| @@ -81,7 +81,7 @@ matrix_monitoring_container_network: matrix-monitoring | |||||
| matrix_homeserver_enabled: true | matrix_homeserver_enabled: true | ||||
| # This will contain the homeserver implementation that is in use. | # This will contain the homeserver implementation that is in use. | ||||
| # Valid values: synapse, dendrite, conduit, conduwuit | |||||
| # Valid values: synapse, dendrite, conduit, conduwuit, continuwuity | |||||
| # | # | ||||
| # By default, we use Synapse, because it's the only full-featured Matrix server at the moment. | # By default, we use Synapse, because it's the only full-featured Matrix server at the moment. | ||||
| # | # | ||||
| @@ -13,7 +13,7 @@ | |||||
| - name: Fail if invalid homeserver implementation | - name: Fail if invalid homeserver implementation | ||||
| ansible.builtin.fail: | ansible.builtin.fail: | ||||
| msg: "You need to set a valid homeserver implementation in `matrix_homeserver_implementation`" | msg: "You need to set a valid homeserver implementation in `matrix_homeserver_implementation`" | ||||
| when: "matrix_homeserver_implementation not in ['synapse', 'dendrite', 'conduit', 'conduwuit']" | |||||
| when: "matrix_homeserver_implementation not in ['synapse', 'dendrite', 'conduit', 'conduwuit', 'continuwuity']" | |||||
| - name: (Deprecation) Catch and report renamed settings | - name: (Deprecation) Catch and report renamed settings | ||||
| ansible.builtin.fail: | ansible.builtin.fail: | ||||
| @@ -0,0 +1,195 @@ | |||||
| # SPDX-FileCopyrightText: 2025 MDAD project contributors | |||||
| # SPDX-FileCopyrightText: 2025 Slavi Pantaleev | |||||
| # | |||||
| # SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| --- | |||||
| # continuwuity is a continuation of conduwuit (https://conduwuit.puppyirl.gay/). | |||||
| # Project source code URL: https://forgejo.ellis.link/continuwuation/continuwuity/ | |||||
| # See: https://continuwuity.org/ | |||||
| matrix_continuwuity_enabled: true | |||||
| matrix_continuwuity_hostname: '' | |||||
| matrix_continuwuity_docker_image: "{{ matrix_continuwuity_docker_image_registry_prefix }}continuwuation/continuwuity:{{ matrix_continuwuity_docker_image_tag }}" | |||||
| # renovate: datasource=docker depName=forgejo.ellis.link/continuwuation/continuwuity | |||||
| matrix_continuwuity_docker_image_tag: pr-789-head | |||||
| matrix_continuwuity_docker_image_force_pull: "{{ matrix_continuwuity_docker_image.endswith(':latest') }}" | |||||
| matrix_continuwuity_docker_image_registry_prefix: "{{ matrix_continuwuity_docker_image_registry_prefix_upstream }}" | |||||
| matrix_continuwuity_docker_image_registry_prefix_upstream: "{{ matrix_continuwuity_docker_image_registry_prefix_upstream_default }}" | |||||
| matrix_continuwuity_docker_image_registry_prefix_upstream_default: forgejo.ellis.link | |||||
| matrix_continuwuity_base_path: "{{ matrix_base_data_path }}/continuwuity" | |||||
| matrix_continuwuity_config_path: "{{ matrix_continuwuity_base_path }}/config" | |||||
| matrix_continuwuity_data_path: "{{ matrix_continuwuity_base_path }}/data" | |||||
| matrix_continuwuity_config_port_number: 6167 | |||||
| matrix_continuwuity_tmp_directory_size_mb: 500 | |||||
| # List of systemd services that matrix-continuwuity.service depends on | |||||
| matrix_continuwuity_systemd_required_services_list: "{{ matrix_continuwuity_systemd_required_services_list_default + matrix_continuwuity_systemd_required_services_list_auto + matrix_continuwuity_systemd_required_services_list_custom }}" | |||||
| matrix_continuwuity_systemd_required_services_list_default: "{{ [devture_systemd_docker_base_docker_service_name] if devture_systemd_docker_base_docker_service_name else [] }}" | |||||
| matrix_continuwuity_systemd_required_services_list_auto: [] | |||||
| matrix_continuwuity_systemd_required_services_list_custom: [] | |||||
| # List of systemd services that matrix-continuwuity.service wants | |||||
| matrix_continuwuity_systemd_wanted_services_list: [] | |||||
| # Controls how long to sleep for after starting the matrix-synapse container. | |||||
| # | |||||
| # Delaying, so that the homeserver can manage to fully start and various services | |||||
| # that depend on it (`matrix_continuwuity_systemd_required_services_list` and `matrix_continuwuity_systemd_wanted_services_list`) | |||||
| # may only start after the homeserver is up and running. | |||||
| # | |||||
| # This can be set to 0 to remove the delay. | |||||
| matrix_continuwuity_systemd_service_post_start_delay_seconds: 3 | |||||
| # The base container network. It will be auto-created by this role if it doesn't exist already. | |||||
| matrix_continuwuity_container_network: "" | |||||
| # A list of additional container networks that the container would be connected to. | |||||
| # The role does not create these networks, so make sure they already exist. | |||||
| # Use this to expose this container to another reverse proxy, which runs in a different container network. | |||||
| matrix_continuwuity_container_additional_networks: "{{ matrix_continuwuity_container_additional_networks_auto + matrix_continuwuity_container_additional_networks_custom }}" | |||||
| matrix_continuwuity_container_additional_networks_auto: [] | |||||
| matrix_continuwuity_container_additional_networks_custom: [] | |||||
