| @@ -36,6 +36,7 @@ If you are using Cloudflare DNS, make sure to disable the proxy and set all reco | |||||
| | CNAME | `stats` | - | - | - | `matrix.<your-domain>` | | | CNAME | `stats` | - | - | - | `matrix.<your-domain>` | | ||||
| | CNAME | `goneb` | - | - | - | `matrix.<your-domain>` | | | CNAME | `goneb` | - | - | - | `matrix.<your-domain>` | | ||||
| | CNAME | `sygnal` | - | - | - | `matrix.<your-domain>` | | | CNAME | `sygnal` | - | - | - | `matrix.<your-domain>` | | ||||
| | CNAME | `ntfy` | - | - | - | `matrix.<your-domain>` | | |||||
| | CNAME | `hydrogen` | - | - | - | `matrix.<your-domain>` | | | CNAME | `hydrogen` | - | - | - | `matrix.<your-domain>` | | ||||
| | CNAME | `cinny` | - | - | - | `matrix.<your-domain>` | | | CNAME | `cinny` | - | - | - | `matrix.<your-domain>` | | ||||
| | CNAME | `buscarron` | - | - | - | `matrix.<your-domain>` | | | CNAME | `buscarron` | - | - | - | `matrix.<your-domain>` | | ||||
| @@ -57,6 +58,8 @@ The `goneb.<your-domain>` subdomain may be necessary, because this playbook coul | |||||
| The `sygnal.<your-domain>` subdomain may be necessary, because this playbook could install the [Sygnal](https://github.com/matrix-org/sygnal) push gateway. The installation of Sygnal is disabled by default, it is not a core required component. To learn how to install it, see our [configuring Sygnal guide](configuring-playbook-sygnal.md). If you do not wish to set up Sygnal (you probably don't, unless you're also developing/building your own Matrix apps), feel free to skip the `sygnal.<your-domain>` DNS record. | The `sygnal.<your-domain>` subdomain may be necessary, because this playbook could install the [Sygnal](https://github.com/matrix-org/sygnal) push gateway. The installation of Sygnal is disabled by default, it is not a core required component. To learn how to install it, see our [configuring Sygnal guide](configuring-playbook-sygnal.md). If you do not wish to set up Sygnal (you probably don't, unless you're also developing/building your own Matrix apps), feel free to skip the `sygnal.<your-domain>` DNS record. | ||||
| The `ntfy.<your-domain>` subdomain may be necessary, because this playbook could install the [ntfy](https://ntfy.sh/) UnifiedPush-compatible push notifications server. The installation of ntfy is disabled by default, it is not a core required component. To learn how to install it, see our [configuring ntfy guide](configuring-playbook-ntfy.md). If you do not wish to set up ntfy, feel free to skip the `ntfy.<your-domain>` DNS record. | |||||
| The `hydrogen.<your-domain>` subdomain may be necessary, because this playbook could install the [Hydrogen](https://github.com/vector-im/hydrogen-web) web client. The installation of Hydrogen is disabled by default, it is not a core required component. To learn how to install it, see our [configuring Hydrogen guide](configuring-playbook-client-hydrogen.md). If you do not wish to set up Hydrogen, feel free to skip the `hydrogen.<your-domain>` DNS record. | The `hydrogen.<your-domain>` subdomain may be necessary, because this playbook could install the [Hydrogen](https://github.com/vector-im/hydrogen-web) web client. The installation of Hydrogen is disabled by default, it is not a core required component. To learn how to install it, see our [configuring Hydrogen guide](configuring-playbook-client-hydrogen.md). If you do not wish to set up Hydrogen, feel free to skip the `hydrogen.<your-domain>` DNS record. | ||||
| The `cinny.<your-domain>` subdomain may be necessary, because this playbook could install the [Cinny](https://github.com/ajbura/cinny) web client. The installation of cinny is disabled by default, it is not a core required component. To learn how to install it, see our [configuring cinny guide](configuring-playbook-client-cinny.md). If you do not wish to set up cinny, feel free to skip the `cinny.<your-domain>` DNS record. | The `cinny.<your-domain>` subdomain may be necessary, because this playbook could install the [Cinny](https://github.com/ajbura/cinny) web client. The installation of cinny is disabled by default, it is not a core required component. To learn how to install it, see our [configuring cinny guide](configuring-playbook-client-cinny.md). If you do not wish to set up cinny, feel free to skip the `cinny.<your-domain>` DNS record. | ||||
