name of the Twitter user. +# {{ .Username }} is replaced with the username of the Twitter user. +matrix_mautrix_twitter_network_displayname_template: "{% raw %}{{ .DisplayName }}{% endraw %} (Twitter)" + matrix_mautrix_twitter_bridge_command_prefix: "!tw" matrix_mautrix_twitter_bridge_permissions: | diff --git a/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 index e437ffc3c..cc9cfc255 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 @@ -11,7 +11,7 @@ network: # {{ .DisplayName }} is replaced with the display name of the Twitter user. # {{ .Username }} is replaced with the username of the Twitter user. # {% endraw %} - displayname_template: "{% raw %}{{ .DisplayName }}{% endraw %} (Twitter)" + displayname_template: {{ matrix_mautrix_twitter_network_displayname_template | to_json }} # Maximum number of conversations to sync on startup conversation_sync_limit: 20 From a41ec6e8de4b287b7e62baa091ebc5bb8d2ea781 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Tue, 8 Jul 2025 07:26:48 +0300 Subject: [PATCH 211/404] Upgrade Postgres (v17.4-0 -> v17.5-0) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index ed1170323..48f88142b 100644 --- a/requirements.yml +++ b/requirements.yml @@ -43,7 +43,7 @@ version: ff2fd42e1c1a9e28e3312bbd725395f9c2fc7f16 name: playbook_state_preserver - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-postgres.git - version: v17.4-0 + version: v17.5-0 name: postgres - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-postgres-backup.git version: v17-3 From 9726cb24bea4c12fec65fe6dc829b69ff9754ce2 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 8 Jul 2025 04:27:39 +0000 Subject: [PATCH 212/404] Update dependency etherpad to v2.3.2-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 48f88142b..eb9a84f6e 100644 --- a/requirements.yml +++ b/requirements.yml @@ -16,7 +16,7 @@ version: 129c8590e106b83e6f4c259649a613c6279e937a name: docker_sdk_for_python - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-etherpad.git - version: v2.3.0-0 + version: v2.3.2-0 name: etherpad - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-exim-relay.git version: v4.98.1-r0-2-0 From 06e14a6b7001a577914f0eb81a6c4504c37d6f15 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 9 Jul 2025 08:08:59 +0000 Subject: [PATCH 213/404] Update dependency certifi to v2025.7.9 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 4b26d1146..8a975bcb5 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -1,6 +1,6 @@ alabaster==1.0.0 babel==2.17.0 -certifi==2025.6.15 +certifi==2025.7.9 charset-normalizer==3.4.2 click==8.2.1 docutils==0.21.2 From 54ef63e0c2b64a68f17402753f129d5eb1967160 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 9 Jul 2025 16:58:56 +0000 Subject: [PATCH 214/404] Update dependency ntfy to v2.12.0-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index eb9a84f6e..297dfe97d 100644 --- a/requirements.yml +++ b/requirements.yml @@ -31,7 +31,7 @@ version: v1.9.0-0 name: livekit_server - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-ntfy.git - version: v2.11.0-5 + version: v2.12.0-0 name: ntfy - src: git+https://github.com/devture/com.devture.ansible.role.playbook_help.git version: 201c939eed363de269a83ba29784fc3244846048 From 2d1b1cfdde9873232891181539edbe322d814ca8 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 9 Jul 2025 19:39:15 +0000 Subject: [PATCH 215/404] Update gnuxie/draupnir Docker tag to v2.5.0 --- .../custom/matrix-appservice-draupnir-for-all/defaults/main.yml | 2 +- roles/custom/matrix-bot-draupnir/defaults/main.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml b/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml index b6a732cd9..accba1a10 100644 --- a/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml +++ b/roles/custom/matrix-appservice-draupnir-for-all/defaults/main.yml @@ -12,7 +12,7 @@ matrix_appservice_draupnir_for_all_enabled: true # renovate: datasource=docker depName=gnuxie/draupnir -matrix_appservice_draupnir_for_all_version: "v2.4.1" +matrix_appservice_draupnir_for_all_version: "v2.5.0" matrix_appservice_draupnir_for_all_container_image_self_build: false matrix_appservice_draupnir_for_all_container_image_self_build_repo: "https://github.com/the-draupnir-project/Draupnir.git" diff --git a/roles/custom/matrix-bot-draupnir/defaults/main.yml b/roles/custom/matrix-bot-draupnir/defaults/main.yml index 44b04f7c7..7f293d26c 100644 --- a/roles/custom/matrix-bot-draupnir/defaults/main.yml +++ b/roles/custom/matrix-bot-draupnir/defaults/main.yml @@ -12,7 +12,7 @@ matrix_bot_draupnir_enabled: true # renovate: datasource=docker depName=gnuxie/draupnir -matrix_bot_draupnir_version: "v2.4.1" +matrix_bot_draupnir_version: "v2.5.0" matrix_bot_draupnir_container_image_self_build: false matrix_bot_draupnir_container_image_self_build_repo: "https://github.com/the-draupnir-project/Draupnir.git" From e6413534beb068ed45678e353eea8aaedb886e6a Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 10 Jul 2025 06:56:07 +0000 Subject: [PATCH 216/404] Update dependency valkey to v8.1.3-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 297dfe97d..2dc45abba 100644 --- a/requirements.yml +++ b/requirements.yml @@ -73,5 +73,5 @@ version: v2.10.0-0 name: traefik_certs_dumper - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-valkey.git - version: v8.1.2-0 + version: v8.1.3-0 name: valkey From fb0ccc391e2476a5f84a86857e931cf773f93b23 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Thu, 10 Jul 2025 19:05:42 +0300 Subject: [PATCH 217/404] Make FluffyChat container HTTP port configurable This makes it possible to switch out the container image with one that uses a port other than 8080. --- roles/custom/matrix-client-fluffychat/defaults/main.yml | 8 +++++++- roles/custom/matrix-client-fluffychat/templates/labels.j2 | 2 +- .../templates/systemd/matrix-client-fluffychat.service.j2 | 2 +- 3 files changed, 9 insertions(+), 3 deletions(-) diff --git a/roles/custom/matrix-client-fluffychat/defaults/main.yml b/roles/custom/matrix-client-fluffychat/defaults/main.yml index 03a8bd613..017d58410 100644 --- a/roles/custom/matrix-client-fluffychat/defaults/main.yml +++ b/roles/custom/matrix-client-fluffychat/defaults/main.yml @@ -33,9 +33,14 @@ matrix_client_fluffychat_container_additional_networks: "{{ matrix_client_fluffy matrix_client_fluffychat_container_additional_networks_auto: [] matrix_client_fluffychat_container_additional_networks_custom: [] +# Configures the port number used inside the container image. +matrix_client_fluffychat_container_http_port: 8080 + # Controls whether the matrix-client-fluffychat container exposes its HTTP port (tcp/8080 in the container). # -# Takes an ":" or "" value (e.g. "127.0.0.1:8765"), or empty string to not expose. +# Takes an ":" or "" value (e.g. "127.0.0.1:8080"), or empty string to not expose. +# +# Also see: `matrix_client_fluffychat_container_http_port` matrix_client_fluffychat_container_http_host_bind_port: '' # matrix_client_fluffychat_container_labels_traefik_enabled controls whether labels to assist a Traefik reverse-proxy will be attached to the container. @@ -44,6 +49,7 @@ matrix_client_fluffychat_container_http_host_bind_port: '' # To inject your own other container labels, see `matrix_client_fluffychat_container_labels_additional_labels`. matrix_client_fluffychat_container_labels_traefik_enabled: true matrix_client_fluffychat_container_labels_traefik_docker_network: "{{ matrix_client_fluffychat_container_network }}" +matrix_client_fluffychat_container_labels_traefik_http_service_load_balancer_port: "{{ matrix_client_fluffychat_container_http_port }}" matrix_client_fluffychat_container_labels_traefik_hostname: "{{ matrix_client_fluffychat_hostname }}" # The path prefix must either be `/` or not end with a slash (e.g. `/fluffychat`). matrix_client_fluffychat_container_labels_traefik_path_prefix: "{{ matrix_client_fluffychat_path_prefix }}" diff --git a/roles/custom/matrix-client-fluffychat/templates/labels.j2 b/roles/custom/matrix-client-fluffychat/templates/labels.j2 index f3527c61a..8c71045de 100644 --- a/roles/custom/matrix-client-fluffychat/templates/labels.j2 +++ b/roles/custom/matrix-client-fluffychat/templates/labels.j2 @@ -11,7 +11,7 @@ traefik.enable=true traefik.docker.network={{ matrix_client_fluffychat_container_labels_traefik_docker_network }} {% endif %} -traefik.http.services.matrix-client-fluffychat.loadbalancer.server.port=8080 +traefik.http.services.matrix-client-fluffychat.loadbalancer.server.port={{ matrix_client_fluffychat_container_labels_traefik_http_service_load_balancer_port }} {% set middlewares = [] %} diff --git a/roles/custom/matrix-client-fluffychat/templates/systemd/matrix-client-fluffychat.service.j2 b/roles/custom/matrix-client-fluffychat/templates/systemd/matrix-client-fluffychat.service.j2 index ad10c6297..57ae43d06 100644 --- a/roles/custom/matrix-client-fluffychat/templates/systemd/matrix-client-fluffychat.service.j2 +++ b/roles/custom/matrix-client-fluffychat/templates/systemd/matrix-client-fluffychat.service.j2 @@ -22,7 +22,7 @@ ExecStartPre={{ devture_systemd_docker_base_host_command_docker }} create \ --read-only \ --network={{ matrix_client_fluffychat_container_network }} \ {% if matrix_client_fluffychat_container_http_host_bind_port %} - -p {{ matrix_client_fluffychat_container_http_host_bind_port }}:8080 \ + -p {{ matrix_client_fluffychat_container_http_host_bind_port }}:{{ matrix_client_fluffychat_container_http_port }} \ {% endif %} --label-file={{ matrix_client_fluffychat_data_path }}/labels \ --tmpfs=/tmp:rw,noexec,nosuid,size=10m \ From bd6be256b70fe6d5a44b1ba68d8b465c963b2845 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 11 Jul 2025 06:42:22 +0000 Subject: [PATCH 218/404] Update dependency ntfy to v2.13.0-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 2dc45abba..69339b3f0 100644 --- a/requirements.yml +++ b/requirements.yml @@ -31,7 +31,7 @@ version: v1.9.0-0 name: livekit_server - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-ntfy.git - version: v2.12.0-0 + version: v2.13.0-0 name: ntfy - src: git+https://github.com/devture/com.devture.ansible.role.playbook_help.git version: 201c939eed363de269a83ba29784fc3244846048 From 56e01ad456f12a0033525a330a30d7686cf9f180 Mon Sep 17 00:00:00 2001 From: Suguru Hirahara Date: Fri, 11 Jul 2025 16:39:38 +0900 Subject: [PATCH 219/404] Update renovate.json: apply versioning=loose This makes it possible for Renovate to detect updates such as from `x.x.x-0` to `x.x.x-1`. References: - https://docs.renovatebot.com/modules/versioning/loose/ - https://docs.renovatebot.com/configuration-options/#versioning Signed-off-by: Suguru Hirahara --- .github/renovate.json | 1 + 1 file changed, 1 insertion(+) diff --git a/.github/renovate.json b/.github/renovate.json index 607d94509..5565fefde 100644 --- a/.github/renovate.json +++ b/.github/renovate.json @@ -20,6 +20,7 @@ "packageRules": [ { "ignoreUnstable": false, + "versioning": "loose", "matchSourceUrls": [ "https://github.com/devture/com.devture.ansible.role{/,}**", "https://github.com/mother-of-all-self-hosting{/,}**" From 7fcb253c236f55677887e0e4cb012055515bd8d3 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 11 Jul 2025 08:10:51 +0000 Subject: [PATCH 220/404] Update dependency grafana to v11.6.3-1 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 69339b3f0..8e6473691 100644 --- a/requirements.yml +++ b/requirements.yml @@ -22,7 +22,7 @@ version: v4.98.1-r0-2-0 name: exim_relay - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-grafana.git - version: v11.6.3-0 + version: v11.6.3-1 name: grafana - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-jitsi.git version: v10314-1 From a770681b18a9970d12b34c6960ddec838a8080a7 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 11 Jul 2025 08:10:46 +0000 Subject: [PATCH 221/404] Update dependency container_socket_proxy to v0.3.0-6 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 8e6473691..9daa55f09 100644 --- a/requirements.yml +++ b/requirements.yml @@ -7,7 +7,7 @@ version: v1.4.1-1.9.14-0 name: backup_borg - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-container-socket-proxy.git - version: v0.3.0-4 + version: v0.3.0-6 name: container_socket_proxy - src: git+https://github.com/geerlingguy/ansible-role-docker version: 7.4.7 From 63a3915d86b4dc5c74339dde7e0150976c28264b Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 11 Jul 2025 10:29:45 +0000 Subject: [PATCH 222/404] Update dependency livekit_server to v1.9.0-2 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 9daa55f09..537dc750f 100644 --- a/requirements.yml +++ b/requirements.yml @@ -28,7 +28,7 @@ version: v10314-1 name: jitsi - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-livekit-server.git - version: v1.9.0-0 + version: v1.9.0-2 name: livekit_server - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-ntfy.git version: v2.13.0-0 From 348324d3479f3c8ca6e2c68eafaa84937d0c707c Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 11 Jul 2025 10:29:49 +0000 Subject: [PATCH 223/404] Update dependency postgres_backup to v17-4 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 537dc750f..e9ebd0624 100644 --- a/requirements.yml +++ b/requirements.yml @@ -46,7 +46,7 @@ version: v17.5-0 name: postgres - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-postgres-backup.git - version: v17-3 + version: v17-4 name: postgres_backup - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus.git version: v3.4.2-0 From 9e205d50acc8cd37a412d1c006db0899ad22613f Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Fri, 11 Jul 2025 16:49:24 +0300 Subject: [PATCH 224/404] Upgrade baibot (v1.7.5 -> v1.7.6) --- roles/custom/matrix-bot-baibot/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bot-baibot/defaults/main.yml b/roles/custom/matrix-bot-baibot/defaults/main.yml index e33d591fe..98f2b1646 100644 --- a/roles/custom/matrix-bot-baibot/defaults/main.yml +++ b/roles/custom/matrix-bot-baibot/defaults/main.yml @@ -17,7 +17,7 @@ matrix_bot_baibot_container_repo_version: "{{ 'main' if matrix_bot_baibot_versio matrix_bot_baibot_container_src_files_path: "{{ matrix_base_data_path }}/baibot/container-src" # renovate: datasource=docker depName=ghcr.io/etkecc/baibot -matrix_bot_baibot_version: v1.7.5 +matrix_bot_baibot_version: v1.7.6 matrix_bot_baibot_container_image: "{{ matrix_bot_baibot_container_image_registry_prefix }}etkecc/baibot:{{ matrix_bot_baibot_version }}" matrix_bot_baibot_container_image_registry_prefix: "{{ 'localhost/' if matrix_bot_baibot_container_image_self_build else matrix_bot_baibot_container_image_registry_prefix_upstream }}" matrix_bot_baibot_container_image_registry_prefix_upstream: "{{ matrix_bot_baibot_container_image_registry_prefix_upstream_default }}" From bc55e358bf2a0a8944da839fc824847a5313128f Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 11 Jul 2025 19:04:39 +0000 Subject: [PATCH 225/404] Update dependency prometheus to v3.4.2-1 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index e9ebd0624..0e1e39ab1 100644 --- a/requirements.yml +++ b/requirements.yml @@ -49,7 +49,7 @@ version: v17-4 name: postgres_backup - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus.git - version: v3.4.2-0 + version: v3.4.2-1 name: prometheus - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-node-exporter.git version: v1.9.1-3 From f0f1d6ca677e2c2f5c4b9de1f9f3fc894c3cff28 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 11 Jul 2025 19:04:32 +0000 Subject: [PATCH 226/404] Update dependency postgres_backup to v17-5 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 0e1e39ab1..83210ed6a 100644 --- a/requirements.yml +++ b/requirements.yml @@ -46,7 +46,7 @@ version: v17.5-0 name: postgres - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-postgres-backup.git - version: v17-4 + version: v17-5 name: postgres_backup - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus.git version: v3.4.2-1 From 49d32b15c687221421dfdb1a1d30d42f02ec6d45 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 12 Jul 2025 01:27:16 +0000 Subject: [PATCH 227/404] Update dependency traefik_certs_dumper to v2.10.0-1 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 83210ed6a..1b7599583 100644 --- a/requirements.yml +++ b/requirements.yml @@ -70,7 +70,7 @@ version: v3.4.3-0 name: traefik - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik-certs-dumper.git - version: v2.10.0-0 + version: v2.10.0-1 name: traefik_certs_dumper - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-valkey.git version: v8.1.3-0 From 05202d00329ff9698fbd7ecd7fd633287205ca67 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 12 Jul 2025 05:46:24 +0000 Subject: [PATCH 228/404] Update dependency traefik to v3.4.4-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 1b7599583..b87d8f03d 100644 --- a/requirements.yml +++ b/requirements.yml @@ -67,7 +67,7 @@ version: v1.0.0-0 name: timesync - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik.git - version: v3.4.3-0 + version: v3.4.4-0 name: traefik - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik-certs-dumper.git version: v2.10.0-1 From eff5dd0527d65f25e29850bf2333877d9f4fcffd Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 11 Jul 2025 22:55:47 +0000 Subject: [PATCH 229/404] Update dependency prometheus_node_exporter to v1.9.1-9 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index b87d8f03d..3c232456a 100644 --- a/requirements.yml +++ b/requirements.yml @@ -52,7 +52,7 @@ version: v3.4.2-1 name: prometheus - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-node-exporter.git - version: v1.9.1-3 + version: v1.9.1-9 name: prometheus_node_exporter - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-postgres-exporter.git version: v0.17.1-1 From cffda7277b72c206edf24b1ea39d8c281353ef49 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 11 Jul 2025 22:55:52 +0000 Subject: [PATCH 230/404] Update dependency prometheus_postgres_exporter to v0.17.1-6 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 3c232456a..a9f106f3f 100644 --- a/requirements.yml +++ b/requirements.yml @@ -55,7 +55,7 @@ version: v1.9.1-9 name: prometheus_node_exporter - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-postgres-exporter.git - version: v0.17.1-1 + version: v0.17.1-6 name: prometheus_postgres_exporter - src: git+https://github.com/devture/com.devture.ansible.role.systemd_docker_base.git version: v1.4.0-0 From 9b3d2637adca6f5b6ca024f747e2341cea5d67fb Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Sat, 12 Jul 2025 13:29:25 +0300 Subject: [PATCH 231/404] Upgrade Traefik (v3.4.4-0 -> v3.4.4-1) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index a9f106f3f..48b9047f2 100644 --- a/requirements.yml +++ b/requirements.yml @@ -67,7 +67,7 @@ version: v1.0.0-0 name: timesync - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik.git - version: v3.4.4-0 + version: v3.4.4-1 name: traefik - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik-certs-dumper.git version: v2.10.0-1 From f3a819c5f112417bc3f9b55cdac726010ee545d6 Mon Sep 17 00:00:00 2001 From: Aine <97398200+aine-etke@users.noreply.github.com> Date: Sun, 13 Jul 2025 22:23:48 +0100 Subject: [PATCH 232/404] Synapse Admin v0.11.1-etke45 --- roles/custom/matrix-synapse-admin/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse-admin/defaults/main.yml b/roles/custom/matrix-synapse-admin/defaults/main.yml index 0a9be79fb..0691e60a4 100644 --- a/roles/custom/matrix-synapse-admin/defaults/main.yml +++ b/roles/custom/matrix-synapse-admin/defaults/main.yml @@ -25,7 +25,7 @@ matrix_synapse_admin_container_image_self_build: false matrix_synapse_admin_container_image_self_build_repo: "https://github.com/etkecc/synapse-admin.git" # renovate: datasource=docker depName=ghcr.io/etkecc/synapse-admin -matrix_synapse_admin_version: v0.11.1-etke44 +matrix_synapse_admin_version: v0.11.1-etke45 matrix_synapse_admin_docker_image: "{{ matrix_synapse_admin_docker_image_registry_prefix }}etkecc/synapse-admin:{{ matrix_synapse_admin_version }}" matrix_synapse_admin_docker_image_registry_prefix: "{{ 'localhost/' if matrix_synapse_admin_container_image_self_build else matrix_synapse_admin_docker_image_registry_prefix_upstream }}" matrix_synapse_admin_docker_image_registry_prefix_upstream: "{{ matrix_synapse_admin_docker_image_registry_prefix_upstream_default }}" From aa527d2b99fbbbfe8a68915adc557edadbb6f6bd Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 14 Jul 2025 05:26:32 +0000 Subject: [PATCH 233/404] Update dependency certifi to v2025.7.14 --- i18n/requirements.