Matrix Docker Ansible eploy
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 

376 line
21 KiB

  1. ---
  2. # The bare domain name which represents your Matrix identity.
  3. # Matrix user ids for your server will be of the form (`@user:<matrix-domain>`).
  4. #
  5. # Note: this playbook does not touch the server referenced here.
  6. # Installation happens on another server ("matrix.<matrix-domain>", see `matrix_server_fqn_matrix`).
  7. #
  8. # Example value: example.com
  9. matrix_domain: ~
  10. # The optional matrix admin MXID, used in bridges' configs to set bridge admin user
  11. # Example value: "@someone:{{ matrix_domain }}"
  12. matrix_admin: ''
  13. # Global var to enable/disable encryption across all bridges with encryption support
  14. matrix_bridges_encryption_enabled: false
  15. # Global var to enable/disable relay mode across all bridges with relay mode support
  16. matrix_bridges_relay_enabled: false
  17. # matrix_homeserver_enabled controls whether to enable the homeserver systemd service, etc.
  18. #
  19. # Unless you're wrapping this playbook in another one
  20. # where you optionally wish to disable homeserver integration, you don't need to use this.
  21. #
  22. # Note: disabling this does not mean that a homeserver won't get installed.
  23. # Whether homeserver software is installed depends on other (`matrix_HOMESERVER_enabled`) variables - see `group_vars/matrix_servers`.
  24. matrix_homeserver_enabled: true
  25. # Homeserver admin contacts and support page as per MSC 1929
  26. # See: https://github.com/matrix-org/matrix-spec-proposals/pull/1929
  27. # Users in form:
  28. # matrix_homeserver_admin_contacts:
  29. # - matrix_id: @admin:domain.tld
  30. # email_address: admin@domain.tld
  31. # role: admin
  32. # - email_address: security@domain.tld
  33. # role: security
  34. # Also see: `matrix_well_known_matrix_support_enabled`
  35. matrix_homeserver_admin_contacts: []
  36. # Url string like https://domain.tld/support.html
  37. # Also see: `matrix_well_known_matrix_support_enabled`
  38. matrix_homeserver_support_url: ''
  39. # This will contain the homeserver implementation that is in use.
  40. # Valid values: synapse, dendrite, conduit
  41. #
  42. # By default, we use Synapse, because it's the only full-featured Matrix server at the moment.
  43. #
  44. # This value automatically influences other variables (`matrix_synapse_enabled`, `matrix_dendrite_enabled`, etc.).
  45. # The homeserver implementation of an existing server cannot be changed without data loss.
  46. matrix_homeserver_implementation: synapse
  47. # This contains a secret, which is used for generating various other secrets later on.
  48. matrix_homeserver_generic_secret_key: ''
  49. # This is where your data lives and what we set up.
  50. # This and the Element FQN (see below) are expected to be on the same server.
  51. matrix_server_fqn_matrix: "matrix.{{ matrix_domain }}"
  52. # This is where you access federation API.
  53. matrix_server_fqn_matrix_federation: '{{ matrix_server_fqn_matrix }}'
  54. # This is where you access the Element web UI from (if enabled via matrix_client_element_enabled; enabled by default).
  55. # This and the Matrix FQN (see above) are expected to be on the same server.
  56. matrix_server_fqn_element: "element.{{ matrix_domain }}"
  57. # This is where you access the Hydrogen web client from (if enabled via matrix_client_hydrogen_enabled; disabled by default).
  58. matrix_server_fqn_hydrogen: "hydrogen.{{ matrix_domain }}"
  59. # This is where you access the Cinny web client from (if enabled via matrix_client_cinny_enabled; disabled by default).
  60. matrix_server_fqn_cinny: "cinny.{{ matrix_domain }}"
  61. # This is where you access the schildichat web client from (if enabled via matrix_client_schildichat_enabled; disabled by default).
  62. matrix_server_fqn_schildichat: "schildichat.{{ matrix_domain }}"
  63. # This is where you access the buscarron bot from (if enabled via matrix_bot_buscarron_enabled; disabled by default).
  64. matrix_server_fqn_buscarron: "buscarron.{{ matrix_domain }}"
  65. # This is where you access the Dimension.
  66. matrix_server_fqn_dimension: "dimension.{{ matrix_domain }}"
  67. # This is where you access the etherpad (if enabled via etherpad_enabled; disabled by default).
  68. matrix_server_fqn_etherpad: "etherpad.{{ matrix_domain }}"
  69. # For use with Go-NEB! (github callback url for example)
  70. matrix_server_fqn_bot_go_neb: "goneb.{{ matrix_domain }}"
  71. # This is where you access Jitsi.
