Slavi Pantaleev
38904c08b0
Wire backup_borg_username
It's probably unnecessary, as this user is only used in the borg container
internally, but.. It doesn't hurt to set it to `matrix`.
3 lat temu
Slavi Pantaleev
78c35136b2
Replace matrix-backup-borg with an external role
3 lat temu
td
af10d350bc
fix: missing endif in client well-known
3 lat temu
Jayesh Nirve
6939a3d6d3
fix: only add element related entries to client well-known if element is enabled ( #2453 )
* fix: only add element related entries to client well-known if element is enabled
* Fix matrix-base/defaults/main.yml syntax
---------
Co-authored-by: Slavi Pantaleev <slavi@devture.com>
3 lat temu
Array in a Matrix
79413e7717
updated dendrite
3 lat temu
Catalan Lover
cba63bd4b9
Upgrade Drapunir from 1.8.0 Beta to 1.8.0 release.
3 lat temu
Slavi Pantaleev
6b0650641b
Update matrix_playbook_reverse_proxy_type documentation
3 lat temu
Slavi Pantaleev
8309a21303
Rename reverse proxy types and fix Hookshot http/https urlPrefix issue
3 lat temu
Slavi Pantaleev
ad22bdb884
Do not run matrix-user-verification-service validation tasks unless the service is enabled
3 lat temu
Slavi Pantaleev
7142ff422d
Ensure matrix_user_verification_service_uvs_access_token is always defined
The playbook tries to avoid such variables which are sometimes defined
and sometimes not. We'd rather not check for `is defined`.
3 lat temu
Slavi Pantaleev
97f65e8dff
Minor fixes to allow for Traefik without SSL
3 lat temu
Aine
a1ef28681a
Update Hydrogen 0.3.6 -> 0.3.7
3 lat temu
Slavi Pantaleev
28d2eb593c
Add matrix_playbook_reverse_proxy_type variable which influences all other services
3 lat temu
Slavi Pantaleev
f6ab162fff
Remove systemd-reloading handler in matrix-user-verification-service
None of the other roles use handlers.
We rely on com.devture.ansible.role.systemd_service_manager to reload services when it's necessary to do so.
3 lat temu
Slavi Pantaleev
e1bfa2a7d6
Fix ansible-lint-reported errors
3 lat temu
Slavi Pantaleev
43a6a035a0
Skip removing /.well-known/element directory to suppress ansible-lint error
Leaving an orphan directory is okay and can be improved later on.
3 lat temu
ntallasv
f71cd3a760
fix linting in validate_config.yml
3 lat temu
ntallasv
b738486684
update validate_config.yml
3 lat temu
Aine
d32f80bf29
Update postmoogle 0.9.11 -> 0.9.12
* fix uploads from incoming emails into matrix threads
* fix emails dequeue (account data cleanup)
* rewrite recipients handling (Cc, To, etc.)
3 lat temu
ntallasv
9615855cfa
update matrix-chatgpt-bot
3 lat temu
Catalan Lover
ddcb1735e2
Add draupnir as valid prefix to resolve a bug
Current draupnir does not listen to its name. This config change fixes this bug. This bodge is able to be removed once this is fixed upstream.
3 lat temu
Catalan Lover
a717590aa5
Rename systemd service file from mjolnir to draupnir
3 lat temu
Catalan Lover
9092d4bb6b
Push draupnir version from develop to v1.80.0-beta.0
3 lat temu
Catalan Lover
78b1ebd5af
commit main.yml for draupnir and set target ver to develop
3 lat temu
Catalan Lover
563cf1a4ba
Initial commit for draupnir.
main.yml is not included due to that its changed separately.
3 lat temu
Slavi Pantaleev
49a1985750
Fix Postmoogle systemd service description
3 lat temu
Slavi Pantaleev
d44d4b637f
Allow Coturn to work with SSL certificates extracted from Traefik
3 lat temu
Aine
2eb2ad0ad7
Update heisenbridge 1.14.1 -> 1.14.2
3 lat temu
Slavi Pantaleev
2b9061a5d3
Add support for reverse-proxying the base domain via Traefik
3 lat temu
Slavi Pantaleev
6c17671abd
Upgrade synapse-admin (0.8.6 -> 0.8.7) and drop reverse-proxy workaround
Related to 6a31fba346d9da434, 6a31fba346 .