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/i18n/requirements.txt b/i18n/requirements.txt index 8a975bcb5..a9666d699 100644 --- a/i18n/requirements.txt +++ b/i18n/requirements.txt @@ -1,6 +1,6 @@ alabaster==1.0.0 babel==2.17.0 -certifi==2025.7.9 +certifi==2025.7.14 charset-normalizer==3.4.2 click==8.2.1 docutils==0.21.2 From 30156f1ac07a0ecd5ca5fee1bd31ea14a314f730 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 15 Jul 2025 02:13:31 +0000 Subject: [PATCH 234/404] Update dependency prometheus to v3.5.0-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 48b9047f2..fdcb1c387 100644 --- a/requirements.yml +++ b/requirements.yml @@ -49,7 +49,7 @@ version: v17-5 name: postgres_backup - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus.git - version: v3.4.2-1 + version: v3.5.0-0 name: prometheus - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-node-exporter.git version: v1.9.1-9 From 8ecee76f627bfc3846694cec719c59333794f4cf Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 15 Jul 2025 15:09:49 +0000 Subject: [PATCH 235/404] Update ghcr.io/element-hq/synapse Docker tag to v1.134.0 --- roles/custom/matrix-synapse/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-synapse/defaults/main.yml b/roles/custom/matrix-synapse/defaults/main.yml index 4f1176133..e4bf4faa7 100644 --- a/roles/custom/matrix-synapse/defaults/main.yml +++ b/roles/custom/matrix-synapse/defaults/main.yml @@ -16,7 +16,7 @@ matrix_synapse_enabled: true matrix_synapse_github_org_and_repo: element-hq/synapse # renovate: datasource=docker depName=ghcr.io/element-hq/synapse -matrix_synapse_version: v1.133.0 +matrix_synapse_version: v1.134.0 matrix_synapse_username: '' matrix_synapse_uid: '' From 6a98f47f7368079882b744b2623d3fa29d45b93c Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 15 Jul 2025 15:09:44 +0000 Subject: [PATCH 236/404] Update ghcr.io/element-hq/matrix-authentication-service Docker tag to v0.19.0 --- roles/custom/matrix-authentication-service/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-authentication-service/defaults/main.yml b/roles/custom/matrix-authentication-service/defaults/main.yml index 1a8996ba5..83ad35271 100644 --- a/roles/custom/matrix-authentication-service/defaults/main.yml +++ b/roles/custom/matrix-authentication-service/defaults/main.yml @@ -22,7 +22,7 @@ matrix_authentication_service_container_repo_version: "{{ 'main' if matrix_authe matrix_authentication_service_container_src_files_path: "{{ matrix_base_data_path }}/matrix-authentication-service/container-src" # renovate: datasource=docker depName=ghcr.io/element-hq/matrix-authentication-service -matrix_authentication_service_version: 0.18.0 +matrix_authentication_service_version: 0.19.0 matrix_authentication_service_container_image_registry_prefix: "{{ 'localhost/' if matrix_authentication_service_container_image_self_build else matrix_authentication_service_container_image_registry_prefix_upstream }}" matrix_authentication_service_container_image_registry_prefix_upstream: "{{ matrix_authentication_service_container_image_registry_prefix_upstream_default }}" matrix_authentication_service_container_image_registry_prefix_upstream_default: "ghcr.io/" From b8029111c9520e88d31c5898796fd88014634b66 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Tue, 15 Jul 2025 19:48:26 +0000 Subject: [PATCH 237/404] Update ghcr.io/element-hq/element-web Docker tag to v1.11.106 --- roles/custom/matrix-client-element/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-client-element/defaults/main.yml b/roles/custom/matrix-client-element/defaults/main.yml index 7348c31b4..2528ede43 100644 --- a/roles/custom/matrix-client-element/defaults/main.yml +++ b/roles/custom/matrix-client-element/defaults/main.yml @@ -29,7 +29,7 @@ matrix_client_element_container_image_self_build_repo: "https://github.com/eleme matrix_client_element_container_image_self_build_low_memory_system_patch_enabled: "{{ ansible_memtotal_mb < 4096 }}" # renovate: datasource=docker depName=ghcr.io/element-hq/element-web -matrix_client_element_version: v1.11.105 +matrix_client_element_version: v1.11.106 matrix_client_element_docker_image: "{{ matrix_client_element_docker_image_registry_prefix }}element-hq/element-web:{{ matrix_client_element_version }}" matrix_client_element_docker_image_registry_prefix: "{{ 'localhost/' if matrix_client_element_container_image_self_build else matrix_client_element_docker_image_registry_prefix_upstream }}" From a04a72d4e5fb066f6f265dbf62ba72d110092da3 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 16 Jul 2025 21:25:27 +0000 Subject: [PATCH 238/404] Update dock.mau.dev/mautrix/gmessages Docker tag to v0.6.4 --- roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml index 900fa38f2..acbc44507 100644 --- a/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-gmessages/defaults/main.yml @@ -18,7 +18,7 @@ matrix_mautrix_gmessages_container_image_self_build_repo: "https://github.com/ma matrix_mautrix_gmessages_container_image_self_build_branch: "{{ 'main' if matrix_mautrix_gmessages_version == 'latest' else matrix_mautrix_gmessages_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/gmessages -matrix_mautrix_gmessages_version: v0.6.3 +matrix_mautrix_gmessages_version: v0.6.4 # See: https://mau.dev/mautrix/gmessages/container_registry matrix_mautrix_gmessages_docker_image: "{{ matrix_mautrix_gmessages_docker_image_registry_prefix }}mautrix/gmessages:{{ matrix_mautrix_gmessages_version }}" From b5af7f7a3206eddaf30cd37023450e590c1bc4f1 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 16 Jul 2025 21:25:31 +0000 Subject: [PATCH 239/404] Update dock.mau.dev/mautrix/meta Docker tag to v0.5.2 --- .../matrix-bridge-mautrix-meta-instagram/defaults/main.yml | 2 +- .../matrix-bridge-mautrix-meta-messenger/defaults/main.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml index e74ba2ea3..d86fcfaaf 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-instagram/defaults/main.yml @@ -20,7 +20,7 @@ matrix_mautrix_meta_instagram_enabled: true matrix_mautrix_meta_instagram_identifier: matrix-mautrix-meta-instagram # renovate: datasource=docker depName=dock.mau.dev/mautrix/meta -matrix_mautrix_meta_instagram_version: v0.5.1 +matrix_mautrix_meta_instagram_version: v0.5.2 matrix_mautrix_meta_instagram_base_path: "{{ matrix_base_data_path }}/mautrix-meta-instagram" matrix_mautrix_meta_instagram_config_path: "{{ matrix_mautrix_meta_instagram_base_path }}/config" diff --git a/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml index 7c3786e32..1b84659b9 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-messenger/defaults/main.yml @@ -20,7 +20,7 @@ matrix_mautrix_meta_messenger_enabled: true matrix_mautrix_meta_messenger_identifier: matrix-mautrix-meta-messenger # renovate: datasource=docker depName=dock.mau.dev/mautrix/meta -matrix_mautrix_meta_messenger_version: v0.5.1 +matrix_mautrix_meta_messenger_version: v0.5.2 matrix_mautrix_meta_messenger_base_path: "{{ matrix_base_data_path }}/mautrix-meta-messenger" matrix_mautrix_meta_messenger_config_path: "{{ matrix_mautrix_meta_messenger_base_path }}/config" From c1d5d38cf6296058b4f1d5aec50faee0fc484e2d Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 16 Jul 2025 16:09:38 +0000 Subject: [PATCH 240/404] Update dock.mau.dev/mautrix/bluesky Docker tag to v0.1.2 --- roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml index f02ee3ad4..a0c8dd620 100644 --- a/roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-bluesky/defaults/main.yml @@ -14,7 +14,7 @@ matrix_mautrix_bluesky_container_image_self_build_repo: "https://github.com/maut matrix_mautrix_bluesky_container_image_self_build_repo_version: "{{ 'master' if matrix_mautrix_bluesky_version == 'latest' else matrix_mautrix_bluesky_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/bluesky -matrix_mautrix_bluesky_version: v0.1.1 +matrix_mautrix_bluesky_version: v0.1.2 # See: https://mau.dev/tulir/mautrix-bluesky/container_registry matrix_mautrix_bluesky_docker_image: "{{ matrix_mautrix_bluesky_docker_image_registry_prefix }}mautrix/bluesky:{{ matrix_mautrix_bluesky_version }}" matrix_mautrix_bluesky_docker_image_registry_prefix: "{{ 'localhost/' if matrix_mautrix_bluesky_container_image_self_build else matrix_mautrix_bluesky_docker_image_registry_prefix_upstream }}" From eb067b75360a7a8aacc3ef926246e246672d7136 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 16 Jul 2025 16:09:42 +0000 Subject: [PATCH 241/404] Update dock.mau.dev/mautrix/discord Docker tag to v0.7.5 --- roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml index 81d1c5084..98fb03555 100644 --- a/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml @@ -21,7 +21,7 @@ matrix_mautrix_discord_container_image_self_build_repo: "https://mau.dev/mautrix matrix_mautrix_discord_container_image_self_build_branch: "{{ 'main' if matrix_mautrix_discord_version == 'latest' else matrix_mautrix_discord_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/discord -matrix_mautrix_discord_version: v0.7.4 +matrix_mautrix_discord_version: v0.7.5 # See: https://mau.dev/mautrix/discord/container_registry matrix_mautrix_discord_docker_image: "{{ matrix_mautrix_discord_docker_image_registry_prefix }}mautrix/discord:{{ matrix_mautrix_discord_version }}" From 2ad2fd8b57b9463266d4415f6cc1c2f2bfb5f16e Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 17 Jul 2025 03:30:03 +0000 Subject: [PATCH 242/404] Update dock.mau.dev/mautrix/signal Docker tag to v0.8.5 --- roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml index d9ce5bbee..4f2d97af4 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-signal/defaults/main.yml @@ -25,7 +25,7 @@ matrix_mautrix_signal_container_image_self_build_repo: "https://mau.dev/mautrix/ matrix_mautrix_signal_container_image_self_build_branch: "{{ 'main' if matrix_mautrix_signal_version == 'latest' else matrix_mautrix_signal_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/signal -matrix_mautrix_signal_version: v0.8.4 +matrix_mautrix_signal_version: v0.8.5 # See: https://mau.dev/mautrix/signal/container_registry matrix_mautrix_signal_docker_image: "{{ matrix_mautrix_signal_docker_image_registry_prefix }}mautrix/signal:{{ matrix_mautrix_signal_docker_image_tag }}" From 70686595d561fd8508eaf053aa716a19fdc420b1 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 17 Jul 2025 06:06:41 +0000 Subject: [PATCH 243/404] Update dock.mau.dev/mautrix/slack Docker tag to v0.2.2 --- roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml index 681d082ea..a1ff8f45a 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml @@ -17,7 +17,7 @@ matrix_mautrix_slack_container_image_self_build_repo: "https://mau.dev/mautrix/s matrix_mautrix_slack_container_image_self_build_branch: "{{ 'main' if matrix_mautrix_slack_version == 'latest' else matrix_mautrix_slack_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/slack -matrix_mautrix_slack_version: v0.2.1 +matrix_mautrix_slack_version: v0.2.2 # See: https://mau.dev/mautrix/slack/container_registry matrix_mautrix_slack_docker_image: "{{ matrix_mautrix_slack_docker_image_registry_prefix }}mautrix/slack:{{ matrix_mautrix_slack_version }}" matrix_mautrix_slack_docker_image_registry_prefix: "{{ 'localhost/' if matrix_mautrix_slack_container_image_self_build else matrix_mautrix_slack_docker_image_registry_prefix_upstream }}" From 7cf0fe52d4f78ddef0a8a2974b0c8129a1364d09 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 17 Jul 2025 06:06:45 +0000 Subject: [PATCH 244/404] Update dock.mau.dev/mautrix/telegram Docker tag to v0.15.3 --- roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml index 069e8ace4..2cfc50322 100644 --- a/roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-telegram/defaults/main.yml @@ -41,7 +41,7 @@ matrix_mautrix_telegram_docker_repo_version: "{{ 'master' if matrix_mautrix_tele matrix_mautrix_telegram_docker_src_files_path: "{{ matrix_base_data_path }}/mautrix-telegram/docker-src" # renovate: datasource=docker depName=dock.mau.dev/mautrix/telegram -matrix_mautrix_telegram_version: v0.15.2 +matrix_mautrix_telegram_version: v0.15.3 # See: https://mau.dev/mautrix/telegram/container_registry matrix_mautrix_telegram_docker_image: "{{ matrix_mautrix_telegram_docker_image_registry_prefix }}mautrix/telegram:{{ matrix_mautrix_telegram_version }}" matrix_mautrix_telegram_docker_image_registry_prefix: "{{ 'localhost/' if matrix_mautrix_telegram_container_image_self_build else matrix_mautrix_telegram_docker_image_registry_prefix_upstream }}" From c6871d187fc626b2d7552d9711c137a24d1329f0 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 17 Jul 2025 07:17:37 +0000 Subject: [PATCH 245/404] Update dock.mau.dev/mautrix/twitter Docker tag to v0.4.3 --- roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml index 3b5e479c8..1c31e1206 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-twitter/defaults/main.yml @@ -22,7 +22,7 @@ matrix_mautrix_twitter_container_image_self_build_repo: "https://github.com/maut matrix_mautrix_twitter_container_image_self_build_repo_version: "{{ 'master' if matrix_mautrix_twitter_version == 'latest' else matrix_mautrix_twitter_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/twitter -matrix_mautrix_twitter_version: v0.4.2 +matrix_mautrix_twitter_version: v0.4.3 # See: https://mau.dev/tulir/mautrix-twitter/container_registry matrix_mautrix_twitter_docker_image: "{{ matrix_mautrix_twitter_docker_image_registry_prefix }}mautrix/twitter:{{ matrix_mautrix_twitter_version }}" matrix_mautrix_twitter_docker_image_registry_prefix: "{{ 'localhost/' if matrix_mautrix_twitter_container_image_self_build else matrix_mautrix_twitter_docker_image_registry_prefix_upstream }}" From abc74a6b96edcfc9d7eb8c9af5995c976b66aa0f Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Thu, 17 Jul 2025 07:17:41 +0000 Subject: [PATCH 246/404] Update dock.mau.dev/mautrix/whatsapp Docker tag to v0.12.3 --- roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml index 70565a31a..877aed52d 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/defaults/main.yml @@ -28,7 +28,7 @@ matrix_mautrix_whatsapp_container_image_self_build_repo: "https://mau.dev/mautri matrix_mautrix_whatsapp_container_image_self_build_branch: "{{ 'master' if matrix_mautrix_whatsapp_version == 'latest' else matrix_mautrix_whatsapp_version }}" # renovate: datasource=docker depName=dock.mau.dev/mautrix/whatsapp -matrix_mautrix_whatsapp_version: v0.12.2 +matrix_mautrix_whatsapp_version: v0.12.3 # See: https://mau.dev/mautrix/whatsapp/container_registry matrix_mautrix_whatsapp_docker_image: "{{ matrix_mautrix_whatsapp_docker_image_registry_prefix }}mautrix/whatsapp:{{ matrix_mautrix_whatsapp_version }}" From 7eff95f38d4757a428012af048ff8ad93caf2880 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Mon, 21 Jul 2025 22:15:33 +0000 Subject: [PATCH 247/404] Update joseluisq/static-web-server Docker tag to v2.38.0 --- roles/custom/matrix-cactus-comments-client/defaults/main.yml | 2 +- roles/custom/matrix-static-files/defaults/main.yml | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/roles/custom/matrix-cactus-comments-client/defaults/main.yml b/roles/custom/matrix-cactus-comments-client/defaults/main.yml index a6f488d44..dd03d0d4d 100644 --- a/roles/custom/matrix-cactus-comments-client/defaults/main.yml +++ b/roles/custom/matrix-cactus-comments-client/defaults/main.yml @@ -18,7 +18,7 @@ matrix_cactus_comments_client_public_path: "{{ matrix_cactus_comments_client_bas matrix_cactus_comments_client_public_path_file_permissions: "0644" # renovate: datasource=docker depName=joseluisq/static-web-server -matrix_cactus_comments_client_version: 2.37.0 +matrix_cactus_comments_client_version: 2.38.0 matrix_cactus_comments_client_container_image: "{{ matrix_cactus_comments_client_container_image_registry_prefix }}joseluisq/static-web-server:{{ matrix_cactus_comments_client_container_image_tag }}" matrix_cactus_comments_client_container_image_registry_prefix: "{{ matrix_cactus_comments_client_container_image_registry_prefix_upstream }}" diff --git a/roles/custom/matrix-static-files/defaults/main.yml b/roles/custom/matrix-static-files/defaults/main.yml index 701011650..529482867 100644 --- a/roles/custom/matrix-static-files/defaults/main.yml +++ b/roles/custom/matrix-static-files/defaults/main.yml @@ -13,7 +13,7 @@ matrix_static_files_enabled: true matrix_static_files_identifier: matrix-static-files # renovate: datasource=docker depName=joseluisq/static-web-server -matrix_static_files_version: 2.37.0 +matrix_static_files_version: 2.38.0 matrix_static_files_base_path: "{{ matrix_base_data_path }}/{{ 'static-files' if matrix_static_files_identifier == 'matrix-static-files' else matrix_static_files_identifier }}" matrix_static_files_config_path: "{{ matrix_static_files_base_path }}/config" From 7261be5537fafbaadce424ac042e239d32761faa Mon Sep 17 00:00:00 2001 From: Aine Date: Wed, 23 Jul 2025 08:46:08 +0100 Subject: [PATCH 248/404] add matrix_synapse_ext_password_provider_ldap_tls_options_validate var --- roles/custom/matrix-synapse/defaults/main.yml | 1 + .../custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 | 2 ++ 2 files changed, 3 insertions(+) diff --git a/roles/custom/matrix-synapse/defaults/main.yml b/roles/custom/matrix-synapse/defaults/main.yml index e4bf4faa7..76deda672 100644 --- a/roles/custom/matrix-synapse/defaults/main.yml +++ b/roles/custom/matrix-synapse/defaults/main.yml @@ -1373,6 +1373,7 @@ matrix_synapse_ext_password_provider_ldap_bind_password: "" matrix_synapse_ext_password_provider_ldap_filter: "" matrix_synapse_ext_password_provider_ldap_active_directory: false matrix_synapse_ext_password_provider_ldap_default_domain: "" +matrix_synapse_ext_password_provider_ldap_tls_options_validate: true # Enable this to activate the Synapse Antispam spam-checker module. # See: https://github.com/t2bot/synapse-simple-antispam diff --git a/roles/custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 b/roles/custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 index 6eb6df116..6fe7fc389 100644 --- a/roles/custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 +++ b/roles/custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 @@ -2550,6 +2550,8 @@ password_providers: bind_password: {{ matrix_synapse_ext_password_provider_ldap_bind_password | string|to_json }} {% endif %} filter: {{ matrix_synapse_ext_password_provider_ldap_filter | string|to_json }} + tls_options: + validate: {{ matrix_synapse_ext_password_provider_ldap_tls_options_validate | to_json }} {% endif %} {% endif %} From 8be492777082b4d9175dfdc22a4531c70188a956 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 08:59:53 +0000 Subject: [PATCH 249/404] Update docker.io/metio/matrix-alertmanager-receiver Docker tag to v2025.7.23 --- roles/custom/matrix-alertmanager-receiver/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-alertmanager-receiver/defaults/main.yml b/roles/custom/matrix-alertmanager-receiver/defaults/main.yml index 897daee55..b5a680c49 100644 --- a/roles/custom/matrix-alertmanager-receiver/defaults/main.yml +++ b/roles/custom/matrix-alertmanager-receiver/defaults/main.yml @@ -11,7 +11,7 @@ matrix_alertmanager_receiver_enabled: true # renovate: datasource=docker depName=docker.io/metio/matrix-alertmanager-receiver -matrix_alertmanager_receiver_version: 2025.7.2 +matrix_alertmanager_receiver_version: 2025.7.23 matrix_alertmanager_receiver_scheme: https From 8ab525d609f4c99e920a13100353e0ca4f5bf278 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 23:36:45 +0000 Subject: [PATCH 250/404] Update dependency grafana to v11.6.4-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index fdcb1c387..4f0408965 100644 --- a/requirements.yml +++ b/requirements.yml @@ -22,7 +22,7 @@ version: v4.98.1-r0-2-0 name: exim_relay - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-grafana.git - version: v11.6.3-1 + version: v11.6.4-0 name: grafana - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-jitsi.git version: v10314-1 From 514a9473869fbde4e94842596db93f091d00a509 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Wed, 23 Jul 2025 23:36:50 +0000 Subject: [PATCH 251/404] Update dependency traefik to v3.5.0-0 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 4f0408965..03ce0d38e 100644 --- a/requirements.yml +++ b/requirements.yml @@ -67,7 +67,7 @@ version: v1.0.0-0 name: timesync - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik.git - version: v3.4.4-1 + version: v3.5.0-0 name: traefik - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik-certs-dumper.git version: v2.10.0-1 From 69184bc4a37305de898f1a571ed1bf46a9d21f93 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Fri, 18 Jul 2025 16:43:35 +0000 Subject: [PATCH 252/404] Update matrixdotorg/sygnal Docker tag to v0.16.0 --- roles/custom/matrix-sygnal/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-sygnal/defaults/main.yml b/roles/custom/matrix-sygnal/defaults/main.yml index 540dece4e..99f467741 100644 --- a/roles/custom/matrix-sygnal/defaults/main.yml +++ b/roles/custom/matrix-sygnal/defaults/main.yml @@ -22,7 +22,7 @@ matrix_sygnal_hostname: '' matrix_sygnal_path_prefix: / # renovate: datasource=docker depName=matrixdotorg/sygnal -matrix_sygnal_version: v0.15.1 +matrix_sygnal_version: v0.16.0 matrix_sygnal_base_path: "{{ matrix_base_data_path }}/sygnal" matrix_sygnal_config_path: "{{ matrix_sygnal_base_path }}/config" From 16212150a3a403eee22a67f0d68e82e7f8e8202f Mon Sep 17 00:00:00 2001 From: Aine Date: Thu, 24 Jul 2025 16:47:36 +0100 Subject: [PATCH 253/404] Sygnal: rollback to v0.15.1, because v0.16.0's docker image is broken --- roles/custom/matrix-sygnal/defaults/main.