  72. matrix_server_fqn_jitsi: "jitsi.{{ matrix_domain }}"
  73. # This is where you access Grafana.
  74. matrix_server_fqn_grafana: "stats.{{ matrix_domain }}"
  75. # This is where you access the Sygnal push gateway.
  76. matrix_server_fqn_sygnal: "sygnal.{{ matrix_domain }}"
  77. # This is where you access the mautrix wsproxy push gateway.
  78. matrix_server_fqn_mautrix_wsproxy: "wsproxy.{{ matrix_domain }}"
  79. # This is where you access the ntfy push notification service.
  80. matrix_server_fqn_ntfy: "ntfy.{{ matrix_domain }}"
  81. # This is where you access rageshake.
  82. matrix_server_fqn_rageshake: "rageshake.{{ matrix_domain }}"
  83. matrix_federation_public_port: 8448
  84. # The name of the Traefik entrypoint for handling Matrix Federation
  85. # Also see the `matrix_playbook_public_matrix_federation_api_traefik_entrypoint_*` variables.
  86. matrix_federation_traefik_entrypoint: matrix-federation
  87. # The architecture that your server runs.
  88. # Recognized values by us are 'amd64', 'arm32' and 'arm64'.
  89. # Not all architectures support all services, so your experience (on non-amd64) may vary.
  90. # See docs/alternative-architectures.md
  91. matrix_architecture: "{{ 'amd64' if ansible_architecture == 'x86_64' else ('arm64' if ansible_architecture == 'aarch64' else ('arm32' if ansible_architecture.startswith('armv') else '')) }}"
  92. # The architecture for Debian packages.
  93. # See: https://wiki.debian.org/SupportedArchitectures
  94. # We just remap from our `matrix_architecture` values to what Debian and possibly other distros call things.
  95. matrix_debian_arch: "{{ 'armhf' if matrix_architecture == 'arm32' else matrix_architecture }}"
  96. matrix_container_global_registry_prefix: "docker.io/"
  97. matrix_user_username: "matrix"
  98. matrix_user_groupname: "matrix"
  99. # By default, the playbook creates the user (`matrix_user_username`)
  100. # and group (`matrix_user_groupname`) with a random id.
  101. # To use a specific user/group id, override these variables.
  102. matrix_user_uid: ~
  103. matrix_user_gid: ~
  104. matrix_base_data_path: "/matrix"
  105. matrix_base_data_path_mode: "750"
  106. matrix_bin_path: "{{ matrix_base_data_path }}/bin"
  107. matrix_static_files_base_path: "{{ matrix_base_data_path }}/static-files"
  108. matrix_host_command_sleep: "/usr/bin/env sleep"
  109. matrix_host_command_chown: "/usr/bin/env chown"
  110. matrix_host_command_fusermount: "/usr/bin/env fusermount"
  111. matrix_host_command_openssl: "/usr/bin/env openssl"
  112. matrix_homeserver_url: "https://{{ matrix_server_fqn_matrix }}"
  113. # Specifies where the homeserver's Client-Server API is on the container network.
  114. # Where this is depends on whether there's a reverse-proxy in front of the homeserver, which homeserver it is, etc.
  115. # This likely gets overriden elsewhere.
  116. matrix_homeserver_container_url: ""
  117. # Specifies where the homeserver's Federation API is on the container network.
  118. # Where this is depends on whether there's a reverse-proxy in front of the homeserver, which homeserver it is, etc.
  119. # This likely gets overriden elsewhere.
  120. matrix_homeserver_container_federation_url: ""
  121. # Specifies the public url of the Sync v3 (sliding-sync) API.
  122. # This will be used to set the `org.matrix.msc3575.proxy` property in `/.well-known/matrix/client`.
  123. # Once the API is stabilized, this will no longer be required.
  124. # See MSC3575: https://github.com/matrix-org/matrix-spec-proposals/blob/kegan/sync-v3/proposals/3575-sync.md
  125. matrix_homeserver_sliding_sync_url: ""
  126. matrix_identity_server_url: ~
  127. matrix_integration_manager_rest_url: ~
  128. matrix_integration_manager_ui_url: ~
  129. # The domain name where a Jitsi server is self-hosted.
  130. # If set, `/.well-known/matrix/client` will suggest Element clients to use that Jitsi server.
