Matrix Docker Ansible eploy
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 

225 lines
14 KiB

  1. # SPDX-FileCopyrightText: 2023 - 2024 MDAD project contributors
  2. # SPDX-FileCopyrightText: 2023 - 2026 Catalan Lover <catalanlover@protonmail.com>
  3. # SPDX-FileCopyrightText: 2023 Samuel Meenzen
  4. # SPDX-FileCopyrightText: 2024 - 2025 Slavi Pantaleev
  5. #
  6. # SPDX-License-Identifier: AGPL-3.0-or-later
  7. ---
  8. # A moderation tool for Matrix
  9. # Project source code URL: https://github.com/the-draupnir-project/Draupnir
  10. matrix_bot_draupnir_enabled: true
  11. # renovate: datasource=docker depName=depName=ghcr.io/the-draupnir-project/draupnir
  12. matrix_bot_draupnir_version: "v3.0.0"
  13. matrix_bot_draupnir_container_image_self_build: false
  14. matrix_bot_draupnir_container_image_self_build_repo: "https://github.com/the-draupnir-project/Draupnir.git"
  15. matrix_bot_draupnir_container_image: "{{ matrix_bot_draupnir_container_image_registry_prefix }}{{ matrix_bot_draupnir_container_image_registry_namespace_identifier }}:{{ matrix_bot_draupnir_version }}"
  16. matrix_bot_draupnir_container_image_registry_namespace_identifier: "the-draupnir-project/draupnir"
  17. matrix_bot_draupnir_container_image_registry_prefix: "{{ 'localhost/' if matrix_bot_draupnir_container_image_self_build else matrix_bot_draupnir_container_image_registry_prefix_upstream }}"
  18. matrix_bot_draupnir_container_image_registry_prefix_upstream: "{{ matrix_bot_draupnir_container_image_registry_prefix_upstream_default }}"
  19. matrix_bot_draupnir_container_image_registry_prefix_upstream_default: "ghcr.io/"
  20. matrix_bot_draupnir_base_path: "{{ matrix_base_data_path }}/draupnir"
  21. matrix_bot_draupnir_config_path: "{{ matrix_bot_draupnir_base_path }}/config"
  22. matrix_bot_draupnir_data_path: "{{ matrix_bot_draupnir_base_path }}/data"
  23. matrix_bot_draupnir_container_src_files_path: "{{ matrix_bot_draupnir_base_path }}/docker-src"
  24. # Rolling tag: true if version doesn't match semver shape (vX.Y.Z with optional prerelease/build), false otherwise.
  25. matrix_bot_draupnir_rolling_tag: "{{ not (matrix_bot_draupnir_version is match('^v[0-9]+\\.[0-9]+\\.[0-9]+(?:-[0-9A-Za-z.-]+)?(?:\\+[0-9A-Za-z.-]+)?$')) }}"
  26. # Force restart the service on all runs only when both roles are enabled, both roles
  27. # are using the same version string, and that version is a classified as a moving tag.
  28. matrix_bot_draupnir_force_restart: "{{
  29. matrix_bot_draupnir_enabled | bool and
  30. matrix_appservice_draupnir_for_all_enabled | bool and
  31. matrix_bot_draupnir_version == matrix_appservice_draupnir_for_all_version and
  32. matrix_bot_draupnir_rolling_tag | bool
  33. }}"
  34. matrix_bot_draupnir_config_web_enabled: "{{ matrix_bot_draupnir_config_web_abuseReporting or matrix_bot_draupnir_config_web_synapseHTTPAntispam_enabled }}" # noqa var-naming
  35. matrix_bot_draupnir_config_web_abuseReporting: false # noqa var-naming
  36. matrix_bot_draupnir_config_web_port: 8080
  37. # These variables are used for turning on the integration between the synapseHTTPAntispam module and Draupnir.
  38. # Authorisation is a shared secret between Draupnir and the module just like is used by Appservices and the homeserver
  39. # therefore the same creation mechanism is used here too.