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix-sygnal/defaults/main.yml b/roles/custom/matrix-sygnal/defaults/main.yml index 99f467741..540dece4e 100644 --- a/roles/custom/matrix-sygnal/defaults/main.yml +++ b/roles/custom/matrix-sygnal/defaults/main.yml @@ -22,7 +22,7 @@ matrix_sygnal_hostname: '' matrix_sygnal_path_prefix: / # renovate: datasource=docker depName=matrixdotorg/sygnal -matrix_sygnal_version: v0.16.0 +matrix_sygnal_version: v0.15.1 matrix_sygnal_base_path: "{{ matrix_base_data_path }}/sygnal" matrix_sygnal_config_path: "{{ matrix_sygnal_base_path }}/config" From d70bccbda47699e7ba23d1c6d7ba60fd66739534 Mon Sep 17 00:00:00 2001 From: adam-kress Date: Fri, 25 Jul 2025 16:56:25 -0400 Subject: [PATCH 254/404] Upgrade Jitsi (v10314-1 -> v10431-0) --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 03ce0d38e..e5b4bbf69 100644 --- a/requirements.yml +++ b/requirements.yml @@ -25,7 +25,7 @@ version: v11.6.4-0 name: grafana - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-jitsi.git - version: v10314-1 + version: v10431-0 name: jitsi - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-livekit-server.git version: v1.9.0-2 From d4d293f9a46f8d567b4a94d49122224118b38e4f Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 26 Jul 2025 05:40:23 +0000 Subject: [PATCH 255/404] Update dependency traefik to v3.5.0-1 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index e5b4bbf69..1ea5986c9 100644 --- a/requirements.yml +++ b/requirements.yml @@ -67,7 +67,7 @@ version: v1.0.0-0 name: timesync - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik.git - version: v3.5.0-0 + version: v3.5.0-1 name: traefik - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik-certs-dumper.git version: v2.10.0-1 From e2cb95f1451c4a50935dd56b9fbc69f1f15ac9ea Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 26 Jul 2025 05:40:18 +0000 Subject: [PATCH 256/404] Update dependency postgres to v17.5-1 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 1ea5986c9..7e66dfed4 100644 --- a/requirements.yml +++ b/requirements.yml @@ -43,7 +43,7 @@ version: ff2fd42e1c1a9e28e3312bbd725395f9c2fc7f16 name: playbook_state_preserver - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-postgres.git - version: v17.5-0 + version: v17.5-1 name: postgres - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-postgres-backup.git version: v17-5 From 8c89f577ad96328fb66deee9cc9f46185e524b23 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 26 Jul 2025 09:34:17 +0000 Subject: [PATCH 257/404] Update dependency container_socket_proxy to v0.3.0-7 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 7e66dfed4..67845aba3 100644 --- a/requirements.yml +++ b/requirements.yml @@ -7,7 +7,7 @@ version: v1.4.1-1.9.14-0 name: backup_borg - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-container-socket-proxy.git - version: v0.3.0-6 + version: v0.3.0-7 name: container_socket_proxy - src: git+https://github.com/geerlingguy/ansible-role-docker version: 7.4.7 From 28870d2867d7c738343e7750dc040a93d3703a5e Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 26 Jul 2025 09:34:22 +0000 Subject: [PATCH 258/404] Update dependency etherpad to v2.3.2-1 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 67845aba3..3897de635 100644 --- a/requirements.yml +++ b/requirements.yml @@ -16,7 +16,7 @@ version: 129c8590e106b83e6f4c259649a613c6279e937a name: docker_sdk_for_python - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-etherpad.git - version: v2.3.2-0 + version: v2.3.2-1 name: etherpad - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-exim-relay.git version: v4.98.1-r0-2-0 From c7989af64f7d39e2ac2ead6af77816a22b3eb9ef Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 26 Jul 2025 13:34:46 +0000 Subject: [PATCH 259/404] Update dependency etherpad to v2.3.2-2 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 3897de635..79f0f1b7b 100644 --- a/requirements.yml +++ b/requirements.yml @@ -16,7 +16,7 @@ version: 129c8590e106b83e6f4c259649a613c6279e937a name: docker_sdk_for_python - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-etherpad.git - version: v2.3.2-1 + version: v2.3.2-2 name: etherpad - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-exim-relay.git version: v4.98.1-r0-2-0 From 6da6b466dae047346329acb222bd591d1d7a0c03 Mon Sep 17 00:00:00 2001 From: "renovate[bot]" <29139614+renovate[bot]@users.noreply.github.com> Date: Sat, 26 Jul 2025 13:34:51 +0000 Subject: [PATCH 260/404] Update dependency exim_relay to v4.98.1-r0-2-1 --- requirements.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/requirements.yml b/requirements.yml index 79f0f1b7b..7aa7f1ac5 100644 --- a/requirements.yml +++ b/requirements.yml @@ -19,7 +19,7 @@ version: v2.3.2-2 name: etherpad - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-exim-relay.git - version: v4.98.1-r0-2-0 + version: v4.98.1-r0-2-1 name: exim_relay - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-grafana.git version: v11.6.4-0 From a1f6ee4dc9b92fdb520627ec22265b800f73a6f8 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Sat, 26 Jul 2025 17:49:52 +0300 Subject: [PATCH 261/404] Improve compatibility with ansible-core>=2.19.0 by not reaching into `vars` Fixes https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/4445 --- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 2 +- .../matrix-base/tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 6 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 12 ++- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 2 +- .../matrix-conduit/tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 4 +- .../matrix-corporal/tasks/validate_config.yml | 2 +- .../matrix-coturn/tasks/validate_config.yml | 4 +- .../matrix-dendrite/tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 2 +- .../matrix-ma1sd/tasks/validate_config.yml | 12 ++- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 2 +- .../matrix-synapse/tasks/validate_config.yml | 2 +- .../tasks/validate_config.yml | 4 +- .../tasks/validate_config.yml | 74 +++++++++---------- 73 files changed, 167 insertions(+), 171 deletions(-) diff --git a/roles/custom/matrix-alertmanager-receiver/tasks/validate_config.yml b/roles/custom/matrix-alertmanager-receiver/tasks/validate_config.yml index 77ecdce2a..3a75616d6 100644 --- a/roles/custom/matrix-alertmanager-receiver/tasks/validate_config.yml +++ b/roles/custom/matrix-alertmanager-receiver/tasks/validate_config.yml @@ -7,7 +7,7 @@ ansible.builtin.fail: msg: > You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_alertmanager_receiver_hostname', when: true} - {'name': 'matrix_alertmanager_receiver_path_prefix', when: true} @@ -21,6 +21,6 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_alertmanager_receiver_container_image_name_prefix', 'new': 'matrix_alertmanager_receiver_container_image_registry_prefix'} diff --git a/roles/custom/matrix-appservice-double-puppet/tasks/validate_config.yml b/roles/custom/matrix-appservice-double-puppet/tasks/validate_config.yml index abe7b371b..97d482d6e 100644 --- a/roles/custom/matrix-appservice-double-puppet/tasks/validate_config.yml +++ b/roles/custom/matrix-appservice-double-puppet/tasks/validate_config.yml @@ -7,7 +7,7 @@ ansible.builtin.fail: msg: > You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_appservice_double_puppet_registration_as_token', when: true} - {'name': 'matrix_appservice_double_puppet_registration_as_token', when: true} diff --git a/roles/custom/matrix-appservice-draupnir-for-all/tasks/validate_config.yml b/roles/custom/matrix-appservice-draupnir-for-all/tasks/validate_config.yml index 95ed9fde3..b07a2d2f4 100644 --- a/roles/custom/matrix-appservice-draupnir-for-all/tasks/validate_config.yml +++ b/roles/custom/matrix-appservice-draupnir-for-all/tasks/validate_config.yml @@ -20,7 +20,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_appservice_draupnir_for_all_docker_image_name_prefix', 'new': 'matrix_appservice_draupnir_for_all_docker_image_registry_prefix'} - {'old': 'matrix_appservice_draupnir_for_all_enable_room_state_backing_store', 'new': 'matrix_appservice_draupnir_for_all_config_roomStateBackingStore_enabled'} diff --git a/roles/custom/matrix-authentication-service/tasks/validate_config.yml b/roles/custom/matrix-authentication-service/tasks/validate_config.yml index d3c47844f..675e0a13f 100644 --- a/roles/custom/matrix-authentication-service/tasks/validate_config.yml +++ b/roles/custom/matrix-authentication-service/tasks/validate_config.yml @@ -40,7 +40,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_authentication_service_container_image_name_prefix', 'new': 'matrix_authentication_service_container_image_registry_prefix'} - {'old': 'matrix_authentication_service_syn2mas_container_image_name_prefix', 'new': 'matrix_authentication_service_syn2mas_container_image_registry_prefix'} diff --git a/roles/custom/matrix-base/tasks/validate_config.yml b/roles/custom/matrix-base/tasks/validate_config.yml index f3f4eb166..93e1ded81 100644 --- a/roles/custom/matrix-base/tasks/validate_config.yml +++ b/roles/custom/matrix-base/tasks/validate_config.yml @@ -20,7 +20,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'host_specific_hostname_identity', 'new': 'matrix_domain'} - {'old': 'hostname_identity', 'new': 'matrix_domain'} @@ -97,7 +97,7 @@ To get rid of this error, remove all `matrix_mx_puppet_*` references from your configuration. To clean up your server from mx-puppet-skype's presence, see this changelog entry: https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/master/CHANGELOG.md#mx-puppet-skype-removal. If you still need bridging to Skype, consider switching to the go-skype bridge instead. See `docs/configuring-playbook-bridge-go-skype-bridge.md`. - when: "'matrix_mx_puppet_skype_enabled' in vars" + when: "lookup('ansible.builtin.varnames', '^matrix_mx_puppet_skype_enabled$', wantlist=True) | length > 0" - name: Fail if mautrix-instagram and mautrix-meta-instagram are in conflict ansible.builtin.fail: diff --git a/roles/custom/matrix-bot-baibot/tasks/validate_config.yml b/roles/custom/matrix-bot-baibot/tasks/validate_config.yml index ee4eae03c..14d155b6e 100644 --- a/roles/custom/matrix-bot-baibot/tasks/validate_config.yml +++ b/roles/custom/matrix-bot-baibot/tasks/validate_config.yml @@ -9,7 +9,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_bot_baibot_config_user_mxid_localpart', when: true} - {'name': 'matrix_bot_baibot_config_user_password', when: true} @@ -37,6 +37,6 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_bot_baibot_container_image_name_prefix', 'new': 'matrix_bot_baibot_container_image_registry_prefix'} diff --git a/roles/custom/matrix-bot-buscarron/tasks/validate_config.yml b/roles/custom/matrix-bot-buscarron/tasks/validate_config.yml index 45e6690e2..97b765235 100644 --- a/roles/custom/matrix-bot-buscarron/tasks/validate_config.yml +++ b/roles/custom/matrix-bot-buscarron/tasks/validate_config.yml @@ -10,7 +10,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_bot_buscarron_noencryption', 'new': ''} - {'old': 'matrix_bot_buscarron_spam_hosts', 'new': ''} @@ -22,7 +22,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_bot_buscarron_password', when: true} - {'name': 'matrix_bot_buscarron_hostname', when: true} diff --git a/roles/custom/matrix-bot-chatgpt/tasks/validate_config.yml b/roles/custom/matrix-bot-chatgpt/tasks/validate_config.yml index 0c7a36ba6..2c175b4a5 100644 --- a/roles/custom/matrix-bot-chatgpt/tasks/validate_config.yml +++ b/roles/custom/matrix-bot-chatgpt/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_bot_chatgpt_openai_api_key', when: true} - {'name': 'matrix_bot_chatgpt_matrix_bot_username', when: true} @@ -22,7 +22,7 @@ msg: >- Your configuration contains a variable that is no longer used. Please change your configuration to remove the variable (`{{ item.name }}`). - when: "item.name in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.name + '$'), wantlist=True) | length > 0" with_items: - {'name': 'matrix_bot_chatgpt_openai_email'} - {'name': 'matrix_bot_chatgpt_openai_password'} @@ -33,7 +33,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_bot_chatgpt_docker_image', 'new': 'matrix_bot_chatgpt_container_image'} - {'old': 'matrix_bot_chatgpt_docker_image_name_prefix', 'new': 'matrix_bot_chatgpt_container_image_name_prefix'} diff --git a/roles/custom/matrix-bot-draupnir/tasks/validate_config.yml b/roles/custom/matrix-bot-draupnir/tasks/validate_config.yml index fd7ddca2b..e81663db3 100644 --- a/roles/custom/matrix-bot-draupnir/tasks/validate_config.yml +++ b/roles/custom/matrix-bot-draupnir/tasks/validate_config.yml @@ -11,7 +11,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_bot_draupnir_container_image_name_prefix', 'new': 'matrix_bot_draupnir_container_image_registry_prefix'} - {'old': 'matrix_bot_draupnir_enable_room_state_backing_store', 'new': 'matrix_bot_draupnir_config_roomStateBackingStore_enabled'} diff --git a/roles/custom/matrix-bot-honoroit/tasks/validate_config.yml b/roles/custom/matrix-bot-honoroit/tasks/validate_config.yml index fcaa04b68..6c0c12a19 100644 --- a/roles/custom/matrix-bot-honoroit/tasks/validate_config.yml +++ b/roles/custom/matrix-bot-honoroit/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_bot_honoroit_homeserver', when: true} - {'name': 'matrix_bot_honoroit_password', when: true} @@ -22,6 +22,6 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_bot_honoroit_container_image_name_prefix', 'new': 'matrix_bot_honoroit_container_image_registry_prefix'} diff --git a/roles/custom/matrix-bot-matrix-registration-bot/tasks/validate_config.yml b/roles/custom/matrix-bot-matrix-registration-bot/tasks/validate_config.yml index 8fc291061..3021c8537 100644 --- a/roles/custom/matrix-bot-matrix-registration-bot/tasks/validate_config.yml +++ b/roles/custom/matrix-bot-matrix-registration-bot/tasks/validate_config.yml @@ -20,7 +20,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_bot_matrix_registration_bot_bot_access_token', 'new': ''} - {'old': 'matrix_bot_matrix_registration_bot_matrix_homeserver_url', 'new': 'matrix_bot_matrix_registration_bot_api_base_url'} diff --git a/roles/custom/matrix-bot-matrix-reminder-bot/tasks/validate_config.yml b/roles/custom/matrix-bot-matrix-reminder-bot/tasks/validate_config.yml index 06781bd19..51fb49de5 100644 --- a/roles/custom/matrix-bot-matrix-reminder-bot/tasks/validate_config.yml +++ b/roles/custom/matrix-bot-matrix-reminder-bot/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_bot_matrix_reminder_bot_matrix_user_password', when: true} - {'name': 'matrix_bot_matrix_reminder_bot_reminders_timezone', when: true} @@ -23,7 +23,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_bot_matrix_reminder_bot_container_self_build', 'new': 'matrix_bot_matrix_reminder_bot_container_image_self_build'} - {'old': 'matrix_bot_matrix_reminder_bot_container_image_name_prefix', 'new': 'matrix_bot_matrix_reminder_bot_container_image_registry_prefix'} diff --git a/roles/custom/matrix-bot-maubot/tasks/validate_config.yml b/roles/custom/matrix-bot-maubot/tasks/validate_config.yml index 11c53f8ca..f1a247aee 100644 --- a/roles/custom/matrix-bot-maubot/tasks/validate_config.yml +++ b/roles/custom/matrix-bot-maubot/tasks/validate_config.yml @@ -12,7 +12,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_bot_maubot_management_interface_port', 'new': 'matrix_bot_maubot_server_port'} - {'old': 'matrix_bot_maubot_management_interface_http_bind_port', 'new': 'matrix_bot_maubot_container_management_interface_http_bind_port'} @@ -23,7 +23,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_bot_maubot_hostname', when: true} - {'name': 'matrix_bot_maubot_path_prefix', when: true} diff --git a/roles/custom/matrix-bot-mjolnir/tasks/validate_config.yml b/roles/custom/matrix-bot-mjolnir/tasks/validate_config.yml index 6b9ae0030..53ef0fdd4 100644 --- a/roles/custom/matrix-bot-mjolnir/tasks/validate_config.yml +++ b/roles/custom/matrix-bot-mjolnir/tasks/validate_config.yml @@ -32,6 +32,6 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_bot_mjolnir_container_image_name_prefix', 'new': 'matrix_bot_mjolnir_container_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-appservice-discord/tasks/validate_config.yml b/roles/custom/matrix-bridge-appservice-discord/tasks/validate_config.yml index e2be8da0a..6b46cbcb8 100644 --- a/roles/custom/matrix-bridge-appservice-discord/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-appservice-discord/tasks/validate_config.yml @@ -9,7 +9,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_appservice_discord_client_id', when: true} - {'name': 'matrix_appservice_discord_bot_token', when: true} @@ -24,7 +24,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_appservice_discord_container_expose_client_server_api_port', 'new': ''} - {'old': 'matrix_appservice_discord_container_image_name_prefix', 'new': 'matrix_appservice_discord_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-appservice-irc/tasks/validate_config.yml b/roles/custom/matrix-bridge-appservice-irc/tasks/validate_config.yml index fb7d77281..00124dc40 100644 --- a/roles/custom/matrix-bridge-appservice-irc/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-appservice-irc/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_appservice_irc_appservice_token', when: true} - {'name': 'matrix_appservice_irc_homeserver_url', when: true} @@ -39,7 +39,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_appservice_irc_container_expose_client_server_api_port', 'new': ''} - {'old': 'matrix_appservice_irc_container_self_build', 'new': 'matrix_appservice_irc_container_image_self_build'} diff --git a/roles/custom/matrix-bridge-appservice-kakaotalk/tasks/validate_config.yml b/roles/custom/matrix-bridge-appservice-kakaotalk/tasks/validate_config.yml index ebabe36aa..a22214c05 100644 --- a/roles/custom/matrix-bridge-appservice-kakaotalk/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-appservice-kakaotalk/tasks/validate_config.yml @@ -9,7 +9,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_appservice_kakaotalk_appservice_token', when: true} - {'name': 'matrix_appservice_kakaotalk_homeserver_address', when: true} @@ -22,7 +22,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_appservice_kakaotalk_node_docker_image_name_prefix', 'new': 'matrix_appservice_kakaotalk_node_docker_image_registry_prefix'} - {'old': 'matrix_appservice_kakaotalk_docker_image_name_prefix', 'new': 'matrix_appservice_kakaotalk_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-appservice-slack/tasks/validate_config.yml b/roles/custom/matrix-bridge-appservice-slack/tasks/validate_config.yml index b35e2cdb6..ceb4e4a75 100644 --- a/roles/custom/matrix-bridge-appservice-slack/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-appservice-slack/tasks/validate_config.yml @@ -11,7 +11,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_appservice_slack_control_room_id', when: true} - {'name': 'matrix_appservice_slack_appservice_token', when: true} @@ -28,6 +28,6 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_appservice_slack_container_self_build', 'new': 'matrix_appservice_slack_container_image_self_build'} diff --git a/roles/custom/matrix-bridge-appservice-webhooks/tasks/validate_config.yml b/roles/custom/matrix-bridge-appservice-webhooks/tasks/validate_config.yml index 7f0d8bfec..5742c4c49 100644 --- a/roles/custom/matrix-bridge-appservice-webhooks/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-appservice-webhooks/tasks/validate_config.yml @@ -27,6 +27,6 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_appservice_webhooks_docker_image_name_prefix', 'new': 'matrix_appservice_webhooks_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-beeper-linkedin/tasks/validate_config.yml b/roles/custom/matrix-bridge-beeper-linkedin/tasks/validate_config.yml index 1bc9de53a..2d9cbb3e6 100644 --- a/roles/custom/matrix-bridge-beeper-linkedin/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-beeper-linkedin/tasks/validate_config.yml @@ -11,7 +11,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_beeper_linkedin_appservice_token', when: true} - {'name': 'matrix_beeper_linkedin_homeserver_address', when: true} @@ -24,7 +24,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_beeper_linkedin_login_shared_secret', 'new': ''} - {'old': 'matrix_beeper_linkedin_docker_image_name_prefix', 'new': 'matrix_beeper_linkedin_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-go-skype-bridge/tasks/validate_config.yml b/roles/custom/matrix-bridge-go-skype-bridge/tasks/validate_config.yml index d7d20b94d..b1c73a99c 100644 --- a/roles/custom/matrix-bridge-go-skype-bridge/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-go-skype-bridge/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_go_skype_bridge_appservice_token', when: true} - {'name': 'matrix_go_skype_bridge_homeserver_address', when: true} @@ -23,6 +23,6 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_go_skype_bridge_docker_image_name_prefix', 'new': 'matrix_go_skype_bridge_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-heisenbridge/tasks/validate_config.yml b/roles/custom/matrix-bridge-heisenbridge/tasks/validate_config.yml index 34e63877f..43f900514 100644 --- a/roles/custom/matrix-bridge-heisenbridge/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-heisenbridge/tasks/validate_config.yml @@ -9,7 +9,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_heisenbridge_container_network', when: true} - {'name': 'matrix_heisenbridge_homeserver_url', when: true} diff --git a/roles/custom/matrix-bridge-hookshot/tasks/validate_config.yml b/roles/custom/matrix-bridge-hookshot/tasks/validate_config.yml index 9735668ae..5364b063c 100644 --- a/roles/custom/matrix-bridge-hookshot/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-hookshot/tasks/validate_config.yml @@ -11,7 +11,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_hookshot_feeds_interval', 'new': 'matrix_hookshot_feeds_pollIntervalSeconds'} - {'old': 'matrix_hookshot_generic_urlprefix', 'new': 'matrix_hookshot_generic_urlPrefix'} @@ -116,4 +116,4 @@ with_items: - matrix_hookshot_proxy_metrics - matrix_hookshot_metrics_endpoint - when: "item in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item + '$'), wantlist=True) | length > 0" diff --git a/roles/custom/matrix-bridge-mautrix-bluesky/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-bluesky/tasks/validate_config.yml index e14168283..cc73aedd6 100644 --- a/roles/custom/matrix-bridge-mautrix-bluesky/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-bluesky/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_bluesky_appservice_token', when: true} - {'name': 'matrix_mautrix_bluesky_homeserver_address', when: true} @@ -25,6 +25,6 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_bluesky_docker_image_name_prefix', 'new': 'matrix_mautrix_bluesky_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-mautrix-discord/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-discord/tasks/validate_config.yml index a354dbcd6..d61b33e97 100644 --- a/roles/custom/matrix-bridge-mautrix-discord/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-discord/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_discord_appservice_token', when: true} - {'name': 'matrix_mautrix_discord_homeserver_address', when: true} @@ -26,7 +26,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_discord_login_shared_secret', 'new': ''} - {'old': 'matrix_mautrix_discord_homeserver_public_address', 'new': 'matrix_mautrix_discord_bridge_public_address'} diff --git a/roles/custom/matrix-bridge-mautrix-facebook/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-facebook/tasks/validate_config.yml