  131. # See: https://github.com/element-hq/element-web/blob/develop/docs/jitsi.md#configuring-element-to-use-your-self-hosted-jitsi-server
  132. matrix_client_element_jitsi_preferred_domain: '' # noqa var-naming
  133. # Controls whether Element should use End-to-End Encryption by default.
  134. # Setting this to false will update `/.well-known/matrix/client` and tell Element clients to avoid E2EE.
  135. # See: https://github.com/element-hq/element-web/blob/develop/docs/e2ee.md
  136. matrix_well_known_matrix_client_io_element_e2ee_default: true
  137. # Controls whether Element should require a secure backup set up before Element can be used.
  138. # Setting this to true will update `/.well-known/matrix/client` and tell Element require a secure backup.
  139. # See: https://github.com/element-hq/element-web/blob/develop/docs/e2ee.md
  140. matrix_well_known_matrix_client_io_element_e2ee_secure_backup_required: false
  141. # Controls which backup methods from ["key", "passphrase"] should be used, both is the default.
  142. # Setting this to other then empty will update `/.well-known/matrix/client` and tell Element which method to use
  143. # See: https://github.com/element-hq/element-web/blob/develop/docs/e2ee.md
  144. matrix_well_known_matrix_client_io_element_e2ee_secure_backup_setup_methods: []
  145. # Controls whether element related entries should be added to the client well-known. Override this to false to hide
  146. # element related well-known entries.
  147. # By default if any of the following change from their default this is set to true:
  148. # `matrix_well_known_matrix_client_io_element_e2ee_default`
  149. # `matrix_well_known_matrix_client_io_element_e2ee_secure_backup_required`
  150. # `matrix_well_known_matrix_client_io_element_e2ee_secure_backup_setup_methods`
  151. matrix_well_known_matrix_client_io_element_e2ee_entries_enabled: "{{ not matrix_well_known_matrix_client_io_element_e2ee_default or matrix_well_known_matrix_client_io_element_e2ee_secure_backup_required or matrix_well_known_matrix_client_io_element_e2ee_secure_backup_setup_methods | length > 0 }}"
  152. # Default `/.well-known/matrix/client` configuration - it covers the generic use case.
  153. # You can customize it by controlling the various variables inside the template file that it references.
  154. #
  155. # For a more advanced customization, you can extend the default (see `matrix_well_known_matrix_client_configuration_extension_json`)
  156. # or completely replace this variable with your own template.
  157. #
  158. # The side-effect of this lookup is that Ansible would even parse the JSON for us, returning a dict.
  159. # This is unlike what it does when looking up YAML template files (no automatic parsing there).
  160. matrix_well_known_matrix_client_configuration_default: "{{ lookup('template', 'templates/static-files/well-known/matrix-client.j2') }}"
  161. # Your custom JSON configuration for `/.well-known/matrix/client` should go to `matrix_well_known_matrix_client_configuration_extension_json`.
  162. # This configuration extends the default starting configuration (`matrix_well_known_matrix_client_configuration_default`).
  163. #
  164. # You can override individual variables from the default configuration, or introduce new ones.
  165. #
  166. # If you need something more special, you can take full control by
  167. # completely redefining `matrix_well_known_matrix_client_configuration`.
  168. #
  169. # Example configuration extension follows:
  170. #
  171. # matrix_well_known_matrix_client_configuration_extension_json: |
  172. # {
  173. # "io.element.call_behaviour": {
  174. # "widget_build_url": "https://dimension.example.com/api/v1/dimension/bigbluebutton/widget_state"
  175. # }
  176. # }
  177. matrix_well_known_matrix_client_configuration_extension_json: '{}'
  178. matrix_well_known_matrix_client_configuration_extension: "{{ matrix_well_known_matrix_client_configuration_extension_json | from_json if matrix_well_known_matrix_client_configuration_extension_json | from_json is mapping else {} }}"
  179. # Holds the final `/.well-known/matrix/client` configuration (a combination of the default and its extension).
  180. # You most likely don't need to touch this variable. Instead, see `matrix_well_known_matrix_client_configuration_default` and `matrix_well_known_matrix_client_configuration_extension_json`.
  181. matrix_well_known_matrix_client_configuration: "{{ matrix_well_known_matrix_client_configuration_default | combine(matrix_well_known_matrix_client_configuration_extension, recursive=True) }}"
  182. # Default `/.well-known/matrix/server` configuration - it covers the generic use case.
  183. # You can customize it by controlling the various variables inside the template file that it references.
  184. #
  185. # For a more advanced customization, you can extend the default (see `matrix_well_known_matrix_server_configuration_extension_json`)
  186. # or completely replace this variable with your own template.