Related to https://github.com/Awesome-Technologies/synapse-admin/issues/322
3 lat temu
Slavi Pantaleev
66baef5bf6
Fix matrix-synapse-reverse-proxy-companion.service stopping during uninstallation
Fixes https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/2444
3 lat temu
jakicoll
6a205a83f6
Change renamed variables matrix_systemd_path -> devture_systemd_docker_base_systemd_path
3 lat temu
jakicoll
6cffec14ea
fixup! Remove the self-build stub, because self-build was not implemented
3 lat temu
jakicoll
be634168ac
Make the linter happy.
3 lat temu
jakicoll
f3ca4a0632
Remove unnecessary comment.
3 lat temu
jakicoll
7848d865a5
Also define the vars to be overwritten in group vars within the role vars.
3 lat temu
Paul N
70bea81df7
Introduced flags to (1) enable/disable Auth (2) enable/disable openid_server_name pinning. Updated validate_config.yml and added new checks to verify.
3 lat temu
Paul N
96dd86d33b
Set default values where sensible and remove unnecessary conditionals in .env.j2.
Check for empty string instead of Null to verify if an openid_server_name is pinned.
3 lat temu
jakicoll
6b206b3763
Move checks into validate_config.yml.
3 lat temu
jakicoll
6499b6536a
Decoupling: Do not use variables user-verification-service role inside the jitsi role.
3 lat temu
Paul N
50c1e9d695
Set matrix_user_verification_service_uvs_homeserver_url in the role defaults and updated docs accordingly.
3 lat temu
jakicoll
0e0ae2f3e6
Assign default log level in role instead of matrix_servers file.
3 lat temu
jakicoll
bf5e633656
Remove the self-build stub, because self-build was not implemented
3 lat temu
Paul N
b89f5b7ff5
Clarify task name and add user and group to templated env file
Co-authored-by: Slavi Pantaleev <slavi@devture.com>
3 lat temu
Jakob S
6913d368c8
Consolidate conditionals into a block, keep image
Co-authored-by: Slavi Pantaleev <slavi@devture.com>
3 lat temu
Slavi Pantaleev
8155f780e5
Add support for reverse-proxying Matric (Client & Federation) via Traefik
3 lat temu
Slavi Pantaleev
f983604695
Initial work on Traefik support
This gets us started on adding a Traefik role and hooking Traefik:
- directly to services which support Traefik - we only have a few of
these right now, but the list will grow
- to matrix-nginx-proxy for most services that integrate with
matrix-nginx-proxy right now
Traefik usage should be disabled by default for now and nothing should
change for people just yet.
Enabling these experiments requires additional configuration like this:
```yaml
devture_traefik_ssl_email_address: '.....'
matrix_playbook_traefik_role_enabled: true
matrix_playbook_traefik_labels_enabled: true
matrix_ssl_retrieval_method: none
matrix_nginx_proxy_https_enabled: false
matrix_nginx_proxy_container_http_host_bind_port: ''
matrix_nginx_proxy_container_federation_host_bind_port: ''
matrix_nginx_proxy_trust_forwarded_proto: true
matrix_nginx_proxy_x_forwarded_for: '$proxy_add_x_forwarded_for'
matrix_coturn_enabled: false
```
What currently works is:
reverse-proxying for all nginx-proxy based services **except** for the Matrix homeserver
(both Client-Server an Federation traffic for the homeserver don't work yet)
3 lat temu
Slavi Pantaleev
4d6a8d049d
Add matrix_nginx_proxy_container_network variable
3 lat temu
Slavi Pantaleev
e018663ba4
Attach ma1sd/nginx-proxy/synapse-reverse-proxy-companion to additional networks in a better way
Switching from doing "post-start" loop hacks to running the container
in 3 steps: `create` + potentially connect to additional networks + `start`.
This way, the container would be connected to all its networks even at
the very beginning of its life.
3 lat temu
Slavi Pantaleev
be78b74fbd
Switch from matrix-prometheus-postgres-exporter to an external prometheus_postgres_exporter role
3 lat temu