index aaab4839f..8d141ec08 100644 --- a/roles/custom/matrix-bridge-mautrix-facebook/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-facebook/tasks/validate_config.yml @@ -12,7 +12,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_facebook_public_endpoint', 'new': 'matrix_mautrix_facebook_appservice_public_prefix'} - {'old': 'matrix_mautrix_facebook_docker_image_name_prefix', 'new': 'matrix_mautrix_facebook_docker_image_registry_prefix'} @@ -21,7 +21,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_facebook_appservice_public_hostname', when: "{{ matrix_mautrix_facebook_appservice_public_enabled }}"} - {'name': 'matrix_mautrix_facebook_appservice_public_prefix', when: "{{ matrix_mautrix_facebook_appservice_public_enabled }}"} diff --git a/roles/custom/matrix-bridge-mautrix-gmessages/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-gmessages/tasks/validate_config.yml index 6b1b76e1d..ddd142b72 100644 --- a/roles/custom/matrix-bridge-mautrix-gmessages/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-gmessages/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_gmessages_appservice_token', when: true} - {'name': 'matrix_mautrix_gmessages_homeserver_address', when: true} @@ -25,7 +25,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_gmessages_log_level', 'new': 'matrix_mautrix_gmessages_logging_level'} - {'old': 'matrix_mautrix_gmessages_bridge_mute_bridging', 'new': ''} diff --git a/roles/custom/matrix-bridge-mautrix-googlechat/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-googlechat/tasks/validate_config.yml index 9e2b20132..ea1359c35 100644 --- a/roles/custom/matrix-bridge-mautrix-googlechat/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-googlechat/tasks/validate_config.yml @@ -11,7 +11,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_googlechat_public_endpoint', when: true} - {'name': 'matrix_mautrix_googlechat_appservice_token', when: true} @@ -29,6 +29,6 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_googlechat_docker_image_name_prefix', 'new': 'matrix_mautrix_googlechat_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-mautrix-instagram/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-instagram/tasks/validate_config.yml index f86e3e243..80259cbda 100644 --- a/roles/custom/matrix-bridge-mautrix-instagram/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-instagram/tasks/validate_config.yml @@ -9,7 +9,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_instagram_appservice_token', when: true} - {'name': 'matrix_mautrix_instagram_homeserver_address', when: true} @@ -24,6 +24,6 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_instagram_docker_image_name_prefix', 'new': 'matrix_mautrix_instagram_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-mautrix-meta-instagram/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-meta-instagram/tasks/validate_config.yml index 62ea8d204..6df63b15c 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-instagram/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-instagram/tasks/validate_config.yml @@ -9,7 +9,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_meta_instagram_metrics_proxying_hostname', when: "{{ matrix_mautrix_meta_instagram_metrics_proxying_enabled }}"} - {'name': 'matrix_mautrix_meta_instagram_metrics_proxying_path_prefix', when: "{{ matrix_mautrix_meta_instagram_metrics_proxying_enabled }}"} @@ -25,7 +25,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_meta_instagram_bridge_login_shared_secret', 'new': ''} - {'old': 'matrix_mautrix_meta_instagram_bridge_login_shared_secret_map_custom', 'new': ''} diff --git a/roles/custom/matrix-bridge-mautrix-meta-messenger/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-meta-messenger/tasks/validate_config.yml index db8bb4fb1..5a005f1e2 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-messenger/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-meta-messenger/tasks/validate_config.yml @@ -9,7 +9,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_meta_messenger_metrics_proxying_hostname', when: "{{ matrix_mautrix_meta_messenger_metrics_proxying_enabled }}"} - {'name': 'matrix_mautrix_meta_messenger_metrics_proxying_path_prefix', when: "{{ matrix_mautrix_meta_messenger_metrics_proxying_enabled }}"} @@ -25,7 +25,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_meta_messenger_bridge_login_shared_secret', 'new': ''} - {'old': 'matrix_mautrix_meta_messenger_bridge_login_shared_secret_map_custom', 'new': ''} diff --git a/roles/custom/matrix-bridge-mautrix-signal/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-signal/tasks/validate_config.yml index 1f08f1feb..93d99763d 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-signal/tasks/validate_config.yml @@ -12,7 +12,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_signal_appservice_token', when: true} - {'name': 'matrix_mautrix_signal_homeserver_address', when: true} @@ -27,7 +27,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_signal_log_level', 'new': 'matrix_mautrix_signal_logging_level'} - {'old': 'matrix_mautrix_signal_bridge_restricted_rooms', 'new': ''} diff --git a/roles/custom/matrix-bridge-mautrix-slack/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-slack/tasks/validate_config.yml index d4b8edf32..0d3adfdec 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-slack/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_slack_appservice_token', when: true} - {'name': 'matrix_mautrix_slack_homeserver_address', when: true} @@ -32,7 +32,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_slack_login_shared_secret', 'new': ''} - {'old': 'matrix_mautrix_slack_bridge_login_shared_secret_map', 'new': ''} diff --git a/roles/custom/matrix-bridge-mautrix-telegram/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-telegram/tasks/validate_config.yml index 20bad5816..3a234223d 100644 --- a/roles/custom/matrix-bridge-mautrix-telegram/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-telegram/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_telegram_hostname', when: true} - {'name': 'matrix_mautrix_telegram_path_prefix', when: true} @@ -30,7 +30,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_telegram_container_exposed_port_number', 'new': ''} - {'old': 'matrix_mautrix_telegram_container_self_build', 'new': 'matrix_mautrix_telegram_container_image_self_build'} diff --git a/roles/custom/matrix-bridge-mautrix-twitter/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-twitter/tasks/validate_config.yml index 0a30cd1d7..94623c041 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-twitter/tasks/validate_config.yml @@ -11,7 +11,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_twitter_appservice_token', when: true} - {'name': 'matrix_mautrix_twitter_homeserver_address', when: true} @@ -26,7 +26,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_twitter_login_shared_secret', 'new': ''} - {'old': 'matrix_mautrix_twitter_appservice_database', 'new': 'matrix_mautrix_twitter_database_uri'} diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/tasks/validate_config.yml b/roles/custom/matrix-bridge-mautrix-whatsapp/tasks/validate_config.yml index a1f7605f3..ca5ef9458 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/tasks/validate_config.yml @@ -12,7 +12,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mautrix_whatsapp_appservice_token', when: true} - {'name': 'matrix_mautrix_whatsapp_homeserver_address', when: true} @@ -24,7 +24,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mautrix_whatsapp_log_level', 'new': 'matrix_mautrix_whatsapp_logging_level'} - {'old': 'matrix_mautrix_whatsapp_login_shared_secret', 'new': ''} diff --git a/roles/custom/matrix-bridge-mx-puppet-discord/tasks/validate_config.yml b/roles/custom/matrix-bridge-mx-puppet-discord/tasks/validate_config.yml index d343fbba6..ba90eb314 100644 --- a/roles/custom/matrix-bridge-mx-puppet-discord/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mx-puppet-discord/tasks/validate_config.yml @@ -9,7 +9,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mx_puppet_discord_appservice_token', when: true} - {'name': 'matrix_mx_puppet_discord_homeserver_address', when: true} @@ -21,6 +21,6 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mx_puppet_discord_docker_image_name_prefix', 'new': 'matrix_mx_puppet_discord_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-mx-puppet-groupme/tasks/validate_config.yml b/roles/custom/matrix-bridge-mx-puppet-groupme/tasks/validate_config.yml index 8d195daff..b1647db23 100644 --- a/roles/custom/matrix-bridge-mx-puppet-groupme/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mx-puppet-groupme/tasks/validate_config.yml @@ -9,7 +9,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mx_puppet_groupme_appservice_token', when: true} - {'name': 'matrix_mx_puppet_groupme_homeserver_address', when: true} @@ -21,6 +21,6 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mx_puppet_groupme_docker_image_name_prefix', 'new': 'matrix_mx_puppet_groupme_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-mx-puppet-instagram/tasks/validate_config.yml b/roles/custom/matrix-bridge-mx-puppet-instagram/tasks/validate_config.yml index 13a9fbf7d..2afd623f4 100644 --- a/roles/custom/matrix-bridge-mx-puppet-instagram/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mx-puppet-instagram/tasks/validate_config.yml @@ -9,7 +9,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mx_puppet_instagram_appservice_token', when: true} - {'name': 'matrix_mx_puppet_instagram_homeserver_address', when: true} @@ -21,6 +21,6 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mx_puppet_instagram_docker_image_name_prefix', 'new': 'matrix_mx_puppet_instagram_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-mx-puppet-slack/tasks/validate_config.yml b/roles/custom/matrix-bridge-mx-puppet-slack/tasks/validate_config.yml index 8ede9eed3..ffe171fd4 100644 --- a/roles/custom/matrix-bridge-mx-puppet-slack/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mx-puppet-slack/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mx_puppet_slack_hostname', when: true} - {'name': 'matrix_mx_puppet_slack_path_prefix', when: true} @@ -25,7 +25,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mx_puppet_slack_redirect_path', 'new': 'matrix_mx_puppet_slack_oauth_redirect_path, but setting matrix_mx_puppet_slack_path_prefix is better'} - {'old': 'matrix_mx_puppet_slack_redirect_uri', 'new': '- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mx_puppet_steam_appservice_token', when: true} - {'name': 'matrix_mx_puppet_steam_homeserver_address', when: true} @@ -21,6 +21,6 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mx_puppet_steam_docker_image_name_prefix', 'new': 'matrix_mx_puppet_steam_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-mx-puppet-twitter/tasks/validate_config.yml b/roles/custom/matrix-bridge-mx-puppet-twitter/tasks/validate_config.yml index 84e2c1c76..286305106 100644 --- a/roles/custom/matrix-bridge-mx-puppet-twitter/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-mx-puppet-twitter/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_mx_puppet_twitter_hostname', when: true} - {'name': 'matrix_mx_puppet_twitter_path_prefix', when: true} @@ -25,7 +25,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_mx_puppet_twitter_webhook_path', 'new': '- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_postmoogle_password', when: true} - {'name': 'matrix_postmoogle_container_network', when: true} @@ -21,6 +21,6 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_postmoogle_docker_image_name_prefix', 'new': 'matrix_postmoogle_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-bridge-wechat/tasks/validate_config.yml b/roles/custom/matrix-bridge-wechat/tasks/validate_config.yml index c74f26390..324cb8e1a 100644 --- a/roles/custom/matrix-bridge-wechat/tasks/validate_config.yml +++ b/roles/custom/matrix-bridge-wechat/tasks/validate_config.yml @@ -8,7 +8,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_wechat_appservice_token', when: true} - {'name': 'matrix_wechat_homeserver_address', when: true} @@ -26,7 +26,7 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_wechat_container_image_name_prefix', 'new': 'matrix_wechat_container_image_registry_prefix'} - {'old': 'matrix_wechat_agent_container_image_name_prefix', 'new': 'matrix_wechat_agent_container_image_registry_prefix'} diff --git a/roles/custom/matrix-cactus-comments/tasks/validate_config.yml b/roles/custom/matrix-cactus-comments/tasks/validate_config.yml index 125b4b858..71ae8f935 100644 --- a/roles/custom/matrix-cactus-comments/tasks/validate_config.yml +++ b/roles/custom/matrix-cactus-comments/tasks/validate_config.yml @@ -11,7 +11,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_bot_cactus_comments_systemd_required_services_list', 'new': 'matrix_cactus_comments_systemd_required_services_list'} - {'old': 'matrix_bot_cactus_comments_systemd_wanted_services_list', 'new': 'matrix_cactus_comments_systemd_wanted_services_list'} diff --git a/roles/custom/matrix-client-cinny/tasks/validate_config.yml b/roles/custom/matrix-client-cinny/tasks/validate_config.yml index b3e324a38..fee52fe3c 100644 --- a/roles/custom/matrix-client-cinny/tasks/validate_config.yml +++ b/roles/custom/matrix-client-cinny/tasks/validate_config.yml @@ -8,7 +8,7 @@ ansible.builtin.fail: msg: > You need to define a required configuration setting (`{{ item }}`) to use Cinny. - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_client_cinny_default_hs_url', when: true} - {'name': 'matrix_client_cinny_container_network', when: true} @@ -18,7 +18,7 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_client_cinny_container_image_name_prefix', 'new': 'matrix_client_cinny_container_image_registry_prefix'} diff --git a/roles/custom/matrix-client-element/tasks/validate_config.yml b/roles/custom/matrix-client-element/tasks/validate_config.yml index 7ff71cc2f..ad44193d0 100644 --- a/roles/custom/matrix-client-element/tasks/validate_config.yml +++ b/roles/custom/matrix-client-element/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: > You need to define a required configuration setting (`{{ item }}`) for using Element Web. - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_client_element_default_hs_url', when: true} - {'name': 'matrix_client_element_container_network', when: true} @@ -29,18 +29,16 @@ msg: >- Riot has been renamed to Element (https://element.io/blog/welcome-to-element/). The playbook will migrate your existing configuration and data automatically, but you need to adjust variable names. - Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). + Please rename these variable (`matrix_riot_web_*` -> `matrix_client_element_*`) on your configuration file (vars.yml): {{ lookup('ansible.builtin.varnames', '^matrix_riot_web_.+', wantlist=True) | join(', ') }} Also note that DNS configuration changes may be necessary. - when: "vars | dict2items | selectattr('key', 'match', item.old) | list | items2dict" - with_items: - - {'old': 'matrix_riot_web_.*', 'new': 'matrix_client_element_.*'} + when: "lookup('ansible.builtin.varnames', '^matrix_riot_web_.+', wantlist=True) | length > 0" - name: (Deprecation) Catch and report renamed element-web settings ansible.builtin.fail: msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_client_element_showLabsSettings', 'new': 'matrix_client_element_show_lab_settings'} - {'old': 'matrix_client_element_permalinkPrefix', 'new': 'matrix_client_element_permalink_prefix'} @@ -59,7 +57,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item }}`). - when: "vars[item] == ''" + when: "lookup('vars', item, default='') | string | length == 0" with_items: - matrix_client_element_container_labels_traefik_hostname - matrix_client_element_container_labels_traefik_path_prefix diff --git a/roles/custom/matrix-client-fluffychat/tasks/validate_config.yml b/roles/custom/matrix-client-fluffychat/tasks/validate_config.yml index f5a5ae961..f11b81d65 100644 --- a/roles/custom/matrix-client-fluffychat/tasks/validate_config.yml +++ b/roles/custom/matrix-client-fluffychat/tasks/validate_config.yml @@ -17,7 +17,7 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_client_fluffychat_container_image_name_prefix', 'new': 'matrix_client_fluffychat_container_image_registry_prefix'} diff --git a/roles/custom/matrix-client-hydrogen/tasks/validate_config.yml b/roles/custom/matrix-client-hydrogen/tasks/validate_config.yml index 2bd1ae7ff..6f1ced098 100644 --- a/roles/custom/matrix-client-hydrogen/tasks/validate_config.yml +++ b/roles/custom/matrix-client-hydrogen/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: > You need to define a required configuration setting (`{{ item }}`) to use Hydrogen. - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_client_hydrogen_default_hs_url', when: "{{ matrix_client_hydrogen_container_image_self_build }}"} - {'name': 'matrix_client_hydrogen_container_network', when: true} @@ -20,7 +20,7 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_client_hydrogen_container_image_name_prefix', 'new': 'matrix_client_hydrogen_container_image_registry_prefix'} diff --git a/roles/custom/matrix-client-schildichat/tasks/validate_config.yml b/roles/custom/matrix-client-schildichat/tasks/validate_config.yml index 09ef97434..df87b4356 100644 --- a/roles/custom/matrix-client-schildichat/tasks/validate_config.yml +++ b/roles/custom/matrix-client-schildichat/tasks/validate_config.yml @@ -11,7 +11,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_client_schildichat_welcome_user_id', 'new': ''} - {'old': 'matrix_client_schildichat_container_image_name_prefix', 'new': 'matrix_client_schildichat_container_image_registry_prefix'} diff --git a/roles/custom/matrix-conduit/tasks/validate_config.yml b/roles/custom/matrix-conduit/tasks/validate_config.yml index 2e5bdc3e2..5500c7fc5 100644 --- a/roles/custom/matrix-conduit/tasks/validate_config.yml +++ b/roles/custom/matrix-conduit/tasks/validate_config.yml @@ -8,7 +8,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_conduit_hostname', when: true} - {'name': 'matrix_conduit_container_network', when: true} @@ -18,6 +18,6 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_conduit_container_image_name_prefix', 'new': 'matrix_conduit_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-conduwuit/tasks/validate_config.yml b/roles/custom/matrix-conduwuit/tasks/validate_config.yml index acb95bec1..d044ddf3d 100644 --- a/roles/custom/matrix-conduwuit/tasks/validate_config.yml +++ b/roles/custom/matrix-conduwuit/tasks/validate_config.yml @@ -8,7 +8,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_conduwuit_hostname', when: true} - {'name': 'matrix_conduwuit_container_network', when: true} diff --git a/roles/custom/matrix-continuwuity/tasks/validate_config.yml b/roles/custom/matrix-continuwuity/tasks/validate_config.yml index a5859d948..dd84f682a 100644 --- a/roles/custom/matrix-continuwuity/tasks/validate_config.yml +++ b/roles/custom/matrix-continuwuity/tasks/validate_config.yml @@ -8,7 +8,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_continuwuity_hostname', when: true} - {'name': 'matrix_continuwuity_container_network', when: true} @@ -19,7 +19,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_continuwuity_allowed_remote_server_names', 'new': 'matrix_continuwuity_config_allowed_remote_server_names'} - {'old': 'matrix_continuwuity_forbidden_remote_room_directory_server_names', 'new': 'matrix_continuwuity_config_forbidden_remote_room_directory_server_names'} diff --git a/roles/custom/matrix-corporal/tasks/validate_config.yml b/roles/custom/matrix-corporal/tasks/validate_config.yml index 366527fcb..cb394b81c 100644 --- a/roles/custom/matrix-corporal/tasks/validate_config.yml +++ b/roles/custom/matrix-corporal/tasks/validate_config.yml @@ -28,7 +28,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_corporal_container_expose_ports', 'new': ''} - {'old': 'matrix_corporal_reconciliation_user_id_local_part', 'new': 'matrix_corporal_corporal_user_id_local_part'} diff --git a/roles/custom/matrix-coturn/tasks/validate_config.yml b/roles/custom/matrix-coturn/tasks/validate_config.yml index 4d7568cee..3fe51d9ea 100644 --- a/roles/custom/matrix-coturn/tasks/validate_config.yml +++ b/roles/custom/matrix-coturn/tasks/validate_config.yml @@ -10,7 +10,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_coturn_docker_network', 'new': 'matrix_coturn_container_network'} - {'old': 'matrix_coturn_container_stun_plain_host_bind_port', 'new': 'superseded by matrix_coturn_container_stun_plain_host_bind_port_tcp and matrix_coturn_container_stun_plain_host_bind_port_udp'} @@ -27,7 +27,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_coturn_turn_static_auth_secret', when: "{{ matrix_coturn_authentication_method == 'auth-secret' }}"} - {'name': 'matrix_coturn_lt_cred_mech_username', when: "{{ matrix_coturn_authentication_method == 'lt-cred-mech' }}"} diff --git a/roles/custom/matrix-dendrite/tasks/validate_config.yml b/roles/custom/matrix-dendrite/tasks/validate_config.yml index 2f91bfa74..bff7aded0 100644 --- a/roles/custom/matrix-dendrite/tasks/validate_config.yml +++ b/roles/custom/matrix-dendrite/tasks/validate_config.yml @@ -12,7 +12,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_dendrite_enable_registration_captcha', 'new': 'matrix_dendrite_client_api_enable_registration_captcha'} - {'old': 'matrix_dendrite_recaptcha_public_key', 'new': 'matrix_dendrite_client_api_recaptcha_public_key'} @@ -40,7 +40,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_dendrite_hostname', when: true} - {'name': 'matrix_dendrite_client_api_registration_shared_secret', when: true} diff --git a/roles/custom/matrix-dimension/tasks/validate_config.yml b/roles/custom/matrix-dimension/tasks/validate_config.yml index 39120d536..5800d658f 100644 --- a/roles/custom/matrix-dimension/tasks/validate_config.yml +++ b/roles/custom/matrix-dimension/tasks/validate_config.yml @@ -13,7 +13,7 @@ ansible.builtin.fail: msg: > You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_dimension_hostname', when: true} - {'name': 'matrix_dimension_container_network', when: true} @@ -28,7 +28,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_dimension_container_expose_port', 'new': ''} - {'old': 'matrix_dimension_container_image_name_prefix', 'new': 'matrix_dimension_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-dynamic-dns/tasks/validate_config.yml b/roles/custom/matrix-dynamic-dns/tasks/validate_config.yml index e86ae2317..b358bd3d3 100644 --- a/roles/custom/matrix-dynamic-dns/tasks/validate_config.yml +++ b/roles/custom/matrix-dynamic-dns/tasks/validate_config.yml @@ -24,7 +24,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_dynamic_dns_container_network', when: true} @@ -32,6 +32,6 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_dynamic_dns_container_image_name_prefix', 'new': 'matrix_dynamic_dns_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-ldap-registration-proxy/tasks/validate_config.yml b/roles/custom/matrix-ldap-registration-proxy/tasks/validate_config.yml index fc2d870b5..3fc080949 100644 --- a/roles/custom/matrix-ldap-registration-proxy/tasks/validate_config.yml +++ b/roles/custom/matrix-ldap-registration-proxy/tasks/validate_config.yml @@ -25,7 +25,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_ldap_registration_proxy_registration_addr_with_container', 'new': ''} - {'old': 'matrix_ldap_registration_proxy_registration_addr_sans_container', 'new': ''} diff --git a/roles/custom/matrix-ma1sd/tasks/validate_config.yml b/roles/custom/matrix-ma1sd/tasks/validate_config.yml index 14c8acb4e..0f90eaebf 100644 --- a/roles/custom/matrix-ma1sd/tasks/validate_config.yml +++ b/roles/custom/matrix-ma1sd/tasks/validate_config.yml @@ -13,7 +13,7 @@ The `{{ item }}` variable defined in your configuration is not used by this playbook anymore! You'll need to adapt to the new way of extending ma1sd configuration. See the CHANGELOG and the `matrix_ma1sd_configuration_extension_yaml` variable for more information and examples. - when: "item in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item + '$'), wantlist=True) | length > 0" with_items: - 'matrix_ma1sd_ldap_enabled' - 'matrix_ma1sd_ldap_connection_host' @@ -50,7 +50,7 @@ ansible.builtin.fail: msg: > You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_ma1sd_hostname', when: true} - {'name': 'matrix_ma1sd_threepid_medium_email_connectors_smtp_host', when: true} @@ -68,7 +68,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_ma1sd_container_expose_port', 'new': ''} - {'old': 'matrix_ma1sd_threepid_medium_email_custom_unbind_fraudulent_template', 'new': 'matrix_ma1sd_threepid_medium_email_custom_session_unbind_notification_template'} @@ -82,7 +82,5 @@ msg: >- mxisd is deprecated and has been replaced with ma1sd (https://github.com/ma1uta/ma1sd), a compatible fork. The playbook will migrate your existing mxisd configuration and data automatically, but you need to adjust variable names. - Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "vars | dict2items | selectattr('key', 'match', item.old) | list | items2dict" - with_items: - - {'old': 'matrix_mxisd_.*', 'new': 'matrix_ma1sd_.*'} + Please rename these variables (`matrix_mxisd_*` -> `matrix_ma1sd_*`) on your configuration file (vars.yml): {{ lookup('ansible.builtin.varnames', '^matrix_mxisd_.+', wantlist=True) | join(', ') }} + when: "lookup('ansible.builtin.varnames', '^matrix_mxisd_.+', wantlist=True) | length > 0" diff --git a/roles/custom/matrix-media-repo/tasks/validate_config.yml b/roles/custom/matrix-media-repo/tasks/validate_config.yml index 4d10a44ed..a531b0a4b 100644 --- a/roles/custom/matrix-media-repo/tasks/validate_config.yml +++ b/roles/custom/matrix-media-repo/tasks/validate_config.yml @@ -10,7 +10,7 @@ ansible.builtin.fail: msg: > You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_media_repo_database_hostname', when: true} - {'name': 'matrix_media_repo_container_labels_traefik_internal_media_entrypoints', when: "{{ matrix_media_repo_container_labels_traefik_internal_media_enabled }}"} @@ -21,7 +21,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_media_repo_access_tokens', 'new': ''} - {'old': 'matrix_media_repo_datastores', 'new': ''} diff --git a/roles/custom/matrix-pantalaimon/tasks/validate_config.yml b/roles/custom/matrix-pantalaimon/tasks/validate_config.yml index ff3116355..a6b764815 100644 --- a/roles/custom/matrix-pantalaimon/tasks/validate_config.yml +++ b/roles/custom/matrix-pantalaimon/tasks/validate_config.yml @@ -15,6 +15,6 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_pantalaimon_docker_image_name_prefix', 'new': 'matrix_pantalaimon_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/validate_config.yml b/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/validate_config.yml index 4137efc24..e484c9d94 100644 --- a/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/validate_config.yml +++ b/roles/custom/matrix-prometheus-nginxlog-exporter/tasks/validate_config.yml @@ -11,7 +11,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_prometheus_nginxlog_exporter_container_hostname', 'new': 'matrix_prometheus_nginxlog_exporter_identifier'} - {'old': 'matrix_prometheus_nginxlog_exporter_docker_image_name_prefix', 'new': 'matrix_prometheus_nginxlog_exporter_docker_image_registry_prefix'} @@ -37,7 +37,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_prometheus_nginxlog_exporter_metrics_proxying_hostname', when: "{{ matrix_prometheus_nginxlog_exporter_metrics_proxying_enabled }}"} - {'name': 'matrix_prometheus_nginxlog_exporter_metrics_proxying_path_prefix', when: "{{ matrix_prometheus_nginxlog_exporter_metrics_proxying_enabled }}"} diff --git a/roles/custom/matrix-rageshake/tasks/validate_config.yml b/roles/custom/matrix-rageshake/tasks/validate_config.yml index 80db54151..4b1249372 100644 --- a/roles/custom/matrix-rageshake/tasks/validate_config.yml +++ b/roles/custom/matrix-rageshake/tasks/validate_config.yml @@ -19,7 +19,7 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_rageshake_docker_image_name_prefix', 'new': 'matrix_rageshake_docker_image_registry_prefix'} diff --git a/roles/custom/matrix-registration/tasks/validate_config.yml b/roles/custom/matrix-registration/tasks/validate_config.yml index dba8f7497..4a8793cae 100644 --- a/roles/custom/matrix-registration/tasks/validate_config.yml +++ b/roles/custom/matrix-registration/tasks/validate_config.yml @@ -9,7 +9,7 @@ ansible.builtin.fail: msg: > You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_registration_hostname', when: true} - {'name': 'matrix_registration_path_prefix', when: true} @@ -24,7 +24,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_registration_docker_repo', 'new': 'matrix_registration_container_image_self_build_repo'} - {'old': 'matrix_registration_public_endpoint', 'new': 'matrix_registration_path_prefix'} diff --git a/roles/custom/matrix-sliding-sync/tasks/validate_config.yml b/roles/custom/matrix-sliding-sync/tasks/validate_config.yml index 24a29539d..a4d3d26b3 100644 --- a/roles/custom/matrix-sliding-sync/tasks/validate_config.yml +++ b/roles/custom/matrix-sliding-sync/tasks/validate_config.yml @@ -8,7 +8,7 @@ ansible.builtin.fail: msg: > You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_sliding_sync_hostname', when: true} - {'name': 'matrix_sliding_sync_path_prefix', when: true} @@ -23,6 +23,6 @@ ansible.builtin.fail: msg: >- The variable `{{ item.old }}` is deprecated. Please use `{{ item.new }}` instead. - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_sliding_sync_container_image_name_prefix', 'new': 'matrix_sliding_sync_container_image_registry_prefix'} diff --git a/roles/custom/matrix-synapse-admin/tasks/validate_config.yml b/roles/custom/matrix-synapse-admin/tasks/validate_config.yml index d0e953d24..d86fb5fac 100644 --- a/roles/custom/matrix-synapse-admin/tasks/validate_config.yml +++ b/roles/custom/matrix-synapse-admin/tasks/validate_config.yml @@ -11,7 +11,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_synapse_admin_docker_repo', 'new': 'matrix_synapse_admin_container_self_build_repo'} - {'old': 'matrix_synapse_admin_container_self_build', 'new': 'matrix_synapse_admin_container_image_self_build'} diff --git a/roles/custom/matrix-synapse-auto-compressor/tasks/validate_config.yml b/roles/custom/matrix-synapse-auto-compressor/tasks/validate_config.yml index ccaf4b42a..60a2cc996 100644 --- a/roles/custom/matrix-synapse-auto-compressor/tasks/validate_config.yml +++ b/roles/custom/matrix-synapse-auto-compressor/tasks/validate_config.yml @@ -9,7 +9,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - "old": "matrix_synapse_auto_compressor_calendar" "new": "matrix_synapse_auto_compressor_schedule" diff --git a/roles/custom/matrix-synapse-reverse-proxy-companion/tasks/validate_config.yml b/roles/custom/matrix-synapse-reverse-proxy-companion/tasks/validate_config.yml index 429c12ed2..0cd90bd8d 100644 --- a/roles/custom/matrix-synapse-reverse-proxy-companion/tasks/validate_config.yml +++ b/roles/custom/matrix-synapse-reverse-proxy-companion/tasks/validate_config.yml @@ -8,7 +8,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_synapse_reverse_proxy_companion_container_network', when: true} diff --git a/roles/custom/matrix-synapse-usage-exporter/tasks/validate_config.yml b/roles/custom/matrix-synapse-usage-exporter/tasks/validate_config.yml index c6fa07e23..996b7c461 100644 --- a/roles/custom/matrix-synapse-usage-exporter/tasks/validate_config.yml +++ b/roles/custom/matrix-synapse-usage-exporter/tasks/validate_config.yml @@ -10,6 +10,6 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_synapse_usage_exporter_docker_image_name_prefix', 'new': 'matrix_synapse_usage_exporter_container_image_registry_prefix'} diff --git a/roles/custom/matrix-synapse/tasks/validate_config.yml b/roles/custom/matrix-synapse/tasks/validate_config.yml index 66f6e0296..47156c801 100644 --- a/roles/custom/matrix-synapse/tasks/validate_config.yml +++ b/roles/custom/matrix-synapse/tasks/validate_config.yml @@ -82,7 +82,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_synapse_email_riot_base_url', 'new': ''} - {'old': 'matrix_synapse_container_expose_api_port', 'new': ''} diff --git a/roles/custom/matrix-user-verification-service/tasks/validate_config.yml b/roles/custom/matrix-user-verification-service/tasks/validate_config.yml index 449cad532..5f824ce93 100644 --- a/roles/custom/matrix-user-verification-service/tasks/validate_config.yml +++ b/roles/custom/matrix-user-verification-service/tasks/validate_config.yml @@ -33,7 +33,7 @@ ansible.builtin.fail: msg: >- You need to define a required configuration setting (`{{ item.name }}`). - when: "item.when | bool and vars[item.name] == ''" + when: "item.when | bool and lookup('vars', item.name, default='') | string | length == 0" with_items: - {'name': 'matrix_user_verification_service_uvs_homeserver_url', when: true} - {'name': 'matrix_user_verification_service_container_network', when: true} @@ -43,6 +43,6 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_user_verification_service_docker_image_name_prefix', 'new': 'matrix_user_verification_service_docker_image_registry_prefix'} diff --git a/roles/custom/matrix_playbook_migration/tasks/validate_config.yml b/roles/custom/matrix_playbook_migration/tasks/validate_config.yml index 437d1fc69..483293121 100644 --- a/roles/custom/matrix_playbook_migration/tasks/validate_config.yml +++ b/roles/custom/matrix_playbook_migration/tasks/validate_config.yml @@ -11,7 +11,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_vars_yml_snapshotting_enabled', 'new': 'devture_playbook_state_preserver_vars_preservation_enabled'} - {'old': 'matrix_vars_yml_snapshotting_src', 'new': 'devture_playbook_state_preserver_vars_preservation_src'} @@ -86,8 +86,8 @@ After renaming them, please do not forget to fetch the Ansible role. See docs/maintenance-upgrading-services.md for details about how to do so. - The following variables in your configuration need to be renamed: {{ vars | dict2items | selectattr('key', 'match', 'matrix_postgres_.*') | map(attribute='key') | join(', ') }} - when: "vars | dict2items | selectattr('key', 'match', 'matrix_postgres_.*') | list | items2dict" + The following variables in your configuration need to be renamed: {{ lookup('ansible.builtin.varnames', '^matrix_postgres_.+', wantlist=True) | join(', ') }} + when: "lookup('ansible.builtin.varnames', '^matrix_postgres_.+', wantlist=True) | length > 0" - name: (Deprecation) Catch and report matrix_mailer_ variables ansible.builtin.fail: @@ -99,14 +99,14 @@ After renaming them, please do not forget to fetch the Ansible role. See docs/maintenance-upgrading-services.md for details about how to do so. - The following variables in your configuration need to be renamed: {{ vars | dict2items | selectattr('key', 'match', 'matrix_mailer_.*') | map(attribute='key') | join(', ') }} - when: "vars | dict2items | selectattr('key', 'match', 'matrix_mailer_.*') | list | items2dict" + The following variables in your configuration need to be renamed: {{ lookup('ansible.builtin.varnames', '^matrix_mailer_.+', wantlist=True) | join(', ') }} + when: "lookup('ansible.builtin.varnames', '^matrix_mailer_.+', wantlist=True) | length > 0" - when: matrix_playbook_migration_matrix_prometheus_node_exporter_migration_validation_enabled | bool block: - ansible.builtin.set_fact: matrix_playbook_migration_matrix_prometheus_node_exporter_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_prometheus_node_exporter_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_prometheus_node_exporter_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_prometheus_node_exporter variables ansible.builtin.fail: @@ -118,14 +118,14 @@ After renaming them, please do not forget to fetch the Ansible role. See docs/maintenance-upgrading-services.md for details about how to do so. - The following variables in your configuration need to be renamed: {{ matrix_playbook_migration_matrix_prometheus_node_exporter_migration_vars.keys() | join(', ') }} + The following variables in your configuration need to be renamed: {{ matrix_playbook_migration_matrix_prometheus_node_exporter_migration_vars | join(', ') }} when: "matrix_playbook_migration_matrix_prometheus_node_exporter_migration_vars | length > 0" - when: matrix_playbook_migration_matrix_prometheus_postgres_exporter_migration_validation_enabled | bool block: - ansible.builtin.set_fact: matrix_playbook_migration_matrix_prometheus_postgres_exporter_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_prometheus_postgres_exporter_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_prometheus_postgres_exporter_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_prometheus_postgres_exporter variables ansible.builtin.fail: @@ -144,7 +144,7 @@ block: - ansible.builtin.set_fact: matrix_playbook_migration_backup_borg_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_backup_borg_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_backup_borg_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_backup_borg variables ansible.builtin.fail: @@ -163,7 +163,7 @@ block: - ansible.builtin.set_fact: matrix_playbook_migration_grafana_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_grafana_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_grafana_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_grafana variables ansible.builtin.fail: @@ -182,7 +182,7 @@ block: - ansible.builtin.set_fact: matrix_playbook_migration_ntfy_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_ntfy_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_ntfy_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_ntfy variables ansible.builtin.fail: @@ -201,7 +201,7 @@ block: - ansible.builtin.set_fact: matrix_playbook_migration_redis_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_redis_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_redis_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_redis variables ansible.builtin.fail: @@ -220,7 +220,7 @@ block: - ansible.builtin.set_fact: matrix_playbook_migration_redis_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'redis_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^redis_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_redis variables ansible.builtin.fail: @@ -238,7 +238,7 @@ block: - ansible.builtin.set_fact: matrix_playbook_migration_keydb_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'keydb_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^keydb_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_redis variables ansible.builtin.fail: @@ -256,7 +256,7 @@ block: - ansible.builtin.set_fact: matrix_playbook_migration_etherpad_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_etherpad_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_etherpad_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_etherpad variables ansible.builtin.fail: @@ -275,7 +275,7 @@ block: - ansible.builtin.set_fact: matrix_playbook_migration_aux_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_aux_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_aux_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_aux variables ansible.builtin.fail: @@ -294,7 +294,7 @@ block: - ansible.builtin.set_fact: matrix_playbook_migration_jitsi_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_jitsi_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_jitsi_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_jitsi variables ansible.builtin.fail: @@ -313,7 +313,7 @@ block: - ansible.builtin.set_fact: matrix_playbook_migration_postmoogle_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_bot_postmoogle_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_bot_postmoogle_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_bot_postmoogle variables ansible.builtin.fail: @@ -332,7 +332,7 @@ msg: >- Your configuration contains a variable, which now has a different name. Please rename the variable (`{{ item.old }}` -> `{{ item.new }}`) on your configuration file (vars.yml). - when: "item.old in vars" + when: "lookup('ansible.builtin.varnames', ('^' + item.old + '$'), wantlist=True) | length > 0" with_items: - {'old': 'matrix_nginx_proxy_proxy_matrix_metrics_enabled', 'new': 'matrix_metrics_exposure_enabled'} - {'old': 'matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_enabled', 'new': 'matrix_metrics_exposure_http_basic_auth_enabled'} @@ -419,7 +419,7 @@ block: - ansible.builtin.set_fact: matrix_playbook_migration_nginx_proxy_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_nginx_proxy_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_nginx_proxy_.+', wantlist=True) }} - name: (Deprecation) Catch and report leftover matrix_nginx_proxy variables ansible.builtin.fail: @@ -435,7 +435,7 @@ block: - ansible.builtin.set_fact: matrix_playbook_migration_ssl_migration_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_ssl_.*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_ssl_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_ssl variables ansible.builtin.fail: @@ -450,7 +450,7 @@ - block: - ansible.builtin.set_fact: matrix_playbook_migration_matrix_synapse_container_labels_public_client_synapse_oidc_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_synapse_container_labels_public_client_synapse_oidc_*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_synapse_container_labels_public_client_synapse_oidc_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_ssl variables ansible.builtin.fail: @@ -461,7 +461,7 @@ - block: - ansible.builtin.set_fact: matrix_playbook_migration_matrix_synapse_reverse_proxy_companion_container_labels_public_client_synapse_oidc_vars: |- - {{ vars | dict2items | selectattr('key', 'match', 'matrix_synapse_reverse_proxy_companion_container_labels_public_client_synapse_oidc_*') | list | items2dict }} + {{ lookup('ansible.builtin.varnames', '^matrix_synapse_reverse_proxy_companion_container_labels_public_client_synapse_oidc_.+', wantlist=True) }} - name: (Deprecation) Catch and report matrix_ssl variables ansible.builtin.fail: @@ -479,8 +479,8 @@ After renaming them, please do not forget to fetch the Ansible role. See docs/maintenance-upgrading-services.md for details about how to do so. - The following variables in your configuration need to be renamed: {{ vars | dict2items | selectattr('key', 'match', 'devture_postgres_backup_.*') | map(attribute='key') | join(', ') }} - when: "vars | dict2items | selectattr('key', 'match', 'devture_postgres_backup_.*') | list | items2dict" + The following variables in your configuration need to be renamed: {{ lookup('ansible.builtin.varnames', '^devture_postgres_backup_.+', wantlist=True) | join(', ') }} + when: "lookup('ansible.builtin.varnames', '^devture_postgres_backup_.+', wantlist=True) | length > 0" - name: (Deprecation) Catch and report devture_postgres variables ansible.builtin.fail: @@ -492,8 +492,8 @@ After renaming them, please do not forget to fetch the Ansible role. See docs/maintenance-upgrading-services.md for details about how to do so. - The following variables in your configuration need to be renamed: {{ vars | dict2items | selectattr('key', 'match', 'devture_postgres_.*') | map(attribute='key') | join(', ') }} - when: "vars | dict2items | selectattr('key', 'match', 'devture_postgres_.*') | list | items2dict" + The following variables in your configuration need to be renamed: {{ lookup('ansible.builtin.varnames', '^devture_postgres_.+', wantlist=True) | join(', ') }} + when: "lookup('ansible.builtin.varnames', '^devture_postgres_.