  187. #
  188. # The side-effect of this lookup is that Ansible would even parse the JSON for us, returning a dict.
  189. # This is unlike what it does when looking up YAML template files (no automatic parsing there).
  190. matrix_well_known_matrix_server_configuration_default: "{{ lookup('template', 'templates/static-files/well-known/matrix-server.j2') }}"
  191. # Your custom JSON configuration for `/.well-known/matrix/server` should go to `matrix_well_known_matrix_server_configuration_extension_json`.
  192. # This configuration extends the default starting configuration (`matrix_well_known_matrix_server_configuration_default`).
  193. #
  194. # You can override individual variables from the default configuration, or introduce new ones.
  195. #
  196. # If you need something more special, you can take full control by
  197. # completely redefining `matrix_well_known_matrix_server_configuration`.
  198. #
  199. # Example configuration extension follows:
  200. #
  201. # matrix_well_known_matrix_server_configuration_extension_json: |
  202. # {
  203. # "something": "another"
  204. # }
  205. matrix_well_known_matrix_server_configuration_extension_json: '{}'
  206. matrix_well_known_matrix_server_configuration_extension: "{{ matrix_well_known_matrix_server_configuration_extension_json | from_json if matrix_well_known_matrix_server_configuration_extension_json | from_json is mapping else {} }}"
  207. # Holds the final `/.well-known/matrix/server` configuration (a combination of the default and its extension).
  208. # You most likely don't need to touch this variable. Instead, see `matrix_well_known_matrix_server_configuration_default` and `matrix_well_known_matrix_server_configuration_extension_json`.
  209. matrix_well_known_matrix_server_configuration: "{{ matrix_well_known_matrix_server_configuration_default | combine(matrix_well_known_matrix_server_configuration_extension, recursive=True) }}"
  210. # The side-effect of this lookup is that Ansible would even parse the JSON for us, returning a dict.
  211. # This is unlike what it does when looking up YAML template files (no automatic parsing there).
  212. matrix_well_known_matrix_support_configuration_default: "{{ lookup('template', 'templates/static-files/well-known/matrix-support.j2') }}"
  213. matrix_well_known_matrix_support_configuration_extension_json: '{}'
  214. matrix_well_known_matrix_support_configuration_extension: "{{ matrix_well_known_matrix_support_configuration_extension_json | from_json if matrix_well_known_matrix_support_configuration_extension_json | from_json is mapping else {} }}"
  215. # Holds the final `/.well-known/matrix/support` configuration (a combination of the default and its extension).
  216. # You most likely don't need to touch this variable. Instead, see `matrix_well_known_matrix_support_configuration_default` and `matrix_well_known_matrix_support_configuration_extension_json`.
  217. matrix_well_known_matrix_support_configuration: "{{ matrix_well_known_matrix_support_configuration_default | combine(matrix_well_known_matrix_support_configuration_extension, recursive=True) }}"
  218. # The Docker network that all services would be put into
  219. matrix_docker_network: "matrix"
  220. # Controls whether a `/.well-known/matrix/server` file is generated and used at all.
  221. #
  222. # If you wish to rely on DNS SRV records only, you can disable this.
  223. # Using DNS SRV records implies that you'll be handling Matrix Federation API traffic (tcp/8448)
  224. # using certificates for the base domain (`matrix_domain`) and not for the
  225. # matrix domain (`matrix_server_fqn_matrix`).
  226. matrix_well_known_matrix_server_enabled: true
  227. # Controls whether a `/.well-known/matrix/support` file is generated and used at all.
  228. # For details about this file, see the spec: https://github.com/matrix-org/matrix-spec-proposals/pull/1929
  229. #
  230. # This is not enabled by default, as for it to be useful, other information is necessary.
  231. # See `matrix_homeserver_admin_contacts`, `matrix_homeserver_support_url`, etc.
  232. matrix_well_known_matrix_support_enabled: false
  233. matrix_homeserver_container_extra_arguments_auto: []
  234. matrix_homeserver_app_service_config_files_auto: []
  235. # Specifies the type of reverse-proxy used by the playbook.
  236. #
  237. # Changing this has an effect on whether a reverse-proxy is installed at all and what its type is,
  238. # as well as how all other services are configured.
