mirror of
https://github.com/spantaleev/matrix-docker-ansible-deploy.git
synced 2025-06-25 18:57:50 +02:00
Compare commits
1976 Commits
HarHarLink
...
c198cf16fa
Author | SHA1 | Date | |
---|---|---|---|
c198cf16fa | |||
1fc4d175ac | |||
b62302d547 | |||
c97dd0b24f | |||
66ea709cb3 | |||
7911cdb232 | |||
fb05eace5a | |||
3ad2211d74 | |||
11a90a4789 | |||
d89e627a79 | |||
4d39efe6f6 | |||
358b3486f9 | |||
47a337258c | |||
cea437c844 | |||
f1c238e732 | |||
6e3f508d20 | |||
069f1392e0 | |||
9a56aff933 | |||
2337e62ecf | |||
59d9d2995c | |||
c5f4ea6850 | |||
f044bdd279 | |||
6b87d1aa7d | |||
f204a3ad01 | |||
3be6043b5a | |||
93c860305f | |||
a6a55961a9 | |||
8e9ecdfb63 | |||
dc0d74448c | |||
b3b44a1ce8 | |||
4abf6477d3 | |||
3b81f09748 | |||
c95d181c9a | |||
e533eef620 | |||
e5963c5e6c | |||
e7ea622279 | |||
e33bd16dc6 | |||
23bcf87596 | |||
a146f2199b | |||
25601d96a7 | |||
ad9af092a6 | |||
9cbb6fd548 | |||
c51e771d1a | |||
71e5f1103d | |||
36429d8bd3 | |||
1636c49134 | |||
0afa372ca8 | |||
1cf6f86955 | |||
7551680e09 | |||
d4f8d0918a | |||
33b493737d | |||
3ed5d8ec7c | |||
b0ff7a9379 | |||
b1769c1f39 | |||
abfb17e898 | |||
a8372f3613 | |||
9a17e7c24e | |||
6a124f15b3 | |||
4399b6dc80 | |||
a691b20cf2 | |||
8e41eb57c5 | |||
fe65a0a405 | |||
28f419402e | |||
bfc6bf16d6 | |||
7081124237 | |||
2d1c8c7c01 | |||
9f72062fea | |||
fea8df5ca2 | |||
5c2b33ab91 | |||
f5cc79bc88 | |||
bf9bd1f5fb | |||
beeb8a7933 | |||
3dc0e3f5ef | |||
e9e1e603ea | |||
8ab4315484 | |||
784a5aaef4 | |||
7f7871f100 | |||
40f1ed8450 | |||
58c6a262d1 | |||
703ba5ea68 | |||
1032cbd11a | |||
8283225a0e | |||
21bf12b921 | |||
5e2cc46615 | |||
f3cf8a8095 | |||
59c348e0bd | |||
743417c6f1 | |||
1953b89db2 | |||
666830a6c2 | |||
2c6dfeadfd | |||
7be14f03a0 | |||
81c1a529c9 | |||
65e65f36cf | |||
4140048223 | |||
3d2ff0a9f4 | |||
95b9d0ff3d | |||
a4e3e519d9 | |||
bac0f7546a | |||
8f672d8a5b | |||
e5a03ec273 | |||
d5556260f0 | |||
4578c0b10a | |||
c91adca11d | |||
d1bf29f114 | |||
1eb02f82c4 | |||
8fc38ea3c9 | |||
f609f0e800 | |||
bb81885a5b | |||
ff92f6c43a | |||
9db3dd676e | |||
1d4451ccd2 | |||
8d5d4fa4fa | |||
05f1b3a116 | |||
64d6f77abf | |||
f0cc5da229 | |||
47987b909e | |||
d8ebf28ebc | |||
7517499b6e | |||
5cc44cb67d | |||
3104126099 | |||
5d174024aa | |||
b5f89e6429 | |||
2a1456b67a | |||
75bb7732f6 | |||
53ec946f18 | |||
255b1807a2 | |||
c1c1b3ada0 | |||
701e697d90 | |||
e5ab17cafd | |||
0312ae490d | |||
9178b2e053 | |||
d1fa7378f7 | |||
464f2429b6 | |||
83f3b1aab4 | |||
7d14294de6 | |||
57c5953445 | |||
05ba03f9af | |||
0e5d0aec65 | |||
b037cb6164 | |||
bf123e7ad5 | |||
b266ed4200 | |||
819ca21954 | |||
2c719b2ef7 | |||
e5a2935d0f | |||
4d8b226c38 | |||
34d1586f25 | |||
8892c81d6b | |||
e8548e0016 | |||
a07130e46c | |||
78bb07877c | |||
8c4711ffa9 | |||
bd6db65731 | |||
dd31bf0a0a | |||
a31400ed4a | |||
dd5881f2b8 | |||
bc1849d7ff | |||
c385b79498 | |||
20c2aade3e | |||
14a3a01f43 | |||
45352e76ce | |||
119e78bc11 | |||
daf9418610 | |||
543f2a5c76 | |||
2296113b69 | |||
62996143a2 | |||
63c1cb33c0 | |||
8aa9e0048a | |||
da08975ca8 | |||
d528ab1822 | |||
313a01320b | |||
a9ceb57b4f | |||
687627ccd7 | |||
8a18cc946d | |||
f19f3bea2d | |||
cd1905f576 | |||
85b00f298e | |||
ed90f680ee | |||
18dfa6b439 | |||
b395f42948 | |||
a368af41e3 | |||
d08f1dcaff | |||
304c335940 | |||
c4e81097e3 | |||
78d46b0175 | |||
4a254ec6dd | |||
1253a5ecdd | |||
352f2ac24d | |||
344c860250 | |||
fb82b46723 | |||
bcd6798367 | |||
ad3534dd9e | |||
9ed782fcfd | |||
b940b85914 | |||
5317ef61a5 | |||
204878709a | |||
ea7ffa8929 | |||
5483925ee4 | |||
cb4770abb0 | |||
c8affda9db | |||
ce0036e396 | |||
ca8c1cf2b5 | |||
77ef807c54 | |||
94f15c451e | |||
b979bfed9e | |||
c1909001a1 | |||
e36115a5b9 | |||
194a3ca461 | |||
7b6972aea5 | |||
d617f4247c | |||
d48890c7a2 | |||
e8ae798423 | |||
f1712cec73 | |||
b8ed31527c | |||
0c9fc4358d | |||
659b7a000b | |||
67070f6951 | |||
e2d31ec9c3 | |||
ccd6c003ab | |||
9b72852afe | |||
66febbcd72 | |||
caef30064a | |||
d0d563138e | |||
5645ec0eda | |||
ef8581e323 | |||
b363c17cd9 | |||
bccdcbe19b | |||
373b158f75 | |||
2008b8595b | |||
44cc2afc11 | |||
769a31d3ca | |||
b1dec4a123 | |||
e38f433177 | |||
12b67f7925 | |||
43d1760077 | |||
c7148d8b05 | |||
39c21816ca | |||
01bed6d512 | |||
54af9606db | |||
3b0a433ec8 | |||
0df0f8578e | |||
ba0ef316cc | |||
7fc8509f04 | |||
6e9c143d56 | |||
7e45325338 | |||
fa85ba28dd | |||
5e4c930d90 | |||
8078a743e2 | |||
5bf09f5fdc | |||
8f11e1d5bc | |||
a6cdb2c571 | |||
8f9dfdee4e | |||
3c23b643d8 | |||
4f87328ff1 | |||
d8c288c941 | |||
e5c4650cf8 | |||
ab3c4edea7 | |||
135039b276 | |||
09c42477bb | |||
bba3b95344 | |||
757233d53c | |||
c7f8b7cd1a | |||
471e004ff7 | |||
83e9818db7 | |||
cdbdb43514 | |||
131e164e46 | |||
af89261b92 | |||
bb827f44b1 | |||
dd23e2d1c9 | |||
8937572939 | |||
ce46511563 | |||
9a1e08b2f0 | |||
ac02351ab7 | |||
76e6bf3966 | |||
439e012f03 | |||
edc24022f2 | |||
c97dbc9ec6 | |||
f19cbe6dd4 | |||
774f3de863 | |||
f802df6e6d | |||
f62bdcc697 | |||
b94d4d1862 | |||
f7d4ffc20c | |||
04cf09bdb0 | |||
91787fc0bd | |||
57c5271d9d | |||
609cf5940e | |||
4a61bd49e3 | |||
5cad571296 | |||
4bb16fef54 | |||
bddd6015ad | |||
ebb3b0c249 | |||
58a8f79d95 | |||
5f6c3c27d8 | |||
0865e32635 | |||
946ec39954 | |||
26f91e5944 | |||
cce3f23a74 | |||
895ac02db8 | |||
9854dc0a71 | |||
9b99e41fba | |||
763dcec11f | |||
6f3fa72317 | |||
73e2531293 | |||
509542ccaf | |||
3a11881120 | |||
92086867eb | |||
d34b490a3d | |||
61f7f8ff50 | |||
60dca4dd46 | |||
6d1b4781c9 | |||
58603d79bc | |||
5a85bec895 | |||
50d1a8558e | |||
f8b44a8eca | |||
e6b4ffdd93 | |||
5e23dee4bb | |||
5dccd4e106 | |||
ea48e5e9eb | |||
66a812d99c | |||
578b6b7ab7 | |||
e02dd88ed0 | |||
7a77d84276 | |||
28a4434f55 | |||
30efde4ed3 | |||
0cb3e530d9 | |||
260421beb1 | |||
3c34418ebe | |||
885b8e9204 | |||
2fcd824d6b | |||
b61d8f478f | |||
3af7355d14 | |||
fcf3755f9c | |||
73a30375fa | |||
d8cacb9cde | |||
f4eada6f10 | |||
02a2b4d4d1 | |||
b04b658735 | |||
8308a91afa | |||
513320199a | |||
95aaf76d0d | |||
fc2f09d124 | |||
fa2ba3e04c | |||
da181d72f0 | |||
1da02aee3d | |||
1a87f92647 | |||
db57c95cc0 | |||
1b4fa79595 | |||
40d1a526b1 | |||
261b5dee07 | |||
8b9833bfd2 | |||
0a2198f754 | |||
3684e93a61 | |||
eb452b4e3e | |||
c8c83252be | |||
9e5bb8629c | |||
4cd4835888 | |||
065d3ac066 | |||
c720e9531c | |||
bb84d6f70a | |||
68342eda10 | |||
b9b37f34e1 | |||
d817a923a3 | |||
4bd511819f | |||
d689a73f93 | |||
bcc6c4022d | |||
cc3641d7c0 | |||
71b00a817d | |||
a2d193f163 | |||
6b83f00f8e | |||
79680c5ac1 | |||
ae4dd1ea3a | |||
970ae997b6 | |||
08a19ac4ee | |||
7b9aaceb7e | |||
c8ee67aa3b | |||
7864a75607 | |||
8078a8ad2e | |||
68b8f1137f | |||
16104b6e57 | |||
69273b30e4 | |||
d630668f46 | |||
2376821722 | |||
eaeb2f99b5 | |||
15fd33fb45 | |||
c404995456 | |||
7511b3d3ea | |||
6e92a5da3f | |||
22ef4aed3c | |||
55d9aa04c2 | |||
4a5243228c | |||
5ef203777f | |||
b3f3fca295 | |||
1886a8fc4d | |||
f8c9507ae1 | |||
9a9b913bc5 | |||
c6f0b290bc | |||
fd1d3e6bfc | |||
f8ef45a9a3 | |||
af992fb43b | |||
34f9cd9435 | |||
2ac89b7fb2 | |||
0a192bcfcf | |||
018a8c8fdf | |||
48a2ee2db1 | |||
6b5c66675a | |||
c085efc9e0 | |||
3c5664b809 | |||
94cb9bad32 | |||
04488f4599 | |||
39018f7f4d | |||
24ab56b1bc | |||
c2859c727c | |||
a4619fec25 | |||
292dd56eed | |||
2b12ccb517 | |||
d90dcc4a04 | |||
ab1cce5a14 | |||
