Matrix Docker Ansible eploy
Ви не можете вибрати більше 25 тем Теми мають розпочинатися з літери або цифри, можуть містити дефіси (-) і не повинні перевищувати 35 символів.
 
 

724 рядки
46 KiB

  1. ---
  2. # Project source code URL: https://github.com/nginx/nginx
  3. matrix_nginx_proxy_enabled: true
  4. matrix_nginx_proxy_version: 1.23.3-alpine
  5. # We use an official nginx image, which we fix-up to run unprivileged.
  6. # An alternative would be an `nginxinc/nginx-unprivileged` image, but
  7. # that is frequently out of date.
  8. matrix_nginx_proxy_docker_image: "{{ matrix_container_global_registry_prefix }}nginx:{{ matrix_nginx_proxy_version }}"
  9. matrix_nginx_proxy_docker_image_force_pull: "{{ matrix_nginx_proxy_docker_image.endswith(':latest') }}"
  10. matrix_nginx_proxy_base_path: "{{ matrix_base_data_path }}/nginx-proxy"
  11. matrix_nginx_proxy_data_path: "{{ matrix_nginx_proxy_base_path }}/data"
  12. matrix_nginx_proxy_data_path_in_container: "/nginx-data"
  13. matrix_nginx_proxy_data_path_extension: "/matrix-domain"
  14. matrix_nginx_proxy_confd_path: "{{ matrix_nginx_proxy_base_path }}/conf.d"
  15. # List of systemd services that matrix-nginx-proxy.service depends on
  16. matrix_nginx_proxy_systemd_required_services_list: ['docker.service']
  17. # List of systemd services that matrix-nginx-proxy.service wants
  18. matrix_nginx_proxy_systemd_wanted_services_list: []
  19. # The base container network.
  20. # Also see: matrix_nginx_proxy_container_additional_networks
  21. matrix_nginx_proxy_container_network: "{{ matrix_docker_network }}"
  22. # A list of additional container networks that matrix-nginx-proxy would be connected to.
  23. # The playbook does not create these networks, so make sure they already exist.
  24. #
  25. # Use this to expose matrix-nginx-proxy to another reverse proxy, which runs in a different container network,
  26. # without exposing all other Matrix services to that other reverse-proxy.
  27. #
  28. # For background, see: https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1498
  29. matrix_nginx_proxy_container_additional_networks: []
  30. # A list of additional "volumes" to mount in the container.
  31. # This list gets populated dynamically at runtime. You can provide a different default value,
  32. # if you wish to mount your own files into the container.
  33. # Contains definition objects like this: `{"src": "/outside", "dst": "/inside", "options": "rw|ro|slave|.."}
  34. matrix_nginx_proxy_container_additional_volumes: []
  35. # matrix_nginx_proxy_container_labels_traefik_enabled controls whether labels to assist a Traefik reverse-proxy will be attached to the container.
  36. # See `../templates/labels.j2` for details.
  37. #
  38. # To inject your own other container labels, see `matrix_nginx_proxy_container_labels_additional_labels`.
  39. matrix_nginx_proxy_container_labels_traefik_enabled: false
  40. matrix_nginx_proxy_container_labels_traefik_docker_network: "{{ matrix_nginx_proxy_container_network }}"
  41. matrix_nginx_proxy_container_labels_traefik_entrypoints: web-secure
  42. matrix_nginx_proxy_container_labels_traefik_tls_certResolver: default # noqa var-naming
  43. matrix_nginx_proxy_container_labels_traefik_proxy_base_domain_enabled: "{{ matrix_nginx_proxy_base_domain_serving_enabled }}"
  44. matrix_nginx_proxy_container_labels_traefik_proxy_base_domain_hostname: "{{ matrix_nginx_proxy_base_domain_hostname }}"
  45. matrix_nginx_proxy_container_labels_traefik_proxy_base_domain_tls: "{{ matrix_nginx_proxy_container_labels_traefik_entrypoints != 'web' }}"
  46. matrix_nginx_proxy_container_labels_traefik_proxy_base_domain_rule: "Host(`{{ matrix_nginx_proxy_container_labels_traefik_proxy_base_domain_hostname }}`)"
  47. matrix_nginx_proxy_container_labels_traefik_proxy_matrix_enabled: false
  48. matrix_nginx_proxy_container_labels_traefik_proxy_matrix_hostname: "{{ matrix_server_fqn_matrix }}"
  49. matrix_nginx_proxy_container_labels_traefik_proxy_matrix_tls: "{{ matrix_nginx_proxy_container_labels_traefik_entrypoints != 'web' }}"
  50. matrix_nginx_proxy_container_labels_traefik_proxy_matrix_rule: "Host(`{{ matrix_nginx_proxy_container_labels_traefik_proxy_matrix_hostname }}`)"
  51. matrix_nginx_proxy_container_labels_traefik_proxy_matrix_federation_entrypoint: "{{ matrix_federation_traefik_entrypoint }}"
  52. matrix_nginx_proxy_container_labels_traefik_proxy_matrix_federation_entrypoints: "{{ matrix_nginx_proxy_container_labels_traefik_proxy_matrix_federation_entrypoint }}"
  53. matrix_nginx_proxy_container_labels_traefik_proxy_buscarron_enabled: false
  54. matrix_nginx_proxy_container_labels_traefik_proxy_buscarron_hostname: "{{ matrix_server_fqn_buscarron }}"
  55. matrix_nginx_proxy_container_labels_traefik_proxy_buscarron_tls: "{{ matrix_nginx_proxy_container_labels_traefik_entrypoints != 'web' }}"
  56. matrix_nginx_proxy_container_labels_traefik_proxy_buscarron_rule: "Host(`{{ matrix_nginx_proxy_container_labels_traefik_proxy_buscarron_hostname }}`)"
  57. matrix_nginx_proxy_container_labels_traefik_proxy_dimension_enabled: false
  58. matrix_nginx_proxy_container_labels_traefik_proxy_dimension_hostname: "{{ matrix_server_fqn_dimension }}"
  59. matrix_nginx_proxy_container_labels_traefik_proxy_dimension_tls: "{{ matrix_nginx_proxy_container_labels_traefik_entrypoints != 'web' }}"
  60. matrix_nginx_proxy_container_labels_traefik_proxy_dimension_rule: "Host(`{{ matrix_nginx_proxy_container_labels_traefik_proxy_dimension_hostname }}`)"
  61. matrix_nginx_proxy_container_labels_traefik_proxy_etherpad_enabled: false
  62. matrix_nginx_proxy_container_labels_traefik_proxy_etherpad_hostname: "{{ matrix_server_fqn_etherpad }}"
  63. matrix_nginx_proxy_container_labels_traefik_proxy_etherpad_tls: "{{ matrix_nginx_proxy_container_labels_traefik_entrypoints != 'web' }}"