| @@ -0,0 +1,63 @@ | |||||
| # Setting up ntfy (optional) | |||||
| The playbook can install and configure the [ntfy](https://ntfy.sh/) push notifications server for you. | |||||
| Using the [UnifiedPush](https://unifiedpush.org) standard, ntfy enables self-hosted (Google-free) push notifications from Matrix (and other) servers to UnifiedPush-compatible matrix compatible client apps running on Android and other devices. | |||||
| This role is intended to support UnifiedPush notifications for use with the Matrix and Matrix-related services that this playbook installs. This role is not intended to support all of ntfy's other features. | |||||
| **Note**: In contrast to push notifications using Google's FCM or Apple's APNs, the use of UnifiedPush allows each end-user to choose the push notification server that they prefer. As a consequence, deploying this ntfy server does not by itself ensure any particular user or device or client app will use it. | |||||
| ## Adjusting the playbook configuration | |||||
| Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file (adapt to your needs): | |||||
| ```yaml | |||||
| # Enabling it is the only required setting | |||||
| matrix_ntfy_enabled: true | |||||
| # Some other options | |||||
| matrix_server_fqn_ntfy: "ntfy.{{ matrix_domain }}" | |||||
| matrix_ntfy_configuration_extension_yaml: | | |||||
| log_level: DEBUG | |||||
| ``` | |||||
| For a more complete list of variables that you could override, see `roles/matrix-ntfy/defaults/main.yml`. | |||||
| For a complete list of ntfy config options that you could put in `matrix_ntfy_configuration_extension_yaml`, see the [ntfy config documentation](https://ntfy.sh/docs/config/#config-options). | |||||
| ## Installing | |||||
| Don't forget to add `ntfy.<your-domain>` to DNS as described in [Configuring DNS](configuring-dns.md) before running the playbook. | |||||
| After configuring the playbook, run the [installation](installing.md) command again: | |||||
| ``` | |||||
| ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start | |||||
| ``` | |||||
| ## Usage | |||||
| To make use of your ntfy installation, on Android for example, first you need to install the `ntfy` client app and configure it to point to your ntfy server, such as `https://ntfy.DOMAIN`. That is the only thing you need to do in the ntfy client app. (It has many other features, but for our purposes you can ignore them.) | |||||
| Then any UnifiedPush-enabled matrix app on that device will discover it and tell your matrix server to use your ntfy server to send push notifications to that matrix app. | |||||
| If the matrix app asks, "Choose a distributor: FCM Fallback or ntfy", then choose "ntfy". | |||||
| If the matrix app doesn't seem to pick it up, try restarting it and try the Troubleshooting section below. | |||||
| ## Troubleshooting | |||||
| First check that the matrix client app you are using supports UnifiedPush. There may well be different variants of the app. | |||||
| Set the ntfy server's log level to 'DEBUG', as shown in the example settings above, and watch the server's logs with `sudo journalctl -fu matrix-ntfy`. | |||||
| To check if UnifiedPush is correctly configured on the client device, look at "Settings -> Notifications -> Notification Targets" in Element-Android or SchildiChat, or "Settings -> Notifications -> Devices" in FluffyChat. There should be one entry for each matrix client app that has enabled push notifications, and when that client is using UnifiedPush you should see a URL that begins with your ntfy server's URL. In Element-Android or SchildiChat, two URLs are shown: "push\_key" and "Url", and both should begin with your ntfy server's URL. | |||||
| If it is not working, useful tools are "Settings -> Notifications -> Re-register push distributor" and "Settings -> Notifications -> Troubleshoot Notifications" in SchildiChat (possibly also Element-Android). In particular the "Endpoint/FCM" step of that troubleshooter should display your ntfy server's URL that it has discovered from the ntfy client app. | |||||
| The simple [UnifiedPush troubleshooting](https://unifiedpush.org/users/troubleshooting/) app [UP-Example](https://f-droid.org/en/packages/org.unifiedpush.example/) can be used to manually test UnifiedPush registration and operation on an Android device. | |||||