f3fde12c45 | |||
63e16ed034 | |||
177e49ab47 | |||
8f7a723b37 | |||
f5e333b513 | |||
981a659159 | |||
289bf2909e | |||
085587b103 | |||
0bc4ef8f4d | |||
644fa5fdf7 | |||
8a6b822bbd | |||
e9c5562ae7 | |||
76099c8936 | |||
1be9944282 | |||
8ef2671f2b | |||
2bf31da947 | |||
477afec6d3 | |||
727609c7c8 | |||
e35dae7fca | |||
ddf60ac45b | |||
4de16dde79 | |||
0fdb4a652f | |||
bf0fa1408e | |||
5ebdc0c48d | |||
aa612348bb | |||
8db65bb811 | |||
d200e8d084 | |||
0a8dd90b5e | |||
cb0ea1b23e | |||
950147bc99 | |||
748c38de30 | |||
f41d432ab2 | |||
bff4321fb1 | |||
f6991b2db9 | |||
0b09ad3d76 | |||
c20fcedd2c | |||
e26fea0289 | |||
2234fbbb8a | |||
652feba9cc | |||
fd39392ec5 | |||
15ce998146 | |||
446e656424 | |||
c7d11b71c7 | |||
81831b550d | |||
1008362719 | |||
75c0e88ccd | |||
997e093793 | |||
e87e7e766d | |||
38838983d5 | |||
756bfbdc25 | |||
ad3f359746 | |||
8e33aa6398 | |||
059cf13021 | |||
2cd79e785f | |||
304016982e | |||
4dec2ff563 | |||
efa17d837c | |||
ecd4fc028d | |||
c110ba89b1 | |||
7a791ab692 | |||
409f4195c3 | |||
ec4daa1d3a | |||
15ad4780d6 | |||
4bf2477064 | |||
ef04f5b33f | |||
4bf0414555 | |||
7c504d9d53 | |||
ae864830e0 | |||
a1c01cda5f | |||
6e4ad586e4 | |||
7e0b5753d7 | |||
9cfb8c8c67 | |||
17ccd95734 | |||
379a8677ba | |||
9bd1e3e791 | |||
0cd7404074 | |||
dc461004b4 | |||
560ebd0ae6 | |||
afb538610d | |||
85ccd143ac | |||
d1c7f7eef1 | |||
2e343b44ea | |||
2d36bf17d5 | |||
e77b14a699 | |||
b71c4a1a3e | |||
601406ddda | |||
a74bd65d56 | |||
3d47e0d69c | |||
f9e37fc614 | |||
b63d8a5687 | |||
1c0ba91a47 | |||
cbdf619bd4 | |||
1b117f1757 | |||
91cf8e3230 | |||
65db73e808 | |||
082b75b0c0 | |||
fd43ed9a46 | |||
54e84c5c73 | |||
f4c4930215 | |||
17a20dca1e | |||
dd29a85afe | |||
5dfd023a50 | |||
3e3ac11780 | |||
823a911361 | |||
2c735ab9ab | |||
6dff60e7a4 | |||
70e4320eda | |||
4bc11adb7f | |||
9f372d9058 | |||
9966124531 | |||
4bdbbd9e94 | |||
36a271c154 | |||
a2790d11d5 | |||
b3fa074d67 | |||
c612ca4a09 | |||
b30823745c | |||
ef4c3f78b6 | |||
0751bdcd39 | |||
be9dfdc881 | |||
b35a4293d1 | |||
6995f3990e | |||
ede9612b0b | |||
a367eaa85d | |||
3d9e51fa75 | |||
2f24299597 | |||
66de3412a5 | |||
94fbad4102 | |||
d29ef41715 | |||
a124461ba6 | |||
58a9eb511f | |||
aa7a3b477a | |||
d1d09f7e08 | |||
917a631984 | |||
163b79e877 | |||
14bd58769c | |||
7a5a75ed03 | |||
489c91f51f | |||
66e2ef1f17 | |||
ffa5484cc3 | |||
c5e6873e4b | |||
cfed646149 | |||
9141274f59 | |||
159daa7466 | |||
da07b302fa | |||
5fc2e2f1f9 | |||
0593edbb1a | |||
aaa6335053 | |||
1e8030810f | |||
d152bbcd0c | |||
65967dd52e | |||
ec1b18cf6e | |||
ebd4463654 | |||
a7ab6e74f8 | |||
81a4ef54aa | |||
7b35beb843 | |||
2a73ea4ae5 | |||
17f98f005e | |||
a897841f9b | |||
b9ca98d1e3 | |||
802230a0ef | |||
70411706a9 | |||
8f1262b596 | |||
2afaeef6e3 | |||
fce459d04c | |||
5431a34c69 | |||
44682a9e0f | |||
3d7a926c19 | |||
8f2e9e03a2 | |||
a6fa33e16c | |||
e8c61b0a3c | |||
c892971e89 | |||
ea6e879487 | |||
81d7698944 | |||
a3d47c5581 | |||
3e95e6d2f6 | |||
3ddb1096d4 | |||
e3e16259c0 | |||
9a8fd04432 | |||
398f4bbea5 | |||
abbe7818e2 | |||
7139431d46 | |||
8f16524789 | |||
8bdc8fd037 | |||
c1cffe70ed | |||
0a675d3d91 | |||
95f541b86c | |||
015ad80e62 | |||
f91b716af3 | |||
9ef365424a | |||
c33a4225ba | |||
8caaf2243c | |||
d8a638f518 | |||
09776ccd05 | |||
a933bdde75 | |||
e9998eaf87 | |||
4e5be2fe83 | |||
4db1d6f874 | |||
7f7d19378c | |||
35bef61226 | |||
08b29e9b92 | |||
e7128055f7 | |||
e524d218df | |||
55fcaac1f1 | |||
08a569b0e6 | |||
fa1d92f85d | |||
e27fb2e206 | |||
49f7fd96c9 | |||
26503464c6 | |||
3f15fd49ed | |||
d564124af7 | |||
d997ac6e34 | |||
2b102851e2 | |||
309b91163a | |||
4a375be6a8 | |||
54f7dd587a | |||
b392b544da | |||
c73800b6bc | |||
951cdba49b | |||
7aab3a4f83 | |||
5153c9a6c4 | |||
28c28e1e00 | |||
e42e8aaf83 | |||
6c4eeda748 | |||
9089963fa8 | |||
ee55138f57 | |||
ff4155e033 | |||
3fb2752714 | |||
1c5a8871d5 | |||
faa441029c | |||
d45657df70 | |||
f9cff0ff47 | |||
90cfdabb2b | |||
661974aba4 | |||
f6e118bb4c | |||
95ab7fabd0 | |||
02e0c2c3e0 | |||
fe238474a5 | |||
b2d840482a | |||
d218e93155 | |||
288a711af6 | |||
ef8cf740a1 | |||
e54d66053c | |||
532babc55b | |||
c02aba2724 | |||
7779b747ea | |||
59dd889671 | |||
0261e247e3 | |||
15bc91244a | |||
bfc5374fc8 | |||
12ed373d00 | |||
0eb53a0e77 | |||
0b688eb949 | |||
bf8bbdd5ba | |||
235a1c1644 | |||
e961e1b43d | |||
cd8b969a77 | |||
b9ba9a8ba3 | |||
9be0bd50ec | |||
b7b2fe7fed | |||
22f527ad1a | |||
3d7cef0490 | |||
57e2fb291d | |||
a874d5f918 | |||
72f31faac0 | |||
9b76a86daf | |||
fa7be54bac | |||
9ff0a5c34f | |||
9f0edc628d | |||
844d8ef4c3 | |||
fbd4a48709 | |||
2f9403baee | |||
d9227a98e5 | |||
62292ee7e7 | |||
c4a6a7002e | |||
c400b87c79 | |||
a049859343 | |||
66c60d5691 | |||
c60301a669 | |||
4e38a3712b | |||
1919df1896 | |||
3405dd9ec8 | |||
30a01ce354 | |||
d9dd462db0 | |||
56dc09bf74 | |||
08dfa094ea | |||
c5646712b6 | |||
443a90fef5 | |||
174b18be9a | |||
ac90870e30 | |||
cf50800b30 | |||
ba775a20fc | |||
b3aad9b8a4 | |||
f2a5b8595e | |||
45abdaac01 | |||
bc579cd3ba | |||
c7e347468f | |||
9a75758bbe | |||
58fc1a96d1 | |||
14d5cfd336 | |||
7dd961dea4 | |||
fb2f088bf0 | |||
3fd7377290 | |||
291e66fddf | |||
41186b0771 | |||
a8ab53c149 | |||
ba9aeb7c9f | |||
789bf88b92 | |||
04b5a04df5 | |||
03ae2d11f8 | |||
37900b57d8 | |||
2a443046c8 | |||
76816f1d8e | |||
036c949577 | |||
74b80d46a5 | |||
435da333a9 | |||
97889d8c33 | |||
1eb9bdd8b1 | |||
117d2ad7e8 | |||
913675c0a2 | |||
282e8be07d | |||
5268df9a8b | |||
bf5373479b | |||
ff0d52c824 | |||
a4bfb9611e | |||
08cd782b29 | |||
7161bf5cb4 | |||
e520577842 | |||
ab9f03f171 | |||
f853b05701 | |||
45e1f6c8fb | |||
1047cb0d42 | |||
13b9c8b1bf | |||
dca619ba76 | |||
c249ff1a53 | |||
c5a6862f70 | |||
db53071960 | |||
09d6bf3673 | |||
d2ee9d8ebb | |||
0925317e15 | |||
982c790db1 | |||
cf0793bd9f | |||
2fc5d74049 | |||
a0bf5a076c | |||
e63e0977f2 | |||
038f7b2294 | |||
3a993e43eb | |||
427d02c926 | |||
d2c8491e41 | |||
29c7841cdd | |||
ec5e379672 | |||
74c5277397 | |||
85d0b442d2 | |||
7e2fb9882d | |||
195e0a4481 | |||
ef22504306 | |||
cf29bc7511 | |||
0fe2b06ce4 | |||
b1e772f966 | |||
e253903283 | |||
7afe6c261a | |||
f3709f7df4 | |||
3a082457f2 | |||
b6bfc39dd1 | |||
7f5f44ed47 | |||
dba53732d6 | |||
86d0a01f19 | |||
d9a919a4be | |||
4243957825 | |||
c605235aa8 | |||
88f3996cae | |||
44dc9e1c74 | |||
0b5c5ed258 | |||
c6da799a52 | |||
4d286ddd7a | |||
61c6e09fd8 | |||
4b047b3d63 | |||
bc704a2552 | |||
8b71ce3dec | |||
f8790319fa | |||
d40be5aca6 | |||
148d842386 | |||
d1c8a52e3e | |||
a2db5c3d70 | |||
0a32d76b9b | |||
71d4f79273 | |||
3016630824 | |||
193946c68a | |||
befa282865 | |||
54b715e7fe | |||
f93101f791 | |||
8445843562 | |||
62d66cc196 | |||
fd530d7d48 | |||
a0d29924c4 | |||
8efdfaf854 | |||
8a4c71bbbe | |||
a541f51944 | |||
f657273cc8 | |||
338e6d91c3 | |||
e662eb1e32 | |||
7cbef06c4f | |||
032809a053 | |||
be96be8b3c | |||
6ff979e989 | |||
b670d0f388 | |||
2b8d7e30f7 | |||
c89c356e53 | |||
4d52880170 | |||
5b2600b074 | |||
14a31e3e40 | |||
d9285203fa | |||
34634f144c | |||
cf5763978b | |||
bc0d4759db | |||
605d054549 | |||
aee7d2ca6c | |||
d3b1060428 | |||
de34392edf | |||
239c7eddf8 | |||
67df140ef4 | |||
53f3c94bef | |||
f9705b3323 | |||
01e5514c4b | |||
626a851c82 | |||
52018c652f | |||
42cc7b0844 | |||
ca0abda581 | |||
7507383a90 | |||