  64. matrix_nginx_proxy_container_labels_traefik_proxy_etherpad_rule: "Host(`{{ matrix_nginx_proxy_container_labels_traefik_proxy_etherpad_hostname }}`)"
  65. matrix_nginx_proxy_container_labels_traefik_proxy_bot_go_neb_enabled: false
  66. matrix_nginx_proxy_container_labels_traefik_proxy_bot_go_neb_hostname: "{{ matrix_server_fqn_bot_go_neb }}"
  67. matrix_nginx_proxy_container_labels_traefik_proxy_bot_go_neb_tls: "{{ matrix_nginx_proxy_container_labels_traefik_entrypoints != 'web' }}"
  68. matrix_nginx_proxy_container_labels_traefik_proxy_bot_go_neb_rule: "Host(`{{ matrix_nginx_proxy_container_labels_traefik_proxy_bot_go_neb_hostname }}`)"
  69. matrix_nginx_proxy_container_labels_traefik_proxy_jitsi_enabled: false
  70. matrix_nginx_proxy_container_labels_traefik_proxy_jitsi_hostname: "{{ matrix_server_fqn_jitsi }}"
  71. matrix_nginx_proxy_container_labels_traefik_proxy_jitsi_tls: "{{ matrix_nginx_proxy_container_labels_traefik_entrypoints != 'web' }}"
  72. matrix_nginx_proxy_container_labels_traefik_proxy_jitsi_rule: "Host(`{{ matrix_nginx_proxy_container_labels_traefik_proxy_jitsi_hostname }}`)"
  73. matrix_nginx_proxy_container_labels_traefik_proxy_sygnal_enabled: false
  74. matrix_nginx_proxy_container_labels_traefik_proxy_sygnal_hostname: "{{ matrix_server_fqn_sygnal }}"
  75. matrix_nginx_proxy_container_labels_traefik_proxy_sygnal_tls: "{{ matrix_nginx_proxy_container_labels_traefik_entrypoints != 'web' }}"
  76. matrix_nginx_proxy_container_labels_traefik_proxy_sygnal_rule: "Host(`{{ matrix_nginx_proxy_container_labels_traefik_proxy_sygnal_hostname }}`)"
  77. # matrix_nginx_proxy_container_labels_additional_labels contains a multiline string with additional labels to add to the container label file.
  78. # See `../templates/labels.j2` for details.
  79. #
  80. # Example:
  81. # matrix_nginx_proxy_container_labels_additional_labels: |
  82. # my.label=1
  83. # another.label="here"
  84. matrix_nginx_proxy_container_labels_additional_labels: ''
  85. # A list of extra arguments to pass to the container
  86. matrix_nginx_proxy_container_extra_arguments: []
  87. # Controls whether matrix-nginx-proxy serves its vhosts over HTTPS or HTTP.
  88. #
  89. # If enabled:
  90. # - SSL certificates would be expected to be available (see `matrix_ssl_retrieval_method`)
  91. # - the HTTP vhost would be made a redirect to the HTTPS vhost
  92. #
  93. # If not enabled:
  94. # - you don't need any SSL certificates (you can set `matrix_ssl_retrieval_method: none`)
  95. # - naturally, there's no HTTPS vhost
  96. # - services are served directly from the HTTP vhost
  97. matrix_nginx_proxy_https_enabled: true
  98. # Controls whether matrix-nginx-proxy trusts an upstream server's X-Forwarded-Proto header
  99. #
  100. # Required if you disable HTTPS for the container (see `matrix_nginx_proxy_https_enabled`) and have an upstream server handle it instead.
  101. matrix_nginx_proxy_trust_forwarded_proto: false
  102. matrix_nginx_proxy_x_forwarded_proto_value: "{{ '$http_x_forwarded_proto' if matrix_nginx_proxy_trust_forwarded_proto else '$scheme' }}"
  103. # Controls whether the matrix-nginx-proxy container exposes its HTTP port (tcp/8080 in the container).
  104. #
  105. # Takes an "<ip>:<port>" or "<port>" value (e.g. "127.0.0.1:80"), or empty string to not expose.
  106. matrix_nginx_proxy_container_http_host_bind_port: '80'
  107. # Controls whether the matrix-nginx-proxy container exposes its HTTPS port (tcp/8443 in the container).
  108. #
  109. # Takes an "<ip>:<port>" or "<port>" value (e.g. "127.0.0.1:443"), or empty string to not expose.
  110. #
  111. # This only makes sense and applies if `matrix_nginx_proxy_https_enabled` is set to `true`.
  112. # Otherwise, there are no HTTPS vhosts to expose.
  113. matrix_nginx_proxy_container_https_host_bind_port: '443'
  114. # Controls whether the matrix-nginx-proxy container exposes the Matrix Federation port (tcp/8448 in the container).
  115. #
  116. # Takes an "<ip>:<port>" or "<port>" value (e.g. "127.0.0.1:8448"), or empty string to not expose.
  117. #
  118. # This only makes sense and applies if `matrix_nginx_proxy_proxy_matrix_federation_api_enabled` is set to `true`.
  119. # Otherwise, there is no Matrix Federation port to expose.
  120. #
  121. # This port can take HTTP or HTTPS traffic, depending on `matrix_nginx_proxy_https_enabled`.
  122. # When HTTPS is disabled, you'd likely want to only expose the port locally, and front it with another HTTPS-enabled reverse-proxy.
  123. matrix_nginx_proxy_container_federation_host_bind_port: '8448'
  124. # Controls whether matrix-nginx-proxy should serve the base domain.
  125. #
  126. # This is useful for when you only have your Matrix server, but you need to serve
  127. # to serve `/.well-known/matrix/*` files from the base domain for the needs of
  128. # Server-Discovery (Federation) and for Client-Discovery.
  129. #
  130. # Besides serving these Matrix files, a homepage would be served with content
  131. # as specified in the `matrix_nginx_proxy_base_domain_homepage_template` variable.
  132. # You can also put additional files to use for this webpage
  133. # in the `{{ matrix_nginx_proxy_data_path }}/matrix-domain` (`/matrix/nginx-proxy/data/matrix-domain`) directory.
  134. matrix_nginx_proxy_base_domain_serving_enabled: false
  135. # Controls whether the base domain directory and default index.html file are created.
  136. matrix_nginx_proxy_base_domain_create_directory: true
  137. matrix_nginx_proxy_base_domain_hostname: "{{ matrix_domain }}"
  138. # Controls whether `matrix_nginx_proxy_base_domain_homepage_template` would be dumped to an `index.html` file
  139. # in the `/matrix/nginx-proxy/data/matrix-domain` directory.