| @@ -74,6 +74,7 @@ By default, it obtains certificates for: | |||||
| - possibly for `jitsi.<your-domain>`, if you have explicitly [set up Jitsi](configuring-playbook-jitsi.md). | - possibly for `jitsi.<your-domain>`, if you have explicitly [set up Jitsi](configuring-playbook-jitsi.md). | ||||
| - possibly for `stats.<your-domain>`, if you have explicitly [set up Grafana](configuring-playbook-prometheus-grafana.md). | - possibly for `stats.<your-domain>`, if you have explicitly [set up Grafana](configuring-playbook-prometheus-grafana.md). | ||||
| - possibly for `sygnal.<your-domain>`, if you have explicitly [set up Sygnal](configuring-playbook-sygnal.md). | - possibly for `sygnal.<your-domain>`, if you have explicitly [set up Sygnal](configuring-playbook-sygnal.md). | ||||
| - possibly for `ntfy.<your-domain>`, if you have explicitly [set up ntfy](configuring-playbook-ntfy.md). | |||||
| - possibly for your base domain (`<your-domain>`), if you have explicitly configured [Serving the base domain](configuring-playbook-base-domain-serving.md) | - possibly for your base domain (`<your-domain>`), if you have explicitly configured [Serving the base domain](configuring-playbook-base-domain-serving.md) | ||||
| If you are hosting other domains on the Matrix machine, you can make the playbook obtain and renew certificates for those other domains too. | If you are hosting other domains on the Matrix machine, you can make the playbook obtain and renew certificates for those other domains too. | ||||
| @@ -168,3 +168,5 @@ When you're done with all the configuration you'd like to do, continue with [Ins | |||||
| ### Other specialized services | ### Other specialized services | ||||
| - [Setting up the Sygnal push gateway](configuring-playbook-sygnal.md) (optional) | - [Setting up the Sygnal push gateway](configuring-playbook-sygnal.md) (optional) | ||||
| - [Setting up the ntfy push notifications server](configuring-playbook-ntfy.md) (optional) | |||||
| @@ -109,3 +109,5 @@ These services are not part of our default installation, but can be enabled by [ | |||||
| - [grafana/grafana](https://hub.docker.com/r/grafana/grafana/) - [Grafana](https://github.com/grafana/grafana/) is a graphing tool that works well with the above two images. Our playbook also adds two dashboards for [Synapse](https://github.com/matrix-org/synapse/tree/master/contrib/grafana) and [Node Exporter](https://github.com/rfrail3/grafana-dashboards) | - [grafana/grafana](https://hub.docker.com/r/grafana/grafana/) - [Grafana](https://github.com/grafana/grafana/) is a graphing tool that works well with the above two images. Our playbook also adds two dashboards for [Synapse](https://github.com/matrix-org/synapse/tree/master/contrib/grafana) and [Node Exporter](https://github.com/rfrail3/grafana-dashboards) | ||||
| - [matrixdotorg/sygnal](https://hub.docker.com/r/matrixdotorg/sygnal/) - [Sygnal](https://github.com/matrix-org/sygnal) is a reference Push Gateway for Matrix | - [matrixdotorg/sygnal](https://hub.docker.com/r/matrixdotorg/sygnal/) - [Sygnal](https://github.com/matrix-org/sygnal) is a reference Push Gateway for Matrix | ||||
| - [binwiederhier/ntfy](https://hub.docker.com/r/binwiederhier/ntfy/) - [ntfy](https://ntfy.sh/) is a self-hosted, UnifiedPush-compatible push notifications server | |||||
| @@ -1552,6 +1552,7 @@ matrix_nginx_proxy_proxy_bot_go_neb_enabled: "{{ matrix_bot_go_neb_enabled }}" | |||||
| matrix_nginx_proxy_proxy_jitsi_enabled: "{{ matrix_jitsi_enabled }}" | matrix_nginx_proxy_proxy_jitsi_enabled: "{{ matrix_jitsi_enabled }}" | ||||
| matrix_nginx_proxy_proxy_grafana_enabled: "{{ matrix_grafana_enabled }}" | matrix_nginx_proxy_proxy_grafana_enabled: "{{ matrix_grafana_enabled }}" | ||||
| matrix_nginx_proxy_proxy_sygnal_enabled: "{{ matrix_sygnal_enabled }}" | matrix_nginx_proxy_proxy_sygnal_enabled: "{{ matrix_sygnal_enabled }}" | ||||
| matrix_nginx_proxy_proxy_ntfy_enabled: "{{ matrix_ntfy_enabled }}" | |||||
| matrix_nginx_proxy_proxy_matrix_corporal_api_enabled: "{{ matrix_corporal_enabled and matrix_corporal_http_api_enabled }}" | matrix_nginx_proxy_proxy_matrix_corporal_api_enabled: "{{ matrix_corporal_enabled and matrix_corporal_http_api_enabled }}" | ||||