5ec468cc78 | |||
3622d71d09 | |||
1666d1a1ff | |||
97cf596683 | |||
11e241e30a | |||
4bb08d4a53 | |||
71abb52d59 | |||
482861fce1 | |||
9ac29e7055 | |||
00910248d2 | |||
74cc935ea6 | |||
1851973734 | |||
c65ddd649e | |||
951c9c97a8 | |||
b725f52677 | |||
9cb3ca2f2d | |||
968f305844 | |||
73d338d9d1 | |||
5778e84925 | |||
8e5e923214 | |||
716177d5bc | |||
c54c5c0076 | |||
a482b95149 | |||
b9a6426555 | |||
15127c6f52 | |||
8b56be0fe1 | |||
f98caedd98 | |||
23301fd5ab | |||
165b24bea3 | |||
283dd6494f | |||
1930984ce2 | |||
05b79057aa | |||
fe300d3472 | |||
e1f06d9ab7 | |||
cc356aaee5 | |||
d19f93349a | |||
4c24e311da | |||
8981c62d0d | |||
e1ca320cc7 | |||
7018fe9afd | |||
98ca534ff6 | |||
43c78d7fd5 | |||
3a304b927c | |||
9bdfdb59c2 | |||
6b961f1ac7 | |||
ced0b05925 | |||
d1e40c0c1e | |||
88fb2bf179 | |||
f94df58e9a | |||
bc7ef40019 | |||
3eae4384dc | |||
efc61596a2 | |||
d887e08376 | |||
48a1bf3b45 | |||
5fac2b65cd | |||
e42c530abc | |||
6def6d2887 | |||
5bd11f8175 | |||
c2e242ad73 | |||
cdc0c0e7af | |||
f1f3553eca | |||
335108fb8e | |||
7581ab8ff4 | |||
171f5f84a2 | |||
1385ad8254 | |||
1d145e86b8 | |||
55b222f636 | |||
63d5f20f38 | |||
e15d09819e | |||
dabe46cf2f | |||
2c3d0b9d81 | |||
2086e3efe0 | |||
48bab2f0ea | |||
9b8fe6eadc | |||
08c602b19c | |||
f0479dbd9e | |||
92c216bf5b | |||
d3831ba3a5 | |||
fbd25ae9e9 | |||
77c59aaea0 | |||
1722e4bd83 | |||
999f2bf8dd | |||
111fa65e44 | |||
e4b54c37fe | |||
76fec0b863 | |||
d35c0f486f | |||
e3d489c5fe | |||
70cbf3d5ae | |||
332301f2ed | |||
7005b8db26 | |||
48e021e446 | |||
05e813a846 | |||
922fe9af26 | |||
8eeffec47b | |||
f629f3b0bb | |||
8a2bd345fd | |||
56b0a72000 | |||
1691eaa7e5 | |||
ff19c0bc19 | |||
b022004adf | |||
e1354d505f | |||
01dbd259c6 | |||
c4d07f8b08 | |||
6bef71ebb8 | |||
9d11271d59 | |||
8915869824 | |||
5323bcc906 | |||
c3fd33566d | |||
25b8f334a3 | |||
c44432b968 | |||
abefed3dff | |||
f4b58b95e9 | |||
6c55c867af | |||
1184b3df02 | |||
96e0890df4 | |||
c689eda506 | |||
849c74991d | |||
d76a5c14d0 | |||
4d46b625ff | |||
62ed4b6c9c | |||
9967165722 | |||
c675f19fe9 | |||
d68fdbb409 | |||
5cef79290f | |||
95e400b571 | |||
2a35ad5a0a | |||
0db1e69790 | |||
97410df4f0 | |||
c32881981e | |||
c6bc56139b | |||
b5473b3bd0 | |||
5f121a9fdb | |||
69ec437f82 | |||
fc7e8eef5d | |||
aee6101f95 | |||
9c3c25419e | |||
1c0b14f63c | |||
686a547dd3 | |||
8297c115ea | |||
ba04bace6d | |||
b5de934ccb | |||
af089b89d1 | |||
880daf55af | |||
570582b30b | |||
71a48ab580 | |||
bcd846d3b8 | |||
035b1c3c04 | |||
a1a1c98257 | |||
0028e3e27d | |||
020c66a2c1 | |||
4d9de7d58a | |||
55f869254b | |||
4202115dbe | |||
e29b5323df | |||
57eeb1be33 | |||
ded398bf44 | |||
c4e690d764 | |||
90e3f4cba8 | |||
f1dbbd3106 | |||
18f4b8a0b6 | |||
91f5731287 | |||
98f5f1c200 | |||
35b23f8ec4 | |||
98a2810fa2 | |||
03195ce80e | |||
2c360a99fe | |||
cb7726f4a8 | |||
9c5f22abeb | |||
bf6e9a2bfa | |||
36ef25669b | |||
dce0f64f6d | |||
469a0ebbf7 | |||
b09555f764 | |||
34b91957f0 | |||
a213164cb1 | |||
e608daaf8f | |||
7bd358df5c | |||
1bc34e2237 | |||
86bc14d640 | |||
e8181b92ad | |||
5cb12ca2fb | |||
951771d0e2 | |||
e3c02dd722 | |||
62ebb733c0 | |||
615952cbaf | |||
c6d8a68e77 | |||
6db03724ab | |||
7c5b2563da | |||
a89d19e88a | |||
bf8e9a64d0 | |||
e3e8e7216f | |||
234fa3bd0c | |||
610243a217 | |||
2ca7df9e75 | |||
7af6c74734 | |||
b003a711c9 | |||
90e70530cc | |||
2737d7673e | |||
6538f06b33 | |||
2ffadc1b4c | |||
c08ed10f3c | |||
35df420880 | |||
04db5e77c0 | |||
9ab6b6529a | |||
44064cfc7d | |||
f66ea73c93 | |||
e818b981f3 | |||
b347d98161 | |||
f81c00c948 | |||
3b2fd0ba2c | |||
30baeded64 | |||
f794aa2005 | |||
de91fe933d | |||
663e545cda | |||
386d98886d | |||
1014eee0a8 | |||
07c73f7723 | |||
c044c815bc | |||
33d5b0d991 | |||
b71b59dd8e | |||
2e1ef654b3 | |||
7d5e430ee9 | |||
751ecaafbb | |||
8e7ab4e23f | |||
49db307e5e | |||
e32190433d | |||
6c3746b237 | |||
a56c2f8921 | |||
9c9b2fe4cb | |||
0f037bba48 | |||
a3200523b5 | |||
f5a088b820 | |||
2617d00e75 | |||
032b76bd62 | |||
c87bb206da | |||
aad167561a | |||
9b5be6825d | |||
329796f4d4 | |||
3e3ce659fe | |||
4322c0b496 | |||
5d1b844fca | |||
e1f4f6c8cb | |||
e2cc4e9447 | |||
74bb812739 | |||
18130f8436 | |||
752de4406e | |||
c72cf3a1da | |||
2c4ac73685 | |||
f4bcbd8ae7 | |||
e02ea07511 | |||
e000cbf0f4 | |||
296199fb40 | |||
d723ac67be | |||
fc91b2e22f | |||
4aa3345db0 | |||
7281cd2a25 | |||
8541aeceb5 | |||
ef90ee9495 | |||
c9052647a3 | |||
659df10799 | |||
498e67e2d8 | |||
aac88f418d | |||
cf41aeb02f | |||
dc2c4f4fc0 | |||
616cb3a91c | |||
4704a60718 | |||
aafea6d259 | |||
ea22acc899 | |||
e3cbc61804 | |||
639a4454c0 | |||
5a40e99d11 | |||
fb3745a7b2 | |||
adeba0a71b | |||
9c9b2a8d38 | |||
6963d13054 | |||
d6aa98e57d | |||
d00410966f | |||
a508d2a069 | |||
2fd1c73c38 | |||
3140d56e15 | |||
a62de5a951 | |||
3b15a0100b | |||
6d3dff5a48 | |||
145acb228e | |||
09d9db5617 | |||
9af4b491fa | |||
450e96526c | |||
42bc1d1e52 | |||
43abdb9ec4 | |||
846a90e791 | |||
9b9a8e67cf | |||
58a99502ab | |||
f84a53d801 | |||
cc70ece99b | |||
75f5a1d880 | |||
7f47ba4b3d | |||
d298e73a62 | |||
3a0cb01d6c | |||
222d0c4604 | |||
dc11d24dec | |||
247daf962f | |||
42b00fdff4 | |||
4224741130 | |||
541dbd4851 | |||
7749048bf8 | |||
b357597a6f | |||
9f2eff2ac7 | |||
f97e849018 | |||
8a01063057 | |||
e33b43e4a6 | |||
cc2521d594 | |||
70fd20cef5 | |||
16b4389c31 | |||
cdd8dfffee | |||
c014c41d82 | |||
66a2584b0e | |||
5997658348 | |||
bc508e585f | |||
3d1ff4e489 | |||
0659ae4b8e | |||
2c40dfd9b8 | |||
1b97d9f439 | |||
2cdf53fd25 | |||
8dda8207c6 | |||
ac864d713d | |||
b94ae91d0a | |||
3a4e58c34d | |||
187e65c3de | |||
e14a5ba12c | |||
7891268873 | |||
3bf488fb16 | |||
5ced92ddc4 | |||
b9fbc84bd6 | |||
887f3d5c64 | |||
8774937184 | |||
cd52deed5d | |||
3af2624b2b | |||
9fd4da47e7 | |||
116ccad708 | |||
05f9339a54 | |||
a50c1d347b | |||
7cd418f4a8 | |||
2f1b63ebd5 | |||
ed1dd204ba | |||
6e960753d7 | |||
515eb41691 | |||
eed9da0e2d | |||
ac40afefff | |||
72803a89ce | |||
9fcc4df913 | |||
d24dcb4d28 | |||
34930fd10a | |||
cc76d7b87f | |||
92e55b39e7 | |||
83f5d73bf9 | |||
2bdc6db2eb | |||
f6f1de5a05 | |||
9fcf2b8486 | |||
cfd8d2543e | |||
de371f675b | |||
047bc04f64 | |||
482306eae0 | |||
16ef282f84 | |||
b3fac0ee11 | |||
285decd7f2 | |||
44ed771ca0 | |||
b46085286e | |||
4d22f84830 | |||
a967f44c10 | |||
14f09cce79 | |||
a6f0d643ed | |||
0b7910fc09 | |||
9e6676d089 | |||
25bdb66fae | |||
044631a679 | |||
6f4e207823 | |||
6890dc3880 | |||
b253e86674 | |||
bf002f6af8 | |||
1f97602525 | |||
0e6ca85a63 | |||
53d4bff696 | |||
5ad20d5c92 | |||
afa524d9e5 | |||
664de248c0 | |||
96994055f0 | |||
11b76bd0c2 | |||
f98753e92a | |||
54358cdfde | |||
a10b68d2d5 | |||
c1241761fd | |||
f0319a4ff0 | |||
b0014f05e7 | |||
9d50ff7d01 | |||
2723d29925 | |||
ff251bf0fe | |||
9b18d75e1f | |||
44355ebbb4 | |||
2ead03597a | |||
e5296c6023 | |||
a293858e1c | |||
7de63270cb | |||
dd182e3514 | |||
b959e5354f | |||
397940aeab | |||
3d8fb3fc98 | |||
9f160856cc | |||
5f7c665c98 | |||
22ff9862a1 | |||
303b081cc8 | |||
6526a16e12 | |||
4d91e8b579 | |||
d9598f0bbd | |||
5dd450d690 | |||
759d0fa7ed | |||
05ed4e1eb8 | |||
55a81ac368 | |||
e12a8ef3f8 | |||
1774ed6e7d | |||
7d9eb0893e | |||
5977dcf0fc | |||
5188bcab05 | |||
174dce2707 | |||
b9de0aa64e | |||
13846fcc76 | |||
2a546a1e07 | |||
0106c016ee | |||
0f6aba3aac | |||
d8904eb36c | |||