+', wantlist=True) | length > 0" - name: (Deprecation) Catch and report traefik_certs_dumper variables ansible.builtin.fail: @@ -505,8 +505,8 @@ After renaming them, please do not forget to fetch the Ansible role. See docs/maintenance-upgrading-services.md for details about how to do so. - The following variables in your configuration need to be renamed: {{ vars | dict2items | selectattr('key', 'match', 'devture_traefik_certs_dumper_.*') | map(attribute='key') | join(', ') }} - when: "vars | dict2items | selectattr('key', 'match', 'devture_traefik_certs_dumper_.*') | list | items2dict" + The following variables in your configuration need to be renamed: {{ lookup('ansible.builtin.varnames', '^devture_traefik_certs_dumper_.+', wantlist=True) | join(', ') }} + when: "lookup('ansible.builtin.varnames', '^devture_traefik_certs_dumper_.+', wantlist=True) | length > 0" - name: (Deprecation) Catch and report devture_traefik variables ansible.builtin.fail: @@ -518,8 +518,8 @@ After renaming them, please do not forget to fetch the Ansible role. See docs/maintenance-upgrading-services.md for details about how to do so. - The following variables in your configuration need to be renamed: {{ vars | dict2items | selectattr('key', 'match', 'devture_traefik_.*') | map(attribute='key') | join(', ') }} - when: "vars | dict2items | selectattr('key', 'match', 'devture_traefik_.*') | list | items2dict" + The following variables in your configuration need to be renamed: {{ lookup('ansible.builtin.varnames', '^devture_traefik_.+', wantlist=True) | join(', ') }} + when: "lookup('ansible.builtin.varnames', '^devture_traefik_.+', wantlist=True) | length > 0" - name: (Deprecation) Catch and report devture_container_socket_proxy variables ansible.builtin.fail: @@ -531,8 +531,8 @@ After renaming them, please do not forget to fetch the Ansible role. See docs/maintenance-upgrading-services.md for details about how to do so. - The following variables in your configuration need to be renamed: {{ vars | dict2items | selectattr('key', 'match', 'devture_container_socket_proxy_.*') | map(attribute='key') | join(', ') }} - when: "vars | dict2items | selectattr('key', 'match', 'devture_container_socket_proxy_.*') | list | items2dict" + The following variables in your configuration need to be renamed: {{ lookup('ansible.builtin.varnames', '^devture_container_socket_proxy_.+', wantlist=True) | join(', ') }} + when: "lookup('ansible.builtin.varnames', '^devture_container_socket_proxy_.+', wantlist=True) | length > 0" - name: (Deprecation) Catch and report mautrix-hangouts variables ansible.builtin.fail: @@ -544,8 +544,8 @@ You may also wish to uninstall the bridge manually. See `docs/configuring-playbook-bridge-mautrix-hangouts.md` for more information. - The following variables in your configuration need to be removed: {{ vars | dict2items | selectattr('key', 'match', 'matrix_mautrix_hangouts_.*') | map(attribute='key') | join(', ') }} - when: "vars | dict2items | selectattr('key', 'match', 'matrix_mautrix_hangouts_.*') | list | items2dict" + The following variables in your configuration need to be removed: {{ lookup('ansible.builtin.varnames', '^matrix_mautrix_hangouts_.+', wantlist=True) | join(', ') }} + when: "lookup('ansible.builtin.varnames', '^matrix_mautrix_hangouts_.+', wantlist=True) | length > 0" - name: (Deprecation) Catch and report Email2Matrix variables ansible.builtin.fail: @@ -556,5 +556,5 @@ You may also wish to uninstall the bridge manually. See `docs/configuring-playbook-email2matrix.md` for more information. - The following variables in your configuration need to be removed: {{ vars | dict2items | selectattr('key', 'match', 'matrix_email2matrix_.*') | map(attribute='key') | join(', ') }} - when: "vars | dict2items | selectattr('key', 'match', 'matrix_email2matrix_.*') | list | items2dict" + The following variables in your configuration need to be removed: {{ lookup('ansible.builtin.varnames', '^matrix_email2matrix_.+', wantlist=True) | join(', ') }} + when: "lookup('ansible.builtin.varnames', '^matrix_email2matrix_.+', wantlist=True) | length > 0" From a09760492bd6efd2d760841374ed812664f01410 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Sat, 26 Jul 2025 17:52:43 +0300 Subject: [PATCH 262/404] Update various roles to versions that offer better compatibility with ansible-core>=2.19.0 Ref: https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/4445 --- requirements.yml | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/requirements.yml b/requirements.yml index 7aa7f1ac5..a483a611d 100644 --- a/requirements.yml +++ b/requirements.yml @@ -22,16 +22,16 @@ version: v4.98.1-r0-2-1 name: exim_relay - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-grafana.git - version: v11.6.4-0 + version: v11.6.4-1 name: grafana - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-jitsi.git version: v10431-0 name: jitsi - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-livekit-server.git - version: v1.9.0-2 + version: v1.9.0-4 name: livekit_server - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-ntfy.git - version: v2.13.0-0 + version: v2.13.0-1 name: ntfy - src: git+https://github.com/devture/com.devture.ansible.role.playbook_help.git version: 201c939eed363de269a83ba29784fc3244846048 @@ -43,19 +43,19 @@ version: ff2fd42e1c1a9e28e3312bbd725395f9c2fc7f16 name: playbook_state_preserver - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-postgres.git - version: v17.5-1 + version: v17.5-3 name: postgres - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-postgres-backup.git - version: v17-5 + version: v17-6 name: postgres_backup - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus.git - version: v3.5.0-0 + version: v3.5.0-1 name: prometheus - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-node-exporter.git - version: v1.9.1-9 + version: v1.9.1-11 name: prometheus_node_exporter - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-prometheus-postgres-exporter.git - version: v0.17.1-6 + version: v0.17.1-8 name: prometheus_postgres_exporter - src: git+https://github.com/devture/com.devture.ansible.role.systemd_docker_base.git version: v1.4.0-0 @@ -67,11 +67,11 @@ version: v1.0.0-0 name: timesync - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik.git - version: v3.5.0-1 + version: v3.5.0-2 name: traefik - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-traefik-certs-dumper.git - version: v2.10.0-1 + version: v2.10.0-2 name: traefik_certs_dumper - src: git+https://github.com/mother-of-all-self-hosting/ansible-role-valkey.git - version: v8.1.3-0 + version: v8.1.3-1 name: valkey From 5651206e7716a1a3025c80d4b3ca5277b557dac6 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Sat, 26 Jul 2025 17:57:24 +0300 Subject: [PATCH 263/404] Fix indentation of `when` clause Fixup for a1f6ee4dc9b92fdb520627ec22265b800f73a6f8 --- .../custom/matrix_playbook_migration/tasks/validate_config.yml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/roles/custom/matrix_playbook_migration/tasks/validate_config.yml b/roles/custom/matrix_playbook_migration/tasks/validate_config.yml index 483293121..53d0a32d4 100644 --- a/roles/custom/matrix_playbook_migration/tasks/validate_config.yml +++ b/roles/custom/matrix_playbook_migration/tasks/validate_config.yml @@ -87,7 +87,7 @@ After renaming them, please do not forget to fetch the Ansible role. See docs/maintenance-upgrading-services.md for details about how to do so. The following variables in your configuration need to be renamed: {{ lookup('ansible.builtin.varnames', '^matrix_postgres_.+', wantlist=True) | join(', ') }} - when: "lookup('ansible.builtin.varnames', '^matrix_postgres_.+', wantlist=True) | length > 0" + when: "lookup('ansible.builtin.varnames', '^matrix_postgres_.+', wantlist=True) | length > 0" - name: (Deprecation) Catch and report matrix_mailer_ variables ansible.builtin.fail: From 51ab9ed9ffda1ec97e574b1db0bd892473fe9015 Mon Sep 17 00:00:00 2001 From: Slavi Pantaleev Date: Sat, 26 Jul 2025 17:58:12 +0300 Subject: [PATCH 264/404] Adjust `lstrip_blocks` to use a `bool` value for compatibility with ansible-core>=2.19.0 Related to https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/4445 --- .../matrix-alertmanager-receiver/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-alertmanager-receiver.service.j2 | 2 +- .../systemd/matrix-appservice-draupnir-for-all.service.j2 | 2 +- .../matrix-authentication-service/templates/bin/mas-cli.j2 | 2 +- .../templates/bin/register-user.j2 | 2 +- .../matrix-authentication-service/templates/config.yaml.j2 | 2 +- .../templates/provider/anthropic-config.yml.j2 | 2 +- .../templates/provider/groq-config.yml.j2 | 2 +- .../templates/provider/mistral-config.yml.j2 | 2 +- .../templates/provider/openai-config.yml.j2 | 2 +- .../templates/systemd/matrix-authentication-service.service.j2 | 2 +- roles/custom/matrix-base/templates/bin/remove-all.j2 | 2 +- .../templates/provider/anthropic-config.yml.j2 | 2 +- .../matrix-bot-baibot/templates/provider/groq-config.yml.j2 | 2 +- .../matrix-bot-baibot/templates/provider/mistral-config.yml.j2 | 2 +- .../matrix-bot-baibot/templates/provider/openai-config.yml.j2 | 2 +- .../templates/systemd/matrix-bot-baibot.service.j2 | 2 +- .../templates/systemd/matrix-bot-buscarron.service.j2 | 2 +- .../templates/systemd/matrix-bot-chatgpt.service.j2 | 2 +- .../templates/systemd/matrix-bot-draupnir.service.j2 | 2 +- .../templates/systemd/matrix-bot-go-neb.service.j2 | 2 +- .../templates/systemd/matrix-bot-honoroit.service.j2 | 2 +- .../systemd/matrix-bot-matrix-registration-bot.service.j2 | 2 +- .../templates/systemd/matrix-bot-matrix-reminder-bot.service.j2 | 2 +- .../matrix-bot-maubot/templates/customizations/Dockerfile.j2 | 2 +- .../templates/systemd/matrix-bot-maubot.service.j2 | 2 +- .../templates/systemd/matrix-bot-mjolnir.service.j2 | 2 +- roles/custom/matrix-bridge-appservice-discord/defaults/main.yml | 2 +- .../matrix-bridge-appservice-discord/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-appservice-discord.service.j2 | 2 +- .../templates/systemd/matrix-appservice-irc.service.j2 | 2 +- .../systemd/matrix-appservice-kakaotalk-node.service.j2 | 2 +- .../templates/systemd/matrix-appservice-kakaotalk.service.j2 | 2 +- .../templates/systemd/matrix-appservice-slack.service.j2 | 2 +- .../templates/systemd/matrix-appservice-webhooks.service.j2 | 2 +- .../matrix-bridge-beeper-linkedin/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-beeper-linkedin.service.j2 | 2 +- .../matrix-bridge-go-skype-bridge/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-go-skype-bridge.service.j2 | 2 +- .../templates/systemd/matrix-heisenbridge.service.j2 | 2 +- roles/custom/matrix-bridge-hookshot/templates/config.yaml.j2 | 2 +- .../custom/matrix-bridge-hookshot/templates/registration.yml.j2 | 2 +- .../templates/systemd/matrix-hookshot.service.j2 | 2 +- .../matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-bluesky.service.j2 | 2 +- .../matrix-bridge-mautrix-discord/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-discord.service.j2 | 2 +- .../matrix-bridge-mautrix-facebook/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-facebook.service.j2 | 2 +- .../matrix-bridge-mautrix-gmessages/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-gmessages.service.j2 | 2 +- .../matrix-bridge-mautrix-googlechat/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-googlechat.service.j2 | 2 +- .../matrix-bridge-mautrix-instagram/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-instagram.service.j2 | 2 +- .../templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-meta.service.j2 | 2 +- .../templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-meta.service.j2 | 2 +- .../matrix-bridge-mautrix-signal/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-signal.service.j2 | 2 +- .../custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-slack.service.j2 | 2 +- .../matrix-bridge-mautrix-telegram/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-telegram.service.j2 | 2 +- .../matrix-bridge-mautrix-twitter/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-twitter.service.j2 | 2 +- .../matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mautrix-whatsapp.service.j2 | 2 +- .../systemd/matrix-mautrix-wsproxy-syncproxy.service.j2 | 2 +- .../templates/systemd/matrix-mautrix-wsproxy.service.j2 | 2 +- .../matrix-bridge-mx-puppet-discord/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mx-puppet-discord.service.j2 | 2 +- .../matrix-bridge-mx-puppet-groupme/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mx-puppet-groupme.service.j2 | 2 +- .../matrix-bridge-mx-puppet-instagram/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mx-puppet-instagram.service.j2 | 2 +- .../matrix-bridge-mx-puppet-slack/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mx-puppet-slack.service.j2 | 2 +- .../matrix-bridge-mx-puppet-steam/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mx-puppet-steam.service.j2 | 2 +- .../matrix-bridge-mx-puppet-twitter/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-mx-puppet-twitter.service.j2 | 2 +- .../templates/systemd/matrix-postmoogle.service.j2 | 2 +- roles/custom/matrix-bridge-sms/defaults/main.yml | 2 +- .../templates/systemd/matrix-sms-bridge.service.j2 | 2 +- roles/custom/matrix-bridge-wechat/templates/config.yaml.j2 | 2 +- .../templates/systemd/matrix-wechat-agent.service.j2 | 2 +- .../templates/systemd/matrix-wechat.service.j2 | 2 +- .../templates/systemd/matrix-cactus-comments-client.service.j2 | 2 +- .../templates/systemd/matrix-cactus-comments.service.j2 | 2 +- roles/custom/matrix-client-cinny/templates/nginx.conf.j2 | 2 +- .../templates/systemd/matrix-client-cinny.service.j2 | 2 +- .../templates/systemd/matrix-client-element.service.j2 | 2 +- roles/custom/matrix-client-element/templates/welcome.html.j2 | 2 +- .../templates/systemd/matrix-client-fluffychat.service.j2 | 2 +- roles/custom/matrix-client-hydrogen/templates/nginx.conf.j2 | 2 +- .../templates/systemd/matrix-client-hydrogen.service.j2 | 2 +- .../templates/systemd/matrix-client-schildichat.service.j2 | 2 +- .../custom/matrix-client-schildichat/templates/welcome.html.j2 | 2 +- .../matrix-conduit/templates/systemd/matrix-conduit.service.j2 | 2 +- .../templates/systemd/matrix-conduwuit.service.j2 | 2 +- .../templates/systemd/matrix-continuwuity.service.j2 | 2 +- .../templates/systemd/matrix-corporal.service.j2 | 2 +- .../matrix-coturn/templates/systemd/matrix-coturn.service.j2 | 2 +- roles/custom/matrix-coturn/templates/turnserver.conf.j2 | 2 +- roles/custom/matrix-dendrite/templates/bin/create-account.j2 | 2 +- .../templates/systemd/matrix-dendrite.service.j2 | 2 +- .../templates/systemd/matrix-dimension.service.j2 | 2 +- .../templates/systemd/matrix-dynamic-dns.service.j2 | 2 +- .../templates/systemd/matrix-element-call.service.j2 | 2 +- .../templates/systemd/matrix-ldap-registration-proxy.service.j2 | 2 +- .../templates/systemd/matrix-livekit-jwt-service.service.j2 | 2 +- .../matrix-ma1sd/templates/systemd/matrix-ma1sd.service.j2 | 2 +- .../templates/media-repo/systemd/matrix-media-repo.service.j2 | 2 +- .../templates/systemd/matrix-pantalaimon.service.j2 | 2 +- .../systemd/matrix-prometheus-nginxlog-exporter.service.j2 | 2 +- .../templates/systemd/matrix-rageshake.service.j2 | 2 +- .../templates/systemd/matrix-registration.service.j2 | 2 +- .../templates/systemd/matrix-sliding-sync.service.j2 | 2 +- roles/custom/matrix-static-files/templates/config.toml.j2 | 2 +- .../templates/systemd/matrix-static-files.service.j2 | 2 +- .../matrix-sygnal/templates/systemd/matrix-sygnal.service.j2 | 2 +- .../templates/systemd/matrix-synapse-admin.service.j2 | 2 +- .../templates/matrix-synapse-auto-compressor-fix.sh.j2 | 2 +- .../templates/matrix-synapse-auto-compressor.service.j2 | 2 +- .../nginx/conf.d/matrix-synapse-reverse-proxy-companion.conf.j2 | 2 +- .../templates/nginx/conf.d/nginx-http.conf.j2 | 2 +- .../templates/nginx/nginx.conf.j2 | 2 +- .../systemd/matrix-synapse-reverse-proxy-companion.service.j2 | 2 +- .../templates/systemd/matrix-synapse-usage-exporter.service.j2 | 2 +- roles/custom/matrix-synapse/templates/goofys/env-goofys.j2 | 2 +- .../templates/goofys/systemd/matrix-goofys.service.j2 | 2 +- .../matrix-synapse/templates/synapse/bin/register-user.j2 | 2 +- .../templates/synapse/customizations/Dockerfile.j2 | 2 +- .../templates/synapse/ext/s3-storage-provider/bin/migrate.j2 | 2 +- .../templates/synapse/ext/s3-storage-provider/bin/shell.j2 | 2 +- .../custom/matrix-synapse/templates/synapse/homeserver.yaml.j2 | 2 +- .../matrix-synapse/templates/synapse/synapse.log.config.j2 | 2 +- .../templates/synapse/systemd/matrix-synapse-worker.service.j2 | 2 +- .../templates/synapse/systemd/matrix-synapse.service.j2 | 2 +- roles/custom/matrix-synapse/templates/synapse/worker.yaml.j2 | 2 +- .../systemd/matrix-user-verification-service.service.j2 | 2 +- 143 files changed, 143 insertions(+), 143 deletions(-) diff --git a/roles/custom/matrix-alertmanager-receiver/templates/config.yaml.j2 b/roles/custom/matrix-alertmanager-receiver/templates/config.yaml.j2 index 40d37f9b7..e3f41eca6 100644 --- a/roles/custom/matrix-alertmanager-receiver/templates/config.yaml.j2 +++ b/roles/custom/matrix-alertmanager-receiver/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # configuration of the HTTP server http: address: 0.0.0.0 # bind address for this service. Can be left unspecified to bind on all interfaces diff --git a/roles/custom/matrix-alertmanager-receiver/templates/systemd/matrix-alertmanager-receiver.service.j2 b/roles/custom/matrix-alertmanager-receiver/templates/systemd/matrix-alertmanager-receiver.service.j2 index 2f0b6622d..adb997d56 100644 --- a/roles/custom/matrix-alertmanager-receiver/templates/systemd/matrix-alertmanager-receiver.service.j2 +++ b/roles/custom/matrix-alertmanager-receiver/templates/systemd/matrix-alertmanager-receiver.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=matrix-alertmanager-receiver {% for service in matrix_alertmanager_receiver_systemd_required_services_list %} diff --git a/roles/custom/matrix-appservice-draupnir-for-all/templates/systemd/matrix-appservice-draupnir-for-all.service.j2 b/roles/custom/matrix-appservice-draupnir-for-all/templates/systemd/matrix-appservice-draupnir-for-all.service.j2 index 008d0feb1..e5ad7e97f 100644 --- a/roles/custom/matrix-appservice-draupnir-for-all/templates/systemd/matrix-appservice-draupnir-for-all.service.j2 +++ b/roles/custom/matrix-appservice-draupnir-for-all/templates/systemd/matrix-appservice-draupnir-for-all.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Draupnir for All appservice {% for service in matrix_appservice_draupnir_for_all_systemd_wanted_services_list %} diff --git a/roles/custom/matrix-authentication-service/templates/bin/mas-cli.j2 b/roles/custom/matrix-authentication-service/templates/bin/mas-cli.j2 index d4d1d9c1e..b6c05f6fe 100644 --- a/roles/custom/matrix-authentication-service/templates/bin/mas-cli.j2 +++ b/roles/custom/matrix-authentication-service/templates/bin/mas-cli.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True #!/bin/bash args=$@ diff --git a/roles/custom/matrix-authentication-service/templates/bin/register-user.j2 b/roles/custom/matrix-authentication-service/templates/bin/register-user.j2 index 54d60e8b9..8c159eaa9 100644 --- a/roles/custom/matrix-authentication-service/templates/bin/register-user.j2 +++ b/roles/custom/matrix-authentication-service/templates/bin/register-user.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True #!/bin/bash if [ $# -ne 3 ]; then diff --git a/roles/custom/matrix-authentication-service/templates/config.yaml.j2 b/roles/custom/matrix-authentication-service/templates/config.yaml.j2 index f53b3c94c..32065d221 100644 --- a/roles/custom/matrix-authentication-service/templates/config.yaml.j2 +++ b/roles/custom/matrix-authentication-service/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True http: listeners: - name: web diff --git a/roles/custom/matrix-authentication-service/templates/provider/anthropic-config.yml.j2 b/roles/custom/matrix-authentication-service/templates/provider/anthropic-config.yml.j2 index f1a23ac5a..97ac3c477 100644 --- a/roles/custom/matrix-authentication-service/templates/provider/anthropic-config.yml.j2 +++ b/roles/custom/matrix-authentication-service/templates/provider/anthropic-config.yml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True base_url: {{ matrix_authentication_service_config_agents_static_definitions_anthropic_config_base_url | to_json }} api_key: {{ matrix_authentication_service_config_agents_static_definitions_anthropic_config_api_key | to_json }} diff --git a/roles/custom/matrix-authentication-service/templates/provider/groq-config.yml.j2 b/roles/custom/matrix-authentication-service/templates/provider/groq-config.yml.j2 index c1c381ca3..6bafce672 100644 --- a/roles/custom/matrix-authentication-service/templates/provider/groq-config.yml.j2 +++ b/roles/custom/matrix-authentication-service/templates/provider/groq-config.yml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True base_url: {{ matrix_authentication_service_config_agents_static_definitions_groq_config_base_url | to_json }} api_key: {{ matrix_authentication_service_config_agents_static_definitions_groq_config_api_key | to_json }} diff --git a/roles/custom/matrix-authentication-service/templates/provider/mistral-config.yml.j2 b/roles/custom/matrix-authentication-service/templates/provider/mistral-config.yml.j2 index 5843ba4d6..5e1265f39 100644 --- a/roles/custom/matrix-authentication-service/templates/provider/mistral-config.yml.j2 +++ b/roles/custom/matrix-authentication-service/templates/provider/mistral-config.yml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True base_url: {{ matrix_authentication_service_config_agents_static_definitions_mistral_config_base_url | to_json }} api_key: {{ matrix_authentication_service_config_agents_static_definitions_mistral_config_api_key | to_json }} diff --git a/roles/custom/matrix-authentication-service/templates/provider/openai-config.yml.j2 b/roles/custom/matrix-authentication-service/templates/provider/openai-config.yml.j2 index fcc462d1b..63a10e30e 100644 --- a/roles/custom/matrix-authentication-service/templates/provider/openai-config.yml.j2 +++ b/roles/custom/matrix-authentication-service/templates/provider/openai-config.yml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True base_url: {{ matrix_authentication_service_config_agents_static_definitions_openai_config_base_url | to_json }} api_key: {{ matrix_authentication_service_config_agents_static_definitions_openai_config_api_key | to_json }} diff --git a/roles/custom/matrix-authentication-service/templates/systemd/matrix-authentication-service.service.j2 b/roles/custom/matrix-authentication-service/templates/systemd/matrix-authentication-service.service.j2 index 1f03c6b4f..6b6d042a7 100644 --- a/roles/custom/matrix-authentication-service/templates/systemd/matrix-authentication-service.service.j2 +++ b/roles/custom/matrix-authentication-service/templates/systemd/matrix-authentication-service.