2022-02-05 21:32:54 +01:00
---
2022-11-23 15:56:39 +01:00
2019-02-28 10:51:09 +01:00
# The bare domain name which represents your Matrix identity.
# Matrix user ids for your server will be of the form (`@user:<matrix-domain>`).
#
2019-01-12 16:53:00 +01:00
# Note: this playbook does not touch the server referenced here.
2019-02-28 10:51:09 +01:00
# Installation happens on another server ("matrix.<matrix-domain>", see `matrix_server_fqn_matrix`).
#
# Example value: example.com
matrix_domain : ~
2019-01-12 16:53:00 +01:00
2022-06-27 09:34:04 +02:00
# The optional matrix admin MXID, used in bridges' configs to set bridge admin user
2022-06-27 13:38:21 +02:00
# Example value: "@someone:{{ matrix_domain }}"
2022-06-27 09:34:04 +02:00
matrix_admin : ''
2022-11-23 15:56:39 +01:00
# matrix_homeserver_enabled controls whether to enable the homeserver systemd service, etc.
#
# Unless you're wrapping this playbook in another one
# where you optionally wish to disable homeserver integration, you don't need to use this.
#
# Note: disabling this does not mean that a homeserver won't get installed.
# Whether homeserver software is installed depends on other (`matrix_HOMESERVER_enabled`) variables - see `group_vars/matrix_servers`.
matrix_homeserver_enabled : true
2022-07-18 11:28:59 +02:00
# Homeserver admin contacts and support page as per MSC 1929
# See: https://github.com/matrix-org/matrix-spec-proposals/pull/1929
# Users in form:
# matrix_homeserver_admin_contacts:
# - matrix_id: @admin:domain.tld
# email_address: admin@domain.tld
# role: admin
# - email_address: security@domain.tld
# role: security
2022-07-18 11:32:38 +02:00
# Also see: `matrix_well_known_matrix_support_enabled`
2022-07-18 11:28:59 +02:00
matrix_homeserver_admin_contacts : [ ]
# Url string like https://domain.tld/support.html
2022-07-18 11:32:38 +02:00
# Also see: `matrix_well_known_matrix_support_enabled`
2022-07-18 11:28:59 +02:00
matrix_homeserver_support_url : ''
2021-12-17 18:00:17 +01:00
# This will contain the homeserver implementation that is in use.
2022-08-04 21:35:41 +02:00
# Valid values: synapse, dendrite, conduit
2021-12-23 15:28:34 +01:00
#
# By default, we use Synapse, because it's the only full-featured Matrix server at the moment.
#
# This value automatically influences other variables (`matrix_synapse_enabled`, `matrix_dendrite_enabled`, etc.).
# The homeserver implementation of an existing server cannot be changed without data loss.
matrix_homeserver_implementation : synapse
2021-12-17 18:00:17 +01:00
2022-01-07 15:00:42 +01:00
# This contains a secret, which is used for generating various other secrets later on.
matrix_homeserver_generic_secret_key : ''
2019-02-28 10:51:09 +01:00
# This is where your data lives and what we set up.
2020-07-17 10:31:20 +02:00
# This and the Element FQN (see below) are expected to be on the same server.
2019-02-28 10:51:09 +01:00
matrix_server_fqn_matrix : "matrix.{{ matrix_domain }}"
2019-01-12 16:53:00 +01:00
2021-06-28 14:30:48 +02:00
# This is where you access federation API.
matrix_server_fqn_matrix_federation : '{{ matrix_server_fqn_matrix }}'
2020-07-17 10:31:20 +02:00
# This is where you access the Element web UI from (if enabled via matrix_client_element_enabled; enabled by default).
2019-02-28 10:51:09 +01:00
# This and the Matrix FQN (see above) are expected to be on the same server.
2020-07-17 10:31:20 +02:00
matrix_server_fqn_element : "element.{{ matrix_domain }}"
2019-01-12 16:53:00 +01:00
2021-05-15 11:23:36 +02:00
# This is where you access the Hydrogen web client from (if enabled via matrix_client_hydrogen_enabled; disabled by default).