2d1593f500 | |||
4c36f9e532 | |||
38aba951f4 | |||
951c06ebb5 | |||
e1135b15e8 | |||
f60e4a8241 | |||
858b300a5a | |||
328c3e0f26 | |||
88609a59b1 | |||
c89e437579 | |||
9d647a7362 | |||
7b4983c5e8 | |||
11494ac5fc | |||
4cf447ef8d | |||
f8f9229676 | |||
5a364f2b45 | |||
a57b38dc25 | |||
5365f58422 | |||
b63918813e | |||
0742d348b0 | |||
0afc4f1427 | |||
80ce28405c | |||
d7fbec3e2a | |||
0c25bf0242 | |||
3cfc8a423c | |||
45fe0408ba | |||
f6aa94deb9 | |||
cd88e4658c | |||
98bd0f9272 | |||
dd6ee2dd14 | |||
382fa37f19 | |||
348c8c25e0 | |||
3e57c9f6e9 | |||
532e8b498b | |||
de4eb1ace1 | |||
cc62d71243 | |||
0430baf567 | |||
e1a086ff87 | |||
37143b1305 | |||
50813c600d | |||
17b109d9f6 | |||
42c036c920 | |||
23dda314ef | |||
661f8c7121 | |||
0e05a332db | |||
d0fd25dcda | |||
9a8c9850aa | |||
a34ab87782 | |||
b5ec8f83b1 | |||
ffd5829476 | |||
859f4ca26b | |||
0b4309c8ef | |||
56cf263eb2 | |||
3454394857 | |||
9c01d875f3 | |||
7143133beb | |||
38b4c2e21f | |||
3b7468787f | |||
60b304a2f3 | |||
fe89e7dcbd | |||
2d78ff2bda | |||
530df651c2 | |||
a99b57943d | |||
3758b0cfeb | |||
96d42d2009 | |||
0049ddf002 | |||
d25d0572fb | |||
6de6dd4759 | |||
c1b93fb337 | |||
e3bfd17792 | |||
23aee07cf4 | |||
998b48e07d | |||
55b6abdbc9 | |||
8bb2fbe653 | |||
afc3c4df0d | |||
fde0009253 | |||
6d1fdce34a | |||
b54e1b9cf6 | |||
a000386e27 | |||
c1cc5e1595 | |||
d48e384f4e | |||
ab008e20cf | |||
dda758925d | |||
4442a1d6b2 | |||
790e8315ad | |||
f19edbf4ed | |||
63dc5322f4 | |||
27b464f1a6 | |||
80ebad5178 | |||
77e3bb38f1 | |||
c09bbe17c4 | |||
c719dede2e | |||
d84dee5d5f | |||
6b44183770 | |||
90f0287403 | |||
a60b1c12fb | |||
89a1b1a0ef | |||
efbfc866b1 | |||
236f7ab311 | |||
1296195fc4 | |||
4f86b357be | |||
e666d83ba3 | |||
98e8bfd504 | |||
609cbc84bf | |||
3612fc6969 | |||
bef0feb622 | |||
227541d407 | |||
97d43c78d3 | |||
a4d5fec8bb | |||
bfab104bd4 | |||
095c74cc3e | |||
0c52cb4c4a | |||
7c1e5df3e7 | |||
7a2c95008d | |||
ef5f2e8d88 | |||
b6f3c38d5f | |||
8f800472ca | |||
9d5902f096 | |||
3f810e42df | |||
30627c4e38 | |||
abbcd2188d | |||
80f6f98ac4 | |||
86c1875b3e | |||
56d7b7a402 | |||
7c106dbe81 | |||
5a5c275f38 | |||
f876eefadb | |||
2c56b6a4d1 | |||
ba2e31c48d | |||
b8cec987db | |||
a4fdba9ba1 | |||
728d05c161 | |||
e2643a317c | |||
b1413a5645 | |||
e3a0f69076 | |||
6403733651 | |||
ce893c1b22 | |||
ac24b9f20d | |||
c375d888e2 | |||
3d337dc144 | |||
540810b968 | |||
905bdfc551 | |||
c9a842147e | |||
11f6e2e810 | |||
0990fe79cd | |||
2cd3d4eedb | |||
bb59e82bca | |||
4ae2e95772 | |||
367af472ea | |||
0f2f72f50f | |||
e1363c9b9b | |||
2fa82b8bca | |||
63b945dc1a | |||
d3c8fd8ad5 | |||
80e71dd671 | |||
08c3a47536 | |||
71bf35befe | |||
fbe8481825 | |||
9b6999cda3 | |||
e19db8a563 | |||
c203bef912 | |||
b5f4030cd0 | |||
972fc6b914 | |||
d0cda27c97 | |||
3d73ec887a | |||
1cd82cf068 | |||
8b0e25966e | |||
9eab0292d4 | |||
f999947dfe | |||
d9940bd807 | |||
60fbcebd59 | |||
a381fa4b21 | |||
51cb2f2288 | |||
95e557dcba | |||
5268a8edce | |||
1e9f472077 | |||
4242f4f7cd | |||
2bc6dcf4f3 | |||
a27464a546 | |||
bbbe89e596 | |||
1aafb58d00 | |||
90679b7dce | |||
cf9ca9e602 | |||
ce9a8d3a2c | |||
cf9388c546 | |||
52d4b5083d | |||
e2ab339634 | |||
522e89708d | |||
05e1fa3546 | |||
dad0d24312 | |||
a71546c3bf | |||
2d4b96e0c5 | |||
89288cce0e | |||
b91da76c6c | |||
1bfafa7004 | |||
68d4e04f4f | |||
9f2fdd4148 | |||
2096d13bbd | |||
41ca1a1d96 | |||
e9a2b91da6 | |||
f3c69562fa | |||
d59a6943a9 | |||
193d20013f | |||
8a9a700cfc | |||
518615a979 | |||
cce395a88a | |||
0667907832 | |||
6892d32bfc | |||
928b21acf4 | |||
1ceb393fc3 | |||
a07345a42e | |||
2baea7ce7b | |||
7f337fc9a6 | |||
8b027efb65 | |||
13942ddcb1 | |||
c68e9dc2eb | |||
e01aa667e7 | |||
929aee3022 | |||
1160e32126 | |||
76a265f9a1 | |||
6e2bcc7932 | |||
0d92e40a7b | |||
1b5cbf24c3 | |||
2c06aa1d04 | |||
533f42fe08 | |||
2e08d65e7a | |||
b94ba07d93 | |||
502db35831 | |||
5e050dbb4d | |||
578d00a54a | |||
8c69ff8d03 | |||
672b42848f | |||
674658039e | |||
a91f14ee0d | |||
b167f48396 | |||
2ba4b94b99 | |||
4bf4fc4f62 | |||
45e46f82bb | |||
5ca527066d | |||
f08fbbe103 | |||
4a2ad1583e | |||
1468c08065 | |||
a9eba7ab32 | |||
a1179289a1 | |||
dafeee92f4 | |||
b48b06d2f8 | |||
5ca4d6ebc5 | |||
185f54a4c7 | |||
bc7ed6bd38 | |||
ad9ba1e2bd | |||
243d828e50 | |||
b0b0f9e673 | |||
4ed522e8fe | |||
bd027159b1 | |||
cb3eb2d1c4 | |||
c2ba5c6412 | |||
954e568866 | |||
c4992ca018 | |||
9dd33263e0 | |||
82faab928f | |||
6ee7fbceae | |||
07a77cb4d3 | |||
01b9a09863 | |||
35d22fdba3 | |||
3a0eeed680 | |||
af86ec6dbf | |||
2536b15aed | |||
d895518c1e | |||
e2a4f119f1 | |||
ecb5591743 | |||
17c9c8a6de | |||
60a01622cf | |||
448484a625 | |||
55a8f2ee67 | |||
5c66485c99 | |||
1421355349 | |||
1e09779f24 | |||
f10bc264da | |||
9a7cb0f716 | |||
24394d3ec4 | |||
9fb2d53b54 | |||
84446e52e9 | |||
7cb33da46a | |||
16ca50c6ef | |||
3c7f896246 | |||
535c77da6a | |||
826f757fbb | |||
6c1069fd16 | |||
8f06e2bf05 | |||
0823efe22e | |||
90332f8c3d | |||
f953dd2cd6 | |||
db7ed0e830 | |||
dbebe7c598 | |||
0ec62855bb | |||
060c57c530 | |||
66bf8589ae | |||
aed641e694 | |||
775000883a | |||
7d9eb56164 | |||
ce883a5fce | |||
51df34e7ae | |||
474db10238 | |||
f9e19e9623 | |||
28a26dde4e | |||
025a7e5c66 | |||
042c74f90c | |||
f3a9a2b35e | |||
4407403ab7 | |||
cd06e04497 | |||
3ba0642bcf | |||
0bf8aec8f3 | |||
f9ea76f034 | |||
94378a7729 | |||
17859eccca | |||
ee0a8c4a81 | |||
aa0a85b094 | |||
c0afcaa2e3 | |||
cb7f2eff3d | |||
da1f570db6 | |||
0315d03cdb | |||
a7dfafbd95 | |||
fb64e86ba1 | |||
67f5640b3f | |||
0aff4abcb0 | |||
e7ab93d7d4 | |||
6ec2a89dcb | |||
c269eb5c49 | |||
55604f73c5 | |||
0dbdaf5b9f | |||
a1cbe7f39b | |||
48cb43ec19 | |||
fba9addb03 | |||
f6c636b5e2 | |||
124524ea1f | |||
1379200e9d | |||
5ca9a7269a | |||
12a8d535e8 | |||
0175a472d7 | |||
db70230ae1 | |||
95452482f1 | |||
d4069708be | |||
1036ae212f | |||
8f56166e6b | |||
36e9b7c8c5 | |||
8e5c6fbfc9 | |||
95f989ae8b | |||
b1e08db01d | |||
0b7657396b | |||
4e1f578db5 | |||
8d7a1b0c52 | |||
8dadcee4bc | |||
a4bea66553 | |||
3e3afb79b8 | |||
92c3122b96 | |||
ad32953e0b | |||
fe13d7d010 | |||
e0aebe9b1e | |||
a717509531 | |||
48a4afb114 | |||
b9148675db | |||
b91ad453be | |||
3fa21d19be | |||
25697861d7 | |||
142a307af9 | |||
4f9b7ba656 | |||
fe38c616c3 | |||
8f64262e31 | |||
f4f3d57520 | |||
18211810ef | |||
0e831db3e5 | |||
aff57d67c0 | |||
bdc573d1b1 | |||
038c63888a | |||
aeb1bde4ab | |||
69ca30d1b1 | |||
6b5f42fa81 | |||
c238978ac8 | |||
df5d8bfc04 | |||
17c9e3f168 | |||
4d66c14fd5 | |||
ee0eb59dc6 | |||
b2aeb8cde9 | |||
39bddefd39 | |||
533dc711ad | |||
95e5a5c62e | |||
f3dfd5e063 | |||
bfd93adb20 | |||
d7b5b65b0c | |||
d48a70b052 | |||
130f9ad0a3 | |||
10777218e8 | |||
62c4e76634 | |||
bc54e514d1 | |||
ca63fa4f9e | |||
f6fa395c88 | |||
17d80cb9e8 | |||
b9dfa87f9a | |||
ed63068e22 | |||
fa591ba278 | |||
c79f354dce | |||
49066d41a9 | |||
07d0ec4217 | |||
0ceea3895e | |||
782f1f5b1c | |||
a70af2cb6c | |||
ae64be525f | |||
594839448f | |||
cdf28c39d3 | |||
0921087a21 | |||
1c7f892b2b | |||
7c286ab179 | |||
c96a0156c0 | |||
75f8a879de | |||
d1d6fe01b0 | |||
23845c1d24 | |||
c86cff2708 | |||
6b73073012 | |||
e782e91fbd | |||
3f212feb1f | |||
809cce98cc | |||
e2157517af | |||
262caf0d59 | |||
a78a749f75 | |||
0fe4aaae09 | |||
313ecd8f8d | |||
21d412f90b | |||
a9a1448f62 | |||
5d76b91dc2 | |||
