Matrix Docker Ansible eploy
Non puoi selezionare più di 25 argomenti Gli argomenti devono iniziare con una lettera o un numero, possono includere trattini ('-') e possono essere lunghi fino a 35 caratteri.
 
 

319 righe
18 KiB

  1. ---
  2. # The bare domain name which represents your Matrix identity.
  3. # Matrix user ids for your server will be of the form (`@user:<matrix-domain>`).
  4. #
  5. # Note: this playbook does not touch the server referenced here.
  6. # Installation happens on another server ("matrix.<matrix-domain>", see `matrix_server_fqn_matrix`).
  7. #
  8. # Example value: example.com
  9. matrix_domain: ~
  10. # The optional matrix admin MXID, used in bridges' configs to set bridge admin user
  11. # Example value: "@someone:{{ matrix_domain }}"
  12. matrix_admin: ''
  13. # Global var to enable/disable encryption across all bridges with encryption support
  14. matrix_bridges_encryption_enabled: false
  15. # Global var to enable/disable relay mode across all bridges with relay mode support
  16. matrix_bridges_relay_enabled: false
  17. # A container network where all addon services (bridges, bots, etc.) would live.
  18. matrix_addons_container_network: matrix-addons
  19. # The container network that the homeserver lives on and addon services (bridges, bots, etc.) should be connected to
  20. matrix_addons_homeserver_container_network: "{{ matrix_homeserver_container_network }}"
  21. # The URL where addon services (bridges, bots, etc.) can reach the homeserver.
  22. # By default, this is configured to go directly to the homeserver, but the playbook may
  23. # override it to go through an intermediary service.
  24. matrix_addons_homeserver_client_api_url: "{{ matrix_homeserver_container_url }}"
  25. # The systemd services (representing the homeserver) that addon services (bridges, bots, etc.) should depend on
  26. matrix_addons_homeserver_systemd_services_list: "{{ matrix_homeserver_systemd_services_list }}"
  27. # A container network where all monitoring services would live.
  28. matrix_monitoring_container_network: matrix-monitoring
  29. # matrix_homeserver_enabled controls whether to enable the homeserver systemd service, etc.
  30. #
  31. # Unless you're wrapping this playbook in another one
  32. # where you optionally wish to disable homeserver integration, you don't need to use this.
  33. #
  34. # Note: disabling this does not mean that a homeserver won't get installed.
  35. # Whether homeserver software is installed depends on other (`matrix_HOMESERVER_enabled`) variables - see `group_vars/matrix_servers`.
  36. matrix_homeserver_enabled: true
  37. # This will contain the homeserver implementation that is in use.
  38. # Valid values: synapse, dendrite, conduit
  39. #
  40. # By default, we use Synapse, because it's the only full-featured Matrix server at the moment.
  41. #
  42. # This value automatically influences other variables (`matrix_synapse_enabled`, `matrix_dendrite_enabled`, etc.).
  43. # The homeserver implementation of an existing server cannot be changed without data loss.
  44. matrix_homeserver_implementation: synapse
  45. # This contains a secret, which is used for generating various other secrets later on.
  46. matrix_homeserver_generic_secret_key: ''
  47. # This is where your data lives and what we set up.
  48. # This and the Element FQN (see below) are expected to be on the same server.
  49. matrix_server_fqn_matrix: "matrix.{{ matrix_domain }}"
  50. # This is where you access federation API.
  51. matrix_server_fqn_matrix_federation: '{{ matrix_server_fqn_matrix }}'
  52. # This is where you access the Element web UI from (if enabled via matrix_client_element_enabled; enabled by default).
  53. # This and the Matrix FQN (see above) are expected to be on the same server.
  54. matrix_server_fqn_element: "element.{{ matrix_domain }}"
  55. # This is where you access the Hydrogen web client from (if enabled via matrix_client_hydrogen_enabled; disabled by default).