  140. #
  141. # If you would instead like to serve a static website by yourself, you can disable this.
  142. # When disabled, you're expected to put website files in `/matrix/nginx-proxy/data/matrix-domain` manually
  143. # and can expect that the playbook won't intefere with the `index.html` file.
  144. matrix_nginx_proxy_base_domain_homepage_enabled: true
  145. matrix_nginx_proxy_base_domain_homepage_template: |-
  146. <!doctype html>
  147. <meta charset="utf-8" />
  148. <html>
  149. <body>
  150. Hello from {{ matrix_domain }}!
  151. </body>
  152. </html>
  153. # Option to disable the access log
  154. matrix_nginx_proxy_access_log_enabled: true
  155. # Controls whether proxying the riot domain should be done.
  156. matrix_nginx_proxy_proxy_riot_compat_redirect_enabled: false
  157. matrix_nginx_proxy_proxy_riot_compat_redirect_hostname: "riot.{{ matrix_domain }}"
  158. # Controls whether proxying for Synapse should be done.
  159. matrix_nginx_proxy_proxy_synapse_enabled: false
  160. matrix_nginx_proxy_proxy_synapse_hostname: "matrix-nginx-proxy"
  161. matrix_nginx_proxy_proxy_synapse_federation_api_enabled: "{{ matrix_nginx_proxy_proxy_matrix_federation_api_enabled }}"
  162. # The addresses where the Matrix Client API is, when using Synapse.
  163. matrix_nginx_proxy_proxy_synapse_client_api_addr_with_container: ""
  164. matrix_nginx_proxy_proxy_synapse_client_api_addr_sans_container: ""
  165. # The addresses where the Federation API is, when using Synapse.
  166. matrix_nginx_proxy_proxy_synapse_federation_api_addr_with_container: ""
  167. matrix_nginx_proxy_proxy_synapse_federation_api_addr_sans_container: ""
  168. # A list of strings containing additional configuration blocks to add to the Synapse's server configuration (matrix-synapse.conf).
  169. matrix_nginx_proxy_proxy_synapse_additional_server_configuration_blocks: []
  170. # Controls whether proxying for Dendrite should be done.
  171. matrix_nginx_proxy_proxy_dendrite_enabled: false
  172. matrix_nginx_proxy_proxy_dendrite_hostname: "matrix-nginx-proxy"
  173. matrix_nginx_proxy_proxy_dendrite_federation_api_enabled: "{{ matrix_nginx_proxy_proxy_matrix_federation_api_enabled }}"
  174. # Controls whether the Client API server (usually at matrix.DOMAIN:443) should explicitly reject `/_matrix/federation` endpoints.
  175. # Normally, Dendrite Monolith serves both APIs (Client & Federation) at the same port, so we can serve federation at `matrix.DOMAIN:443` too.
  176. matrix_nginx_proxy_proxy_dendrite_block_federation_api_on_client_port: true
  177. # The addresses where the Matrix Client API is, when using Dendrite.
  178. matrix_nginx_proxy_proxy_dendrite_client_api_addr_with_container: ""
  179. matrix_nginx_proxy_proxy_dendrite_client_api_addr_sans_container: ""
  180. # A list of strings containing additional configuration blocks to add to the Dendrite's server configuration (matrix-dendrite.conf).
  181. matrix_nginx_proxy_proxy_dendrite_additional_server_configuration_blocks: []
  182. # Controls whether proxying for Conduit should be done.
  183. matrix_nginx_proxy_proxy_conduit_enabled: false
  184. matrix_nginx_proxy_proxy_conduit_hostname: "matrix-nginx-proxy"
  185. matrix_nginx_proxy_proxy_conduit_federation_api_enabled: "{{ matrix_nginx_proxy_proxy_matrix_federation_api_enabled }}"
  186. # Controls whether the Client API server (usually at matrix.DOMAIN:443) should explicitly reject `/_matrix/federation` endpoints.
  187. matrix_nginx_proxy_proxy_conduit_block_federation_api_on_client_port: true
  188. # The addresses where the Matrix Client API is, when using Conduit.
  189. matrix_nginx_proxy_proxy_conduit_client_api_addr_with_container: ""
  190. matrix_nginx_proxy_proxy_conduit_client_api_addr_sans_container: ""
  191. # The addresses where the Federation API is, when using Conduit.
  192. matrix_nginx_proxy_proxy_conduit_federation_api_addr_with_container: ""
  193. matrix_nginx_proxy_proxy_conduit_federation_api_addr_sans_container: ""
  194. # A list of strings containing additional configuration blocks to add to the Conduit's server configuration (matrix-conduit.conf).
  195. matrix_nginx_proxy_proxy_conduit_additional_server_configuration_blocks: []
  196. # Controls whether proxying the Element domain should be done.
  197. matrix_nginx_proxy_proxy_element_enabled: false
  198. matrix_nginx_proxy_proxy_element_hostname: "{{ matrix_server_fqn_element }}"
  199. # Controls whether proxying the Hydrogen domain should be done.
  200. matrix_nginx_proxy_proxy_hydrogen_enabled: false
  201. matrix_nginx_proxy_proxy_hydrogen_hostname: "{{ matrix_server_fqn_hydrogen }}"
  202. # Controls whether proxying the Cinny domain should be done.
  203. matrix_nginx_proxy_proxy_cinny_enabled: false
  204. matrix_nginx_proxy_proxy_cinny_hostname: "{{ matrix_server_fqn_cinny }}"
  205. # Controls whether proxying the buscarron domain should be done.
  206. matrix_nginx_proxy_proxy_buscarron_enabled: false
  207. matrix_nginx_proxy_proxy_buscarron_hostname: "{{ matrix_server_fqn_buscarron }}"
  208. # Controls whether proxying the matrix domain should be done.
  209. matrix_nginx_proxy_proxy_matrix_enabled: false
  210. matrix_nginx_proxy_proxy_matrix_hostname: "{{ matrix_server_fqn_matrix }}"
  211. matrix_nginx_proxy_proxy_matrix_federation_hostname: "{{ matrix_nginx_proxy_proxy_matrix_hostname }}"
  212. # The port name used for federation in the nginx configuration.
  213. # This is not necessarily the port that it's actually on,
  214. # as port-mapping happens (`-p ..`) for the `matrix-nginx-proxy` container.
  215. matrix_nginx_proxy_proxy_matrix_federation_port: 8448
  216. # Controls whether proxying the dimension domain should be done.