c23022ff86 | |||
71e0022d9a | |||
e5f4da8e27 | |||
4698e64bb8 | |||
48e6344c9e | |||
22dce1d4cc | |||
253a7772aa | |||
48311bb96a | |||
d6e91116ab | |||
3c81d0b06a | |||
c468a860f8 | |||
ea65bde7a6 | |||
ab9efb6921 | |||
beb0f2387d | |||
170ebabe30 | |||
2881dc0a54 | |||
7fba83924c | |||
4018aa38b3 | |||
13e47fc3f5 | |||
74099383cd | |||
934b73c849 | |||
c0308307e2 | |||
41a52945d6 | |||
22f5f0ba75 | |||
3556dd77ef | |||
a92efa46ad | |||
b38b00bbd7 | |||
1831f09f2b | |||
f9faaae26c | |||
18254cd0b2 | |||
ce2f541deb | |||
881c20bf25 | |||
e5130372b9 | |||
c4d6144bb9 | |||
f257cd9fbe | |||
0701a01825 | |||
4873af18a8 | |||
bea41e28b0 | |||
e902214070 | |||
d8eb768e03 | |||
f78adfde47 | |||
030e8065e4 | |||
9ae8ccac36 | |||
4639eebf12 | |||
3e0e92bdf7 | |||
53b5d8286f | |||
95e505106b | |||
6766216fcb | |||
2c3c7ce6b7 | |||
ce14647161 | |||
057d168ff0 | |||
2f457b2a23 | |||
f54b68956d | |||
db272ab995 | |||
fc79afadd1 | |||
3e19c8b102 | |||
c7a637bfde | |||
883afa11dc | |||
f83c221fda | |||
7ad5321f54 | |||
25595a3c65 | |||
aea66442a1 | |||
81f1c4683b | |||
7441fff210 | |||
b2b373bab3 | |||
0c048c7592 | |||
a8bda6ab88 | |||
300e67c03d | |||
61216d51cc | |||
9171b8df91 | |||
998e9ce655 | |||
bf95ad2235 | |||
2642cc1b18 | |||
5caf1fef1d | |||
4c7ee34194 | |||
fce84a2b3c | |||
2f27a57d00 | |||
ea992496a3 | |||
14b252c5f0 | |||
7c5cbecd78 | |||
241779b583 | |||
1750f11abc | |||
4011eaf258 | |||
30d82cc651 | |||
b6916d3adc | |||
594e6d9679 | |||
8e8c9cc03b | |||
1e19fee772 | |||
3c099541a7 | |||
150a40ec26 | |||
f94f2b9823 | |||
82de4581e3 | |||
6d0ecb0269 | |||
5764c2cc67 | |||
e48adcb91d | |||
effca48288 | |||
8b28f8e122 | |||
f9b4ae8241 | |||
0f89156e94 | |||
d6911503a0 | |||
7ec6fd3dfe | |||
142de83b41 | |||
6723fcd6d5 | |||
f8f3318bb2 | |||
c6c88c2503 | |||
5e7b882ce9 | |||
39e45b0298 | |||
493a9abafa | |||
205663a4be | |||
b651495c07 | |||
a5618a893b | |||
5f329f72ab | |||
db53a17a38 | |||
3fe3d5a78c | |||
dcdc43b6aa | |||
bf11a3c2ca | |||
0994730f4d | |||
7d625011a1 | |||
c5006c3ac2 | |||
6deb99f31b | |||
a794db4c38 | |||
d5ea80cf68 | |||
87c8c29c47 | |||
628496d022 | |||
835f623bb8 | |||
867af6385a | |||
88ad58fccb | |||
d8b867b6fb | |||
14d57bb7a6 | |||
4a9fe21d44 | |||
9c0287f4f8 | |||
b122c7092a | |||
d116d863e6 | |||
0bb40d1337 | |||
377fce5855 | |||
ba0a4e864a | |||
f308bcdcac | |||
1f6bb281e9 | |||
9488e3857a | |||
1be90cf87d | |||
7766db2a5f | |||
e7b7b48db5 | |||
a266da1b78 | |||
724021cfde | |||
9b6c393414 | |||
fc151fed77 | |||
e60ad025e4 | |||
1d6f52db44 | |||
b37a02720f | |||
2ec6448cdb | |||
06f561f0dd | |||
d262ca0fe6 | |||
14278c51c2 | |||
499e4887f7 | |||
7a6a6270d1 | |||
3fb016cd6b | |||
170f321a01 | |||
2b2c1880cb | |||
b1caf5eb59 | |||
04de14a462 | |||
015acb6d08 | |||
fe7c06d6f5 | |||
0222e75c19 | |||
9c3d8687bf | |||
8f88b5d25e | |||
ab15991814 | |||
abde681b56 | |||
54fb153acf | |||
0ea3fa0e85 | |||
84cedff355 | |||
4752e7f9a0 | |||
e678adfeda | |||
c053336ad2 | |||
354c887602 | |||
bbd9493b8f | |||
97f40a95fb | |||
e81a395a98 | |||
cc75be9c65 | |||
da48a605bb | |||
23a78d1718 | |||
b6e4352ea9 | |||
015b8f69de | |||
46cbc2ead0 | |||
61bf368080 | |||
065b70203d | |||
128a7b82d5 | |||
16653bdbb4 | |||
a9689334c5 | |||
c76aaf2e0b | |||
b2b6edc8a1 | |||
feaf1ee7e7 | |||
8eb07e8d85 | |||
20c7cabfe4 | |||
77b0ef4799 | |||
4a6287c528 | |||
c744d29567 | |||
aa60fdeb00 | |||
9ff405504d | |||
4db1e5930d | |||
6d4d1bf679 | |||
e5d31b5883 | |||
cd9411158f | |||
c4fa8d473e | |||
bfd7fa4b95 | |||
c1ec637e05 | |||
9c7d0fb2ad | |||
c873516cb6 | |||
4690d4d51b | |||
8bf96d188e | |||
63ff1be575 | |||
850078b7e3 | |||
fc16bb0032 | |||
b2aa81a5ea | |||
91e39a58f7 | |||
db46933b3a | |||
84677298e5 | |||
0ded422cf9 | |||
811c6b1af5 | |||
da27655ef3 | |||
87a74335f9 | |||
11ee949e9e | |||
e47ad60cf5 | |||
055406b255 | |||
e7a911a7fa | |||
3da4c66b85 | |||
ce013a325c | |||
2ebbe26e25 | |||
a4c3bedf4b | |||
1894f84b8a | |||
a8e14ac79e | |||
0908c6b662 | |||
7163b9df3c | |||
8051fd7012 | |||
06f62e031a | |||
8ca3b7c5c6 | |||
b898ae661c | |||
81e015db9d | |||
b426a68316 | |||
c93b642f90 | |||
c9a1d79954 | |||
2f6525ccb3 | |||
42f33339c5 | |||
09b8f49871 | |||
64db27c7fa | |||
fd3d9640d8 | |||
530d291a52 | |||
a66a2d2692 | |||
d925409567 | |||
805280355c | |||
90d576dac9 | |||
ae759bd86e | |||
0e4c878ee3 | |||
9f5d4018c7 | |||
ace00fe92b | |||
dbf1a685bf | |||
ae983491e7 | |||
94c1503a60 | |||
f4806aadcb | |||
c028d75f9e | |||
44068b444f | |||
c49cf35ba6 | |||
3dc4923e6e | |||
cfea80b52a | |||
e3fdd6b955 | |||
26d1f3216e | |||
6bd581ef7f | |||
4a8d8d8ce5 | |||
173286470c | |||
078d1ea531 | |||
a42aacb41c | |||
7a83c2026c | |||
0f7b89523f | |||
69a7847097 |
2
.github/ISSUE_TEMPLATE/bug_report.md
vendored
2
.github/ISSUE_TEMPLATE/bug_report.md
vendored
@ -2,7 +2,7 @@
|
|||||||
name: Bug report
|
name: Bug report
|
||||||
about: Create a report to help us improve
|
about: Create a report to help us improve
|
||||||
title: ''
|
title: ''
|
||||||
labels: ''
|
labels: bug
|
||||||
assignees: ''
|
assignees: ''
|
||||||
|
|
||||||
---
|
---
|
||||||
|
6
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
6
.github/ISSUE_TEMPLATE/config.yml
vendored
Normal file
@ -0,0 +1,6 @@
|
|||||||
|
---
|
||||||
|
blank_issues_enabled: false
|
||||||
|
contact_links:
|
||||||
|
- name: Support room on Matrix
|
||||||
|
url: https://matrix.to/#/#matrix-docker-ansible-deploy:devture.com
|
||||||
|
about: Get timely support from more people by joining our Matrix room.
|
4
.github/ISSUE_TEMPLATE/feature_request.md
vendored
4
.github/ISSUE_TEMPLATE/feature_request.md
vendored
@ -2,13 +2,13 @@
|
|||||||
name: Feature request
|
name: Feature request
|
||||||
about: Suggest an idea for this project
|
about: Suggest an idea for this project
|
||||||
title: ''
|
title: ''
|
||||||
labels: ''
|
labels: suggestion
|
||||||
assignees: ''
|
assignees: ''
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
**Is your feature request related to a problem? Please describe.**
|
**Is your feature request related to a problem? Please describe.**
|
||||||
A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]
|
A clear and concise description of what the problem is. Ex. I'm always frustrated when […]
|
||||||
|
|
||||||
<!--
|
<!--
|
||||||
NOTE: When submitting feature requests, be aware that:
|
NOTE: When submitting feature requests, be aware that:
|
||||||
|
6
.github/ISSUE_TEMPLATE/i-need-help.md
vendored
6
.github/ISSUE_TEMPLATE/i-need-help.md
vendored
@ -2,13 +2,15 @@
|
|||||||
name: I need help
|
name: I need help
|
||||||
about: Get support from our community
|
about: Get support from our community
|
||||||
title: ''
|
title: ''
|
||||||
labels: ''
|
labels: question
|
||||||
assignees: ''
|
assignees: ''
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
<!--
|
<!--
|
||||||
NOTE: you can usually get more timely support and from more people by joining our Matrix room (also bridged to IRC). See the [Support section of our README](https://github.com/spantaleev/matrix-docker-ansible-deploy#support)
|
NOTE: our FAQ page is available at https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/master/docs/faq.md. It contains a list of questions and answers about configuration, installation, troubleshooting, etc. Before creating a new issue, you are encouraged to have a look at it.