matrix_server_fqn_hydrogen : "hydrogen.{{ matrix_domain }}"
2022-01-05 17:33:21 +01:00
# This is where you access the Cinny web client from (if enabled via matrix_client_cinny_enabled; disabled by default).
matrix_server_fqn_cinny : "cinny.{{ matrix_domain }}"
2022-04-23 15:19:24 +02:00
# This is where you access the buscarron bot from (if enabled via matrix_bot_buscarron_enabled; disabled by default).
matrix_server_fqn_buscarron : "buscarron.{{ matrix_domain }}"
2019-03-07 06:22:08 +01:00
# This is where you access the Dimension.
matrix_server_fqn_dimension : "dimension.{{ matrix_domain }}"
2022-11-04 10:36:10 +01:00
# This is where you access the etherpad (if enabled via matrix_etherpad_enabled; disabled by default).
matrix_server_fqn_etherpad : "etherpad.{{ matrix_domain }}"
2021-03-11 19:23:01 +01:00
# For use with Go-NEB! (github callback url for example)
matrix_server_fqn_bot_go_neb : "goneb.{{ matrix_domain }}"
2020-03-23 16:19:15 +01:00
# This is where you access Jitsi.
matrix_server_fqn_jitsi : "jitsi.{{ matrix_domain }}"
2021-01-29 10:30:04 +01:00
# This is where you access Grafana.
matrix_server_fqn_grafana : "stats.{{ matrix_domain }}"
2021-03-20 12:31:34 +01:00
# This is where you access the Sygnal push gateway.
matrix_server_fqn_sygnal : "sygnal.{{ matrix_domain }}"
2022-06-21 15:31:21 +02:00
# This is where you access the ntfy push notification service.
matrix_server_fqn_ntfy : "ntfy.{{ matrix_domain }}"
2023-02-20 22:34:16 +01:00
# This is where you access rageshake.
matrix_server_fqn_rageshake : "rageshake.{{ matrix_domain }}"
2020-06-09 07:29:03 +02:00
matrix_federation_public_port : 8448
2023-02-06 12:08:11 +01:00
# The name of the Traefik entrypoint for handling Matrix Federation
matrix_federation_traefik_entrypoint : matrix-federation
2020-12-17 10:33:18 +01:00
# The architecture that your server runs.
# Recognized values by us are 'amd64', 'arm32' and 'arm64'.
# Not all architectures support all services, so your experience (on non-amd64) may vary.
# See docs/alternative-architectures.md
2022-11-22 08:09:11 +01:00
matrix_architecture : "{{ 'amd64' if ansible_architecture == 'x86_64' else ('arm64' if ansible_architecture == 'aarch64' else ('arm32' if ansible_architecture.startswith('armv') else '')) }}"
2020-12-17 10:33:18 +01:00
2020-12-17 10:37:30 +01:00
# The architecture for Debian packages.
# See: https://wiki.debian.org/SupportedArchitectures
# We just remap from our `matrix_architecture` values to what Debian and possibly other distros call things.
matrix_debian_arch : "{{ 'armhf' if matrix_architecture == 'arm32' else matrix_architecture }}"
2022-03-10 10:28:25 +01:00
matrix_container_global_registry_prefix : "docker.io/"
2019-01-12 16:53:00 +01:00
matrix_user_username : "matrix"
2020-05-01 19:59:32 +02:00
matrix_user_groupname : "matrix"