| # matrix_continuwuity_container_labels_traefik_enabled controls whether labels to assist a Traefik reverse-proxy will be attached to the container. | |||||
| # See `../templates/labels.j2` for details. | |||||
| # | |||||
| # To inject your own other container labels, see `matrix_continuwuity_container_labels_additional_labels`. | |||||
| matrix_continuwuity_container_labels_traefik_enabled: true | |||||
| matrix_continuwuity_container_labels_traefik_docker_network: "{{ matrix_continuwuity_container_network }}" | |||||
| matrix_continuwuity_container_labels_traefik_entrypoints: web-secure | |||||
| matrix_continuwuity_container_labels_traefik_tls_certResolver: default # noqa var-naming | |||||
| # Controls whether labels will be added for handling the root (/) path on a public Traefik entrypoint. | |||||
| matrix_continuwuity_container_labels_public_client_root_enabled: true | |||||
| matrix_continuwuity_container_labels_public_client_root_traefik_hostname: "{{ matrix_continuwuity_hostname }}" | |||||
| matrix_continuwuity_container_labels_public_client_root_traefik_rule: "Host(`{{ matrix_continuwuity_container_labels_public_client_root_traefik_hostname }}`) && Path(`/`)" | |||||
| matrix_continuwuity_container_labels_public_client_root_traefik_priority: 0 | |||||
| matrix_continuwuity_container_labels_public_client_root_traefik_entrypoints: "{{ matrix_continuwuity_container_labels_traefik_entrypoints }}" | |||||
| matrix_continuwuity_container_labels_public_client_root_traefik_tls: "{{ matrix_continuwuity_container_labels_public_client_root_traefik_entrypoints != 'web' }}" | |||||
| matrix_continuwuity_container_labels_public_client_root_traefik_tls_certResolver: "{{ matrix_continuwuity_container_labels_traefik_tls_certResolver }}" # noqa var-naming | |||||
| matrix_continuwuity_container_labels_public_client_root_redirection_enabled: false | |||||
| matrix_continuwuity_container_labels_public_client_root_redirection_url: "" | |||||
| # Controls whether labels will be added that expose the Client-Server API on a public Traefik entrypoint. | |||||
| matrix_continuwuity_container_labels_public_client_api_enabled: true | |||||
| matrix_continuwuity_container_labels_public_client_api_traefik_hostname: "{{ matrix_continuwuity_hostname }}" | |||||
| matrix_continuwuity_container_labels_public_client_api_traefik_path_prefix: /_matrix | |||||
| matrix_continuwuity_container_labels_public_client_api_traefik_rule: "Host(`{{ matrix_continuwuity_container_labels_public_client_api_traefik_hostname }}`) && PathPrefix(`{{ matrix_continuwuity_container_labels_public_client_api_traefik_path_prefix }}`)" | |||||
| matrix_continuwuity_container_labels_public_client_api_traefik_priority: 0 | |||||
| matrix_continuwuity_container_labels_public_client_api_traefik_entrypoints: "{{ matrix_continuwuity_container_labels_traefik_entrypoints }}" | |||||
| matrix_continuwuity_container_labels_public_client_api_traefik_tls: "{{ matrix_continuwuity_container_labels_public_client_api_traefik_entrypoints != 'web' }}" | |||||
| matrix_continuwuity_container_labels_public_client_api_traefik_tls_certResolver: "{{ matrix_continuwuity_container_labels_traefik_tls_certResolver }}" # noqa var-naming | |||||
| # Controls whether labels will be added that expose the Client-Server API on the internal Traefik entrypoint. | |||||
| # This is similar to `matrix_continuwuity_container_labels_public_client_api_enabled`, but the entrypoint and intent is different. | |||||
| matrix_continuwuity_container_labels_internal_client_api_enabled: false | |||||
| matrix_continuwuity_container_labels_internal_client_api_traefik_path_prefix: "{{ matrix_continuwuity_container_labels_public_client_api_traefik_path_prefix }}" | |||||
| matrix_continuwuity_container_labels_internal_client_api_traefik_rule: "PathPrefix(`{{ matrix_continuwuity_container_labels_internal_client_api_traefik_path_prefix }}`)" | |||||
| matrix_continuwuity_container_labels_internal_client_api_traefik_priority: "{{ matrix_continuwuity_container_labels_public_client_api_traefik_priority }}" | |||||
| matrix_continuwuity_container_labels_internal_client_api_traefik_entrypoints: "" | |||||
| # Controls whether labels will be added that expose the Server-Server API (Federation API) on a public Traefik entrypoint. | |||||
| matrix_continuwuity_container_labels_public_federation_api_enabled: "{{ matrix_continuwuity_config_allow_federation }}" | |||||
| matrix_continuwuity_container_labels_public_federation_api_traefik_hostname: "{{ matrix_continuwuity_hostname }}" | |||||
| matrix_continuwuity_container_labels_public_federation_api_traefik_path_prefix: /_matrix | |||||
| matrix_continuwuity_container_labels_public_federation_api_traefik_rule: "Host(`{{ matrix_continuwuity_container_labels_public_federation_api_traefik_hostname }}`) && PathPrefix(`{{ matrix_continuwuity_container_labels_public_federation_api_traefik_path_prefix }}`)" | |||||
| matrix_continuwuity_container_labels_public_federation_api_traefik_priority: 0 | |||||
| matrix_continuwuity_container_labels_public_federation_api_traefik_entrypoints: '' | |||||
| # TLS is force-enabled here, because the spec (https://spec.matrix.org/v1.9/server-server-api/#tls) says that the federation API must use HTTPS. | |||||
| matrix_continuwuity_container_labels_public_federation_api_traefik_tls: true | |||||