|
||||||
|
|
||||||
|
Also you can usually get more timely support and from more people by joining our Matrix room (also bridged to IRC). See the support section of our README.
|
||||||
-->
|
-->
|
||||||
|
|
||||||
**Playbook Configuration**:
|
**Playbook Configuration**:
|
||||||
|
5
.github/renovate.json
vendored
5
.github/renovate.json
vendored
@ -3,6 +3,7 @@
|
|||||||
"extends": [
|
"extends": [
|
||||||
"config:base"
|
"config:base"
|
||||||
],
|
],
|
||||||
|
"labels": ["dependencies"],
|
||||||
"regexManagers": [
|
"regexManagers": [
|
||||||
{
|
{
|
||||||
"fileMatch": ["defaults/main.yml$"],
|
"fileMatch": ["defaults/main.yml$"],
|
||||||
@ -15,10 +16,12 @@
|
|||||||
{
|
{
|
||||||
"matchSourceUrlPrefixes": [
|
"matchSourceUrlPrefixes": [
|
||||||
"https://github.com/devture/com.devture.ansible.role",
|
"https://github.com/devture/com.devture.ansible.role",
|
||||||
"https://gitlab.com/etke.cc/roles",
|
|
||||||
"https://github.com/mother-of-all-self-hosting"
|
"https://github.com/mother-of-all-self-hosting"
|
||||||
],
|
],
|
||||||
"ignoreUnstable": false
|
"ignoreUnstable": false
|
||||||
}
|
}
|
||||||
|
],
|
||||||
|
"ignoreDeps": [
|
||||||
|
"ghcr.io/matrixgpt/matrix-chatgpt-bot"
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
50
.github/workflows/close-stale-issues.yml
vendored
Normal file
50
.github/workflows/close-stale-issues.yml
vendored
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
---
|
||||||
|
name: 'Close stale issues and PRs'
|
||||||
|
on: # yamllint disable-line rule:truthy
|
||||||
|
# Use this to do a dry run from a pull request
|
||||||
|
# pull_request:
|
||||||
|
schedule:
|
||||||
|
- cron: '30 1 * * *'
|
||||||
|
|
||||||
|
permissions:
|
||||||
|
issues: write
|
||||||
|
pull-requests: write
|
||||||
|
|
||||||
|
jobs:
|
||||||
|
stale:
|
||||||
|
if: github.repository == 'spantaleev/matrix-docker-ansible-deploy'
|
||||||
|
runs-on: ubuntu-latest
|
||||||
|
steps:
|
||||||
|
- uses: actions/stale@v9
|
||||||
|
with:
|
||||||
|
######################################################################
|
||||||
|
# Issues/PRs
|
||||||
|
######################################################################
|
||||||
|
exempt-assignees: 'spantaleev,aine-etke'
|
||||||
|
operations-per-run: 100
|
||||||
|
# Use this to do a dry run from a pull request
|
||||||
|
# debug-only: true
|
||||||
|
######################################################################
|
||||||
|
# Issues
|
||||||
|
######################################################################
|
||||||
|
stale-issue-message: 'This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 7 days. To exempt the issue from being marked as stale again due to inactivity, add "confirmed" label.'
|
||||||
|
close-issue-message: 'This issue was closed because it has been stalled for 7 days with no activity. If this issue is still reproduced, feel free to provide the issue with up-to-date information.'
|
||||||
|
stale-issue-label: 'stale'
|
||||||
|
# Add this label to exempt the issue from being marked as stale due to inactivity
|
||||||
|
exempt-issue-labels: 'confirmed'
|
||||||
|
# An allow-list of label(s) to only process the issues which contain one of these label(s).
|
||||||
|
any-of-issue-labels: 'needs-info,question'
|
||||||
|
######################################################################
|
||||||
|
# PRs
|
||||||
|
######################################################################
|
||||||
|
days-before-pr-stale: '365'
|
||||||
|
days-before-pr-close: '30'
|
||||||
|
stale-pr-message: 'This PR is stale because it has not been provided with required information or its conflicts have not been fixed over a year. Remove stale label or this will be closed in 30 days. To exempt the PR from being marked as stale again due to inactivity, add "confirmed" label.'
|
||||||
|
close-pr-message: 'This PR was closed because it has been stalled for 30 days with no activity.'
|
||||||
|
stale-pr-label: 'stale'
|
||||||
|
# Add this label to exempt the PR from being marked as stale due to inactivity
|
||||||
|
exempt-pr-labels: 'confirmed'
|
||||||
|
# An allow-list of label(s) to only process the PRs which contain one of these label(s).
|
||||||
|
any-of-pr-labels: 'needs-info,needs-rebase'
|
||||||
|
# Use this to ignore updates such as comments (only to keep the PR alive by bumping)
|
||||||
|
ignore-pr-updates: true
|
2
.github/workflows/matrix.yml
vendored
2
.github/workflows/matrix.yml
vendored
@ -13,7 +13,7 @@ jobs:
|
|||||||
- name: Check out
|
- name: Check out
|
||||||
uses: actions/checkout@v4
|
uses: actions/checkout@v4
|
||||||
- name: Run yamllint
|
- name: Run yamllint
|
||||||
uses: frenck/action-yamllint@v1.4.2
|
uses: frenck/action-yamllint@v1.5.0
|
||||||
ansible-lint:
|
ansible-lint:
|
||||||
name: ansible-lint
|
name: ansible-lint
|
||||||
runs-on: ubuntu-latest
|
runs-on: ubuntu-latest
|
||||||
|
7
.gitignore
vendored
7
.gitignore
vendored
@ -1,12 +1,9 @@
|
|||||||
/inventory/*
|
/inventory
|
||||||
!/inventory/.gitkeep
|
|
||||||
!/inventory/host_vars/.gitkeep
|
|
||||||
!/inventory/scripts
|
|
||||||
/roles/**/files/scratchpad
|
/roles/**/files/scratchpad
|
||||||
.DS_Store
|
.DS_Store
|
||||||
.python-version
|
.python-version
|
||||||
.idea/
|
.idea/
|
||||||
flake.lock
|
.direnv/
|
||||||
|
|
||||||
# ignore roles pulled by ansible-galaxy
|
# ignore roles pulled by ansible-galaxy
|
||||||
/roles/galaxy/*
|
/roles/galaxy/*
|
||||||
|
1282
CHANGELOG.md
1282
CHANGELOG.md
File diff suppressed because it is too large
Load Diff
235
LICENSES/AGPL-3.0-or-later.txt
Normal file
235
LICENSES/AGPL-3.0-or-later.txt
Normal file
@ -0,0 +1,235 @@
|
|||||||
|
GNU AFFERO GENERAL PUBLIC LICENSE
|
||||||
|
Version 3, 19 November 2007
|
||||||
|
|
||||||
|
Copyright (C) 2007 Free Software Foundation, Inc. <http://fsf.org/>
|
||||||
|
|
||||||
|
Everyone is permitted to copy and distribute verbatim copies of this license document, but changing it is not allowed.
|
||||||
|
|
||||||
|
Preamble
|
||||||
|
|
||||||
|
The GNU Affero General Public License is a free, copyleft license for software and other kinds of works, specifically designed to ensure cooperation with the community in the case of network server software.
|
||||||
|
|
||||||
|
The licenses for most software and other practical works are designed to take away your freedom to share and change the works. By contrast, our General Public Licenses are intended to guarantee your freedom to share and change all versions of a program--to make sure it remains free software for all its users.
|
||||||
|
|
||||||
|
When we speak of free software, we are referring to freedom, not price. Our General Public Licenses are designed to make sure that you have the freedom to distribute copies of free software (and charge for them if you wish), that you receive source code or can get it if you want it, that you can change the software or use pieces of it in new free programs, and that you know you can do these things.
|
||||||
|
|
||||||
|
Developers that use our General Public Licenses protect your rights with two steps: (1) assert copyright on the software, and (2) offer you this License which gives you legal permission to copy, distribute and/or modify the software.
|
||||||
|
|
||||||
|
A secondary benefit of defending all users' freedom is that improvements made in alternate versions of the program, if they receive widespread use, become available for other developers to incorporate. Many developers of free software are heartened and encouraged by the resulting cooperation. However, in the case of software used on network servers, this result may fail to come about. The GNU General Public License permits making a modified version and letting the public access it on a server without ever releasing its source code to the public.
|
||||||
|
|
||||||
|
The GNU Affero General Public License is designed specifically to ensure that, in such cases, the modified source code becomes available to the community. It requires the operator of a network server to provide the source code of the modified version running there to the users of that server. Therefore, public use of a modified version, on a publicly accessible server, gives the public access to the source code of the modified version.
|
||||||
|
|
||||||
|
An older license, called the Affero General Public License and published by Affero, was designed to accomplish similar goals. This is a different license, not a version of the Affero GPL, but Affero has released a new version of the Affero GPL which permits relicensing under this license.
|
||||||
|
|
||||||
|
The precise terms and conditions for copying, distribution and modification follow.
|
||||||
|
|
||||||
|
TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
0. Definitions.
|
||||||
|
|
||||||
|
"This License" refers to version 3 of the GNU Affero General Public License.
|
||||||
|
|
||||||
|
"Copyright" also means copyright-like laws that apply to other kinds of works, such as semiconductor masks.
|
||||||
|
|
||||||
|
"The Program" refers to any copyrightable work licensed under this License. Each licensee is addressed as "you". "Licensees" and "recipients" may be individuals or organizations.
|
||||||
|
|
||||||
|
To "modify" a work means to copy from or adapt all or part of the work in a fashion requiring copyright permission, other than the making of an exact copy. The resulting work is called a "modified version" of the earlier work or a work "based on" the earlier work.
|
||||||
|
|
||||||
|
A "covered work" means either the unmodified Program or a work based on the Program.
|
||||||
|
|
||||||
|
To "propagate" a work means to do anything with it that, without permission, would make you directly or secondarily liable for infringement under applicable copyright law, except executing it on a computer or modifying a private copy. Propagation includes copying, distribution (with or without modification), making available to the public, and in some countries other activities as well.
|
||||||
|
|
||||||
|
To "convey" a work means any kind of propagation that enables other parties to make or receive copies. Mere interaction with a user through a computer network, with no transfer of a copy, is not conveying.
|
||||||
|
|
||||||
|
An interactive user interface displays "Appropriate Legal Notices" to the extent that it includes a convenient and prominently visible feature that (1) displays an appropriate copyright notice, and (2) tells the user that there is no warranty for the work (except to the extent that warranties are provided), that licensees may convey the work under this License, and how to view a copy of this License. If the interface presents a list of user commands or options, such as a menu, a prominent item in the list meets this criterion.
|
||||||
|
|
||||||
|
1. Source Code.
|
||||||
|
The "source code" for a work means the preferred form of the work for making modifications to it. "Object code" means any non-source form of a work.
|
||||||
|
|
||||||
|
A "Standard Interface" means an interface that either is an official standard defined by a recognized standards body, or, in the case of interfaces specified for a particular programming language, one that is widely used among developers working in that language.
|
||||||
|
|
||||||
|
The "System Libraries" of an executable work include anything, other than the work as a whole, that (a) is included in the normal form of packaging a Major Component, but which is not part of that Major Component, and (b) serves only to enable use of the work with that Major Component, or to implement a Standard Interface for which an implementation is available to the public in source code form. A "Major Component", in this context, means a major essential component (kernel, window system, and so on) of the specific operating system (if any) on which the executable work runs, or a compiler used to produce the work, or an object code interpreter used to run it.