2019-01-12 16:53:00 +01:00
2020-07-06 10:05:34 +02:00
# By default, the playbook creates the user (`matrix_user_username`)
# and group (`matrix_user_groupname`) with a random id.
# To use a specific user/group id, override these variables.
matrix_user_uid : ~
matrix_user_gid : ~
2019-01-12 16:53:00 +01:00
matrix_base_data_path : "/matrix"
2019-01-14 14:28:37 +01:00
matrix_base_data_path_mode : "750"
2019-01-12 16:53:00 +01:00
2022-11-27 08:47:02 +01:00
matrix_bin_path : "{{ matrix_base_data_path }}/bin"
2019-01-12 16:53:00 +01:00
matrix_static_files_base_path : "{{ matrix_base_data_path }}/static-files"
2021-01-14 23:21:55 +01:00
2020-05-27 18:53:52 +02:00
matrix_host_command_sleep : "/usr/bin/env sleep"
matrix_host_command_chown : "/usr/bin/env chown"
matrix_host_command_fusermount : "/usr/bin/env fusermount"
2020-05-27 22:18:24 +02:00
matrix_host_command_openssl : "/usr/bin/env openssl"
2020-04-05 08:42:52 +02:00
2019-02-28 10:51:09 +01:00
matrix_homeserver_url : "https://{{ matrix_server_fqn_matrix }}"
2019-01-16 17:05:48 +01:00
2021-12-23 17:13:44 +01:00
# Specifies where the homeserver's Client-Server API is on the container network.
# Where this is depends on whether there's a reverse-proxy in front of the homeserver, which homeserver it is, etc.
2021-01-25 12:55:08 +01:00
# This likely gets overriden elsewhere.
2021-11-16 20:03:21 +01:00
matrix_homeserver_container_url : ""
2021-01-25 12:55:08 +01:00
2021-12-23 17:13:44 +01:00
# Specifies where the homeserver's Federation API is on the container network.
# Where this is depends on whether there's a reverse-proxy in front of the homeserver, which homeserver it is, etc.
# This likely gets overriden elsewhere.
matrix_homeserver_container_federation_url : ""
2019-01-16 17:05:48 +01:00
matrix_identity_server_url : ~
2019-01-12 16:53:00 +01:00
2019-12-10 05:23:56 +01:00
matrix_integration_manager_rest_url : ~
matrix_integration_manager_ui_url : ~
2020-04-09 08:58:35 +02:00
# The domain name where a Jitsi server is self-hosted.
2020-07-17 10:31:20 +02:00
# If set, `/.well-known/matrix/client` will suggest Element clients to use that Jitsi server.
2020-09-26 18:24:09 +02:00
# See: https://github.com/vector-im/element-web/blob/develop/docs/jitsi.md#configuring-element-to-use-your-self-hosted-jitsi-server
2022-07-18 15:43:12 +02:00
matrix_client_element_jitsi_preferredDomain : '' # noqa var-naming
2020-04-09 08:58:35 +02:00
2020-07-17 10:31:20 +02:00
# Controls whether Element should use End-to-End Encryption by default.
# Setting this to false will update `/.well-known/matrix/client` and tell Element clients to avoid E2EE.
2020-09-26 18:24:09 +02:00
# See: https://github.com/vector-im/element-web/blob/develop/docs/e2ee.md
2023-02-13 07:36:20 +01:00
matrix_well_known_matrix_client_io_element_e2ee_default : true
2020-06-24 10:38:51 +02:00
2020-10-16 00:32:00 +02:00
# Controls whether Element should require a secure backup set up before Element can be used.
# Setting this to true will update `/.well-known/matrix/client` and tell Element require a secure backup.
# See: https://github.com/vector-im/element-web/blob/develop/docs/e2ee.md
2023-02-13 07:36:20 +01:00
matrix_well_known_matrix_client_io_element_e2ee_secure_backup_required : false
2020-10-16 00:32:00 +02:00
# Controls which backup methods from ["key", "passphrase"] should be used, both is the default.
# Setting this to other then empty will update `/.well-known/matrix/client` and tell Element which method to use
# See: https://github.com/vector-im/element-web/blob/develop/docs/e2ee.md
2023-02-13 07:36:20 +01:00
matrix_well_known_matrix_client_io_element_e2ee_secure_backup_setup_methods : [ ]