| matrix_continuwuity_container_labels_public_federation_api_traefik_tls_certResolver: "{{ matrix_continuwuity_container_labels_traefik_tls_certResolver }}" # noqa var-naming | |||||
| # Controls whether labels will be added that expose the `/_continuwuity` path prefix on a public Traefik entrypoint. | |||||
| matrix_continuwuity_container_labels_public_continuwuity_api_enabled: true | |||||
| matrix_continuwuity_container_labels_public_continuwuity_api_traefik_hostname: "{{ matrix_continuwuity_hostname }}" | |||||
| matrix_continuwuity_container_labels_public_continuwuity_api_traefik_path_prefix: /_continuwuity | |||||
| matrix_continuwuity_container_labels_public_continuwuity_api_traefik_rule: "Host(`{{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_hostname }}`) && PathPrefix(`{{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_path_prefix }}`)" | |||||
| matrix_continuwuity_container_labels_public_continuwuity_api_traefik_priority: 0 | |||||
| matrix_continuwuity_container_labels_public_continuwuity_api_traefik_entrypoints: "{{ matrix_continuwuity_container_labels_traefik_entrypoints }}" | |||||
| matrix_continuwuity_container_labels_public_continuwuity_api_traefik_tls: "{{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_entrypoints != 'web' }}" | |||||
| matrix_continuwuity_container_labels_public_continuwuity_api_traefik_tls_certResolver: "{{ matrix_continuwuity_container_labels_traefik_tls_certResolver }}" # noqa var-naming | |||||
| # matrix_continuwuity_container_labels_additional_labels contains a multiline string with additional labels to add to the container label file. | |||||
| # See `../templates/labels.j2` for details. | |||||
| # | |||||
| # Example: | |||||
| # matrix_continuwuity_container_labels_additional_labels: | | |||||
| # my.label=1 | |||||
| # another.label="here" | |||||
| matrix_continuwuity_container_labels_additional_labels: '' | |||||
| # Extra arguments for the Docker container | |||||
| matrix_continuwuity_container_extra_arguments: [] | |||||
| # Specifies which template files to use when configuring continuwuity. | |||||
| # If you'd like to have your own different configuration, feel free to copy and paste | |||||
| # the original files into your inventory (e.g. in `inventory/host_vars/matrix.example.com/`) | |||||
| # and then change the specific host's `vars.yml` file like this: | |||||
| # matrix_continuwuity_template_continuwuity_config: "{{ playbook_dir }}/inventory/host_vars/matrix.example.com/continuwuity.toml.j2" | |||||
| matrix_continuwuity_template_continuwuity_config: "{{ role_path }}/templates/continuwuity.toml.j2" | |||||
| # Max size for uploads, in bytes | |||||
| matrix_continuwuity_config_server_name: "{{ matrix_domain }}" | |||||
| # Max size for uploads, in bytes | |||||
| matrix_continuwuity_config_max_request_size: 20_000_000 | |||||
| # Enables registration. If set to false, no users can register on this server. | |||||
| matrix_continuwuity_config_allow_registration: false | |||||
| # Controls the `yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse` setting. | |||||
| # This is only used when `matrix_continuwuity_config_allow_registration` is set to true and no registration token is configured. | |||||
| matrix_continuwuity_config_yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse: false | |||||
| # Controls the `registration_token` setting. | |||||
| # When registration is enabled (`matrix_continuwuity_config_allow_registration`) you: | |||||
| # - either need to set a token to protect registration from abuse | |||||
| # - or you need to enable the `yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse` setting | |||||
| # (see `matrix_continuwuity_config_yes_i_am_very_very_sure_i_want_an_open_registration_server_prone_to_abuse`), | |||||
| # to allow registration without any form of 2nd-step. | |||||
| matrix_continuwuity_config_registration_token: '' | |||||
| # Controls the `new_user_displayname_suffix` setting. | |||||
| # This is the suffix that will be added to the displayname of new users. | |||||
| # Upstream defaults this to "🏳️⚧️", but we keep this consistent across all homeserver implementations and do not enable a suffix. | |||||
| matrix_continuwuity_config_new_user_displayname_suffix: "" | |||||
| # Controls the `allow_check_for_updates` setting. | |||||
| matrix_continuwuity_config_allow_check_for_updates: false | |||||
| # Controls the `emergency_password` setting. | |||||
| # matrix_continuwuity_config_emergency_password: '' | |||||
| # Controls the `allow_federation` setting. | |||||
| matrix_continuwuity_config_allow_federation: true | |||||
| matrix_continuwuity_trusted_servers: | |||||
| - "matrix.org" | |||||
| matrix_continuwuity_config_log: "info,state_res=warn,rocket=off,_=off,sled=off" | |||||
| # TURN integration. | |||||
| # See: https://continuwuity.org/turn | |||||
| matrix_continuwuity_config_turn_uris: [] | |||||
| matrix_continuwuity_config_turn_secret: '' | |||||
| matrix_continuwuity_config_turn_username: '' | |||||
| matrix_continuwuity_config_turn_password: '' | |||||
| # Controls whether the self-check feature should validate SSL certificates. | |||||
| matrix_continuwuity_self_check_validate_certificates: true | |||||
| # Additional environment variables to pass to the container. | |||||
| # | |||||
| # Environment variables take priority over settings in the configuration file. | |||||