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Authentication Service {% for service in matrix_authentication_service_systemd_required_services_list %} diff --git a/roles/custom/matrix-base/templates/bin/remove-all.j2 b/roles/custom/matrix-base/templates/bin/remove-all.j2 index 5a0579586..e35abc462 100644 --- a/roles/custom/matrix-base/templates/bin/remove-all.j2 +++ b/roles/custom/matrix-base/templates/bin/remove-all.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True #!/bin/bash if [ "$(id -u)" != "0" ]; then diff --git a/roles/custom/matrix-bot-baibot/templates/provider/anthropic-config.yml.j2 b/roles/custom/matrix-bot-baibot/templates/provider/anthropic-config.yml.j2 index 1d613b70c..a8007a868 100644 --- a/roles/custom/matrix-bot-baibot/templates/provider/anthropic-config.yml.j2 +++ b/roles/custom/matrix-bot-baibot/templates/provider/anthropic-config.yml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True base_url: {{ matrix_bot_baibot_config_agents_static_definitions_anthropic_config_base_url | to_json }} api_key: {{ matrix_bot_baibot_config_agents_static_definitions_anthropic_config_api_key | to_json }} diff --git a/roles/custom/matrix-bot-baibot/templates/provider/groq-config.yml.j2 b/roles/custom/matrix-bot-baibot/templates/provider/groq-config.yml.j2 index fbefa5a3b..7009b5546 100644 --- a/roles/custom/matrix-bot-baibot/templates/provider/groq-config.yml.j2 +++ b/roles/custom/matrix-bot-baibot/templates/provider/groq-config.yml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True base_url: {{ matrix_bot_baibot_config_agents_static_definitions_groq_config_base_url | to_json }} api_key: {{ matrix_bot_baibot_config_agents_static_definitions_groq_config_api_key | to_json }} diff --git a/roles/custom/matrix-bot-baibot/templates/provider/mistral-config.yml.j2 b/roles/custom/matrix-bot-baibot/templates/provider/mistral-config.yml.j2 index 5f97e69fd..9e007cb3d 100644 --- a/roles/custom/matrix-bot-baibot/templates/provider/mistral-config.yml.j2 +++ b/roles/custom/matrix-bot-baibot/templates/provider/mistral-config.yml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True base_url: {{ matrix_bot_baibot_config_agents_static_definitions_mistral_config_base_url | to_json }} api_key: {{ matrix_bot_baibot_config_agents_static_definitions_mistral_config_api_key | to_json }} diff --git a/roles/custom/matrix-bot-baibot/templates/provider/openai-config.yml.j2 b/roles/custom/matrix-bot-baibot/templates/provider/openai-config.yml.j2 index 46ee64984..37ceeaada 100644 --- a/roles/custom/matrix-bot-baibot/templates/provider/openai-config.yml.j2 +++ b/roles/custom/matrix-bot-baibot/templates/provider/openai-config.yml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True base_url: {{ matrix_bot_baibot_config_agents_static_definitions_openai_config_base_url | to_json }} api_key: {{ matrix_bot_baibot_config_agents_static_definitions_openai_config_api_key | to_json }} diff --git a/roles/custom/matrix-bot-baibot/templates/systemd/matrix-bot-baibot.service.j2 b/roles/custom/matrix-bot-baibot/templates/systemd/matrix-bot-baibot.service.j2 index 01b6c0a06..e9b01fb0a 100644 --- a/roles/custom/matrix-bot-baibot/templates/systemd/matrix-bot-baibot.service.j2 +++ b/roles/custom/matrix-bot-baibot/templates/systemd/matrix-bot-baibot.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix baibot bot {% for service in matrix_bot_baibot_systemd_required_services_list %} diff --git a/roles/custom/matrix-bot-buscarron/templates/systemd/matrix-bot-buscarron.service.j2 b/roles/custom/matrix-bot-buscarron/templates/systemd/matrix-bot-buscarron.service.j2 index c5ed0f3e0..3593fff97 100644 --- a/roles/custom/matrix-bot-buscarron/templates/systemd/matrix-bot-buscarron.service.j2 +++ b/roles/custom/matrix-bot-buscarron/templates/systemd/matrix-bot-buscarron.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix web forms bot {% for service in matrix_bot_buscarron_systemd_required_services_list %} diff --git a/roles/custom/matrix-bot-chatgpt/templates/systemd/matrix-bot-chatgpt.service.j2 b/roles/custom/matrix-bot-chatgpt/templates/systemd/matrix-bot-chatgpt.service.j2 index a3a3ba219..9cef687f3 100644 --- a/roles/custom/matrix-bot-chatgpt/templates/systemd/matrix-bot-chatgpt.service.j2 +++ b/roles/custom/matrix-bot-chatgpt/templates/systemd/matrix-bot-chatgpt.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix chatgpt bot {% for service in matrix_bot_chatgpt_systemd_required_services_list %} diff --git a/roles/custom/matrix-bot-draupnir/templates/systemd/matrix-bot-draupnir.service.j2 b/roles/custom/matrix-bot-draupnir/templates/systemd/matrix-bot-draupnir.service.j2 index 550be60a7..e54f1c7d0 100644 --- a/roles/custom/matrix-bot-draupnir/templates/systemd/matrix-bot-draupnir.service.j2 +++ b/roles/custom/matrix-bot-draupnir/templates/systemd/matrix-bot-draupnir.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Draupnir bot {% for service in matrix_bot_draupnir_systemd_wanted_services_list %} diff --git a/roles/custom/matrix-bot-go-neb/templates/systemd/matrix-bot-go-neb.service.j2 b/roles/custom/matrix-bot-go-neb/templates/systemd/matrix-bot-go-neb.service.j2 index c8c028b77..d27909e4b 100644 --- a/roles/custom/matrix-bot-go-neb/templates/systemd/matrix-bot-go-neb.service.j2 +++ b/roles/custom/matrix-bot-go-neb/templates/systemd/matrix-bot-go-neb.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Go-NEB bot {% for service in matrix_bot_go_neb_systemd_required_services_list %} diff --git a/roles/custom/matrix-bot-honoroit/templates/systemd/matrix-bot-honoroit.service.j2 b/roles/custom/matrix-bot-honoroit/templates/systemd/matrix-bot-honoroit.service.j2 index 3bcd8441b..1fcbbb03c 100644 --- a/roles/custom/matrix-bot-honoroit/templates/systemd/matrix-bot-honoroit.service.j2 +++ b/roles/custom/matrix-bot-honoroit/templates/systemd/matrix-bot-honoroit.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix helpdesk bot {% for service in matrix_bot_honoroit_systemd_required_services_list %} diff --git a/roles/custom/matrix-bot-matrix-registration-bot/templates/systemd/matrix-bot-matrix-registration-bot.service.j2 b/roles/custom/matrix-bot-matrix-registration-bot/templates/systemd/matrix-bot-matrix-registration-bot.service.j2 index 1ad089e3d..5d78bacfc 100644 --- a/roles/custom/matrix-bot-matrix-registration-bot/templates/systemd/matrix-bot-matrix-registration-bot.service.j2 +++ b/roles/custom/matrix-bot-matrix-registration-bot/templates/systemd/matrix-bot-matrix-registration-bot.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix registration bot {% for service in matrix_bot_matrix_registration_bot_systemd_required_services_list %} diff --git a/roles/custom/matrix-bot-matrix-reminder-bot/templates/systemd/matrix-bot-matrix-reminder-bot.service.j2 b/roles/custom/matrix-bot-matrix-reminder-bot/templates/systemd/matrix-bot-matrix-reminder-bot.service.j2 index 823d050c2..0453cf934 100644 --- a/roles/custom/matrix-bot-matrix-reminder-bot/templates/systemd/matrix-bot-matrix-reminder-bot.service.j2 +++ b/roles/custom/matrix-bot-matrix-reminder-bot/templates/systemd/matrix-bot-matrix-reminder-bot.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix reminder bot {% for service in matrix_bot_matrix_reminder_bot_systemd_required_services_list %} diff --git a/roles/custom/matrix-bot-maubot/templates/customizations/Dockerfile.j2 b/roles/custom/matrix-bot-maubot/templates/customizations/Dockerfile.j2 index 0f2f4e508..f580a96af 100644 --- a/roles/custom/matrix-bot-maubot/templates/customizations/Dockerfile.j2 +++ b/roles/custom/matrix-bot-maubot/templates/customizations/Dockerfile.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True FROM {{ matrix_bot_maubot_docker_image }} {{ matrix_bot_maubot_container_image_customizations_dockerfile_body_custom }} diff --git a/roles/custom/matrix-bot-maubot/templates/systemd/matrix-bot-maubot.service.j2 b/roles/custom/matrix-bot-maubot/templates/systemd/matrix-bot-maubot.service.j2 index 6c6174677..36082f58c 100644 --- a/roles/custom/matrix-bot-maubot/templates/systemd/matrix-bot-maubot.service.j2 +++ b/roles/custom/matrix-bot-maubot/templates/systemd/matrix-bot-maubot.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Maubot {% for service in matrix_bot_maubot_systemd_required_services_list %} diff --git a/roles/custom/matrix-bot-mjolnir/templates/systemd/matrix-bot-mjolnir.service.j2 b/roles/custom/matrix-bot-mjolnir/templates/systemd/matrix-bot-mjolnir.service.j2 index 9c1f46733..9c2933489 100644 --- a/roles/custom/matrix-bot-mjolnir/templates/systemd/matrix-bot-mjolnir.service.j2 +++ b/roles/custom/matrix-bot-mjolnir/templates/systemd/matrix-bot-mjolnir.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mjolnir bot {% for service in matrix_bot_mjolnir_systemd_wanted_services_list %} diff --git a/roles/custom/matrix-bridge-appservice-discord/defaults/main.yml b/roles/custom/matrix-bridge-appservice-discord/defaults/main.yml index 6da159f0d..8a2d35c78 100644 --- a/roles/custom/matrix-bridge-appservice-discord/defaults/main.yml +++ b/roles/custom/matrix-bridge-appservice-discord/defaults/main.yml @@ -119,7 +119,7 @@ matrix_appservice_discord_configuration_extension: "{{ matrix_appservice_discord matrix_appservice_discord_configuration: "{{ matrix_appservice_discord_configuration_yaml | from_yaml | combine(matrix_appservice_discord_configuration_extension, recursive=True) }}" matrix_appservice_discord_registration_yaml: | - #jinja2: lstrip_blocks: "True" + #jinja2: lstrip_blocks: True id: appservice-discord as_token: "{{ matrix_appservice_discord_appservice_token }}" hs_token: "{{ matrix_appservice_discord_homeserver_token }}" diff --git a/roles/custom/matrix-bridge-appservice-discord/templates/config.yaml.j2 b/roles/custom/matrix-bridge-appservice-discord/templates/config.yaml.j2 index 9d6974678..63c45d020 100644 --- a/roles/custom/matrix-bridge-appservice-discord/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-appservice-discord/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True bridge: # Domain part of the bridge, e.g. matrix.org domain: {{ matrix_appservice_discord_bridge_domain|to_json }} diff --git a/roles/custom/matrix-bridge-appservice-discord/templates/systemd/matrix-appservice-discord.service.j2 b/roles/custom/matrix-bridge-appservice-discord/templates/systemd/matrix-appservice-discord.service.j2 index e4a943bc2..a832b991f 100644 --- a/roles/custom/matrix-bridge-appservice-discord/templates/systemd/matrix-appservice-discord.service.j2 +++ b/roles/custom/matrix-bridge-appservice-discord/templates/systemd/matrix-appservice-discord.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Appservice Discord bridge {% for service in matrix_appservice_discord_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-appservice-irc/templates/systemd/matrix-appservice-irc.service.j2 b/roles/custom/matrix-bridge-appservice-irc/templates/systemd/matrix-appservice-irc.service.j2 index 0b50d10e2..aa26ff78b 100644 --- a/roles/custom/matrix-bridge-appservice-irc/templates/systemd/matrix-appservice-irc.service.j2 +++ b/roles/custom/matrix-bridge-appservice-irc/templates/systemd/matrix-appservice-irc.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Appservice IRC bridge {% for service in matrix_appservice_irc_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-appservice-kakaotalk/templates/systemd/matrix-appservice-kakaotalk-node.service.j2 b/roles/custom/matrix-bridge-appservice-kakaotalk/templates/systemd/matrix-appservice-kakaotalk-node.service.j2 index 12f688112..cac295057 100644 --- a/roles/custom/matrix-bridge-appservice-kakaotalk/templates/systemd/matrix-appservice-kakaotalk-node.service.j2 +++ b/roles/custom/matrix-bridge-appservice-kakaotalk/templates/systemd/matrix-appservice-kakaotalk-node.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=appservice-kakaotalk-node bridge helper {% for service in matrix_appservice_kakaotalk_node_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-appservice-kakaotalk/templates/systemd/matrix-appservice-kakaotalk.service.j2 b/roles/custom/matrix-bridge-appservice-kakaotalk/templates/systemd/matrix-appservice-kakaotalk.service.j2 index 0f5e2fe2d..3c5e15b3a 100644 --- a/roles/custom/matrix-bridge-appservice-kakaotalk/templates/systemd/matrix-appservice-kakaotalk.service.j2 +++ b/roles/custom/matrix-bridge-appservice-kakaotalk/templates/systemd/matrix-appservice-kakaotalk.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=appservice-kakaotalk bridge {% for service in matrix_appservice_kakaotalk_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-appservice-slack/templates/systemd/matrix-appservice-slack.service.j2 b/roles/custom/matrix-bridge-appservice-slack/templates/systemd/matrix-appservice-slack.service.j2 index 36d9377ea..7c50d692c 100644 --- a/roles/custom/matrix-bridge-appservice-slack/templates/systemd/matrix-appservice-slack.service.j2 +++ b/roles/custom/matrix-bridge-appservice-slack/templates/systemd/matrix-appservice-slack.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Appservice Slack bridge {% for service in matrix_appservice_slack_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-appservice-webhooks/templates/systemd/matrix-appservice-webhooks.service.j2 b/roles/custom/matrix-bridge-appservice-webhooks/templates/systemd/matrix-appservice-webhooks.service.j2 index e761442cc..9e7df5c4c 100644 --- a/roles/custom/matrix-bridge-appservice-webhooks/templates/systemd/matrix-appservice-webhooks.service.j2 +++ b/roles/custom/matrix-bridge-appservice-webhooks/templates/systemd/matrix-appservice-webhooks.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Appservice webhooks bridge {% for service in matrix_appservice_webhooks_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-beeper-linkedin/templates/config.yaml.j2 b/roles/custom/matrix-bridge-beeper-linkedin/templates/config.yaml.j2 index ea7caa765..d99cecd88 100644 --- a/roles/custom/matrix-bridge-beeper-linkedin/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-beeper-linkedin/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Homeserver details homeserver: # The address that this appservice can use to connect to the homeserver. diff --git a/roles/custom/matrix-bridge-beeper-linkedin/templates/systemd/matrix-beeper-linkedin.service.j2 b/roles/custom/matrix-bridge-beeper-linkedin/templates/systemd/matrix-beeper-linkedin.service.j2 index d3fe0d249..10ca9af5f 100644 --- a/roles/custom/matrix-bridge-beeper-linkedin/templates/systemd/matrix-beeper-linkedin.service.j2 +++ b/roles/custom/matrix-bridge-beeper-linkedin/templates/systemd/matrix-beeper-linkedin.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Beeper Linkedin bridge {% for service in matrix_beeper_linkedin_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-go-skype-bridge/templates/config.yaml.j2 b/roles/custom/matrix-bridge-go-skype-bridge/templates/config.yaml.j2 index 2bd1c2c7d..219a7e97d 100644 --- a/roles/custom/matrix-bridge-go-skype-bridge/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-go-skype-bridge/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Homeserver details. homeserver: # The address that this appservice can use to connect to the homeserver. diff --git a/roles/custom/matrix-bridge-go-skype-bridge/templates/systemd/matrix-go-skype-bridge.service.j2 b/roles/custom/matrix-bridge-go-skype-bridge/templates/systemd/matrix-go-skype-bridge.service.j2 index fcd05f49e..816dd676a 100644 --- a/roles/custom/matrix-bridge-go-skype-bridge/templates/systemd/matrix-go-skype-bridge.service.j2 +++ b/roles/custom/matrix-bridge-go-skype-bridge/templates/systemd/matrix-go-skype-bridge.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Go Skype Bridge bridge {% for service in matrix_go_skype_bridge_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-heisenbridge/templates/systemd/matrix-heisenbridge.service.j2 b/roles/custom/matrix-bridge-heisenbridge/templates/systemd/matrix-heisenbridge.service.j2 index 556eb28c9..7810444f4 100644 --- a/roles/custom/matrix-bridge-heisenbridge/templates/systemd/matrix-heisenbridge.service.j2 +++ b/roles/custom/matrix-bridge-heisenbridge/templates/systemd/matrix-heisenbridge.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=a bouncer-style Matrix IRC bridge {% for service in matrix_heisenbridge_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-hookshot/templates/config.yaml.j2 b/roles/custom/matrix-bridge-hookshot/templates/config.yaml.j2 index eb62280a8..343114a56 100644 --- a/roles/custom/matrix-bridge-hookshot/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-hookshot/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True bridge: # Basic homeserver configuration # diff --git a/roles/custom/matrix-bridge-hookshot/templates/registration.yml.j2 b/roles/custom/matrix-bridge-hookshot/templates/registration.yml.j2 index 05ed7809d..92eda8e4d 100644 --- a/roles/custom/matrix-bridge-hookshot/templates/registration.yml.j2 +++ b/roles/custom/matrix-bridge-hookshot/templates/registration.yml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True id: matrix-hookshot # This can be anything, but must be unique within your homeserver as_token: {{ matrix_hookshot_appservice_token|to_json }} # This again can be a random string hs_token: {{ matrix_hookshot_homeserver_token|to_json }} # ..as can this diff --git a/roles/custom/matrix-bridge-hookshot/templates/systemd/matrix-hookshot.service.j2 b/roles/custom/matrix-bridge-hookshot/templates/systemd/matrix-hookshot.service.j2 index 3ad5df541..5b698e2e1 100644 --- a/roles/custom/matrix-bridge-hookshot/templates/systemd/matrix-hookshot.service.j2 +++ b/roles/custom/matrix-bridge-hookshot/templates/systemd/matrix-hookshot.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=A bridge between Matrix and multiple project management services, such as GitHub, GitLab and JIRA. {% for service in matrix_hookshot_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 index 20b398fce..c9a6455c9 100644 --- a/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-bluesky/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Network-specific config options network: # Proxy to use for all Bluesky connections. diff --git a/roles/custom/matrix-bridge-mautrix-bluesky/templates/systemd/matrix-mautrix-bluesky.service.j2 b/roles/custom/matrix-bridge-mautrix-bluesky/templates/systemd/matrix-mautrix-bluesky.service.j2 index 5dd291dd2..550c6f226 100644 --- a/roles/custom/matrix-bridge-mautrix-bluesky/templates/systemd/matrix-mautrix-bluesky.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-bluesky/templates/systemd/matrix-mautrix-bluesky.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix Bluesky bridge {% for service in matrix_mautrix_bluesky_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2 index c88209ae0..11a344d65 100644 --- a/roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Homeserver details. homeserver: # The address that this appservice can use to connect to the homeserver. diff --git a/roles/custom/matrix-bridge-mautrix-discord/templates/systemd/matrix-mautrix-discord.service.j2 b/roles/custom/matrix-bridge-mautrix-discord/templates/systemd/matrix-mautrix-discord.service.j2 index 9344d7866..3a5de31e2 100644 --- a/roles/custom/matrix-bridge-mautrix-discord/templates/systemd/matrix-mautrix-discord.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-discord/templates/systemd/matrix-mautrix-discord.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix Discord bridge {% for service in matrix_mautrix_discord_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-facebook/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-facebook/templates/config.yaml.j2 index 7280ec12d..7c899b3d4 100644 --- a/roles/custom/matrix-bridge-mautrix-facebook/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-facebook/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Homeserver details homeserver: # The address that this appservice can use to connect to the homeserver. diff --git a/roles/custom/matrix-bridge-mautrix-facebook/templates/systemd/matrix-mautrix-facebook.service.j2 b/roles/custom/matrix-bridge-mautrix-facebook/templates/systemd/matrix-mautrix-facebook.service.j2 index 754c48885..441848a08 100644 --- a/roles/custom/matrix-bridge-mautrix-facebook/templates/systemd/matrix-mautrix-facebook.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-facebook/templates/systemd/matrix-mautrix-facebook.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix Facebook bridge {% for service in matrix_mautrix_facebook_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-gmessages/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-gmessages/templates/config.yaml.j2 index 844d547e3..cd102eebd 100644 --- a/roles/custom/matrix-bridge-mautrix-gmessages/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-gmessages/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Network-specific config options network: # Displayname template for SMS users. diff --git a/roles/custom/matrix-bridge-mautrix-gmessages/templates/systemd/matrix-mautrix-gmessages.service.j2 b/roles/custom/matrix-bridge-mautrix-gmessages/templates/systemd/matrix-mautrix-gmessages.service.j2 index af3c1731f..e0fa1ab0d 100644 --- a/roles/custom/matrix-bridge-mautrix-gmessages/templates/systemd/matrix-mautrix-gmessages.