  239. #
  240. # Valid options and a description of their behavior:
  241. #
  242. # - `playbook-managed-traefik`
  243. # - the playbook will run a managed Traefik instance (matrix-traefik)
  244. # - Traefik will do SSL termination, unless you disable it (e.g. `devture_traefik_config_entrypoint_web_secure_enabled: false`)
  245. # - if SSL termination is enabled (as it is by default), you need to populate: `devture_traefik_config_certificatesResolvers_acme_email`
  246. # - it will also install matrix-nginx-proxy in local-only mode, while we migrate the rest of the services to a Traefik-native mode of working
  247. #
  248. # - `playbook-managed-nginx`
  249. # - the playbook will install matrix-nginx-proxy
  250. # - matrix-nginx-proxy will do SSL termination with Certbot, unless you change that (see `matrix_ssl_retrieval_method`)
  251. # - if SSL termination is enabled (as it is by default), you need to populate: `matrix_ssl_lets_encrypt_support_email`
  252. #
  253. # - `other-traefik-container`
  254. # - this playbook will not install Traefik
  255. # - nevertheless, the playbook expects that you would install Traefik yourself via other means
  256. # - you should make sure your Traefik configuration is compatible with what the playbook would have configured (web, web-secure, matrix-federation entrypoints, etc.)
  257. # - you need to set `matrix_playbook_reverse_proxyable_services_additional_network` to the name of your Traefik network
  258. # - Traefik certs dumper will be enabled by default (`devture_traefik_certs_dumper_enabled`). You need to point it to your Traefik's SSL certificates (`devture_traefik_certs_dumper_ssl_dir_path`)
  259. #
  260. # - `other-nginx-non-container`
  261. # - the playbook will not install matrix-nginx-proxy
  262. # - however, it will still dump some nginx configuration in /matrix/nginx/conf.d
  263. # - these configs are meant to be included into a locally-installed (without a container) nginx server
  264. # - all container services are exposed locally (e.g. `-p 127.0.0.1:8080:8080`)
  265. #
  266. # - `other-on-same-host`
  267. # - like other-nginx-non-container, but supposedly won't generate useless configuration in /matrix/nginx/conf.d in the future
  268. #
  269. # - `other-on-another-host`
  270. # - like other-on-same-host, but services are exposed on all interfaces (e.g. `-p 0.0.0.0:8080:8080`)
  271. # - configurable via `matrix_playbook_service_host_bind_interface_prefix`
  272. #
  273. # - `none`
  274. # - no reverse-proxy will be installed
  275. # - no nginx configuration will be dumped in /matrix/nginx/conf.d
  276. # - no port exposure will be done for any of the container services
  277. # - it's up to you to expose the ports you want, etc.
  278. matrix_playbook_reverse_proxy_type: ''
  279. matrix_playbook_service_host_bind_interface_prefix: "{{ '' if matrix_playbook_reverse_proxy_type not in ['other-nginx-non-container', 'other-on-same-host', 'other-on-another-host'] else ('0.0.0.0:' if matrix_playbook_reverse_proxy_type == 'other-on-another-host' else '127.0.0.1:') }}"
  280. # Controls whether to enable an additional Traefik entrypoint for the purpose of serving Matrix Federation.
  281. # By default, federation is served on a special port (8448), so a separate entrypoint is necessary.
  282. # Group variables may influence whether this is enabled based on the port number and on the default entrypoints of the Traefik reverse-proxy.
  283. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_enabled: true
  284. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_name: "{{ matrix_federation_traefik_entrypoint }}"
  285. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_port: "{{ matrix_federation_public_port }}"
  286. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_host_bind_port: "{{ matrix_federation_public_port }}"
  287. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config: "{{ matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config_auto | combine(matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config_custom, recursive=True) }}"
  288. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config_auto: {}
  289. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config_custom: {}
  290. matrix_playbook_public_matrix_federation_api_traefik_entrypoint_definition:
  291. name: "{{ matrix_playbook_public_matrix_federation_api_traefik_entrypoint_name }}"
  292. port: "{{ matrix_playbook_public_matrix_federation_api_traefik_entrypoint_port }}"
  293. host_bind_port: "{{ matrix_playbook_public_matrix_federation_api_traefik_entrypoint_host_bind_port }}"
  294. config: "{{ matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config }}"
  295. # Variables to Control which parts of our roles run.
  296. run_postgres_import: true
  297. run_postgres_upgrade: true
  298. run_postgres_import_sqlite_db: true
  299. run_postgres_vacuum: true
  300. run_synapse_register_user: true
  301. run_synapse_update_user_password: true
  302. run_synapse_import_media_store: true
  303. run_synapse_rust_synapse_compress_state: true
  304. run_dendrite_register_user: true
  305. run_setup: true
  306. run_self_check: true
  307. run_start: true
  308. run_stop: true