| # | |||||
| # Example: | |||||
| # matrix_continuwuity_environment_variables_extension: | | |||||
| # continuwuity_MAX_REQUEST_SIZE=50000000 | |||||
| # continuwuity_REQUEST_TIMEOUT=60 | |||||
| matrix_continuwuity_environment_variables_extension: '' | |||||
| @@ -0,0 +1,64 @@ | |||||
| # SPDX-FileCopyrightText: 2025 Slavi Pantaleev | |||||
| # | |||||
| # SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| --- | |||||
| - name: Ensure continuwuity config path exists | |||||
| ansible.builtin.file: | |||||
| path: "{{ matrix_continuwuity_config_path }}" | |||||
| state: directory | |||||
| mode: 0750 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| - name: Ensure continuwuity data path exists | |||||
| ansible.builtin.file: | |||||
| path: "{{ matrix_continuwuity_data_path }}" | |||||
| state: directory | |||||
| mode: 0770 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| - name: Ensure continuwuity configuration installed | |||||
| ansible.builtin.template: | |||||
| src: "{{ matrix_continuwuity_template_continuwuity_config }}" | |||||
| dest: "{{ matrix_continuwuity_config_path }}/continuwuity.toml" | |||||
| mode: 0644 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| - name: Ensure continuwuity support files installed | |||||
| ansible.builtin.template: | |||||
| src: "{{ role_path }}/templates/{{ item }}.j2" | |||||
| dest: "{{ matrix_continuwuity_base_path }}/{{ item }}" | |||||
| mode: 0640 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| with_items: | |||||
| - labels | |||||
| - env | |||||
| - name: Ensure continuwuity container network is created | |||||
| community.general.docker_network: | |||||
| enable_ipv6: "{{ devture_systemd_docker_base_ipv6_enabled }}" | |||||
| name: "{{ matrix_continuwuity_container_network }}" | |||||
| driver: bridge | |||||
| driver_options: "{{ devture_systemd_docker_base_container_networks_driver_options }}" | |||||
| - name: Ensure continuwuity container image is pulled | |||||
| community.docker.docker_image: | |||||
| name: "{{ matrix_continuwuity_docker_image }}" | |||||
| source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" | |||||
| force_source: "{{ matrix_continuwuity_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_continuwuity_docker_image_force_pull }}" | |||||
| register: result | |||||
| retries: "{{ devture_playbook_help_container_retries_count }}" | |||||
| delay: "{{ devture_playbook_help_container_retries_delay }}" | |||||
| until: result is not failed | |||||
| - name: Ensure matrix-continuwuity.service installed | |||||
| ansible.builtin.template: | |||||
| src: "{{ role_path }}/templates/systemd/matrix-continuwuity.service.j2" | |||||
| dest: "{{ devture_systemd_docker_base_systemd_path }}/matrix-continuwuity.service" | |||||
| mode: 0644 | |||||
| @@ -0,0 +1,34 @@ | |||||
| # SPDX-FileCopyrightText: 2025 MDAD project contributors | |||||
| # SPDX-FileCopyrightText: 2025 Slavi Pantaleev | |||||
| # | |||||
| # SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| --- | |||||
| - tags: | |||||
| - setup-all | |||||
| - setup-continuwuity | |||||
| - install-all | |||||
| - install-continuwuity | |||||
| block: | |||||
| - when: matrix_continuwuity_enabled | bool | |||||
| ansible.builtin.include_tasks: "{{ role_path }}/tasks/validate_config.yml" | |||||
| - when: matrix_continuwuity_enabled | bool | |||||
| ansible.builtin.include_tasks: "{{ role_path }}/tasks/install.yml" | |||||
| - tags: | |||||
| - setup-all | |||||
| - setup-continuwuity | |||||
| block: | |||||
| - when: not matrix_continuwuity_enabled | bool | |||||
| ansible.builtin.include_tasks: "{{ role_path }}/tasks/uninstall.yml" | |||||
| - tags: | |||||
| - self-check | |||||
| block: | |||||
| - when: matrix_continuwuity_enabled | bool | |||||
| ansible.builtin.include_tasks: "{{ role_path }}/tasks/self_check_client_api.yml" | |||||
| - when: matrix_continuwuity_enabled | bool | |||||
| ansible.builtin.include_tasks: "{{ role_path }}/tasks/self_check_federation_api.yml" | |||||
| @@ -0,0 +1,28 @@ | |||||
| # SPDX-FileCopyrightText: 2025 Slavi Pantaleev | |||||
| # SPDX-FileCopyrightText: 2025 Suguru Hirahara | |||||
| # | |||||
| # SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| --- | |||||
| - name: Check Matrix Client API | |||||
| ansible.builtin.uri: | |||||
| url: "{{ matrix_continuwuity_client_api_url_endpoint_public }}" | |||||
| follow_redirects: none | |||||
| validate_certs: "{{ matrix_continuwuity_self_check_validate_certificates }}" | |||||
| register: result_matrix_continuwuity_client_api | |||||
| ignore_errors: true | |||||
| check_mode: false | |||||
| when: matrix_continuwuity_enabled | bool | |||||
| delegate_to: 127.0.0.1 | |||||
| become: false | |||||
| - name: Fail if Matrix Client API not working | |||||
| ansible.builtin.fail: | |||||
| msg: "Failed checking Matrix Client API is up at `{{ matrix_server_fqn_matrix }}` (checked endpoint: `{{ matrix_continuwuity_client_api_url_endpoint_public }}`). Is continuwuity running? Is port 443 open in your firewall? Full error: {{ result_matrix_continuwuity_client_api }}" | |||||
| when: "matrix_continuwuity_enabled | bool and (result_matrix_continuwuity_client_api.failed or 'json' not in result_matrix_continuwuity_client_api)" | |||||
| - name: Report working Matrix Client API | |||||