# Controls whether element related entries should be added to the client well-known. Override this to false to hide
# element related well-known entries.
# By default if any of the following change from their default this is set to true:
# `matrix_well_known_matrix_client_io_element_e2ee_default`
# `matrix_well_known_matrix_client_io_element_e2ee_secure_backup_required`
# `matrix_well_known_matrix_client_io_element_e2ee_secure_backup_setup_methods`
matrix_well_known_matrix_client_io_element_e2ee_entries_enabled : "{{ not matrix_well_known_matrix_client_io_element_e2ee_default or matrix_well_known_matrix_client_io_element_e2ee_secure_backup_required or matrix_well_known_matrix_client_io_element_e2ee_secure_backup_setup_methods | length > 0 }}"
2020-10-16 00:32:00 +02:00
2021-11-26 14:25:18 +01:00
# Default `/.well-known/matrix/client` configuration - it covers the generic use case.
# You can customize it by controlling the various variables inside the template file that it references.
#
# For a more advanced customization, you can extend the default (see `matrix_well_known_matrix_client_configuration_extension_json`)
# or completely replace this variable with your own template.
#
# The side-effect of this lookup is that Ansible would even parse the JSON for us, returning a dict.
# This is unlike what it does when looking up YAML template files (no automatic parsing there).
matrix_well_known_matrix_client_configuration_default : "{{ lookup('template', 'templates/static-files/well-known/matrix-client.j2') }}"
# Your custom JSON configuration for `/.well-known/matrix/client` should go to `matrix_well_known_matrix_client_configuration_extension_json`.
# This configuration extends the default starting configuration (`matrix_well_known_matrix_client_configuration_default`).
#
# You can override individual variables from the default configuration, or introduce new ones.
#
# If you need something more special, you can take full control by
# completely redefining `matrix_well_known_matrix_client_configuration`.
#
# Example configuration extension follows:
#
# matrix_well_known_matrix_client_configuration_extension_json: |
# {
# "io.element.call_behaviour": {
# "widget_build_url": "https://dimension.example.com/api/v1/dimension/bigbluebutton/widget_state"
# }
# }
matrix_well_known_matrix_client_configuration_extension_json : '{}'
2022-07-18 11:28:39 +02:00
matrix_well_known_matrix_client_configuration_extension : "{{ matrix_well_known_matrix_client_configuration_extension_json | from_json if matrix_well_known_matrix_client_configuration_extension_json | from_json is mapping else {} }}"
2021-11-26 14:25:18 +01:00
# Holds the final `/.well-known/matrix/client` configuration (a combination of the default and its extension).
# You most likely don't need to touch this variable. Instead, see `matrix_well_known_matrix_client_configuration_default` and `matrix_well_known_matrix_client_configuration_extension_json`.
2022-07-18 11:28:39 +02:00
matrix_well_known_matrix_client_configuration : "{{ matrix_well_known_matrix_client_configuration_default | combine(matrix_well_known_matrix_client_configuration_extension, recursive=True) }}"
2021-11-26 14:25:18 +01:00
# Default `/.well-known/matrix/server` configuration - it covers the generic use case.
# You can customize it by controlling the various variables inside the template file that it references.
#
# For a more advanced customization, you can extend the default (see `matrix_well_known_matrix_server_configuration_extension_json`)
# or completely replace this variable with your own template.
#
# The side-effect of this lookup is that Ansible would even parse the JSON for us, returning a dict.
# This is unlike what it does when looking up YAML template files (no automatic parsing there).
matrix_well_known_matrix_server_configuration_default : "{{ lookup('template', 'templates/static-files/well-known/matrix-server.j2') }}"
# Your custom JSON configuration for `/.well-known/matrix/server` should go to `matrix_well_known_matrix_server_configuration_extension_json`.
# This configuration extends the default starting configuration (`matrix_well_known_matrix_server_configuration_default`).