  40. matrix_bot_draupnir_config_web_synapseHTTPAntispam_enabled: false # noqa var-naming
  41. matrix_bot_draupnir_config_web_synapseHTTPAntispam_authorization: '' # noqa var-naming
  42. matrix_bot_draupnir_config_displayReports: "{{ matrix_bot_draupnir_config_web_abuseReporting }}" # noqa var-naming
  43. matrix_bot_draupnir_container_network: ""
  44. matrix_bot_draupnir_container_additional_networks: "{{ matrix_bot_draupnir_container_additional_networks_auto + matrix_bot_draupnir_container_additional_networks_custom }}"
  45. matrix_bot_draupnir_container_additional_networks_auto: []
  46. matrix_bot_draupnir_container_additional_networks_custom: []
  47. # Controls whether the matrix-bot-draupnir container exposes its HTTP port (tcp/80 in the container).
  48. #
  49. # Takes an "<ip>:<port>" or "<port>" value (e.g. "127.0.0.1:8766"), or empty string to not expose.
  50. matrix_bot_draupnir_container_http_host_bind_port: ''
  51. # A list of extra arguments to pass to the container
  52. matrix_bot_draupnir_container_extra_arguments: []
  53. # List of systemd services that matrix-bot-draupnir.service depends on
  54. matrix_bot_draupnir_systemd_required_services_list: "{{ matrix_bot_draupnir_systemd_required_services_list_default + matrix_bot_draupnir_systemd_required_services_list_auto + matrix_bot_draupnir_systemd_required_services_list_custom }}"
  55. matrix_bot_draupnir_systemd_required_services_list_default: "{{ [devture_systemd_docker_base_docker_service_name] if devture_systemd_docker_base_docker_service_name else [] }}"
  56. matrix_bot_draupnir_systemd_required_services_list_auto: []
  57. matrix_bot_draupnir_systemd_required_services_list_custom: []
  58. # List of systemd services that matrix-bot-draupnir.service wants
  59. matrix_bot_draupnir_systemd_wanted_services_list: []
  60. # Whether Draupnir should talk to the homeserver through Pantalaimon
  61. # If true, then other variables must be provided including pointing
  62. # `matrix_bot_draupnir_config_homeserverUrl` to the Pantalaimon URL.
  63. #
  64. # The upstream project discourages enabling this option, because it is
  65. # known that running Draupnir along with Pantalaimon breaks all workflows that involve
  66. # answering prompts with reactions. (Hint: a lot of workflows rely on them.)
  67. matrix_bot_draupnir_pantalaimon_use: false
  68. # If you choose to accept the risks of using Pantalaimon in your installation
  69. # against the upstream advice, you can enable this to disable the warning about using it.
  70. matrix_bot_draupnir_pantalaimon_breakage_ignore: false
  71. # Tells the bot if it should use its native E2EE support in the form of experimental Rust Crypto in the bot SDK.
  72. # This option is mutually exclusive with `matrix_bot_draupnir_pantalaimon_use`.
  73. # Rust Crypto requires a clean access token that has not touched E2EE so curl is recommended as a method to obtain it.
  74. matrix_bot_draupnir_config_experimentalRustCrypto: false # noqa var-naming
  75. # The access token for the bot user. Required if Pantalaimon is NOT used.
  76. # (Otherwise provide `matrix_bot_draupnir_pantalaimon_username` and `matrix_bot_draupnir_pantalaimon_password` instead.)
  77. matrix_bot_draupnir_config_accessToken: "" # noqa var-naming
  78. # Username and password for the bot. Required if Pantalaimon is used.
  79. # (Otherwise provide `matrix_bot_draupnir_config_accessToken` instead.)
  80. matrix_bot_draupnir_pantalaimon_username: ""
  81. matrix_bot_draupnir_pantalaimon_password: ""
  82. # Username and password the bot uses for logging in directly. If Pantalaimon is used,
  83. # these values become the values of `matrix_bot_draupnir_pantalaimon_username` and `matrix_bot_draupnir_pantalaimon_password`
  84. # These config options do not follow the common naming schema as to not cause user confusion over them being called Pantalaimon when using native login.