| ansible.builtin.debug: | |||||
| msg: "The Matrix Client API at `{{ matrix_server_fqn_matrix }}` (checked endpoint: `{{ matrix_continuwuity_client_api_url_endpoint_public }}`) is working" | |||||
| when: matrix_continuwuity_enabled | bool | |||||
| @@ -0,0 +1,32 @@ | |||||
| # SPDX-FileCopyrightText: 2025 Slavi Pantaleev | |||||
| # | |||||
| # SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| --- | |||||
| - name: Check Matrix Federation API | |||||
| ansible.builtin.uri: | |||||
| url: "{{ matrix_synapse_federation_api_url_endpoint_public }}" | |||||
| follow_redirects: none | |||||
| validate_certs: "{{ matrix_synapse_self_check_validate_certificates }}" | |||||
| register: result_matrix_synapse_federation_api | |||||
| ignore_errors: true | |||||
| check_mode: false | |||||
| when: matrix_synapse_enabled | bool | |||||
| delegate_to: 127.0.0.1 | |||||
| become: false | |||||
| - name: Fail if Matrix Federation API not working | |||||
| ansible.builtin.fail: | |||||
| msg: "Failed checking Matrix Federation API is up at `{{ matrix_server_fqn_matrix }}` (checked endpoint: `{{ matrix_synapse_federation_api_url_endpoint_public }}`). Is Synapse running? Is port {{ matrix_federation_public_port }} open in your firewall? Full error: {{ result_matrix_synapse_federation_api }}" | |||||
| when: "matrix_synapse_enabled | bool and matrix_synapse_federation_enabled | bool and (result_matrix_synapse_federation_api.failed or 'json' not in result_matrix_synapse_federation_api)" | |||||
| - name: Fail if Matrix Federation API unexpectedly enabled | |||||
| ansible.builtin.fail: | |||||
| msg: "Matrix Federation API is up at `{{ matrix_server_fqn_matrix }}` (checked endpoint: `{{ matrix_synapse_federation_api_url_endpoint_public }}`) despite being disabled." | |||||
| when: "matrix_synapse_enabled | bool and not matrix_synapse_federation_enabled | bool and not result_matrix_synapse_federation_api.failed" | |||||
| - name: Report working Matrix Federation API | |||||
| ansible.builtin.debug: | |||||
| msg: "The Matrix Federation API at `{{ matrix_server_fqn_matrix }}` (checked endpoint: `{{ matrix_synapse_federation_api_url_endpoint_public }}`) is working" | |||||
| when: "matrix_synapse_enabled | bool and matrix_synapse_federation_enabled | bool" | |||||
| @@ -0,0 +1,63 @@ | |||||
| # SPDX-FileCopyrightText: 2025 MDAD project contributors | |||||
| # | |||||
| # SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| --- | |||||
| - name: Ensure continuwuity config path exists | |||||
| ansible.builtin.file: | |||||
| path: "{{ matrix_continuwuity_config_path }}" | |||||
| state: directory | |||||
| mode: 0750 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| - name: Ensure continuwuity data path exists | |||||
| ansible.builtin.file: | |||||
| path: "{{ matrix_continuwuity_data_path }}" | |||||
| state: directory | |||||
| mode: 0770 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| - name: Ensure continuwuity configuration installed | |||||
| ansible.builtin.template: | |||||
| src: "{{ matrix_continuwuity_template_continuwuity_config }}" | |||||
| dest: "{{ matrix_continuwuity_config_path }}/continuwuity.toml" | |||||
| mode: 0644 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| - name: Ensure continuwuity support files installed | |||||
| ansible.builtin.template: | |||||
| src: "{{ role_path }}/templates/{{ item }}.j2" | |||||
| dest: "{{ matrix_continuwuity_base_path }}/{{ item }}" | |||||
| mode: 0640 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| with_items: | |||||
| - labels | |||||
| - name: Ensure continuwuity container network is created | |||||
| community.general.docker_network: | |||||
| enable_ipv6: "{{ devture_systemd_docker_base_ipv6_enabled }}" | |||||
| name: "{{ matrix_continuwuity_container_network }}" | |||||
| driver: bridge | |||||
| driver_options: "{{ devture_systemd_docker_base_container_networks_driver_options }}" | |||||
| - name: Ensure continuwuity container image is pulled | |||||
| community.docker.docker_image: | |||||
| name: "{{ matrix_continuwuity_docker_image }}" | |||||
| source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" | |||||
| force_source: "{{ matrix_continuwuity_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_continuwuity_docker_image_force_pull }}" | |||||
| register: result | |||||
| retries: "{{ devture_playbook_help_container_retries_count }}" | |||||
| delay: "{{ devture_playbook_help_container_retries_delay }}" | |||||
| until: result is not failed | |||||
| - name: Ensure matrix-continuwuity.service installed | |||||
| ansible.builtin.template: | |||||
| src: "{{ role_path }}/templates/systemd/matrix-continuwuity.service.j2" | |||||
| dest: "{{ devture_systemd_docker_base_systemd_path }}/matrix-continuwuity.service" | |||||
| mode: 0644 | |||||
| @@ -0,0 +1,23 @@ | |||||
| # SPDX-FileCopyrightText: 2025 MDAD project contributors | |||||
| # | |||||
| # SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| --- | |||||
| - name: Check existence of matrix-continuwuity service | |||||
| ansible.builtin.stat: | |||||
| path: "{{ devture_systemd_docker_base_systemd_path }}/matrix-continuwuity.service" | |||||
| register: matrix_continuwuity_service_stat | |||||
| - when: matrix_continuwuity_service_stat.stat.exists | bool | |||||
| block: | |||||
| - name: Ensure matrix-continuwuity is stopped | |||||