  56. matrix_server_fqn_hydrogen: "hydrogen.{{ matrix_domain }}"
  57. # This is where you access the Cinny web client from (if enabled via matrix_client_cinny_enabled; disabled by default).
  58. matrix_server_fqn_cinny: "cinny.{{ matrix_domain }}"
  59. # This is where you access the schildichat web client from (if enabled via matrix_client_schildichat_enabled; disabled by default).
  60. matrix_server_fqn_schildichat: "schildichat.{{ matrix_domain }}"
  61. # This is where you access the buscarron bot from (if enabled via matrix_bot_buscarron_enabled; disabled by default).
  62. matrix_server_fqn_buscarron: "buscarron.{{ matrix_domain }}"
  63. # This is where you access the Dimension.
  64. matrix_server_fqn_dimension: "dimension.{{ matrix_domain }}"
  65. # This is where you access the etherpad (if enabled via etherpad_enabled; disabled by default).
  66. matrix_server_fqn_etherpad: "etherpad.{{ matrix_domain }}"
  67. # For use with Go-NEB! (github callback url for example)
  68. matrix_server_fqn_bot_go_neb: "goneb.{{ matrix_domain }}"
  69. # This is where you access Jitsi.
  70. matrix_server_fqn_jitsi: "jitsi.{{ matrix_domain }}"
  71. # This is where you access Grafana.
  72. matrix_server_fqn_grafana: "stats.{{ matrix_domain }}"
  73. # This is where you access the Sygnal push gateway.
  74. matrix_server_fqn_sygnal: "sygnal.{{ matrix_domain }}"
  75. # This is where you access the mautrix wsproxy push gateway.
  76. matrix_server_fqn_mautrix_wsproxy: "wsproxy.{{ matrix_domain }}"
  77. # This is where you access the ntfy push notification service.
  78. matrix_server_fqn_ntfy: "ntfy.{{ matrix_domain }}"
  79. # This is where you access rageshake.
  80. matrix_server_fqn_rageshake: "rageshake.{{ matrix_domain }}"
  81. matrix_federation_public_port: 8448
  82. # The name of the Traefik entrypoint for handling Matrix Federation
  83. # Also see the `matrix_playbook_public_matrix_federation_api_traefik_entrypoint_*` variables.
  84. matrix_federation_traefik_entrypoint: matrix-federation
  85. # The architecture that your server runs.
  86. # Recognized values by us are 'amd64', 'arm32' and 'arm64'.
  87. # Not all architectures support all services, so your experience (on non-amd64) may vary.
  88. # See docs/alternative-architectures.md
  89. matrix_architecture: "{{ 'amd64' if ansible_architecture == 'x86_64' else ('arm64' if ansible_architecture == 'aarch64' else ('arm32' if ansible_architecture.startswith('armv') else '')) }}"
  90. # The architecture for Debian packages.
  91. # See: https://wiki.debian.org/SupportedArchitectures
  92. # We just remap from our `matrix_architecture` values to what Debian and possibly other distros call things.
  93. matrix_debian_arch: "{{ 'armhf' if matrix_architecture == 'arm32' else matrix_architecture }}"
  94. matrix_container_global_registry_prefix: "docker.io/"
  95. matrix_user_username: "matrix"
  96. matrix_user_groupname: "matrix"
  97. # By default, the playbook creates the user (`matrix_user_username`)
  98. # and group (`matrix_user_groupname`) with a random id.
  99. # To use a specific user/group id, override these variables.
  100. matrix_user_uid: ~
  101. matrix_user_gid: ~
  102. matrix_base_data_path: "/matrix"
  103. matrix_base_data_path_mode: "750"
  104. matrix_bin_path: "{{ matrix_base_data_path }}/bin"
  105. matrix_host_command_sleep: "/usr/bin/env sleep"
  106. matrix_host_command_chown: "/usr/bin/env chown"
  107. matrix_host_command_fusermount: "/usr/bin/env fusermount"
  108. matrix_host_command_openssl: "/usr/bin/env openssl"
  109. matrix_homeserver_url: "https://{{ matrix_server_fqn_matrix }}"
  110. # Specifies on which container network the homeserver is.