  217. matrix_nginx_proxy_proxy_dimension_enabled: false
  218. matrix_nginx_proxy_proxy_dimension_hostname: "{{ matrix_server_fqn_dimension }}"
  219. # Controls whether proxying the etherpad domain should be done.
  220. matrix_nginx_proxy_proxy_etherpad_enabled: false
  221. matrix_nginx_proxy_proxy_etherpad_hostname: "{{ matrix_server_fqn_etherpad }}"
  222. # Controls whether proxying the goneb domain should be done.
  223. matrix_nginx_proxy_proxy_bot_go_neb_enabled: false
  224. matrix_nginx_proxy_proxy_bot_go_neb_hostname: "{{ matrix_server_fqn_bot_go_neb }}"
  225. # Controls whether proxying the jitsi domain should be done.
  226. matrix_nginx_proxy_proxy_jitsi_enabled: false
  227. matrix_nginx_proxy_proxy_jitsi_hostname: "{{ matrix_server_fqn_jitsi }}"
  228. matrix_nginx_proxy_proxy_jitsi_manage_wellknown: false
  229. matrix_nginx_proxy_proxy_jitsi_well_known_configuration_blocks: []
  230. # Controls whether proxying the grafana domain should be done.
  231. matrix_nginx_proxy_proxy_grafana_enabled: false
  232. matrix_nginx_proxy_proxy_grafana_hostname: "{{ matrix_server_fqn_grafana }}"
  233. # Controls whether proxying the sygnal domain should be done.
  234. matrix_nginx_proxy_proxy_sygnal_enabled: false
  235. matrix_nginx_proxy_proxy_sygnal_hostname: "{{ matrix_server_fqn_sygnal }}"
  236. # Controls whether proxying the ntfy domain should be done.
  237. matrix_nginx_proxy_proxy_ntfy_enabled: false
  238. matrix_nginx_proxy_proxy_ntfy_hostname: "{{ matrix_server_fqn_ntfy }}"
  239. # Controls whether proxying for (Prometheus) metrics (`/metrics/*`) for the various services should be done (on the matrix domain)
  240. # If the internal Prometheus server (`matrix-prometheus` role) is used, proxying is not necessary, since Prometheus can access each container directly.
  241. # This is only useful when an external Prometheus will be collecting metrics.
  242. #
  243. # To control what kind of metrics are exposed under `/metrics/` (e.g `/metrics/node-exporter`, `/metrics/postgres-exporter`, etc.),
  244. # use `matrix_SERVICE_metrics_proxying_enabled` variables in each respective role.
  245. # Roles inject themselves into the matrix-nginx-proxy configuration.
  246. #
  247. # To protect the metrics endpoints, see `matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_enabled`
  248. matrix_nginx_proxy_proxy_matrix_metrics_enabled: false
  249. # Controls whether Basic Auth is enabled for all `/metrics/*` endpoints.
  250. #
  251. # You can provide the Basic Auth credentials in 2 ways:
  252. # 1. A single username/password pair using `matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_username` and `matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_password`
  253. # 2. Using raw content (`htpasswd`-generated file) provided in `matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_raw_content`
  254. matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_enabled: false
  255. # `matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_username` and `matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_password` specify
  256. # the Basic Auth username/password for protecting `/metrics/*` endpoints.
  257. # Alternatively, use `matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_raw_content`.
  258. matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_username: ""
  259. matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_password: ""
  260. # `matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_raw_content` value will be written verbatim to the htpasswd file protecting `/metrics/*` endpoints.
  261. # Use this when a single username/password is not enough and you'd like to get more control over credentials.
  262. #
  263. # Read the manpage at `man 1 htpasswd` to learn more, then encrypt your password, and paste the encrypted value here.
  264. # e.g. `htpasswd -c mypass.htpasswd prometheus` and enter `mysecurepw` when prompted yields `prometheus:$apr1$wZhqsn.U$7LC3kMmjUbjNAZjyMyvYv/`
  265. # The whole thing is needed here. matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_raw_content: "prometheus:$apr1$wZhqsn.U$7LC3kMmjUbjNAZjyMyvYv/"
  266. matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_raw_content: ""
  267. # Specifies the path to the htpasswd file holding the htpasswd credentials for protecting `/metrics/*` endpoints
  268. # This is not meant to be modified.
  269. matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_path: "{{ matrix_nginx_proxy_data_path_in_container if matrix_nginx_proxy_enabled else matrix_nginx_proxy_data_path }}/matrix-metrics-htpasswd"
  270. # Specifies the Apache container image to use
  271. # when `matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_username` and `matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_password` are provided.
  272. # This image provides the `htpasswd` tool which we use for generating the htpasswd file protecting `/metrics/*`.
  273. # To avoid using this, use `matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_raw_content` instead of supplying username/password.
  274. # Learn more in: `roles/custom/matrix-nginx-proxy/tasks/nginx-proxy/setup_metrics_auth.yml`.
  275. matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_apache_container_image: "{{ matrix_container_global_registry_prefix }}httpd:{{ matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_apache_container_image_tag }}"
  276. matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_apache_container_image_tag: "2.4.54-alpine3.16"
  277. matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_apache_container_force_pull: "{{ matrix_nginx_proxy_proxy_matrix_metrics_basic_auth_apache_container_image_tag.endswith(':latest') }}"
  278. # A list of strings containing additional configuration blocks to add to the `location /metrics` configuration (matrix-domain.conf).
  279. # Do not modify `matrix_nginx_proxy_proxy_matrix_metrics_additional_location_configuration_blocks` and `matrix_nginx_proxy_proxy_matrix_metrics_additional_system_location_configuration_blocks`.
  280. # If you'd like to inject your own configuration blocks, use `matrix_nginx_proxy_proxy_matrix_metrics_additional_user_location_configuration_blocks`.
  281. matrix_nginx_proxy_proxy_matrix_metrics_additional_location_configuration_blocks: "{{ matrix_nginx_proxy_proxy_matrix_metrics_additional_system_location_configuration_blocks + matrix_nginx_proxy_proxy_matrix_metrics_additional_user_location_configuration_blocks }}"
  282. matrix_nginx_proxy_proxy_matrix_metrics_additional_system_location_configuration_blocks: []
  283. matrix_nginx_proxy_proxy_matrix_metrics_additional_user_location_configuration_blocks: []
  284. # Controls whether proxying for the matrix-corporal API (`/_matrix/corporal`) should be done (on the matrix domain)
  285. matrix_nginx_proxy_proxy_matrix_corporal_api_enabled: false
  286. matrix_nginx_proxy_proxy_matrix_corporal_api_addr_with_container: "matrix-corporal:41081"
  287. matrix_nginx_proxy_proxy_matrix_corporal_api_addr_sans_container: "127.0.0.1:41081"
  288. # Controls whether proxying for the User Directory Search API (`/_matrix/client/r0/user_directory/search`) should be done (on the matrix domain).