| ansible.builtin.systemd: | |||||
| name: matrix-continuwuity | |||||
| state: stopped | |||||
| daemon_reload: true | |||||
| - name: Ensure matrix-continuwuity.service doesn't exist | |||||
| ansible.builtin.file: | |||||
| path: "{{ devture_systemd_docker_base_systemd_path }}/matrix-continuwuity.service" | |||||
| state: absent | |||||
| @@ -0,0 +1,23 @@ | |||||
| # SPDX-FileCopyrightText: 2025 Slavi Pantaleev | |||||
| # | |||||
| # SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| --- | |||||
| - name: Check existence of matrix-continuwuity service | |||||
| ansible.builtin.stat: | |||||
| path: "{{ devture_systemd_docker_base_systemd_path }}/matrix-continuwuity.service" | |||||
| register: matrix_continuwuity_service_stat | |||||
| - when: matrix_continuwuity_service_stat.stat.exists | bool | |||||
| block: | |||||
| - name: Ensure matrix-continuwuity is stopped | |||||
| ansible.builtin.systemd: | |||||
| name: matrix-continuwuity | |||||
| state: stopped | |||||
| daemon_reload: true | |||||
| - name: Ensure matrix-continuwuity.service doesn't exist | |||||
| ansible.builtin.file: | |||||
| path: "{{ devture_systemd_docker_base_systemd_path }}/matrix-continuwuity.service" | |||||
| state: absent | |||||
| @@ -0,0 +1,15 @@ | |||||
| # SPDX-FileCopyrightText: 2025 MDAD project contributors | |||||
| # | |||||
| # SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| --- | |||||
| - name: Fail if required continuwuity settings not defined | |||||
| ansible.builtin.fail: | |||||
| msg: >- | |||||
| You need to define a required configuration setting (`{{ item.name }}`). | |||||
| when: "item.when | bool and vars[item.name] == ''" | |||||
| with_items: | |||||
| - {'name': 'matrix_continuwuity_hostname', when: true} | |||||
| - {'name': 'matrix_continuwuity_container_network', when: true} | |||||
| - {'name': 'matrix_continuwuity_container_labels_internal_client_api_traefik_entrypoints', when: "{{ matrix_continuwuity_container_labels_internal_client_api_enabled }}"} | |||||
| @@ -0,0 +1 @@ | |||||
| {{ matrix_continuwuity_environment_variables_extension }} | |||||
| @@ -0,0 +1,3 @@ | |||||
| SPDX-FileCopyrightText: 2025 Slavi Pantaleev | |||||
| SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| @@ -0,0 +1,173 @@ | |||||
| {# | |||||
| SPDX-FileCopyrightText: 2025 MDAD project contributors | |||||
| SPDX-FileCopyrightText: 2025 Slavi Pantaleev | |||||
| SPDX-FileCopyrightText: 2025 Suguru Hirahara | |||||
| SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| #} | |||||
| {% if matrix_continuwuity_container_labels_traefik_enabled %} | |||||
| traefik.enable=true | |||||
| {% if matrix_continuwuity_container_labels_traefik_docker_network %} | |||||
| traefik.docker.network={{ matrix_continuwuity_container_labels_traefik_docker_network }} | |||||
| {% endif %} | |||||
| traefik.http.services.matrix-continuwuity.loadbalancer.server.port={{ matrix_continuwuity_config_port_number }} | |||||
| {% if matrix_continuwuity_container_labels_public_client_root_enabled %} | |||||
| ############################################################ | |||||
| # # | |||||
| # Public Root path (/) # | |||||
| # # | |||||
| ############################################################ | |||||
| {% set client_root_middlewares = [] %} | |||||
| {% if matrix_continuwuity_container_labels_public_client_root_redirection_enabled %} | |||||
| {% set client_root_middlewares = client_root_middlewares + ['matrix-continuwuity-client-root-redirect'] %} | |||||
| traefik.http.middlewares.matrix-continuwuity-client-root-redirect.redirectregex.regex=(.*) | |||||
| traefik.http.middlewares.matrix-continuwuity-client-root-redirect.redirectregex.replacement={{ matrix_continuwuity_container_labels_public_client_root_redirection_url }} | |||||
| {% endif %} | |||||
| traefik.http.routers.matrix-continuwuity-public-client-root.rule={{ matrix_continuwuity_container_labels_public_client_root_traefik_rule }} | |||||
| traefik.http.routers.matrix-continuwuity-public-client-root.middlewares={{ client_root_middlewares | join(',') }} | |||||
| {% if matrix_continuwuity_container_labels_public_client_root_traefik_priority | int > 0 %} | |||||
| traefik.http.routers.matrix-continuwuity-public-client-root.priority={{ matrix_continuwuity_container_labels_public_client_root_traefik_priority }} | |||||
| {% endif %} | |||||
| traefik.http.routers.matrix-continuwuity-public-client-root.service=matrix-continuwuity | |||||
| traefik.http.routers.matrix-continuwuity-public-client-root.entrypoints={{ matrix_continuwuity_container_labels_public_client_root_traefik_entrypoints }} | |||||
| traefik.http.routers.matrix-continuwuity-public-client-root.tls={{ matrix_continuwuity_container_labels_public_client_root_traefik_tls | to_json }} | |||||
| {% if matrix_continuwuity_container_labels_public_client_root_traefik_tls %} | |||||
| traefik.http.routers.matrix-continuwuity-public-client-root.tls.certResolver={{ matrix_continuwuity_container_labels_public_client_root_traefik_tls_certResolver }} | |||||
| {% endif %} | |||||
| ############################################################ | |||||
| # # | |||||
| # /Public Root path (/) # | |||||
| # # | |||||
| ############################################################ | |||||
| {% endif %} | |||||
| {% if matrix_continuwuity_container_labels_public_client_api_enabled %} | |||||