  111. matrix_homeserver_container_network: "matrix-homeserver"
  112. # Specifies which systemd services are responsible for the homeserver
  113. matrix_homeserver_systemd_services_list: []
  114. # Specifies where the homeserver's Client-Server API is on the container network (matrix_homeserver_container_network).
  115. # Most services that need to reach the homeserver do not use `matrix_homeserver_container_url`, but
  116. # rather `matrix_addons_homeserver_client_api_url`.
  117. matrix_homeserver_container_url: "http://{{ matrix_homeserver_container_client_api_endpoint }}"
  118. # Specifies where the homeserver's Client-Server API is on the container network (matrix_homeserver_container_network).
  119. # Where this is depends on whether there's a reverse-proxy in front of the homeserver, which homeserver it is, etc.
  120. # This likely gets overriden elsewhere.
  121. matrix_homeserver_container_client_api_endpoint: ""
  122. # Specifies where the homeserver's Federation API is on the container network (matrix_homeserver_container_network).
  123. matrix_homeserver_container_federation_url: "http://{{ matrix_homeserver_container_federation_api_endpoint }}"
  124. # Specifies where the homeserver's Federation API is on the container network (matrix_homeserver_container_network).
  125. # Where this is depends on whether there's a reverse-proxy in front of the homeserver, which homeserver it is, etc.
  126. # This likely gets overriden elsewhere.
  127. matrix_homeserver_container_federation_api_endpoint: ""
  128. # Specifies the public url of the Sync v3 (sliding-sync) API.
  129. # This will be used to set the `org.matrix.msc3575.proxy` property in `/.well-known/matrix/client`.
  130. # Once the API is stabilized, this will no longer be required.
  131. # See MSC3575: https://github.com/matrix-org/matrix-spec-proposals/blob/kegan/sync-v3/proposals/3575-sync.md
  132. matrix_homeserver_sliding_sync_url: ""
  133. matrix_identity_server_url: ~
  134. matrix_integration_manager_rest_url: ~
  135. matrix_integration_manager_ui_url: ~
  136. matrix_homeserver_container_extra_arguments_auto: []
  137. matrix_homeserver_app_service_config_files_auto: []
  138. # Controls whether various services should expose metrics publicly.
  139. # If Prometheus is operating on the same machine, exposing metrics publicly is not necessary.
  140. matrix_metrics_exposure_enabled: false
  141. matrix_metrics_exposure_hostname: "{{ matrix_server_fqn_matrix }}"
  142. matrix_metrics_exposure_path_prefix: /metrics
  143. matrix_metrics_exposure_http_basic_auth_enabled: false
  144. # See https://doc.traefik.io/traefik/middlewares/http/basicauth/#users
  145. matrix_metrics_exposure_http_basic_auth_users: ''
  146. # Specifies the type of reverse-proxy used by the playbook.
  147. #
  148. # Changing this has an effect on whether a reverse-proxy is installed at all and what its type is,
  149. # as well as how all other services are configured.
  150. #
  151. # Valid options and a description of their behavior:
  152. #
  153. # - `playbook-managed-traefik`
  154. # - the playbook will run a managed Traefik instance (matrix-traefik)
  155. # - Traefik will do SSL termination, unless you disable it (e.g. `devture_traefik_config_entrypoint_web_secure_enabled: false`)
  156. # - if SSL termination is enabled (as it is by default), you need to populate: `devture_traefik_config_certificatesResolvers_acme_email`
  157. # - it will also install matrix-nginx-proxy in local-only mode, while we migrate the rest of the services to a Traefik-native mode of working
  158. #
  159. # - `playbook-managed-nginx`
  160. # - the playbook will install matrix-nginx-proxy
  161. # - matrix-nginx-proxy will do SSL termination with Certbot, unless you change that (see `matrix_ssl_retrieval_method`)
  162. # - if SSL termination is enabled (as it is by default), you need to populate: `matrix_ssl_lets_encrypt_support_email`
  163. #
  164. # - `other-traefik-container`
  165. # - this playbook will not install Traefik
  166. # - nevertheless, the playbook expects that you would install Traefik yourself via other means
  167. # - you should make sure your Traefik configuration is compatible with what the playbook would have configured (web, web-secure, matrix-federation entrypoints, etc.)