  289. # This can be used to forward the API endpoint to another service, augmenting the functionality of Synapse's own User Directory Search.
  290. # To learn more, see: https://github.com/ma1uta/ma1sd/blob/master/docs/features/directory.md
  291. matrix_nginx_proxy_proxy_matrix_user_directory_search_enabled: false
  292. matrix_nginx_proxy_proxy_matrix_user_directory_search_addr_with_container: "matrix-ma1sd:{{ matrix_ma1sd_container_port }}"
  293. matrix_nginx_proxy_proxy_matrix_user_directory_search_addr_sans_container: "127.0.0.1:{{ matrix_ma1sd_container_port }}"
  294. # Controls whether proxying for 3PID-based registration (`/_matrix/client/r0/register/(email|msisdn)/requestToken`) should be done (on the matrix domain).
  295. # This allows another service to control registrations involving 3PIDs.
  296. # To learn more, see: https://github.com/ma1uta/ma1sd/blob/master/docs/features/registration.md
  297. matrix_nginx_proxy_proxy_matrix_3pid_registration_enabled: false
  298. matrix_nginx_proxy_proxy_matrix_3pid_registration_addr_with_container: "matrix-ma1sd:{{ matrix_ma1sd_container_port }}"
  299. matrix_nginx_proxy_proxy_matrix_3pid_registration_addr_sans_container: "127.0.0.1:{{ matrix_ma1sd_container_port }}"
  300. # Controls whether proxying for the Identity API (`/_matrix/identity`) should be done (on the matrix domain)
  301. matrix_nginx_proxy_proxy_matrix_identity_api_enabled: false
  302. matrix_nginx_proxy_proxy_matrix_identity_api_addr_with_container: "matrix-ma1sd:{{ matrix_ma1sd_container_port }}"
  303. matrix_nginx_proxy_proxy_matrix_identity_api_addr_sans_container: "127.0.0.1:{{ matrix_ma1sd_container_port }}"
  304. # The addresses where the Matrix Client API is.
  305. # Certain extensions (like matrix-corporal) may override this in order to capture all traffic.
  306. matrix_nginx_proxy_proxy_matrix_client_api_addr_with_container: "matrix-nginx-proxy:12080"
  307. matrix_nginx_proxy_proxy_matrix_client_api_addr_sans_container: "127.0.0.1:12080"
  308. # This needs to be equal or higher than the maximum upload size accepted by Synapse.
  309. matrix_nginx_proxy_proxy_matrix_client_api_client_max_body_size_mb: 50
  310. # Tells whether `/_synapse/client` is forwarded to the Matrix Client API server.
  311. matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_client_api_enabled: true
  312. # Tells whether `/_synapse/oidc` is forwarded to the Matrix Client API server.
  313. # Enable this if you need OpenID Connect authentication support.
  314. matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_oidc_api_enabled: false
  315. # Tells whether `/_synapse/admin` is forwarded to the Matrix Client API server.
  316. # Following these recommendations (https://github.com/matrix-org/synapse/blob/master/docs/reverse_proxy.md), by default, we don't.
  317. matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_admin_api_enabled: false
  318. # `matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_prefixes` holds
  319. # the location prefixes that get forwarded to the Matrix Client API server.
  320. # These locations get combined into a regex like this `^(/_matrix|/_synapse/client)`.
  321. matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_prefix_regexes: |
  322. {{
  323. (['/_matrix'])
  324. +
  325. (['/_synapse/client'] if matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_client_api_enabled else [])
  326. +
  327. (['/_synapse/oidc'] if matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_oidc_api_enabled else [])
  328. +
  329. (['/_synapse/admin'] if matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_admin_api_enabled else [])
  330. }}
  331. # Specifies where requests for the root URI (`/`) on the `matrix.` domain should be redirected.
  332. # If this has an empty value, they're just passed to the homeserver, which serves a static page.
  333. # If you'd like to make `https://matrix.DOMAIN` redirect to `https://element.DOMAIN` (or something of that sort), specify the domain name here.
  334. # Example value: `element.DOMAIN` (or `{{ matrix_server_fqn_element }}`).
  335. matrix_nginx_proxy_proxy_matrix_client_redirect_root_uri_to_domain: ""
  336. # Controls whether proxying for the Matrix Federation API should be done.
  337. matrix_nginx_proxy_proxy_matrix_federation_api_enabled: false
  338. matrix_nginx_proxy_proxy_matrix_federation_api_addr_with_container: "matrix-nginx-proxy:12088"
  339. matrix_nginx_proxy_proxy_matrix_federation_api_addr_sans_container: "127.0.0.1:12088"
  340. matrix_nginx_proxy_proxy_matrix_federation_api_client_max_body_size_mb: "{{ (matrix_nginx_proxy_proxy_matrix_client_api_client_max_body_size_mb | int) * 3 }}"
  341. matrix_nginx_proxy_proxy_matrix_federation_api_ssl_certificate: "{{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_matrix_hostname }}/fullchain.pem"
  342. matrix_nginx_proxy_proxy_matrix_federation_api_ssl_certificate_key: "{{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_matrix_hostname }}/privkey.pem"
  343. matrix_nginx_proxy_proxy_matrix_federation_api_ssl_trusted_certificate: "{{ matrix_ssl_config_dir_path }}/live/{{ matrix_nginx_proxy_proxy_matrix_hostname }}/chain.pem"
  344. # The tmpfs at /tmp needs to be large enough to handle multiple concurrent file uploads.
  345. matrix_nginx_proxy_tmp_directory_size_mb: "{{ (matrix_nginx_proxy_proxy_matrix_federation_api_client_max_body_size_mb | int) * 50 }}"
  346. matrix_nginx_proxy_tmp_cache_directory_size_mb: "{{ (matrix_nginx_proxy_synapse_cache_max_size_mb | int) * 2 }}"
  347. # A list of strings containing additional configuration blocks to add to the nginx server configuration (nginx.conf).
  348. # for big matrixservers to enlarge the number of open files to prevent timeouts
  349. # matrix_nginx_proxy_proxy_additional_configuration_blocks:
  350. # - 'worker_rlimit_nofile 30000;'
  351. matrix_nginx_proxy_proxy_additional_configuration_blocks: []
  352. # A list of strings containing additional configuration blocks to add to the nginx event server configuration (nginx.conf).
  353. matrix_nginx_proxy_proxy_event_additional_configuration_blocks: []
  354. # A list of strings containing additional configuration blocks to add to the nginx http's server configuration (nginx-http.conf).