| ############################################################ | |||||
| # # | |||||
| # Public Client-API (/_matrix) # | |||||
| # # | |||||
| ############################################################ | |||||
| traefik.http.routers.matrix-continuwuity-public-client-api.rule={{ matrix_continuwuity_container_labels_public_client_api_traefik_rule }} | |||||
| {% if matrix_continuwuity_container_labels_public_client_api_traefik_priority | int > 0 %} | |||||
| traefik.http.routers.matrix-continuwuity-public-client-api.priority={{ matrix_continuwuity_container_labels_public_client_api_traefik_priority }} | |||||
| {% endif %} | |||||
| traefik.http.routers.matrix-continuwuity-public-client-api.service=matrix-continuwuity | |||||
| traefik.http.routers.matrix-continuwuity-public-client-api.entrypoints={{ matrix_continuwuity_container_labels_public_client_api_traefik_entrypoints }} | |||||
| traefik.http.routers.matrix-continuwuity-public-client-api.tls={{ matrix_continuwuity_container_labels_public_client_api_traefik_tls | to_json }} | |||||
| {% if matrix_continuwuity_container_labels_public_client_api_traefik_tls %} | |||||
| traefik.http.routers.matrix-continuwuity-public-client-api.tls.certResolver={{ matrix_continuwuity_container_labels_public_client_api_traefik_tls_certResolver }} | |||||
| {% endif %} | |||||
| ############################################################ | |||||
| # # | |||||
| # /Public Client-API (/_matrix) # | |||||
| # # | |||||
| ############################################################ | |||||
| {% endif %} | |||||
| {% if matrix_continuwuity_container_labels_internal_client_api_enabled %} | |||||
| ############################################################ | |||||
| # # | |||||
| # Internal Client-API (/_matrix) # | |||||
| # # | |||||
| ############################################################ | |||||
| traefik.http.routers.matrix-continuwuity-internal-client-api.rule={{ matrix_continuwuity_container_labels_internal_client_api_traefik_rule }} | |||||
| {% if matrix_continuwuity_container_labels_internal_client_api_traefik_priority | int > 0 %} | |||||
| traefik.http.routers.matrix-continuwuity-internal-client-api.priority={{ matrix_continuwuity_container_labels_internal_client_api_traefik_priority }} | |||||
| {% endif %} | |||||
| traefik.http.routers.matrix-continuwuity-internal-client-api.service=matrix-continuwuity | |||||
| traefik.http.routers.matrix-continuwuity-internal-client-api.entrypoints={{ matrix_continuwuity_container_labels_internal_client_api_traefik_entrypoints }} | |||||
| ############################################################ | |||||
| # # | |||||
| # /Internal Client-API (/_matrix) # | |||||
| # # | |||||
| ############################################################ | |||||
| {% endif %} | |||||
| {% if matrix_continuwuity_container_labels_public_federation_api_enabled %} | |||||
| ############################################################ | |||||
| # # | |||||
| # Public Federation-API (/_matrix) # | |||||
| # # | |||||
| ############################################################ | |||||
| traefik.http.routers.matrix-continuwuity-public-federation-api.rule={{ matrix_continuwuity_container_labels_public_federation_api_traefik_rule }} | |||||
| {% if matrix_continuwuity_container_labels_public_federation_api_traefik_priority | int > 0 %} | |||||
| traefik.http.routers.matrix-continuwuity-public-federation-api.priority={{ matrix_continuwuity_container_labels_public_federation_api_traefik_priority }} | |||||
| {% endif %} | |||||
| traefik.http.routers.matrix-continuwuity-public-federation-api.service=matrix-continuwuity | |||||
| traefik.http.routers.matrix-continuwuity-public-federation-api.entrypoints={{ matrix_continuwuity_container_labels_public_federation_api_traefik_entrypoints }} | |||||
| traefik.http.routers.matrix-continuwuity-public-federation-api.tls={{ matrix_continuwuity_container_labels_public_federation_api_traefik_tls | to_json }} | |||||
| {% if matrix_continuwuity_container_labels_public_federation_api_traefik_tls %} | |||||
| traefik.http.routers.matrix-continuwuity-public-federation-api.tls.certResolver={{ matrix_continuwuity_container_labels_public_federation_api_traefik_tls_certResolver }} | |||||
| {% endif %} | |||||
| ############################################################ | |||||
| # # | |||||
| # /Public Federation-API (/_matrix) # | |||||
| # # | |||||
| ############################################################ | |||||
| {% endif %} | |||||
| {% if matrix_continuwuity_container_labels_public_continuwuity_api_enabled %} | |||||
| ############################################################ | |||||
| # # | |||||
| # Public continuwuity-API (/_continuwuity) # | |||||
| # # | |||||
| ############################################################ | |||||
| traefik.http.routers.matrix-continuwuity-public-continuwuity-api.rule={{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_rule }} | |||||
| {% if matrix_continuwuity_container_labels_public_continuwuity_api_traefik_priority | int > 0 %} | |||||
| traefik.http.routers.matrix-continuwuity-public-continuwuity-api.priority={{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_priority }} | |||||
| {% endif %} | |||||
| traefik.http.routers.matrix-continuwuity-public-continuwuity-api.service=matrix-continuwuity | |||||