  168. # - you need to set `matrix_playbook_reverse_proxyable_services_additional_network` to the name of your Traefik network
  169. # - Traefik certs dumper will be enabled by default (`devture_traefik_certs_dumper_enabled`). You need to point it to your Traefik's SSL certificates (`devture_traefik_certs_dumper_ssl_dir_path`)
  170. #
  171. # - `other-nginx-non-container`
  172. # - the playbook will not install matrix-nginx-proxy
  173. # - however, it will still dump some nginx configuration in /matrix/nginx/conf.d
  174. # - these configs are meant to be included into a locally-installed (without a container) nginx server
  175. # - all container services are exposed locally (e.g. `-p 127.0.0.1:8080:8080`)
  176. #
  177. # - `other-on-same-host`
  178. # - like other-nginx-non-container, but supposedly won't generate useless configuration in /matrix/nginx/conf.d in the future
  179. #
  180. # - `other-on-another-host`
  181. # - like other-on-same-host, but services are exposed on all interfaces (e.g. `-p 0.0.0.0:8080:8080`)
  182. # - configurable via `matrix_playbook_service_host_bind_interface_prefix`
  183. #
  184. # - `none`
  185. # - no reverse-proxy will be installed
  186. # - no nginx configuration will be dumped in /matrix/nginx/conf.d
  187. # - no port exposure will be done for any of the container services
  188. # - it's up to you to expose the ports you want, etc.
  189. matrix_playbook_reverse_proxy_type: ''
  190. # Specifies the network that the reverse-proxy is operating at
  191. matrix_playbook_reverse_proxy_container_network: 'traefik'
  192. # Specifies the hostname that the reverse-proxy is available at
  193. matrix_playbook_reverse_proxy_hostname: 'matrix-traefik'
  194. # Controls the additional network that reverse-proxyable services will be connected to.
  195. matrix_playbook_reverse_proxyable_services_additional_network: "{{ matrix_playbook_reverse_proxy_container_network }}"
  196. matrix_playbook_service_host_bind_interface_prefix: "{{ '' if matrix_playbook_reverse_proxy_type not in ['other-nginx-non-container', 'other-on-same-host', 'other-on-another-host'] else ('0.0.0.0:' if matrix_playbook_reverse_proxy_type == 'other-on-another-host' else '127.0.0.1:') }}"
  197. # Controls whether to enable an additional Traefik entrypoint for the purpose of serving Matrix Federation.
  198. # By default, federation is served on a special port (8448), so a separate entrypoint is necessary.
  199. # Group variables may influence whether this is enabled based on the port number and on the default entrypoints of the Traefik reverse-proxy.
  200. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_enabled: true
  201. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_name: "{{ matrix_federation_traefik_entrypoint }}"
  202. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_port: "{{ matrix_federation_public_port }}"
  203. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_host_bind_port: "{{ matrix_federation_public_port }}"
  204. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config: "{{ matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config_auto | combine(matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config_custom, recursive=True) }}"
  205. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config_auto: {}
  206. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config_custom: {}
  207. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_definition:
  208. name: "{{ matrix_playbook_public_matrix_federation_api_traefik_entrypoint_name }}"
  209. port: "{{ matrix_playbook_public_matrix_federation_api_traefik_entrypoint_port }}"
  210. host_bind_port: "{{ matrix_playbook_public_matrix_federation_api_traefik_entrypoint_host_bind_port }}"
  211. config: "{{ matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config }}"
  212. # Controls whether to enable an additional Traefik entrypoint for the purpose of serving the homeserver's Client-Server API internally.