|
||||||
|
|
||||||
|
The "Corresponding Source" for a work in object code form means all the source code needed to generate, install, and (for an executable work) run the object code and to modify the work, including scripts to control those activities. However, it does not include the work's System Libraries, or general-purpose tools or generally available free programs which are used unmodified in performing those activities but which are not part of the work. For example, Corresponding Source includes interface definition files associated with source files for the work, and the source code for shared libraries and dynamically linked subprograms that the work is specifically designed to require, such as by intimate data communication or control flow between those
|
||||||
|
subprograms and other parts of the work.
|
||||||
|
|
||||||
|
The Corresponding Source need not include anything that users can regenerate automatically from other parts of the Corresponding Source.
|
||||||
|
|
||||||
|
The Corresponding Source for a work in source code form is that same work.
|
||||||
|
|
||||||
|
2. Basic Permissions.
|
||||||
|
All rights granted under this License are granted for the term of copyright on the Program, and are irrevocable provided the stated conditions are met. This License explicitly affirms your unlimited permission to run the unmodified Program. The output from running a covered work is covered by this License only if the output, given its content, constitutes a covered work. This License acknowledges your rights of fair use or other equivalent, as provided by copyright law.
|
||||||
|
|
||||||
|
You may make, run and propagate covered works that you do not convey, without conditions so long as your license otherwise remains in force. You may convey covered works to others for the sole purpose of having them make modifications exclusively for you, or provide you with facilities for running those works, provided that you comply with the terms of this License in conveying all material for which you do not control copyright. Those thus making or running the covered works for you must do so exclusively on your behalf, under your direction and control, on terms that prohibit them from making any copies of your copyrighted material outside their relationship with you.
|
||||||
|
|
||||||
|
Conveying under any other circumstances is permitted solely under the conditions stated below. Sublicensing is not allowed; section 10 makes it unnecessary.
|
||||||
|
|
||||||
|
3. Protecting Users' Legal Rights From Anti-Circumvention Law.
|
||||||
|
No covered work shall be deemed part of an effective technological measure under any applicable law fulfilling obligations under article 11 of the WIPO copyright treaty adopted on 20 December 1996, or similar laws prohibiting or restricting circumvention of such measures.
|
||||||
|
|
||||||
|
When you convey a covered work, you waive any legal power to forbid circumvention of technological measures to the extent such circumvention is effected by exercising rights under this License with respect to the covered work, and you disclaim any intention to limit operation or modification of the work as a means of enforcing, against the work's users, your or third parties' legal rights to forbid circumvention of technological measures.
|
||||||
|
|
||||||
|
4. Conveying Verbatim Copies.
|
||||||
|
You may convey verbatim copies of the Program's source code as you receive it, in any medium, provided that you conspicuously and appropriately publish on each copy an appropriate copyright notice; keep intact all notices stating that this License and any non-permissive terms added in accord with section 7 apply to the code; keep intact all notices of the absence of any warranty; and give all recipients a copy of this License along with the Program.
|
||||||
|
|
||||||
|
You may charge any price or no price for each copy that you convey, and you may offer support or warranty protection for a fee.
|
||||||
|
|
||||||
|
5. Conveying Modified Source Versions.
|
||||||
|
You may convey a work based on the Program, or the modifications to produce it from the Program, in the form of source code under the terms of section 4, provided that you also meet all of these conditions:
|
||||||
|
|
||||||
|
a) The work must carry prominent notices stating that you modified it, and giving a relevant date.
|
||||||
|
|
||||||
|
b) The work must carry prominent notices stating that it is released under this License and any conditions added under section 7. This requirement modifies the requirement in section 4 to "keep intact all notices".
|
||||||
|
|
||||||
|
c) You must license the entire work, as a whole, under this License to anyone who comes into possession of a copy. This License will therefore apply, along with any applicable section 7 additional terms, to the whole of the work, and all its parts, regardless of how they are packaged. This License gives no permission to license the work in any other way, but it does not invalidate such permission if you have separately received it.
|
||||||
|
|
||||||
|
d) If the work has interactive user interfaces, each must display Appropriate Legal Notices; however, if the Program has interactive interfaces that do not display Appropriate Legal Notices, your work need not make them do so.
|
||||||
|
|
||||||
|
A compilation of a covered work with other separate and independent works, which are not by their nature extensions of the covered work, and which are not combined with it such as to form a larger program, in or on a volume of a storage or distribution medium, is called an "aggregate" if the compilation and its resulting copyright are not used to limit the access or legal rights of the compilation's users beyond what the individual works permit. Inclusion of a covered work in an aggregate does not cause this License to apply to the other parts of the aggregate.
|
||||||
|
|
||||||
|
6. Conveying Non-Source Forms.
|
||||||
|
You may convey a covered work in object code form under the terms of sections 4 and 5, provided that you also convey the machine-readable Corresponding Source under the terms of this License, in one of these ways:
|
||||||
|
|
||||||
|
a) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by the Corresponding Source fixed on a durable physical medium customarily used for software interchange.
|
||||||
|
|
||||||
|
b) Convey the object code in, or embodied in, a physical product (including a physical distribution medium), accompanied by a written offer, valid for at least three years and valid for as long as you offer spare parts or customer support for that product model, to give anyone who possesses the object code either (1) a copy of the Corresponding Source for all the software in the product that is covered by this License, on a durable physical medium customarily used for software interchange, for a price no more than your reasonable cost of physically performing this conveying of source, or (2) access to copy the Corresponding Source from a network server at no charge.
|
||||||
|
|
||||||
|
c) Convey individual copies of the object code with a copy of the written offer to provide the Corresponding Source. This alternative is allowed only occasionally and noncommercially, and only if you received the object code with such an offer, in accord with subsection 6b.
|
||||||
|
|
||||||
|
d) Convey the object code by offering access from a designated place (gratis or for a charge), and offer equivalent access to the Corresponding Source in the same way through the same place at no further charge. You need not require recipients to copy the Corresponding Source along with the object code. If the place to copy the object code is a network server, the Corresponding Source may be on a different server (operated by you or a third party) that supports equivalent copying facilities, provided you maintain clear directions next to the object code saying where to find the Corresponding Source. Regardless of what server hosts the Corresponding Source, you remain obligated to ensure that it is available for as long as needed to satisfy these requirements.
|
||||||
|
|
||||||
|
e) Convey the object code using peer-to-peer transmission, provided you inform other peers where the object code and Corresponding Source of the work are being offered to the general public at no charge under subsection 6d.
|
||||||
|
|
||||||
|
A separable portion of the object code, whose source code is excluded from the Corresponding Source as a System Library, need not be included in conveying the object code work.
|
||||||
|
|
||||||
|
A "User Product" is either (1) a "consumer product", which means any tangible personal property which is normally used for personal, family, or household purposes, or (2) anything designed or sold for incorporation into a dwelling. In determining whether a product is a consumer product, doubtful cases shall be resolved in favor of coverage. For a particular product received by a particular user, "normally used" refers to a typical or common use of that class of product, regardless of the status of the particular user or of the way in which the particular user actually uses, or expects or is expected to use, the product. A product is a consumer product regardless of whether the product has substantial commercial, industrial or non-consumer uses, unless such uses represent the only significant mode of use of the product.
|
||||||
|
|
||||||
|
"Installation Information" for a User Product means any methods, procedures, authorization keys, or other information required to install and execute modified versions of a covered work in that User Product from a modified version of its Corresponding Source. The information must suffice to ensure that the continued functioning of the modified object code is in no case prevented or interfered with solely because modification has been made.
|
||||||
|
|
||||||
|
If you convey an object code work under this section in, or with, or specifically for use in, a User Product, and the conveying occurs as part of a transaction in which the right of possession and use of the User Product is transferred to the recipient in perpetuity or for a fixed term (regardless of how the transaction is characterized), the Corresponding Source conveyed under this section must be accompanied by the Installation Information. But this requirement does not apply if neither you nor any third party retains the ability to install modified object code on the User Product (for example, the work has been installed in ROM).
|
||||||
|
|
||||||
|
The requirement to provide Installation Information does not include a requirement to continue to provide support service, warranty, or updates for a work that has been modified or installed by the recipient, or for the User Product in which it has been modified or installed. Access to a network may be denied when the modification itself materially and adversely affects the operation of the network or violates the rules and protocols for communication across the network.
|
||||||
|
|
||||||
|
Corresponding Source conveyed, and Installation Information provided, in accord with this section must be in a format that is publicly documented (and with an implementation available to the public in source code form), and must require no special password or key for unpacking, reading or copying.
|
||||||
|
|
||||||
|
7. Additional Terms.
|
||||||
|
"Additional permissions" are terms that supplement the terms of this License by making exceptions from one or more of its conditions. Additional permissions that are applicable to the entire Program shall be treated as though they were included in this License, to the extent that they are valid under applicable law. If additional permissions apply only to part of the Program, that part may be used separately under those permissions, but the entire Program remains governed by this License without regard to the additional permissions.
|
||||||
|
|
||||||
|
When you convey a copy of a covered work, you may at your option remove any additional permissions from that copy, or from any part of it. (Additional permissions may be written to require their own removal in certain cases when you modify the work.) You may place additional permissions on material, added by you to a covered work, for which you have or can give appropriate copyright permission.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, for material you add to a covered work, you may (if authorized by the copyright holders of that material) supplement the terms of this License with terms:
|
||||||
|
|
||||||
|
a) Disclaiming warranty or limiting liability differently from the terms of sections 15 and 16 of this License; or
|
||||||
|
|
||||||
|
b) Requiring preservation of specified reasonable legal notices or author attributions in that material or in the Appropriate Legal Notices displayed by works containing it; or
|
||||||
|
|
||||||
|
c) Prohibiting misrepresentation of the origin of that material, or requiring that modified versions of such material be marked in reasonable ways as different from the original version; or
|
||||||
|
|
||||||
|
d) Limiting the use for publicity purposes of names of licensors or authors of the material; or
|
||||||
|
|
||||||
|
e) Declining to grant rights under trademark law for use of some trade names, trademarks, or service marks; or
|
||||||
|
|
||||||
|
f) Requiring indemnification of licensors and authors of that material by anyone who conveys the material (or modified versions of it) with contractual assumptions of liability to the recipient, for any liability that these contractual assumptions directly impose on those licensors and authors.
|
||||||
|
|
||||||
|
All other non-permissive additional terms are considered "further restrictions" within the meaning of section 10. If the Program as you received it, or any part of it, contains a notice stating that it is governed by this License along with a term that is a further restriction, you may remove that term. If a license document contains a further restriction but permits relicensing or conveying under this License, you may add to a covered work material governed by the terms of that license document, provided that the further restriction does not survive such relicensing or conveying.
|
||||||
|
|
||||||
|
If you add terms to a covered work in accord with this section, you must place, in the relevant source files, a statement of the additional terms that apply to those files, or a notice indicating where to find the applicable terms.
|
||||||
|
|
||||||
|
Additional terms, permissive or non-permissive, may be stated in the form of a separately written license, or stated as exceptions; the above requirements apply either way.
|
||||||
|
|
||||||
|
8. Termination.
|
||||||
|
|
||||||
|
You may not propagate or modify a covered work except as expressly provided under this License. Any attempt otherwise to propagate or modify it is void, and will automatically terminate your rights under this License (including any patent licenses granted under the third paragraph of section 11).
|
||||||
|
|
||||||
|
However, if you cease all violation of this License, then your license from a particular copyright holder is reinstated (a) provisionally, unless and until the copyright holder explicitly and finally terminates your license, and (b) permanently, if the copyright holder fails to notify you of the violation by some reasonable means prior to 60 days after the cessation.