#
# You can override individual variables from the default configuration, or introduce new ones.
#
# If you need something more special, you can take full control by
# completely redefining `matrix_well_known_matrix_server_configuration`.
#
# Example configuration extension follows:
#
# matrix_well_known_matrix_server_configuration_extension_json: |
# {
# "something": "another"
# }
matrix_well_known_matrix_server_configuration_extension_json : '{}'
2022-07-18 11:28:39 +02:00
matrix_well_known_matrix_server_configuration_extension : "{{ matrix_well_known_matrix_server_configuration_extension_json | from_json if matrix_well_known_matrix_server_configuration_extension_json | from_json is mapping else {} }}"
2021-11-26 14:25:18 +01:00
# Holds the final `/.well-known/matrix/server` configuration (a combination of the default and its extension).
# You most likely don't need to touch this variable. Instead, see `matrix_well_known_matrix_server_configuration_default` and `matrix_well_known_matrix_server_configuration_extension_json`.
2022-07-18 11:28:39 +02:00
matrix_well_known_matrix_server_configuration : "{{ matrix_well_known_matrix_server_configuration_default | combine(matrix_well_known_matrix_server_configuration_extension, recursive=True) }}"
2021-11-26 14:25:18 +01:00
2022-07-18 11:28:59 +02:00
# The side-effect of this lookup is that Ansible would even parse the JSON for us, returning a dict.
# This is unlike what it does when looking up YAML template files (no automatic parsing there).
matrix_well_known_matrix_support_configuration_default : "{{ lookup('template', 'templates/static-files/well-known/matrix-support.j2') }}"
matrix_well_known_matrix_support_configuration_extension_json : '{}'
2022-07-18 12:21:32 +02:00
matrix_well_known_matrix_support_configuration_extension : "{{ matrix_well_known_matrix_support_configuration_extension_json | from_json if matrix_well_known_matrix_support_configuration_extension_json | from_json is mapping else {} }}"
2022-07-18 11:28:59 +02:00
# Holds the final `/.well-known/matrix/support` configuration (a combination of the default and its extension).
# You most likely don't need to touch this variable. Instead, see `matrix_well_known_matrix_support_configuration_default` and `matrix_well_known_matrix_support_configuration_extension_json`.
2022-07-18 12:21:32 +02:00
matrix_well_known_matrix_support_configuration : "{{ matrix_well_known_matrix_support_configuration_default | combine(matrix_well_known_matrix_support_configuration_extension, recursive=True) }}"
2021-11-26 14:25:18 +01:00
2019-01-12 16:53:00 +01:00
# The Docker network that all services would be put into
matrix_docker_network : "matrix"
2019-02-05 11:08:00 +01:00
# Controls whether a `/.well-known/matrix/server` file is generated and used at all.
#
# If you wish to rely on DNS SRV records only, you can disable this.
2019-02-14 17:40:55 +01:00
# Using DNS SRV records implies that you'll be handling Matrix Federation API traffic (tcp/8448)
2019-02-28 10:51:09 +01:00
# using certificates for the base domain (`matrix_domain`) and not for the
# matrix domain (`matrix_server_fqn_matrix`).
2019-02-05 11:08:00 +01:00
matrix_well_known_matrix_server_enabled : true
2022-07-18 11:32:38 +02:00
# Controls whether a `/.well-known/matrix/support` file is generated and used at all.
#
2022-07-18 11:54:45 +02:00
# This is not enabled by default, until the MSC gets accepted: https://github.com/matrix-org/matrix-spec-proposals/pull/1929
#
2022-07-18 11:32:38 +02:00
# See `matrix_homeserver_admin_contacts`, `matrix_homeserver_support_url`, etc.
2022-07-18 11:54:45 +02:00
matrix_well_known_matrix_support_enabled : false
2022-07-18 11:32:38 +02:00
2022-11-22 20:36:49 +01:00
matrix_homeserver_container_extra_arguments_auto : [ ]
matrix_homeserver_app_service_config_files_auto : [ ]