| matrix_nginx_proxy_proxy_matrix_corporal_api_addr_with_container: "matrix-corporal:41081" | matrix_nginx_proxy_proxy_matrix_corporal_api_addr_with_container: "matrix-corporal:41081" | ||||
| @@ -1634,6 +1635,8 @@ matrix_nginx_proxy_systemd_wanted_services_list: | | |||||
| + | + | ||||
| (['matrix-sygnal.service'] if matrix_sygnal_enabled else []) | (['matrix-sygnal.service'] if matrix_sygnal_enabled else []) | ||||
| + | + | ||||
| (['matrix-ntfy.service'] if matrix_ntfy_enabled else []) | |||||
| + | |||||
| (['matrix-jitsi.service'] if matrix_jitsi_enabled else []) | (['matrix-jitsi.service'] if matrix_jitsi_enabled else []) | ||||
| + | + | ||||
| (['matrix-bot-go-neb.service'] if matrix_bot_go_neb_enabled else []) | (['matrix-bot-go-neb.service'] if matrix_bot_go_neb_enabled else []) | ||||
| @@ -1667,6 +1670,8 @@ matrix_ssl_domains_to_obtain_certificates_for: | | |||||
| + | + | ||||
| ([matrix_server_fqn_sygnal] if matrix_sygnal_enabled else []) | ([matrix_server_fqn_sygnal] if matrix_sygnal_enabled else []) | ||||
| + | + | ||||
| ([matrix_server_fqn_ntfy] if matrix_ntfy_enabled else []) | |||||
| + | |||||
| ([matrix_domain] if matrix_nginx_proxy_base_domain_serving_enabled else []) | ([matrix_domain] if matrix_nginx_proxy_base_domain_serving_enabled else []) | ||||
| + | + | ||||
| matrix_ssl_additional_domains_to_obtain_certificates_for | matrix_ssl_additional_domains_to_obtain_certificates_for | ||||
| @@ -1960,6 +1965,20 @@ matrix_sygnal_container_http_host_bind_port: "{{ '' if matrix_nginx_proxy_enable | |||||
| # | # | ||||
| ###################################################################### | ###################################################################### | ||||
| ###################################################################### | |||||
| # | |||||
| # matrix-ntfy | |||||
| # | |||||
| ###################################################################### | |||||
| matrix_ntfy_enabled: false | |||||
| ###################################################################### | |||||
| # | |||||
| # /matrix-ntfy | |||||
| # | |||||
| ###################################################################### | |||||
| ###################################################################### | ###################################################################### | ||||
| # | # | ||||
| # matrix-redis | # matrix-redis | ||||
| @@ -59,6 +59,9 @@ matrix_server_fqn_grafana: "stats.{{ matrix_domain }}" | |||||
| # This is where you access the Sygnal push gateway. | # This is where you access the Sygnal push gateway. | ||||
| matrix_server_fqn_sygnal: "sygnal.{{ matrix_domain }}" | matrix_server_fqn_sygnal: "sygnal.{{ matrix_domain }}" | ||||
| # This is where you access the ntfy push notification service. | |||||
| matrix_server_fqn_ntfy: "ntfy.{{ matrix_domain }}" | |||||
| matrix_federation_public_port: 8448 | matrix_federation_public_port: 8448 | ||||
| # The architecture that your server runs. | # The architecture that your server runs. | ||||
| @@ -192,6 +192,10 @@ matrix_nginx_proxy_proxy_grafana_hostname: "{{ matrix_server_fqn_grafana }}" | |||||
| matrix_nginx_proxy_proxy_sygnal_enabled: false | matrix_nginx_proxy_proxy_sygnal_enabled: false | ||||
| matrix_nginx_proxy_proxy_sygnal_hostname: "{{ matrix_server_fqn_sygnal }}" | matrix_nginx_proxy_proxy_sygnal_hostname: "{{ matrix_server_fqn_sygnal }}" | ||||
| # Controls whether proxying the ntfy domain should be done. | |||||
| matrix_nginx_proxy_proxy_ntfy_enabled: false | |||||
| matrix_nginx_proxy_proxy_ntfy_hostname: "{{ matrix_server_fqn_ntfy }}" | |||||
| # Controls whether proxying for (Prometheus) metrics (`/metrics/*`) for the various services should be done (on the matrix domain) | # Controls whether proxying for (Prometheus) metrics (`/metrics/*`) for the various services should be done (on the matrix domain) | ||||
| # If the internal Prometheus server (`matrix-prometheus` role) is used, proxying is not necessary, since Prometheus can access each container directly. | # If the internal Prometheus server (`matrix-prometheus` role) is used, proxying is not necessary, since Prometheus can access each container directly. | ||||