  213. #
  214. # Homeserver software and other core components which are part of the homeserver's Client-Server API
  215. # may wish to register their routes with this additional entrypoint and provide their services on it for internal (no-public-network and non-TLS) use.
  216. #
  217. # This entrypoint provides local addons (e.g. bridges, bots, etc.) with the ability to easily & quickly communicate with the homeserver and/or related software.
  218. # Such services can reach the homeserver over the public internet (e.g. https://matrix.DOMAIN), but this is slow due to networking and SSL-termination.
  219. # Talking directly to the homeserver (e.g. `http://matrix-synapse:8008`) is another option, but does not allow other homeserver-related software
  220. # (e.g. identity servers like ma1sd, media repository servers like matrix-media-repo, firewalls like matrix-corporal)
  221. # to register itself for certain homeserver routes.
  222. #
  223. # For example: when matrix-media-repo is enabled, it wishes to handle `/_matrix/media` both publicly and internally.
  224. # Bots/bridges that try to upload media should not hit `/_matrix/media` on the homeserver directly, but actually go through matrix-media-repo.
  225. #
  226. # This entrypoint gives us a layer of indirection, so that all these homeserver-related services can register themselves on this entrypoint
  227. # the same way they register themselves for the public (e.g. `web-secure`) entrypoint.
  228. #
  229. # Routers enabled on this entrypoint should use Traefik rules which do NOT do Host-matching (Host/HostRegexp),
  230. # because addon services (e.g. bridges, bots) cannot properly pass a `Host` HTTP header when making
  231. # requests to the endpoint's address (e.g. `http://devture-traefik:8008/`).
  232. # This entrypoint only aims to handle a single "virtual host" - one dealing with the homeserver's Client-Server API.
  233. matrix_playbook_internal_matrix_client_api_traefik_entrypoint_enabled: true
  234. matrix_playbook_internal_matrix_client_api_traefik_entrypoint_name: matrix-internal-matrix-client-api
  235. matrix_playbook_internal_matrix_client_api_traefik_entrypoint_port: 8008
  236. matrix_playbook_internal_matrix_client_api_traefik_entrypoint_host_bind_port: ''
  237. matrix_playbook_internal_matrix_client_api_traefik_entrypoint_config: "{{ matrix_playbook_internal_matrix_client_api_traefik_entrypoint_config_auto | combine(matrix_playbook_internal_matrix_client_api_traefik_entrypoint_config_custom, recursive=True) }}"
  238. matrix_playbook_internal_matrix_client_api_traefik_entrypoint_config_auto: {}
  239. matrix_playbook_internal_matrix_client_api_traefik_entrypoint_config_custom: {}
  240. matrix_playbook_internal_matrix_client_api_traefik_entrypoint_definition:
  241. name: "{{ matrix_playbook_internal_matrix_client_api_traefik_entrypoint_name }}"
  242. port: "{{ matrix_playbook_internal_matrix_client_api_traefik_entrypoint_port }}"
  243. host_bind_port: "{{ matrix_playbook_internal_matrix_client_api_traefik_entrypoint_host_bind_port }}"
  244. config: "{{ matrix_playbook_internal_matrix_client_api_traefik_entrypoint_config }}"
  245. # Variables to Control which parts of our roles run.
  246. run_postgres_import: true
  247. run_postgres_upgrade: true
  248. run_postgres_import_sqlite_db: true
  249. run_postgres_vacuum: true
  250. run_synapse_register_user: true
  251. run_synapse_update_user_password: true
  252. run_synapse_import_media_store: true
  253. run_synapse_rust_synapse_compress_state: true
  254. run_dendrite_register_user: true
  255. run_setup: true
  256. run_self_check: true
  257. run_start: true
  258. run_stop: true