  85. matrix_bot_draupnir_login: "{{ matrix_bot_draupnir_pantalaimon_username if matrix_bot_draupnir_pantalaimon_use == 'true' else 'bot.draupnir' }}"
  86. matrix_bot_draupnir_password: "{{ matrix_bot_draupnir_pantalaimon_password }}"
  87. # Controls if we activate the config block for Pantalaimon for now. Its name will
  88. # probably be changed for our usecase due to Draupnir's push to scrub Pantalaimon from the codebase.
  89. # This configuration option does not follow the common naming schema as its not controlling a config key directly.
  90. matrix_bot_draupnir_login_native: false
  91. # The room ID where people can use the bot. The bot has no access controls, so
  92. # anyone in this room can use the bot - secure your room!
  93. # This should be a room alias or room ID - not a matrix.to URL.
  94. # Note: Draupnir is fairly verbose - expect a lot of messages from it.
  95. matrix_bot_draupnir_config_managementRoom: "" # noqa var-naming
  96. # Endpoint URL that Draupnir uses to interact with the Matrix homeserver (client-server API).
  97. # Set this to the Pantalaimon URL if you're using that.
  98. matrix_bot_draupnir_config_homeserverUrl: "" # noqa var-naming
  99. # Endpoint URL that Draupnir could use to fetch events related to reports (client-server API and /_synapse/).
  100. # Only set this to the public-internet homeserver client API URL. Do NOT set this to the Pantalaimon URL.
  101. matrix_bot_draupnir_config_rawHomeserverUrl: "" # noqa var-naming
  102. # Disable Server ACL is used if you do not want to give the bot the right to apply Server ACLs in rooms without complaints from the bot.
  103. # This setting is described the following way in the configuration.
  104. #
  105. # Whether or not Draupnir should apply `m.room.server_acl` events.
  106. # DO NOT change this to `true` unless you are very confident that you know what you are doing.
  107. # It is recommended to consult with people from the upstream project beforehand.
  108. #
  109. # It is exposed here because it is common enough to be valid to expose.
  110. matrix_bot_draupnir_config_disableServerACL: false # noqa var-naming
  111. # Control if Draupnir wants for the Synapse Admin API to be exposed internally to containers, therefore giving Draupnir Access.
  112. matrix_bot_draupnir_admin_api_enabled: "{{ matrix_bot_draupnir_config_admin_enableMakeRoomAdminCommand }}"
  113. # Controls if the Draupnir room hijack command is activated or not.
  114. # Also see `matrix_bot_draupnir_admin_api_enabled`.
  115. matrix_bot_draupnir_config_admin_enableMakeRoomAdminCommand: false # noqa var-naming
  116. # Controls if the room state backing store is activated.
  117. # Room state backing store makes restarts of the bot lightning fast as the bot does not suffer from amnesia.
  118. # This config option has diminished improvements for bots on extremely fast homeservers or very very small bots on fast homeservers.
  119. matrix_bot_draupnir_config_roomStateBackingStore_enabled: true # noqa var-naming
  120. matrix_bot_draupnir_web_url: 'http://matrix-bot-draupnir'
  121. # This controls the URL that the module targets in Draupnir.
  122. matrix_bot_draupnir_synapse_http_antispam_config_base_url: "{{ matrix_bot_draupnir_web_url }}:{{ matrix_bot_draupnir_config_web_port }}/api/1/spam_check"
  123. # These variables control the configuration of the Synapse module as the configuration is highly consumer dependent.
  124. # Therefore the module is configured from Draupnir because the consumer of the module determines what settings are relevant.
  125. matrix_bot_draupnir_synapse_http_antispam_config_enabled_callbacks:
  126. - user_may_invite
  127. - user_may_join_room
  128. matrix_bot_draupnir_synapse_http_antispam_config_fail_open:
  129. user_may_invite: true
  130. user_may_join_room: true
  131. matrix_bot_draupnir_synapse_http_antispam_config_async: {}
  132. # Default configuration template which covers the generic use case.