| # This is only useful when an external Prometheus will be collecting metrics. | # This is only useful when an external Prometheus will be collecting metrics. | ||||
| @@ -365,6 +369,9 @@ matrix_nginx_proxy_proxy_grafana_additional_server_configuration_blocks: [] | |||||
| # A list of strings containing additional configuration blocks to add to Sygnal's server configuration (matrix-sygnal.conf). | # A list of strings containing additional configuration blocks to add to Sygnal's server configuration (matrix-sygnal.conf). | ||||
| matrix_nginx_proxy_proxy_sygnal_additional_server_configuration_blocks: [] | matrix_nginx_proxy_proxy_sygnal_additional_server_configuration_blocks: [] | ||||
| # A list of strings containing additional configuration blocks to add to ntfy's server configuration (matrix-ntfy.conf). | |||||
| matrix_nginx_proxy_proxy_ntfy_additional_server_configuration_blocks: [] | |||||
| # A list of strings containing additional configuration blocks to add to the base domain server configuration (matrix-base-domain.conf). | # A list of strings containing additional configuration blocks to add to the base domain server configuration (matrix-base-domain.conf). | ||||
| matrix_nginx_proxy_proxy_domain_additional_server_configuration_blocks: [] | matrix_nginx_proxy_proxy_domain_additional_server_configuration_blocks: [] | ||||
| @@ -138,6 +138,13 @@ | |||||
| mode: 0644 | mode: 0644 | ||||
| when: matrix_nginx_proxy_proxy_sygnal_enabled|bool | when: matrix_nginx_proxy_proxy_sygnal_enabled|bool | ||||
| - name: Ensure Matrix nginx-proxy configuration for ntfy domain exists | |||||
| template: | |||||
| src: "{{ role_path }}/templates/nginx/conf.d/matrix-ntfy.conf.j2" | |||||
| dest: "{{ matrix_nginx_proxy_confd_path }}/matrix-ntfy.conf" | |||||
| mode: 0644 | |||||
| when: matrix_nginx_proxy_proxy_ntfy_enabled|bool | |||||
| - name: Ensure Matrix nginx-proxy configuration for Matrix domain exists | - name: Ensure Matrix nginx-proxy configuration for Matrix domain exists | ||||
| template: | template: | ||||
| src: "{{ role_path }}/templates/nginx/conf.d/matrix-domain.conf.j2" | src: "{{ role_path }}/templates/nginx/conf.d/matrix-domain.conf.j2" | ||||
| @@ -288,6 +295,12 @@ | |||||
| state: absent | state: absent | ||||
| when: "not matrix_nginx_proxy_proxy_sygnal_enabled|bool" | when: "not matrix_nginx_proxy_proxy_sygnal_enabled|bool" | ||||
| - name: Ensure Matrix nginx-proxy configuration for ntfy domain deleted | |||||
| file: | |||||
| path: "{{ matrix_nginx_proxy_confd_path }}/matrix-ntfy.conf" | |||||
| state: absent | |||||
| when: "not matrix_nginx_proxy_proxy_ntfy_enabled|bool" | |||||
| - name: Ensure Matrix nginx-proxy homepage for base domain deleted | - name: Ensure Matrix nginx-proxy homepage for base domain deleted | ||||
| file: | file: | ||||
| path: "{{ matrix_nginx_proxy_data_path }}/matrix-domain/index.html" | path: "{{ matrix_nginx_proxy_data_path }}/matrix-domain/index.html" | ||||
| @@ -0,0 +1,102 @@ | |||||
| #jinja2: lstrip_blocks: "True" | |||||
| {% macro render_vhost_directives() %} | |||||
| gzip on; | |||||
| gzip_types text/plain application/json application/javascript text/css image/x-icon font/ttf image/gif; | |||||
| {% if matrix_nginx_proxy_hsts_preload_enabled %} | |||||
| add_header Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" always; | |||||
| {% else %} | |||||
| add_header Strict-Transport-Security "max-age=31536000; includeSubDomains" always; | |||||
| {% endif %} | |||||
| add_header X-XSS-Protection "{{ matrix_nginx_proxy_xss_protection }}"; | |||||
| add_header X-Content-Type-Options nosniff; | |||||
| add_header X-Frame-Options DENY; | |||||
| {% for configuration_block in matrix_nginx_proxy_proxy_ntfy_additional_server_configuration_blocks %} | |||||
| {{- configuration_block }} | |||||
| {% endfor %} | |||||
| location / { | |||||
| {% if matrix_nginx_proxy_enabled %} | |||||
| {# Use the embedded DNS resolver in Docker containers to discover the service #} | |||||
| resolver 127.0.0.11 valid=5s; | |||||
| set $backend "matrix-ntfy:80"; | |||||
| proxy_pass http://$backend; | |||||
| {% else %} | |||||
| {# Generic configuration for use outside of our container setup #} | |||||
| proxy_pass http://127.0.0.1:80; | |||||
| {% endif %} | |||||
| proxy_set_header Upgrade $http_upgrade; | |||||