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-gmessages/templates/systemd/matrix-mautrix-gmessages.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix gmessages bridge {% for service in matrix_mautrix_gmessages_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-googlechat/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-googlechat/templates/config.yaml.j2 index e7ee4394f..83b13f6cf 100644 --- a/roles/custom/matrix-bridge-mautrix-googlechat/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-googlechat/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Homeserver details homeserver: # The address that this appservice can use to connect to the homeserver. diff --git a/roles/custom/matrix-bridge-mautrix-googlechat/templates/systemd/matrix-mautrix-googlechat.service.j2 b/roles/custom/matrix-bridge-mautrix-googlechat/templates/systemd/matrix-mautrix-googlechat.service.j2 index 5b38523fe..ee156134c 100644 --- a/roles/custom/matrix-bridge-mautrix-googlechat/templates/systemd/matrix-mautrix-googlechat.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-googlechat/templates/systemd/matrix-mautrix-googlechat.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix googlechat bridge {% for service in matrix_mautrix_googlechat_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-instagram/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-instagram/templates/config.yaml.j2 index d200ebcd6..428bae149 100644 --- a/roles/custom/matrix-bridge-mautrix-instagram/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-instagram/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Homeserver details homeserver: # The address that this appservice can use to connect to the homeserver. diff --git a/roles/custom/matrix-bridge-mautrix-instagram/templates/systemd/matrix-mautrix-instagram.service.j2 b/roles/custom/matrix-bridge-mautrix-instagram/templates/systemd/matrix-mautrix-instagram.service.j2 index 35248d9d1..55356d443 100644 --- a/roles/custom/matrix-bridge-mautrix-instagram/templates/systemd/matrix-mautrix-instagram.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-instagram/templates/systemd/matrix-mautrix-instagram.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix Instagram bridge {% for service in matrix_mautrix_instagram_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2 index 315799dd6..71c358f66 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Network-specific config options network: # Which service is this bridge for? Available options: diff --git a/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/systemd/matrix-mautrix-meta.service.j2 b/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/systemd/matrix-mautrix-meta.service.j2 index e72e911f2..e9fc2eccb 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/systemd/matrix-mautrix-meta.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-meta-instagram/templates/systemd/matrix-mautrix-meta.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=mautrix-meta bridge ({{ matrix_mautrix_meta_instagram_identifier }}) {% for service in matrix_mautrix_meta_instagram_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2 index dfe8acc08..04733ab7f 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Network-specific config options network: # Which service is this bridge for? Available options: diff --git a/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/systemd/matrix-mautrix-meta.service.j2 b/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/systemd/matrix-mautrix-meta.service.j2 index 92439132e..adf8a9c4e 100644 --- a/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/systemd/matrix-mautrix-meta.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-meta-messenger/templates/systemd/matrix-mautrix-meta.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=mautrix-meta bridge ({{ matrix_mautrix_meta_messenger_identifier }}) {% for service in matrix_mautrix_meta_messenger_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2 index 971f102c8..461ac8490 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Network-specific config options network: # Displayname template for Signal users. diff --git a/roles/custom/matrix-bridge-mautrix-signal/templates/systemd/matrix-mautrix-signal.service.j2 b/roles/custom/matrix-bridge-mautrix-signal/templates/systemd/matrix-mautrix-signal.service.j2 index f108dce1c..4b06e8529 100644 --- a/roles/custom/matrix-bridge-mautrix-signal/templates/systemd/matrix-mautrix-signal.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-signal/templates/systemd/matrix-mautrix-signal.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix Signal bridge {% for service in matrix_mautrix_signal_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 index 7a9fbd89b..2f832b839 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Network-specific config options network: # Displayname template for Slack users. Available variables: diff --git a/roles/custom/matrix-bridge-mautrix-slack/templates/systemd/matrix-mautrix-slack.service.j2 b/roles/custom/matrix-bridge-mautrix-slack/templates/systemd/matrix-mautrix-slack.service.j2 index 563ff2552..ff2357791 100644 --- a/roles/custom/matrix-bridge-mautrix-slack/templates/systemd/matrix-mautrix-slack.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-slack/templates/systemd/matrix-mautrix-slack.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix Slack bridge {% for service in matrix_mautrix_slack_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-telegram/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-telegram/templates/config.yaml.j2 index 5ebd4b904..834a8fa56 100644 --- a/roles/custom/matrix-bridge-mautrix-telegram/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-telegram/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Homeserver details homeserver: # The address that this appservice can use to connect to the homeserver. diff --git a/roles/custom/matrix-bridge-mautrix-telegram/templates/systemd/matrix-mautrix-telegram.service.j2 b/roles/custom/matrix-bridge-mautrix-telegram/templates/systemd/matrix-mautrix-telegram.service.j2 index ce59de6af..951343147 100644 --- a/roles/custom/matrix-bridge-mautrix-telegram/templates/systemd/matrix-mautrix-telegram.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-telegram/templates/systemd/matrix-mautrix-telegram.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix Telegram bridge {% for service in matrix_mautrix_telegram_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 index cc9cfc255..32b67b8cb 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-twitter/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Network-specific config options network: # Proxy to use for all Twitter connections. diff --git a/roles/custom/matrix-bridge-mautrix-twitter/templates/systemd/matrix-mautrix-twitter.service.j2 b/roles/custom/matrix-bridge-mautrix-twitter/templates/systemd/matrix-mautrix-twitter.service.j2 index c044cc616..eeccc209b 100644 --- a/roles/custom/matrix-bridge-mautrix-twitter/templates/systemd/matrix-mautrix-twitter.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-twitter/templates/systemd/matrix-mautrix-twitter.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix Twitter bridge {% for service in matrix_mautrix_twitter_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 index 0cb5fb582..35c6edb58 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Network-specific config options network: # Device name that's shown in the "WhatsApp Web" section in the mobile app. diff --git a/roles/custom/matrix-bridge-mautrix-whatsapp/templates/systemd/matrix-mautrix-whatsapp.service.j2 b/roles/custom/matrix-bridge-mautrix-whatsapp/templates/systemd/matrix-mautrix-whatsapp.service.j2 index fe77ca34d..4fe10a546 100644 --- a/roles/custom/matrix-bridge-mautrix-whatsapp/templates/systemd/matrix-mautrix-whatsapp.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-whatsapp/templates/systemd/matrix-mautrix-whatsapp.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix Whatsapp bridge {% for service in matrix_mautrix_whatsapp_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-wsproxy/templates/systemd/matrix-mautrix-wsproxy-syncproxy.service.j2 b/roles/custom/matrix-bridge-mautrix-wsproxy/templates/systemd/matrix-mautrix-wsproxy-syncproxy.service.j2 index c46d7b6f9..c88d92517 100644 --- a/roles/custom/matrix-bridge-mautrix-wsproxy/templates/systemd/matrix-mautrix-wsproxy-syncproxy.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-wsproxy/templates/systemd/matrix-mautrix-wsproxy-syncproxy.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix wsproxy syncproxy {% for service in matrix_mautrix_wsproxy_syncproxy_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mautrix-wsproxy/templates/systemd/matrix-mautrix-wsproxy.service.j2 b/roles/custom/matrix-bridge-mautrix-wsproxy/templates/systemd/matrix-mautrix-wsproxy.service.j2 index ab71702ea..f49beae40 100644 --- a/roles/custom/matrix-bridge-mautrix-wsproxy/templates/systemd/matrix-mautrix-wsproxy.service.j2 +++ b/roles/custom/matrix-bridge-mautrix-wsproxy/templates/systemd/matrix-mautrix-wsproxy.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mautrix wsproxy bridge {% for service in matrix_mautrix_wsproxy_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mx-puppet-discord/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mx-puppet-discord/templates/config.yaml.j2 index 3db538127..2a1046417 100644 --- a/roles/custom/matrix-bridge-mx-puppet-discord/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mx-puppet-discord/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True bridge: # Port to host the bridge on # Used for communication between the homeserver and the bridge diff --git a/roles/custom/matrix-bridge-mx-puppet-discord/templates/systemd/matrix-mx-puppet-discord.service.j2 b/roles/custom/matrix-bridge-mx-puppet-discord/templates/systemd/matrix-mx-puppet-discord.service.j2 index 6d75a9332..200712092 100644 --- a/roles/custom/matrix-bridge-mx-puppet-discord/templates/systemd/matrix-mx-puppet-discord.service.j2 +++ b/roles/custom/matrix-bridge-mx-puppet-discord/templates/systemd/matrix-mx-puppet-discord.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mx Puppet Discord bridge {% for service in matrix_mx_puppet_discord_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mx-puppet-groupme/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mx-puppet-groupme/templates/config.yaml.j2 index c3237513d..eddc714e3 100644 --- a/roles/custom/matrix-bridge-mx-puppet-groupme/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mx-puppet-groupme/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True bridge: # Port to host the bridge on # Used for communication between the homeserver and the bridge diff --git a/roles/custom/matrix-bridge-mx-puppet-groupme/templates/systemd/matrix-mx-puppet-groupme.service.j2 b/roles/custom/matrix-bridge-mx-puppet-groupme/templates/systemd/matrix-mx-puppet-groupme.service.j2 index 9f4483c6a..68fb27490 100644 --- a/roles/custom/matrix-bridge-mx-puppet-groupme/templates/systemd/matrix-mx-puppet-groupme.service.j2 +++ b/roles/custom/matrix-bridge-mx-puppet-groupme/templates/systemd/matrix-mx-puppet-groupme.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mx Puppet Groupme bridge {% for service in matrix_mx_puppet_groupme_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mx-puppet-instagram/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mx-puppet-instagram/templates/config.yaml.j2 index 2e15c5b0c..80c94dd7f 100644 --- a/roles/custom/matrix-bridge-mx-puppet-instagram/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mx-puppet-instagram/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True bridge: # Port to host the bridge on # Used for communication between the homeserver and the bridge diff --git a/roles/custom/matrix-bridge-mx-puppet-instagram/templates/systemd/matrix-mx-puppet-instagram.service.j2 b/roles/custom/matrix-bridge-mx-puppet-instagram/templates/systemd/matrix-mx-puppet-instagram.service.j2 index 0efca1941..847d10ccf 100644 --- a/roles/custom/matrix-bridge-mx-puppet-instagram/templates/systemd/matrix-mx-puppet-instagram.service.j2 +++ b/roles/custom/matrix-bridge-mx-puppet-instagram/templates/systemd/matrix-mx-puppet-instagram.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mx Puppet Instagram bridge {% for service in matrix_mx_puppet_instagram_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mx-puppet-slack/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mx-puppet-slack/templates/config.yaml.j2 index ff965a172..b21d134e4 100644 --- a/roles/custom/matrix-bridge-mx-puppet-slack/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mx-puppet-slack/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True bridge: # Port to host the bridge on # Used for communication between the homeserver and the bridge diff --git a/roles/custom/matrix-bridge-mx-puppet-slack/templates/systemd/matrix-mx-puppet-slack.service.j2 b/roles/custom/matrix-bridge-mx-puppet-slack/templates/systemd/matrix-mx-puppet-slack.service.j2 index 0727c4ec1..d95fe5268 100644 --- a/roles/custom/matrix-bridge-mx-puppet-slack/templates/systemd/matrix-mx-puppet-slack.service.j2 +++ b/roles/custom/matrix-bridge-mx-puppet-slack/templates/systemd/matrix-mx-puppet-slack.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mx Puppet Slack bridge {% for service in matrix_mx_puppet_slack_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mx-puppet-steam/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mx-puppet-steam/templates/config.yaml.j2 index c2d089f7f..3819698ca 100644 --- a/roles/custom/matrix-bridge-mx-puppet-steam/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mx-puppet-steam/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True bridge: # Port to host the bridge on # Used for communication between the homeserver and the bridge diff --git a/roles/custom/matrix-bridge-mx-puppet-steam/templates/systemd/matrix-mx-puppet-steam.service.j2 b/roles/custom/matrix-bridge-mx-puppet-steam/templates/systemd/matrix-mx-puppet-steam.service.j2 index dd235a4e3..2a376ccef 100644 --- a/roles/custom/matrix-bridge-mx-puppet-steam/templates/systemd/matrix-mx-puppet-steam.service.j2 +++ b/roles/custom/matrix-bridge-mx-puppet-steam/templates/systemd/matrix-mx-puppet-steam.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mx Puppet Steam bridge {% for service in matrix_mx_puppet_steam_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-mx-puppet-twitter/templates/config.yaml.j2 b/roles/custom/matrix-bridge-mx-puppet-twitter/templates/config.yaml.j2 index 9cbcf2bc7..e74073118 100644 --- a/roles/custom/matrix-bridge-mx-puppet-twitter/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-mx-puppet-twitter/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True bridge: # Port to host the bridge on # Used for communication between the homeserver and the bridge diff --git a/roles/custom/matrix-bridge-mx-puppet-twitter/templates/systemd/matrix-mx-puppet-twitter.service.j2 b/roles/custom/matrix-bridge-mx-puppet-twitter/templates/systemd/matrix-mx-puppet-twitter.service.j2 index 1e4771d9a..f9fc0eb3e 100644 --- a/roles/custom/matrix-bridge-mx-puppet-twitter/templates/systemd/matrix-mx-puppet-twitter.service.j2 +++ b/roles/custom/matrix-bridge-mx-puppet-twitter/templates/systemd/matrix-mx-puppet-twitter.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Mx Puppet Twitter bridge {% for service in matrix_mx_puppet_twitter_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-postmoogle/templates/systemd/matrix-postmoogle.service.j2 b/roles/custom/matrix-bridge-postmoogle/templates/systemd/matrix-postmoogle.service.j2 index 5d730184e..38ce1b6ba 100644 --- a/roles/custom/matrix-bridge-postmoogle/templates/systemd/matrix-postmoogle.service.j2 +++ b/roles/custom/matrix-bridge-postmoogle/templates/systemd/matrix-postmoogle.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Postmoogle bridge {% for service in matrix_postmoogle_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-sms/defaults/main.yml b/roles/custom/matrix-bridge-sms/defaults/main.yml index 992d8b936..8d9eac2d1 100644 --- a/roles/custom/matrix-bridge-sms/defaults/main.yml +++ b/roles/custom/matrix-bridge-sms/defaults/main.yml @@ -67,7 +67,7 @@ matrix_sms_bridge_provider_android_truststore_password: '' matrix_sms_bridge_configuration_yaml: | - #jinja2: lstrip_blocks: "True" + #jinja2: lstrip_blocks: True # Database connection matrix: diff --git a/roles/custom/matrix-bridge-sms/templates/systemd/matrix-sms-bridge.service.j2 b/roles/custom/matrix-bridge-sms/templates/systemd/matrix-sms-bridge.service.j2 index 49af8b715..1a3fe2ef1 100644 --- a/roles/custom/matrix-bridge-sms/templates/systemd/matrix-sms-bridge.service.j2 +++ b/roles/custom/matrix-bridge-sms/templates/systemd/matrix-sms-bridge.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix sms bridge {% for service in matrix_sms_bridge_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-wechat/templates/config.yaml.j2 b/roles/custom/matrix-bridge-wechat/templates/config.yaml.j2 index e81583a11..5850ee283 100644 --- a/roles/custom/matrix-bridge-wechat/templates/config.yaml.j2 +++ b/roles/custom/matrix-bridge-wechat/templates/config.yaml.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # Homeserver details. homeserver: # The address that this appservice can use to connect to the homeserver. diff --git a/roles/custom/matrix-bridge-wechat/templates/systemd/matrix-wechat-agent.service.j2 b/roles/custom/matrix-bridge-wechat/templates/systemd/matrix-wechat-agent.service.j2 index dc8d348da..9f9a195c2 100644 --- a/roles/custom/matrix-bridge-wechat/templates/systemd/matrix-wechat-agent.service.j2 +++ b/roles/custom/matrix-bridge-wechat/templates/systemd/matrix-wechat-agent.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix WeChat Agent {% for service in matrix_wechat_systemd_required_services_list %} diff --git a/roles/custom/matrix-bridge-wechat/templates/systemd/matrix-wechat.service.j2 b/roles/custom/matrix-bridge-wechat/templates/systemd/matrix-wechat.service.j2 index 193042a66..4c9deb056 100644 --- a/roles/custom/matrix-bridge-wechat/templates/systemd/matrix-wechat.service.j2 +++ b/roles/custom/matrix-bridge-wechat/templates/systemd/matrix-wechat.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix WeChat Bridge {% for service in matrix_wechat_systemd_required_services_list %} diff --git a/roles/custom/matrix-cactus-comments-client/templates/systemd/matrix-cactus-comments-client.service.j2 b/roles/custom/matrix-cactus-comments-client/templates/systemd/matrix-cactus-comments-client.service.j2 index 6e49e6fad..726c66c5b 100755 --- a/roles/custom/matrix-cactus-comments-client/templates/systemd/matrix-cactus-comments-client.service.j2 +++ b/roles/custom/matrix-cactus-comments-client/templates/systemd/matrix-cactus-comments-client.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=matrix-cactus-comments-client server {% for service in matrix_cactus_comments_client_systemd_required_services_list %} diff --git a/roles/custom/matrix-cactus-comments/templates/systemd/matrix-cactus-comments.service.j2 b/roles/custom/matrix-cactus-comments/templates/systemd/matrix-cactus-comments.service.j2 index 64220e310..1178c002f 100644 --- a/roles/custom/matrix-cactus-comments/templates/systemd/matrix-cactus-comments.service.j2 +++ b/roles/custom/matrix-cactus-comments/templates/systemd/matrix-cactus-comments.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Cactus Comments {% for service in matrix_cactus_comments_systemd_required_services_list %} diff --git a/roles/custom/matrix-client-cinny/templates/nginx.conf.j2 b/roles/custom/matrix-client-cinny/templates/nginx.conf.j2 index 2b70f32d2..de9268842 100644 --- a/roles/custom/matrix-client-cinny/templates/nginx.conf.j2 +++ b/roles/custom/matrix-client-cinny/templates/nginx.conf.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True # This is a custom nginx configuration file that we use in the container (instead of the default one), # because it allows us to run nginx with a non-root user. # diff --git a/roles/custom/matrix-client-cinny/templates/systemd/matrix-client-cinny.service.j2 b/roles/custom/matrix-client-cinny/templates/systemd/matrix-client-cinny.service.j2 index 6aac5e9c3..0275ee8c7 100644 --- a/roles/custom/matrix-client-cinny/templates/systemd/matrix-client-cinny.service.j2 +++ b/roles/custom/matrix-client-cinny/templates/systemd/matrix-client-cinny.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Cinny Client {% for service in matrix_client_cinny_systemd_required_services_list %} diff --git a/roles/custom/matrix-client-element/templates/systemd/matrix-client-element.service.j2 b/roles/custom/matrix-client-element/templates/systemd/matrix-client-element.service.j2 index b245baccc..0af097112 100644 --- a/roles/custom/matrix-client-element/templates/systemd/matrix-client-element.service.j2 +++ b/roles/custom/matrix-client-element/templates/systemd/matrix-client-element.service.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True [Unit] Description=Matrix Element Web server {% for service in matrix_client_element_systemd_required_services_list %} diff --git a/roles/custom/matrix-client-element/templates/welcome.html.j2 b/roles/custom/matrix-client-element/templates/welcome.html.j2 index f25ac6812..d505e2fa2 100644 --- a/roles/custom/matrix-client-element/templates/welcome.html.j2 +++ b/roles/custom/matrix-client-element/templates/welcome.html.j2 @@ -1,4 +1,4 @@ -#jinja2: lstrip_blocks: "True" +#jinja2: lstrip_blocks: True