  355. matrix_nginx_proxy_proxy_http_additional_server_configuration_blocks: []
  356. # A list of strings containing additional configuration blocks to add to the base matrix server configuration (matrix-domain.conf).
  357. matrix_nginx_proxy_proxy_matrix_additional_server_configuration_blocks: []
  358. # A list of strings containing additional configuration blocks to add to Riot's server configuration (matrix-riot-web.conf).
  359. matrix_nginx_proxy_proxy_riot_additional_server_configuration_blocks: []
  360. # A list of strings containing additional configuration blocks to add to Element's server configuration (matrix-client-element.conf).
  361. matrix_nginx_proxy_proxy_element_additional_server_configuration_blocks: []
  362. # A list of strings containing additional configuration blocks to add to Hydrogen's server configuration (matrix-client-hydrogen.conf).
  363. matrix_nginx_proxy_proxy_hydrogen_additional_server_configuration_blocks: []
  364. # A list of strings containing additional configuration blocks to add to Cinny's server configuration (matrix-client-cinny.conf).
  365. matrix_nginx_proxy_proxy_cinny_additional_server_configuration_blocks: []
  366. # A list of strings containing additional configuration blocks to add to buscarron's server configuration (matrix-bot-buscarron.conf).
  367. matrix_nginx_proxy_proxy_buscarron_additional_server_configuration_blocks: []
  368. # A list of strings containing additional configuration blocks to add to Dimension's server configuration (matrix-dimension.conf).
  369. matrix_nginx_proxy_proxy_dimension_additional_server_configuration_blocks: []
  370. # A list of strings containing additional configuration blocks to add to etherpad's server configuration (matrix-etherpad.conf).
  371. matrix_nginx_proxy_proxy_etherpad_additional_server_configuration_blocks: []
  372. # A list of strings containing additional configuration blocks to add to GoNEB's server configuration (matrix-bot-go-neb.conf).
  373. matrix_nginx_proxy_proxy_bot_go_neb_additional_server_configuration_blocks: []
  374. # A list of strings containing additional configuration blocks to add to Jitsi's server configuration (matrix-jitsi.conf).
  375. matrix_nginx_proxy_proxy_jitsi_additional_server_configuration_blocks: []
  376. # A list of strings containing additional configuration blocks to add to Grafana's server configuration (matrix-grafana.conf).
  377. matrix_nginx_proxy_proxy_grafana_additional_server_configuration_blocks: []
  378. # A list of strings containing additional configuration blocks to add to Sygnal's server configuration (matrix-sygnal.conf).
  379. matrix_nginx_proxy_proxy_sygnal_additional_server_configuration_blocks: []
  380. # A list of strings containing additional configuration blocks to add to ntfy's server configuration (matrix-ntfy.conf).
  381. matrix_nginx_proxy_proxy_ntfy_additional_server_configuration_blocks: []
  382. # A list of strings containing additional configuration blocks to add to the base domain server configuration (matrix-base-domain.conf).
  383. matrix_nginx_proxy_proxy_domain_additional_server_configuration_blocks: []
  384. # To increase request timeout in NGINX using proxy_read_timeout, proxy_connect_timeout, proxy_send_timeout, send_timeout directives
  385. # Nginx Default: proxy_connect_timeout 60s; #Defines a timeout for establishing a connection with a proxied server
  386. # Nginx Default: proxy_send_timeout 60s; #Sets a timeout for transmitting a request to the proxied server.
  387. # Nginx Default: proxy_read_timeout 60s; #Defines a timeout for reading a response from the proxied server.
  388. # Nginx Default: send_timeout 60s; #Sets a timeout for transmitting a response to the client.
  389. #
  390. # For more information visit:
  391. # http://nginx.org/en/docs/http/ngx_http_proxy_module.html
  392. # http://nginx.org/en/docs/http/ngx_http_core_module.html#send_timeout
  393. # https://www.nginx.com/resources/wiki/start/topics/examples/fullexample2/
  394. #
  395. # Here we are sticking with nginx default values change this value carefully.
  396. matrix_nginx_proxy_connect_timeout: 60
  397. matrix_nginx_proxy_send_timeout: 60
  398. matrix_nginx_proxy_read_timeout: 60
  399. matrix_nginx_send_timeout: 60
  400. # Controls whether to send a "Permissions-Policy interest-cohort=();" header along with all responses for all vhosts meant to be accessed by users.
  401. #
  402. # Learn more about what it is here:
  403. # - https://www.eff.org/deeplinks/2021/03/googles-floc-terrible-idea
  404. # - https://paramdeo.com/blog/opting-your-website-out-of-googles-floc-network
  405. # - https://amifloced.org/
  406. #
  407. # Of course, a better solution is to just stop using browsers (like Chrome), which participate in such tracking practices.
  408. matrix_nginx_proxy_floc_optout_enabled: true
  409. # HSTS Preloading Enable
  410. #
  411. # In its strongest and recommended form, the [HSTS policy](https://www.chromium.org/hsts) includes all subdomains, and
  412. # indicates a willingness to be “preloaded” into browsers:
  413. # `Strict-Transport-Security: max-age=31536000; includeSubDomains; preload`
  414. # For more information visit:
  415. # - https://en.wikipedia.org/wiki/HTTP_Strict_Transport_Security
  416. # - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security
  417. # - https://hstspreload.org/#opt-in
  418. matrix_nginx_proxy_hsts_preload_enabled: false
  419. # X-XSS-Protection Enable
  420. # Stops pages from loading when they detect reflected cross-site scripting (XSS) attacks.
  421. # Note: Not applicable for grafana
  422. #
  423. # Learn more about it is here:
  424. # - https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection
  425. # - https://portswigger.net/web-security/cross-site-scripting/reflected
  426. matrix_nginx_proxy_xss_protection: "1; mode=block"
  427. # Specifies the SSL configuration that should be used for the SSL protocols and ciphers
  428. # This is based on the Mozilla Server Side TLS Recommended configurations.
  429. #
  430. # The posible values are:
  431. # - "modern" - For Modern clients that support TLS 1.3, with no need for backwards compatibility
  432. # - "intermediate" - Recommended configuration for a general-purpose server
  433. # - "old" - Services accessed by very old clients or libraries, such as Internet Explorer 8 (Windows XP), Java 6, or OpenSSL 0.9.8
  434. #
  435. # For more information visit:
  436. # - https://wiki.mozilla.org/Security/Server_Side_TLS#Recommended_configurations
  437. # - https://ssl-config.mozilla.org/#server=nginx
  438. matrix_nginx_proxy_ssl_preset: "intermediate"
  439. # Presets are taken from Mozilla's Server Side TLS Recommended configurations
  440. # DO NOT modify these values and use `matrix_nginx_proxy_ssl_protocols`, `matrix_nginx_proxy_ssl_ciphers` and `matrix_nginx_proxy_ssl_ciphers`
  441. # if you wish to use something more custom.