| proxy_set_header Connection "upgrade"; | |||||
| proxy_set_header Host $host; | |||||
| proxy_set_header X-Forwarded-For {{ matrix_nginx_proxy_x_forwarded_for }}; | |||||
| proxy_set_header X-Forwarded-Proto {{ matrix_nginx_proxy_x_forwarded_proto_value }}; | |||||
| } | |||||
| {% endmacro %} | |||||
| server { | |||||
| listen {{ 8080 if matrix_nginx_proxy_enabled else 80 }}; | |||||
| listen [::]:{{ 8080 if matrix_nginx_proxy_enabled else 80 }}; | |||||
| server_name {{ matrix_nginx_proxy_proxy_ntfy_hostname }}; | |||||
| server_tokens off; | |||||
| root /dev/null; | |||||
| {% if matrix_nginx_proxy_https_enabled %} | |||||
| location /.well-known/acme-challenge { | |||||
| {% if matrix_nginx_proxy_enabled %} | |||||
| {# Use the embedded DNS resolver in Docker containers to discover the service #} | |||||
| resolver 127.0.0.11 valid=5s; | |||||
| set $backend "matrix-certbot:8080"; | |||||
| proxy_pass http://$backend; | |||||
| {% else %} | |||||
| {# Generic configuration for use outside of our container setup #} | |||||
| proxy_pass http://127.0.0.1:{{ matrix_ssl_lets_encrypt_certbot_standalone_http_port }}; | |||||
| {% endif %} | |||||
| } | |||||
| location / { | |||||
| return 301 https://$http_host$request_uri; | |||||
| } | |||||
| {% else %} | |||||
| {{ render_vhost_directives() }} | |||||
| {% endif %} | |||||
| } | |||||
| {% if matrix_nginx_proxy_https_enabled %} | |||||
| server { | |||||
| listen {{ 8443 if matrix_nginx_proxy_enabled else 443 }} ssl http2; | |||||
| listen [::]:{{ 8443 if matrix_nginx_proxy_enabled else 443 }} ssl http2; | |||||
| server_name {{ matrix_nginx_proxy_proxy_ntfy_hostname }}; | |||||
| server_tokens off; | |||||
| root /dev/null; | |||||
| ssl_certificate {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_ntfy_hostname }}/fullchain.pem; | |||||
| ssl_certificate_key {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_ntfy_hostname }}/privkey.pem; | |||||
| ssl_protocols {{ matrix_nginx_proxy_ssl_protocols }}; | |||||
| {% if matrix_nginx_proxy_ssl_ciphers != '' %} | |||||
| ssl_ciphers {{ matrix_nginx_proxy_ssl_ciphers }}; | |||||
| {% endif %} | |||||
| ssl_prefer_server_ciphers {{ matrix_nginx_proxy_ssl_prefer_server_ciphers }}; | |||||
| {% if matrix_nginx_proxy_ocsp_stapling_enabled %} | |||||
| ssl_stapling on; | |||||
| ssl_stapling_verify on; | |||||
| ssl_trusted_certificate {{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_ntfy_hostname }}/chain.pem; | |||||
| {% endif %} | |||||
| {% if matrix_nginx_proxy_ssl_session_tickets_off %} | |||||
| ssl_session_tickets off; | |||||
| {% endif %} | |||||
| ssl_session_cache {{ matrix_nginx_proxy_ssl_session_cache }}; | |||||
| ssl_session_timeout {{ matrix_nginx_proxy_ssl_session_timeout }}; | |||||
| {{ render_vhost_directives() }} | |||||
| } | |||||
| {% endif %} | |||||
| @@ -0,0 +1,46 @@ | |||||
| --- | |||||
| matrix_ntfy_enabled: true | |||||
| matrix_ntfy_base_path: "{{ matrix_base_data_path }}/ntfy" | |||||
| matrix_ntfy_config_dir_path: "{{ matrix_ntfy_base_path }}/config" | |||||
| matrix_ntfy_data_path: "{{ matrix_ntfy_base_path }}/data" | |||||
| matrix_ntfy_version: v1.27.2 | |||||
| matrix_ntfy_docker_image: "{{ matrix_container_global_registry_prefix }}binwiederhier/ntfy:{{ matrix_ntfy_version }}" | |||||
| matrix_ntfy_docker_image_force_pull: "{{ matrix_ntfy_docker_image.endswith(':latest') }}" | |||||
| # Public facing base URL of the ntfy service | |||||
| matrix_ntfy_base_url: "https://{{ matrix_server_fqn_ntfy }}" | |||||
| # Controls whether the container exposes its HTTP port (tcp/8080 in the container). | |||||
| # | |||||
| # Takes an "<ip>:<port>" or "<port>" value (e.g. "127.0.0.1:8768"), or empty string to not expose. | |||||
| matrix_ntfy_container_http_host_bind_port: '' | |||||
| # A list of extra arguments to pass to the container (`docker run` command) | |||||
| matrix_ntfy_container_extra_arguments: [] | |||||
| # Controls whether the self-check feature should validate SSL certificates. | |||||
| matrix_ntfy_self_check_validate_certificates: true | |||||
| # Default ntfy configuration template which covers the generic use case. | |||||
| # You can customize it by controlling the various variables inside it. | |||||
| # | |||||