2023-02-10 14:50:35 +01:00
# Specifies the type of reverse-proxy used by the playbook.
#
# Changing this has an effect on whether a reverse-proxy is installed at all and what its type is,
# as well as how all other services are configured.
#
# Valid options and a description of their behavior:
#
2023-02-11 07:44:11 +01:00
# - `playbook-managed-traefik`
2023-02-10 18:36:06 +01:00
# - the playbook will install devture-traefik
# - Traefik will do SSL termination, unless you disable it (e.g. `devture_traefik_config_entrypoint_web_secure_enabled: false`)
2023-02-19 09:19:54 +01:00
# - if SSL termination is enabled (as it is by default), you need to populate: `devture_traefik_config_certificatesResolvers_acme_email`
2023-02-10 14:50:35 +01:00
# - it will also install matrix-nginx-proxy in local-only mode, while we migrate the rest of the services to a Traefik-native mode of working
#
2023-02-11 07:44:11 +01:00
# - `playbook-managed-nginx`
2023-02-10 18:36:06 +01:00
# - the playbook will install matrix-nginx-proxy
# - matrix-nginx-proxy will do SSL termination with Certbot, unless you change that (see `matrix_ssl_retrieval_method`)
2023-02-11 07:58:53 +01:00
# - if SSL termination is enabled (as it is by default), you need to populate: `matrix_ssl_lets_encrypt_support_email`
2023-02-10 14:50:35 +01:00
#
# - `other-traefik-container`
2023-02-10 18:36:06 +01:00
# - this playbook will not install Traefik
# - nevertheless, the playbook expects that you would install Traefik yourself via other means
# - you should make sure your Traefik configuration is compatible with what the playbook would have configured (web, web-secure, matrix-federation entrypoints, etc.)
# - you need to set `matrix_playbook_reverse_proxyable_services_additional_network` to the name of your Traefik network
2023-02-11 07:58:53 +01:00
# - Traefik certs dumper will be enabled by default (`devture_traefik_certs_dumper_enabled`). You need to point it to your Traefik's SSL certificates (`devture_traefik_certs_dumper_ssl_dir_path`)
2023-02-10 14:50:35 +01:00
#
# - `other-nginx-non-container`
# - the playbook will not install matrix-nginx-proxy
# - however, it will still dump some nginx configuration in /matrix/nginx/conf.d
# - these configs are meant to be included into a locally-installed (without a container) nginx server
# - all container services are exposed locally (e.g. `-p 127.0.0.1:8080:8080`)
#
# - `other-on-same-host`
# - like other-nginx-non-container, but supposedly won't generate useless configuration in /matrix/nginx/conf.d in the future
#
# - `other-on-another-host`
# - like other-on-same-host, but services are exposed on all interfaces (e.g. `-p 0.0.0.0:8080:8080`)
# - configurable via `matrix_playbook_service_host_bind_interface_prefix`
#
# - `none`
# - no reverse-proxy will be installed
# - no nginx configuration will be dumped in /matrix/nginx/conf.d
# - no port exposure will be done for any of the container services
# - it's up to you to expose the ports you want, etc.
2023-02-26 15:14:05 +01:00
matrix_playbook_reverse_proxy_type : ''
2023-02-10 14:50:35 +01:00
matrix_playbook_service_host_bind_interface_prefix : "{{ '' if matrix_playbook_reverse_proxy_type not in ['other-nginx-non-container', 'other-on-same-host', 'other-on-another-host'] else ('0.0.0.0:' if matrix_playbook_reverse_proxy_type == 'other-on-another-host' else '127.0.0.1:') }}"
2019-01-12 16:53:00 +01:00
# Variables to Control which parts of our roles run.
2019-07-08 07:55:08 +02:00
run_postgres_import : true
run_postgres_upgrade : true
run_postgres_import_sqlite_db : true
2019-07-08 08:38:24 +02:00
run_postgres_vacuum : true
2019-07-08 07:55:08 +02:00
run_synapse_register_user : true
run_synapse_update_user_password : true
run_synapse_import_media_store : true
2020-08-21 12:52:16 +02:00
run_synapse_rust_synapse_compress_state : true
2021-12-18 13:40:34 +01:00
run_dendrite_register_user : true
2019-01-12 16:53:00 +01:00
run_setup : true
2019-07-08 07:55:08 +02:00
run_self_check : true
2019-01-12 16:53:00 +01:00
run_start : true
2022-10-31 23:44:47 +01:00
run_stop : true