  442. matrix_nginx_proxy_ssl_presets:
  443. modern:
  444. protocols: TLSv1.3
  445. ciphers: ""
  446. prefer_server_ciphers: "off"
  447. intermediate:
  448. protocols: TLSv1.2 TLSv1.3
  449. ciphers: ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384
  450. prefer_server_ciphers: "off"
  451. old:
  452. protocols: TLSv1 TLSv1.1 TLSv1.2 TLSv1.3
  453. ciphers: ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES256-SHA256:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:DES-CBC3-SHA
  454. prefer_server_ciphers: "on"
  455. # Specifies which *SSL protocols* to use when serving all the various vhosts.
  456. matrix_nginx_proxy_ssl_protocols: "{{ matrix_nginx_proxy_ssl_presets[matrix_nginx_proxy_ssl_preset]['protocols'] }}"
  457. # Specifies whether to prefer *the client’s choice or the server’s choice* when negotiating ciphers.
  458. matrix_nginx_proxy_ssl_prefer_server_ciphers: "{{ matrix_nginx_proxy_ssl_presets[matrix_nginx_proxy_ssl_preset]['prefer_server_ciphers'] }}"
  459. # Specifies which *SSL Cipher suites* to use when serving all the various vhosts.
  460. # To see the full list for suportes ciphers run `openssl ciphers` on your server
  461. matrix_nginx_proxy_ssl_ciphers: "{{ matrix_nginx_proxy_ssl_presets[matrix_nginx_proxy_ssl_preset]['ciphers'] }}"
  462. # Specifies what to use for the X-Forwarded-For variable.
  463. # If you're fronting the nginx reverse-proxy with additional reverse-proxy servers,
  464. # you may wish to set this to '$proxy_add_x_forwarded_for' instead.
  465. matrix_nginx_proxy_x_forwarded_for: '$remote_addr'
  466. # Controls whether the self-check feature should validate SSL certificates.
  467. matrix_nginx_proxy_self_check_validate_certificates: true
  468. # Controls whether redirects will be followed when checking the `/.well-known/matrix/client` resource.
  469. #
  470. # As per the spec (https://matrix.org/docs/spec/client_server/r0.6.0#well-known-uri), it shouldn't be,
  471. # so we default to not following redirects as well.
  472. matrix_nginx_proxy_self_check_well_known_matrix_client_follow_redirects: none
  473. # For OCSP purposes, we need to define a resolver at the `server{}` level or `http{}` level (we do the latter).
  474. #
  475. # Otherwise, we get warnings like this:
  476. # > [warn] 22#22: no resolver defined to resolve r3.o.lencr.org while requesting certificate status, responder: r3.o.lencr.org, certificate: "/matrix/ssl/config/live/.../fullchain.pem"
  477. #
  478. # We point it to the internal Docker resolver, which likely delegates to nameservers defined in `/etc/resolv.conf`.
  479. #
  480. # When nginx proxy is disabled, our configuration is likely used by non-containerized nginx, so can't use the internal Docker resolver.
  481. # Pointing `resolver` to some public DNS server might be an option, but for now we impose DNS servers on people.
  482. # It might also be that no such warnings occur when not running in a container.
  483. matrix_nginx_proxy_http_level_resolver: "{{ '127.0.0.11' if matrix_nginx_proxy_enabled else '' }}"
  484. # By default, this playbook automatically retrieves and auto-renews
  485. # free SSL certificates from Let's Encrypt.
  486. #
  487. # The following retrieval methods are supported:
  488. # - "lets-encrypt" - the playbook obtains free SSL certificates from Let's Encrypt
  489. # - "self-signed" - the playbook generates and self-signs certificates
  490. # - "manually-managed" - lets you manage certificates by yourself (manually; see below)
  491. # - "none" - like "manually-managed", but doesn't care if you don't drop certificates in the location it expects
  492. #
  493. # If you decide to manage certificates by yourself (`matrix_ssl_retrieval_method: manually-managed`),
  494. # you'd need to drop them into the directory specified by `matrix_ssl_config_dir_path`
  495. # obeying the following hierarchy:
  496. # - <matrix_ssl_config_dir_path>/live/<domain>/fullchain.pem
  497. # - <matrix_ssl_config_dir_path>/live/<domain>/privkey.pem
  498. # where <domain> refers to the domains that you need (usually `matrix_server_fqn_matrix` and `matrix_server_fqn_element`).
  499. #
  500. # The "none" type (`matrix_ssl_retrieval_method: none`), simply means that no certificate retrieval will happen.
  501. # It's useful for when you've disabled the nginx proxy (`matrix_nginx_proxy_enabled: false`)
  502. # and you'll be using another reverse-proxy server (like Apache) with your own certificates, managed by yourself.
  503. # It's also useful if you're using `matrix_nginx_proxy_https_enabled: false` to make this nginx proxy serve
  504. # plain HTTP traffic only (usually, on the loopback interface only) and you'd be terminating SSL using another reverse-proxy.
  505. matrix_ssl_retrieval_method: "lets-encrypt"
  506. matrix_ssl_architecture: "amd64"
  507. # The full list of domains that this role will obtain certificates for.
  508. # This variable is likely redefined outside of the role, to include the domains that are necessary (depending on the services that are enabled).
  509. # To add additional domain names, consider using `matrix_ssl_additional_domains_to_obtain_certificates_for` instead.
  510. matrix_ssl_domains_to_obtain_certificates_for: "{{ matrix_ssl_additional_domains_to_obtain_certificates_for }}"
  511. # A list of additional domain names to obtain certificates for.
  512. matrix_ssl_additional_domains_to_obtain_certificates_for: []
  513. # Controls whether to obtain production or staging certificates from Let's Encrypt.
  514. # If you'd like to use another ACME Certificate Authority server (not Let's Encrypt), use `matrix_ssl_lets_encrypt_server`
  515. matrix_ssl_lets_encrypt_staging: false
  516. # Controls from which Certificate Authority server to retrieve the SSL certificates (passed as a `--server` flag to Certbot).
  517. # By default, we use the Let's Encrypt production environment (use `matrix_ssl_lets_encrypt_staging` for using the staging environment).