| # For a more advanced customization, you can extend the default (see `matrix_ntfy_configuration_extension_yaml`) | |||||
| # or completely replace this variable with your own template. | |||||
| matrix_ntfy_configuration_yaml: "{{ lookup('template', 'templates/ntfy/server.yml.j2') }}" | |||||
| matrix_ntfy_configuration_extension_yaml: | | |||||
| # Your custom YAML configuration for ntfy goes here. | |||||
| # This configuration extends the default starting configuration (`matrix_ntfy_configuration_yaml`). | |||||
| # | |||||
| # You can override individual variables from the default configuration, or introduce new ones. | |||||
| # | |||||
| # If you need something more special, you can take full control by | |||||
| # completely redefining `matrix_ntfy_configuration_yaml`. | |||||
| matrix_ntfy_configuration_extension: "{{ matrix_ntfy_configuration_extension_yaml|from_yaml if matrix_ntfy_configuration_extension_yaml|from_yaml is mapping else {} }}" | |||||
| # Holds the final ntfy configuration (a combination of the default and its extension). | |||||
| # You most likely don't need to touch this variable. Instead, see `matrix_ntfy_configuration_yaml`. | |||||
| matrix_ntfy_configuration: "{{ matrix_ntfy_configuration_yaml|from_yaml|combine(matrix_ntfy_configuration_extension, recursive=True) }}" | |||||
| @@ -0,0 +1,5 @@ | |||||
| --- | |||||
| - set_fact: | |||||
| matrix_systemd_services_list: "{{ matrix_systemd_services_list + ['matrix-ntfy.service'] }}" | |||||
| when: matrix_ntfy_enabled|bool | |||||
| @@ -0,0 +1,24 @@ | |||||
| --- | |||||
| - import_tasks: "{{ role_path }}/tasks/init.yml" | |||||
| tags: | |||||
| - always | |||||
| - import_tasks: "{{ role_path }}/tasks/setup_install.yml" | |||||
| when: "run_setup|bool and matrix_ntfy_enabled|bool" | |||||
| tags: | |||||
| - setup-all | |||||
| - setup-ntfy | |||||
| - import_tasks: "{{ role_path }}/tasks/setup_uninstall.yml" | |||||
| when: "run_setup|bool and not matrix_ntfy_enabled|bool" | |||||
| tags: | |||||
| - setup-all | |||||
| - setup-ntfy | |||||
| - import_tasks: "{{ role_path }}/tasks/self_check.yml" | |||||
| delegate_to: 127.0.0.1 | |||||
| become: false | |||||
| when: "run_self_check|bool and matrix_ntfy_enabled|bool" | |||||
| tags: | |||||
| - self-check | |||||
| @@ -0,0 +1,25 @@ | |||||
| --- | |||||
| # Query an arbitrary ntfy topic using ntfy's UnifiedPush topic name syntax. | |||||
| # Expect an empty response (because we query 'since=1s'). | |||||
| - set_fact: | |||||
| matrix_ntfy_url_endpoint_public: "{{ matrix_ntfy_base_url }}/upSELFCHECK123/json?poll=1&since=1s" | |||||
| - name: Check ntfy | |||||
| uri: | |||||
| url: "{{ matrix_ntfy_url_endpoint_public }}" | |||||
| follow_redirects: none | |||||
| validate_certs: "{{ matrix_ntfy_self_check_validate_certificates }}" | |||||
| register: matrix_ntfy_self_check_result | |||||
| check_mode: false | |||||
| ignore_errors: true | |||||
| - name: Fail if ntfy not working | |||||
| fail: | |||||
| msg: "Failed checking ntfy is up at `{{ matrix_server_fqn_ntfy }}` (checked endpoint: `{{ matrix_ntfy_url_endpoint_public }}`). Is ntfy running? Is port 443 open in your firewall? Full error: {{ matrix_ntfy_self_check_result }}" | |||||
| when: "matrix_ntfy_self_check_result.failed" | |||||
| - name: Report working ntfy | |||||
| debug: | |||||
| msg: "ntfy at `{{ matrix_server_fqn_ntfy }}` is working (checked endpoint: `{{ matrix_ntfy_url_endpoint_public }}`)" | |||||
| @@ -0,0 +1,44 @@ | |||||
| --- | |||||
| - name: Ensure matrix-ntfy image is pulled | |||||
| docker_image: | |||||
| name: "{{ matrix_ntfy_docker_image }}" | |||||
| source: "{{ 'pull' if ansible_version.major > 2 or ansible_version.minor > 7 else omit }}" | |||||
| force_source: "{{ matrix_ntfy_docker_image_force_pull if ansible_version.major > 2 or ansible_version.minor >= 8 else omit }}" | |||||
| force: "{{ omit if ansible_version.major > 2 or ansible_version.minor >= 8 else matrix_ntfy_docker_image_force_pull }}" | |||||
| register: result | |||||
| retries: "{{ matrix_container_retries_count }}" | |||||
| delay: "{{ matrix_container_retries_delay }}" | |||||
| until: result is not failed | |||||
| - name: Ensure matrix-ntfy paths exists | |||||
| file: | |||||
| path: "{{ item }}" | |||||
| state: directory | |||||