  133. # You can customize it by controlling the various variables inside it.
  134. #
  135. # For a more advanced customization, you can extend the default (see `matrix_bot_draupnir_configuration_extension_yaml`)
  136. # or completely replace this variable with your own template.
  137. matrix_bot_draupnir_configuration_yaml: "{{ lookup('template', 'templates/production.yaml.j2') }}"
  138. matrix_bot_draupnir_configuration_extension_yaml: |
  139. # Your custom YAML configuration goes here.
  140. # This configuration extends the default starting configuration (`matrix_bot_draupnir_configuration_yaml`).
  141. #
  142. # You can override individual variables from the default configuration, or introduce new ones.
  143. #
  144. # If you need something more special, you can take full control by
  145. # completely redefining `matrix_bot_draupnir_configuration_yaml`.
  146. matrix_bot_draupnir_configuration_extension: "{{ matrix_bot_draupnir_configuration_extension_yaml | from_yaml if matrix_bot_draupnir_configuration_extension_yaml | from_yaml is mapping else {} }}"
  147. # Holds the final configuration (a combination of the default and its extension).
  148. # You most likely don't need to touch this variable. Instead, see `matrix_bot_draupnir_configuration_yaml`.
  149. matrix_bot_draupnir_configuration: "{{ matrix_bot_draupnir_configuration_yaml | from_yaml | combine(matrix_bot_draupnir_configuration_extension, recursive=True) }}"
  150. # Controls whether labels will be added that redirect the /_matrix/client/../rooms/../report paths to Draupnir
  151. # Following these recommendations (https://github.com/element-hq/synapse/blob/master/docs/reverse_proxy.md), by default, we don't.
  152. # Regardless of whether this is enabled, it may or may not take effect due to the value of other variables.
  153. # See `matrix_synapse_container_labels_traefik_enabled` or `matrix_synapse_container_labels_matrix_related_labels_enabled`
  154. matrix_bot_draupnir_container_labels_traefik_enabled: false
  155. matrix_bot_draupnir_container_labels_traefik_docker_network: "{{ matrix_draupnir_bot_container_network }}"
  156. matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_hostname: "{{ matrix_synapse_container_labels_traefik_hostname }}" # noqa var-naming
  157. matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_path_regexp: "^/_matrix/client/(r0|v3)/rooms/([^/]*)/report/(.*)$" # noqa var-naming
  158. matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_rule: "Host(`{{ matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_hostname }}`) && PathRegexp(`{{ matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_path_regexp }}`)" # noqa var-naming
  159. matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_priority: 0 # noqa var-naming
  160. matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_entrypoints: "{{ matrix_synapse_container_labels_traefik_entrypoints }}" # noqa var-naming
  161. matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_tls: "{{ matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_entrypoints != 'web' }}" # noqa var-naming
  162. matrix_bot_draupnir_container_labels_web_abuseReporting_traefik_tls_certResolver: "{{ matrix_synapse_container_labels_traefik_tls_certResolver }}" # noqa var-naming
  163. # matrix_bot_draupnir_container_labels_traefik_labels_additional_labels contains a multiline string with additional labels to add to the container label file.
  164. # See `../templates/labels.j2` for details.
  165. #
  166. # Example:
  167. # matrix_bot_draupnir_container_labels_traefik_labels_additional_labels: |
  168. # my.label=1
  169. # another.label="here"
  170. matrix_bot_draupnir_container_labels_traefik_labels_additional_labels: ''
  171. # matrix_bot_draupnir_restart_necessary controls whether the service
  172. # will be restarted (when true) or merely started (when false) by the
  173. # systemd service manager role (when conditional restart is enabled).
  174. #
  175. # This value is automatically computed during installation based on whether
  176. # any configuration files, the systemd service file, or the container image changed.
  177. # The default of `false` means "no restart needed" — appropriate when the role's
  178. # installation tasks haven't run (e.g., due to --tags skipping them).
  179. matrix_bot_draupnir_restart_necessary: false