  518. # Learn more here: https://eff-certbot.readthedocs.io/en/stable/using.html#changing-the-acme-server
  519. matrix_ssl_lets_encrypt_server: ''
  520. matrix_ssl_lets_encrypt_certbot_docker_image: "{{ matrix_container_global_registry_prefix }}certbot/certbot:{{ matrix_ssl_architecture }}-v2.0.0"
  521. matrix_ssl_lets_encrypt_certbot_docker_image_force_pull: "{{ matrix_ssl_lets_encrypt_certbot_docker_image.endswith(':latest') }}"
  522. matrix_ssl_lets_encrypt_certbot_standalone_http_port: 2402
  523. matrix_ssl_lets_encrypt_support_email: ~
  524. # Tells which interface and port the Let's Encrypt (certbot) container should try to bind to
  525. # when it tries to obtain initial certificates in standalone mode.
  526. #
  527. # This should normally be a public interface and port.
  528. # If you'd like to not bind on all IP addresses, specify one explicitly (e.g. `a.b.c.d:80`)
  529. matrix_ssl_lets_encrypt_container_standalone_http_host_bind_port: '80'
  530. # Specify key type of the private key algorithm.
  531. # Learn more here: https://eff-certbot.readthedocs.io/en/stable/using.html#rsa-and-ecdsa-keys
  532. matrix_ssl_lets_encrypt_key_type: ecdsa
  533. matrix_ssl_base_path: "{{ matrix_base_data_path }}/ssl"
  534. matrix_ssl_config_dir_path: "{{ matrix_ssl_base_path }}/config"
  535. matrix_ssl_log_dir_path: "{{ matrix_ssl_base_path }}/log"
  536. matrix_ssl_bin_dir_path: "{{ matrix_ssl_base_path }}/bin"
  537. # If you'd like to start some service before a certificate is obtained, specify it here.
  538. # This could be something like `matrix-dynamic-dns`, etc.
  539. matrix_ssl_pre_obtaining_required_service_name: ~
  540. matrix_ssl_pre_obtaining_required_service_start_wait_time_seconds: 60
  541. # matrix_ssl_orphaned_renewal_configs_purging_enabled controls whether the playbook will delete Let's Encryption renewal configuration files (`/matrix/ssl/config/renewal/*.conf)
  542. # for domains that are not part of the `matrix_ssl_domains_to_obtain_certificates_for` list.
  543. #
  544. # As the `matrix_ssl_domains_to_obtain_certificates_for` list changes over time, the playbook obtains certificates for various domains
  545. # and sets up "renewal" configuration files to keep these certificates fresh.
  546. # When a domain disappears from the `matrix_ssl_domains_to_obtain_certificates_for` list (because its associated service had gotten disabled),
  547. # the certificate files and renewal configuration still remain in the filesystem and certbot may try to renewal the certificate for this domain.
  548. # If there's no DNS record for this domain or it doesn't point to this server anymore, the `matrix-ssl-lets-encrypt-certificates-renew.service` systemd service
  549. # won't be able to renew the certificate and will generate an error.
  550. #
  551. # With `matrix_ssl_orphaned_renewal_configs_purging_enabled` enabled, orphaned renewal configurations will be purged on each playbook run.
  552. # Some other leftover files will still remain, but we don't bother purging them because they don't cause troubles.
  553. matrix_ssl_orphaned_renewal_configs_purging_enabled: true
  554. # Nginx Optimize SSL Session
  555. #
  556. # ssl_session_cache:
  557. # - Creating a cache of TLS connection parameters reduces the number of handshakes
  558. # and thus can improve the performance of application.
  559. # - Default session cache is not optimal as it can be used by only one worker process
  560. # and can cause memory fragmentation. It is much better to use shared cache.
  561. # - Learn More: https://nginx.org/en/docs/http/ngx_http_ssl_module.html
  562. #
  563. # ssl_session_timeout:
  564. # - Nginx by default it is set to 5 minutes which is very low.
  565. # should be like 4h or 1d but will require you to increase the size of cache.
  566. # - Learn More:
  567. # https://github.com/certbot/certbot/issues/6903
  568. # https://github.com/mozilla/server-side-tls/issues/198
  569. #
  570. # ssl_session_tickets:
  571. # - In case of session tickets, information about session is given to the client.
  572. # Enabling this improve performance also make Perfect Forward Secrecy useless.
  573. # - If you would instead like to use ssl_session_tickets by yourself, you can set
  574. # matrix_nginx_proxy_ssl_session_tickets_off false.
  575. # - Learn More: https://github.com/mozilla/server-side-tls/issues/135
  576. #
  577. # Presets are taken from Mozilla's Server Side TLS Recommended configurations
  578. matrix_nginx_proxy_ssl_session_cache: "shared:MozSSL:10m"
  579. matrix_nginx_proxy_ssl_session_timeout: "1d"
  580. matrix_nginx_proxy_ssl_session_tickets_off: true
  581. # OCSP Stapling eliminating the need for clients to contact the CA, with the aim of improving both security and performance.
  582. # OCSP stapling can provide a performance boost of up to 30%
  583. # nginx web server supports OCSP stapling since version 1.3.7.
  584. #
  585. # *warning* Nginx is lazy loading OCSP responses, which means that for the first few web requests it is unable to add the OCSP response.
  586. # set matrix_nginx_proxy_ocsp_stapling_enabled false to disable OCSP Stapling
  587. #
  588. # Learn more about what it is here:
  589. # - https://en.wikipedia.org/wiki/OCSP_stapling
  590. # - https://blog.cloudflare.com/high-reliability-ocsp-stapling/
  591. # - https://blog.mozilla.org/security/2013/07/29/ocsp-stapling-in-firefox/
  592. matrix_nginx_proxy_ocsp_stapling_enabled: true
  593. # nginx status page configurations.
  594. matrix_nginx_proxy_proxy_matrix_nginx_status_enabled: false
  595. matrix_nginx_proxy_proxy_matrix_nginx_status_allowed_addresses: ['{{ ansible_default_ipv4.address }}']
  596. # The amount of worker processes and connections
  597. # Consider increasing these when you are expecting high amounts of traffic
  598. # http://nginx.org/en/docs/ngx_core_module.html#worker_connections
  599. matrix_nginx_proxy_worker_processes: auto
  600. matrix_nginx_proxy_worker_connections: 1024
  601. # A mapping of JVB server ids to hostname/ipa addresses used to add additional jvb blocks
  602. # to the Jitsi's server configuration (matrix-jitsi.conf)
  603. # Note: avoid using the JVB server id "jvb-1" as this is reserved for the main host.
  604. # Example:
  605. # matrix_nginx_proxy_proxy_jitsi_additional_jvbs:
  606. # jvb-2: 192.168.0.1
  607. # jvb-3: 192.168.0.2
  608. matrix_nginx_proxy_proxy_jitsi_additional_jvbs: {}