| mode: 0750 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| with_items: | |||||
| - "{{ matrix_ntfy_base_path }}" | |||||
| - "{{ matrix_ntfy_config_dir_path }}" | |||||
| - "{{ matrix_ntfy_data_path }}" | |||||
| - name: Ensure matrix-ntfy config installed | |||||
| copy: | |||||
| content: "{{ matrix_ntfy_configuration|to_nice_yaml(indent=2, width=999999) }}" | |||||
| dest: "{{ matrix_ntfy_config_dir_path }}/server.yml" | |||||
| mode: 0644 | |||||
| owner: "{{ matrix_user_username }}" | |||||
| group: "{{ matrix_user_groupname }}" | |||||
| - name: Ensure matrix-ntfy.service installed | |||||
| template: | |||||
| src: "{{ role_path }}/templates/systemd/matrix-ntfy.service.j2" | |||||
| dest: "{{ matrix_systemd_path }}/matrix-ntfy.service" | |||||
| mode: 0644 | |||||
| register: matrix_ntfy_systemd_service_result | |||||
| - name: Ensure systemd reloaded after matrix-ntfy.service installation | |||||
| service: | |||||
| daemon_reload: true | |||||
| when: "matrix_ntfy_systemd_service_result.changed" | |||||
| @@ -0,0 +1,36 @@ | |||||
| --- | |||||
| - name: Check existence of matrix-ntfy service | |||||
| stat: | |||||
| path: "{{ matrix_systemd_path }}/matrix-ntfy.service" | |||||
| register: matrix_ntfy_service_stat | |||||
| - name: Ensure matrix-ntfy is stopped | |||||
| service: | |||||
| name: matrix-ntfy | |||||
| state: stopped | |||||
| enabled: false | |||||
| daemon_reload: true | |||||
| register: stopping_result | |||||
| when: "matrix_ntfy_service_stat.stat.exists" | |||||
| - name: Ensure matrix-ntfy.service doesn't exist | |||||
| file: | |||||
| path: "{{ matrix_systemd_path }}/matrix-ntfy.service" | |||||
| state: absent | |||||
| when: "matrix_ntfy_service_stat.stat.exists" | |||||
| - name: Ensure systemd reloaded after matrix-ntfy.service removal | |||||
| service: | |||||
| daemon_reload: true | |||||
| when: "matrix_ntfy_service_stat.stat.exists" | |||||
| - name: Ensure matrix-ntfy path doesn't exist | |||||
| file: | |||||
| path: "{{ matrix_ntfy_base_path }}" | |||||
| state: absent | |||||
| - name: Ensure ntfy Docker image doesn't exist | |||||
| docker_image: | |||||
| name: "{{ matrix_ntfy_docker_image }}" | |||||
| state: absent | |||||
| @@ -0,0 +1,3 @@ | |||||
| base_url: {{ matrix_ntfy_base_url }} | |||||
| behind_proxy: true | |||||
| cache_file: /data/cache.db | |||||
| @@ -0,0 +1,38 @@ | |||||
| #jinja2: lstrip_blocks: "True" | |||||
| [Unit] | |||||
| Description=matrix-ntfy | |||||
| After=docker.service | |||||
| Requires=docker.service | |||||
| DefaultDependencies=no | |||||
| [Service] | |||||
| Type=simple | |||||
| Environment="HOME={{ matrix_systemd_unit_home_path }}" | |||||
| ExecStartPre=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-ntfy 2>/dev/null || true' | |||||
| ExecStartPre=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-ntfy 2>/dev/null || true' | |||||
| ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-ntfy \ | |||||
| --log-driver=none \ | |||||
| --user={{ matrix_user_uid }}:{{ matrix_user_gid }} \ | |||||
| --cap-drop=ALL \ | |||||
| --read-only \ | |||||
| {% for arg in matrix_ntfy_container_extra_arguments %} | |||||
| {{ arg }} \ | |||||
| {% endfor %} | |||||
| --network={{ matrix_docker_network }} \ | |||||
| {% if matrix_ntfy_container_http_host_bind_port %} | |||||
| -p {{ matrix_ntfy_container_http_host_bind_port }}:80 \ | |||||
| {% endif %} | |||||
| --mount type=bind,src={{ matrix_ntfy_config_dir_path }},dst=/etc/ntfy,ro \ | |||||
| --mount type=bind,src={{ matrix_ntfy_data_path }},dst=/data \ | |||||
| {{ matrix_ntfy_docker_image }} \ | |||||
| serve | |||||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-ntfy 2>/dev/null || true' | |||||
| ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-ntfy 2>/dev/null || true' | |||||
| Restart=always | |||||
| RestartSec=30 | |||||
| SyslogIdentifier=matrix-ntfy | |||||
| [Install] | |||||
| WantedBy=multi-user.target | |||||
| @@ -60,6 +60,7 @@ | |||||
| - matrix-etherpad | - matrix-etherpad | ||||
| - matrix-email2matrix | - matrix-email2matrix | ||||
| - matrix-sygnal | - matrix-sygnal | ||||
| - matrix-ntfy | |||||
| - matrix-nginx-proxy | - matrix-nginx-proxy | ||||
| - matrix-coturn | - matrix-coturn | ||||
| - matrix-aux | - matrix-aux | ||||