| traefik.http.routers.matrix-continuwuity-public-continuwuity-api.entrypoints={{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_entrypoints }} | |||||
| traefik.http.routers.matrix-continuwuity-public-continuwuity-api.tls={{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_tls | to_json }} | |||||
| {% if matrix_continuwuity_container_labels_public_continuwuity_api_traefik_tls %} | |||||
| traefik.http.routers.matrix-continuwuity-public-continuwuity-api.tls.certResolver={{ matrix_continuwuity_container_labels_public_continuwuity_api_traefik_tls_certResolver }} | |||||
| {% endif %} | |||||
| ############################################################ | |||||
| # # | |||||
| # /Public continuwuity-API (/_continuwuity) # | |||||
| # # | |||||
| ############################################################ | |||||
| {% endif %} | |||||
| {% endif %} | |||||
| {{ matrix_continuwuity_container_labels_additional_labels }} | |||||
| @@ -0,0 +1,51 @@ | |||||
| #jinja2: lstrip_blocks: "True" | |||||
| [Unit] | |||||
| Description=continuwuity Matrix homeserver | |||||
| {% for service in matrix_continuwuity_systemd_required_services_list %} | |||||
| Requires={{ service }} | |||||
| After={{ service }} | |||||
| {% endfor %} | |||||
| [Service] | |||||
| Type=simple | |||||
| Environment="HOME={{ devture_systemd_docker_base_systemd_unit_home_path }}" | |||||
| ExecStartPre=-{{ devture_systemd_docker_base_host_command_sh }} -c '{{ devture_systemd_docker_base_host_command_docker }} stop -t {{ devture_systemd_docker_base_container_stop_grace_time_seconds }} matrix-continuwuity 2>/dev/null || true' | |||||
| ExecStartPre=-{{ devture_systemd_docker_base_host_command_sh }} -c '{{ devture_systemd_docker_base_host_command_docker }} rm matrix-continuwuity 2>/dev/null || true' | |||||
| ExecStartPre={{ devture_systemd_docker_base_host_command_docker }} create \ | |||||
| --rm \ | |||||
| --name=matrix-continuwuity \ | |||||
| --log-driver=none \ | |||||
| --user={{ matrix_user_uid }}:{{ matrix_user_gid }} \ | |||||
| --cap-drop=ALL \ | |||||
| --read-only \ | |||||
| --tmpfs=/tmp:rw,noexec,nosuid,size={{ matrix_continuwuity_tmp_directory_size_mb }}m \ | |||||
| --network={{ matrix_continuwuity_container_network }} \ | |||||
| --env continuwuity_CONFIG=/etc/continuwuity/continuwuity.toml \ | |||||
| --label-file={{ matrix_continuwuity_base_path }}/labels \ | |||||
| --mount type=bind,src={{ matrix_continuwuity_data_path }},dst=/var/lib/continuwuity \ | |||||
| --mount type=bind,src={{ matrix_continuwuity_config_path }},dst=/etc/continuwuity,ro \ | |||||
| {% for arg in matrix_continuwuity_container_extra_arguments %} | |||||
| {{ arg }} \ | |||||
| {% endfor %} | |||||
| {{ matrix_continuwuity_docker_image }} | |||||
| {% for network in matrix_continuwuity_container_additional_networks %} | |||||
| ExecStartPre={{ devture_systemd_docker_base_host_command_docker }} network connect {{ network }} matrix-continuwuity | |||||
| {% endfor %} | |||||
| ExecStart={{ devture_systemd_docker_base_host_command_docker }} start --attach matrix-continuwuity | |||||
| {% if matrix_continuwuity_systemd_service_post_start_delay_seconds != 0 %} | |||||
| ExecStartPost=-{{ matrix_host_command_sleep }} {{ matrix_continuwuity_systemd_service_post_start_delay_seconds }} | |||||
| {% endif %} | |||||
| ExecStop=-{{ devture_systemd_docker_base_host_command_sh }} -c '{{ devture_systemd_docker_base_host_command_docker }} stop -t {{ devture_systemd_docker_base_container_stop_grace_time_seconds }} matrix-continuwuity 2>/dev/null || true' | |||||
| ExecStop=-{{ devture_systemd_docker_base_host_command_sh }} -c '{{ devture_systemd_docker_base_host_command_docker }} rm matrix-continuwuity 2>/dev/null || true' | |||||
| ExecReload={{ devture_systemd_docker_base_host_command_docker }} exec matrix-continuwuity /bin/sh -c 'kill -HUP 1' | |||||
| Restart=always | |||||
| RestartSec=30 | |||||
| SyslogIdentifier=matrix-continuwuity | |||||
| [Install] | |||||
| WantedBy=multi-user.target | |||||
| @@ -0,0 +1,4 @@ | |||||
| SPDX-FileCopyrightText: 2025 MDAD project contributors | |||||
| SPDX-FileCopyrightText: 2025 Slavi Pantaleev | |||||
| SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| @@ -0,0 +1,9 @@ | |||||
| # SPDX-FileCopyrightText: 2025 MDAD project contributors | |||||
| # SPDX-FileCopyrightText: 2025 Slavi Pantaleev | |||||
| # | |||||
| # SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| --- | |||||
| matrix_continuwuity_client_api_url_endpoint_public: "{{ 'https' if matrix_playbook_ssl_enabled else 'http' }}://{{ matrix_continuwuity_hostname }}/_matrix/client/versions" | |||||
| matrix_continuwuity_federation_api_url_endpoint_public: "{{ 'https' if matrix_playbook_ssl_enabled else 'http' }}://{{ matrix_continuwuity_hostname }}:{{ matrix_federation_public_port }}/_matrix/federation/v1/version" | |||||
| @@ -0,0 +1,10 @@ | |||||
| # SPDX-FileCopyrightText: 2025 Slavi Pantaleev | |||||
| # SPDX-FileCopyrightText: 2025 Suguru Hirahara | |||||
| # | |||||
| # SPDX-License-Identifier: AGPL-3.0-or-later | |||||
| --- | |||||
| - name: Ensure continuwuity user registered - {{ user.username | quote }} | |||||
| ansible.builtin.debug: | |||||
| msg: "Not registering user. To register continuwuity users, message the continuwuity bot" | |||||