|
||||||
|
|
||||||
|
Moreover, your license from a particular copyright holder is reinstated permanently if the copyright holder notifies you of the violation by some reasonable means, this is the first time you have received notice of violation of this License (for any work) from that copyright holder, and you cure the violation prior to 30 days after your receipt of the notice.
|
||||||
|
|
||||||
|
Termination of your rights under this section does not terminate the licenses of parties who have received copies or rights from you under this License. If your rights have been terminated and not permanently reinstated, you do not qualify to receive new licenses for the same material under section 10.
|
||||||
|
|
||||||
|
9. Acceptance Not Required for Having Copies.
|
||||||
|
|
||||||
|
You are not required to accept this License in order to receive or run a copy of the Program. Ancillary propagation of a covered work occurring solely as a consequence of using peer-to-peer transmission to receive a copy likewise does not require acceptance. However, nothing other than this License grants you permission to propagate or modify any covered work. These actions infringe copyright if you do not accept this License. Therefore, by modifying or propagating a covered work, you indicate your acceptance of this License to do so.
|
||||||
|
|
||||||
|
10. Automatic Licensing of Downstream Recipients.
|
||||||
|
|
||||||
|
Each time you convey a covered work, the recipient automatically receives a license from the original licensors, to run, modify and propagate that work, subject to this License. You are not responsible for enforcing compliance by third parties with this License.
|
||||||
|
|
||||||
|
An "entity transaction" is a transaction transferring control of an organization, or substantially all assets of one, or subdividing an organization, or merging organizations. If propagation of a covered work results from an entity transaction, each party to that transaction who receives a copy of the work also receives whatever licenses to the work the party's predecessor in interest had or could give under the previous paragraph, plus a right to possession of the Corresponding Source of the work from the predecessor in interest, if the predecessor has it or can get it with reasonable efforts.
|
||||||
|
|
||||||
|
You may not impose any further restrictions on the exercise of the rights granted or affirmed under this License. For example, you may not impose a license fee, royalty, or other charge for exercise of rights granted under this License, and you may not initiate litigation (including a cross-claim or counterclaim in a lawsuit) alleging that any patent claim is infringed by making, using, selling, offering for sale, or importing the Program or any portion of it.
|
||||||
|
|
||||||
|
11. Patents.
|
||||||
|
|
||||||
|
A "contributor" is a copyright holder who authorizes use under this License of the Program or a work on which the Program is based. The work thus licensed is called the contributor's "contributor version".
|
||||||
|
|
||||||
|
A contributor's "essential patent claims" are all patent claims owned or controlled by the contributor, whether already acquired or hereafter acquired, that would be infringed by some manner, permitted by this License, of making, using, or selling its contributor version, but do not include claims that would be infringed only as a consequence of further modification of the contributor version. For purposes of this definition, "control" includes the right to grant patent sublicenses in a manner consistent with the requirements of this License.
|
||||||
|
|
||||||
|
Each contributor grants you a non-exclusive, worldwide, royalty-free patent license under the contributor's essential patent claims, to make, use, sell, offer for sale, import and otherwise run, modify and propagate the contents of its contributor version.
|
||||||
|
|
||||||
|
In the following three paragraphs, a "patent license" is any express agreement or commitment, however denominated, not to enforce a patent (such as an express permission to practice a patent or covenant not to sue for patent infringement). To "grant" such a patent license to a party means to make such an agreement or commitment not to enforce a patent against the party.
|
||||||
|
|
||||||
|
If you convey a covered work, knowingly relying on a patent license, and the Corresponding Source of the work is not available for anyone to copy, free of charge and under the terms of this License, through a publicly available network server or other readily accessible means, then you must either (1) cause the Corresponding Source to be so available, or (2) arrange to deprive yourself of the benefit of the patent license for this particular work, or (3) arrange, in a manner consistent with the requirements of this License, to extend the patent
|
||||||
|
license to downstream recipients. "Knowingly relying" means you have actual knowledge that, but for the patent license, your conveying the covered work in a country, or your recipient's use of the covered work in a country, would infringe one or more identifiable patents in that country that you have reason to believe are valid.
|
||||||
|
|
||||||
|
If, pursuant to or in connection with a single transaction or arrangement, you convey, or propagate by procuring conveyance of, a covered work, and grant a patent license to some of the parties receiving the covered work authorizing them to use, propagate, modify or convey a specific copy of the covered work, then the patent license you grant is automatically extended to all recipients of the covered work and works based on it.
|
||||||
|
|
||||||
|
A patent license is "discriminatory" if it does not include within the scope of its coverage, prohibits the exercise of, or is conditioned on the non-exercise of one or more of the rights that are specifically granted under this License. You may not convey a covered work if you are a party to an arrangement with a third party that is in the business of distributing software, under which you make payment to the third party based on the extent of your activity of conveying the work, and under which the third party grants, to any of the parties who would receive the covered work from you, a discriminatory patent license (a) in connection with copies of the covered work conveyed by you (or copies made from those copies), or (b) primarily for and in connection with specific products or compilations that contain the covered work, unless you entered into that arrangement, or that patent license was granted, prior to 28 March 2007.
|
||||||
|
|
||||||
|
Nothing in this License shall be construed as excluding or limiting any implied license or other defenses to infringement that may otherwise be available to you under applicable patent law.
|
||||||
|
|
||||||
|
12. No Surrender of Others' Freedom.
|
||||||
|
|
||||||
|
If conditions are imposed on you (whether by court order, agreement or otherwise) that contradict the conditions of this License, they do not excuse you from the conditions of this License. If you cannot convey a covered work so as to satisfy simultaneously your obligations under this License and any other pertinent obligations, then as a consequence you may
|
||||||
|
not convey it at all. For example, if you agree to terms that obligate you to collect a royalty for further conveying from those to whom you convey the Program, the only way you could satisfy both those terms and this License would be to refrain entirely from conveying the Program.
|
||||||
|
|
||||||
|
13. Remote Network Interaction; Use with the GNU General Public License.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, if you modify the Program, your modified version must prominently offer all users interacting with it remotely through a computer network (if your version supports such interaction) an opportunity to receive the Corresponding Source of your version by providing access to the Corresponding Source from a network server at no charge, through some standard or customary means of facilitating copying of software. This Corresponding Source shall include the Corresponding Source for any work covered by version 3 of the GNU General Public License that is incorporated pursuant to the following paragraph.
|
||||||
|
|
||||||
|
Notwithstanding any other provision of this License, you have permission to link or combine any covered work with a work licensed under version 3 of the GNU General Public License into a single combined work, and to convey the resulting work. The terms of this License will continue to apply to the part which is the covered work, but the work with which it is combined will remain governed by version 3 of the GNU General Public License.
|
||||||
|
|
||||||
|
14. Revised Versions of this License.
|
||||||
|
|
||||||
|
The Free Software Foundation may publish revised and/or new versions of the GNU Affero General Public License from time to time. Such new versions will be similar in spirit to the present version, but may differ in detail to address new problems or concerns.
|
||||||
|
|
||||||
|
Each version is given a distinguishing version number. If the Program specifies that a certain numbered version of the GNU Affero General Public License "or any later version" applies to it, you have the option of following the terms and conditions either of that numbered version or of any later version published by the Free Software Foundation. If the Program does not specify a version number of the GNU Affero General Public License, you may choose any version ever published by the Free Software Foundation.
|
||||||
|
|
||||||
|
If the Program specifies that a proxy can decide which future versions of the GNU Affero General Public License can be used, that proxy's public statement of acceptance of a version permanently authorizes you to choose that version for the Program.
|
||||||
|
|
||||||
|
Later license versions may give you additional or different permissions. However, no additional obligations are imposed on any author or copyright holder as a result of your choosing to follow a later version.
|
||||||
|
|
||||||
|
15. Disclaimer of Warranty.
|
||||||
|
|
||||||
|
THERE IS NO WARRANTY FOR THE PROGRAM, TO THE EXTENT PERMITTED BY APPLICABLE LAW. EXCEPT WHEN OTHERWISE STATED IN WRITING THE COPYRIGHT HOLDERS AND/OR OTHER PARTIES PROVIDE THE PROGRAM "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE QUALITY AND PERFORMANCE OF THE PROGRAM IS WITH YOU. SHOULD THE PROGRAM PROVE DEFECTIVE, YOU ASSUME THE COST OF ALL NECESSARY SERVICING, REPAIR OR CORRECTION.
|
||||||
|
|
||||||
|
16. Limitation of Liability.
|
||||||
|
|
||||||
|
IN NO EVENT UNLESS REQUIRED BY APPLICABLE LAW OR AGREED TO IN WRITING WILL ANY COPYRIGHT HOLDER, OR ANY OTHER PARTY WHO MODIFIES AND/OR CONVEYS THE PROGRAM AS PERMITTED ABOVE, BE LIABLE TO YOU FOR DAMAGES, INCLUDING ANY GENERAL, SPECIAL, INCIDENTAL OR CONSEQUENTIAL DAMAGES ARISING OUT OF THE USE OR INABILITY TO USE THE PROGRAM (INCLUDING BUT NOT LIMITED TO LOSS OF DATA OR DATA BEING RENDERED INACCURATE OR LOSSES SUSTAINED BY YOU OR THIRD PARTIES OR A FAILURE OF THE PROGRAM TO OPERATE WITH ANY OTHER PROGRAMS), EVEN IF SUCH HOLDER OR OTHER PARTY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
|
||||||
|
|
||||||
|
17. Interpretation of Sections 15 and 16.
|
||||||
|
|
||||||
|
If the disclaimer of warranty and limitation of liability provided above cannot be given local legal effect according to their terms, reviewing courts shall apply local law that most closely approximates an absolute waiver of all civil liability in connection with the Program, unless a warranty or assumption of liability accompanies a copy of the Program in return for a fee.
|
||||||
|
|
||||||
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
|
How to Apply These Terms to Your New Programs
|
||||||
|
|
||||||
|
If you develop a new program, and you want it to be of the greatest possible use to the public, the best way to achieve this is to make it free software which everyone can redistribute and change under these terms.
|
||||||
|
|
||||||
|
To do so, attach the following notices to the program. It is safest to attach them to the start of each source file to most effectively state the exclusion of warranty; and each file should have at least the "copyright" line and a pointer to where the full notice is found.
|
||||||
|
|
||||||
|
<one line to give the program's name and a brief idea of what it does.>
|
||||||
|
Copyright (C) <year> <name of author>
|
||||||
|
|
||||||
|
This program is free software: you can redistribute it and/or modify it under the terms of the GNU Affero General Public License as published by the Free Software Foundation, either version 3 of the License, or (at your option) any later version.
|
||||||
|
|
||||||
|
This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU Affero General Public License for more details.
|
||||||
|
|
||||||
|
You should have received a copy of the GNU Affero General Public License along with this program. If not, see <http://www.gnu.org/licenses/>.
|
||||||
|
|
||||||
|
Also add information on how to contact you by electronic and paper mail.
|
||||||
|
|
||||||
|
If your software can interact with users remotely through a computer network, you should also make sure that it provides a way for users to get its source. For example, if your program is a web application, its interface could display a "Source" link that leads users to an archive of the code. There are many ways you could offer source, and different solutions will be better for different programs; see section 13 for the specific requirements.
|
||||||
|
|
||||||
|
You should also get your employer (if you work as a programmer) or school, if any, to sign a "copyright disclaimer" for the program, if necessary. For more information on this, and how to apply and follow the GNU AGPL, see <http://www.gnu.org/licenses/>.
|
221
README.md
221
README.md
@ -2,57 +2,68 @@
|
|||||||
|
|
||||||
# Matrix (An open network for secure, decentralized communication) server setup using Ansible and Docker
|
# Matrix (An open network for secure, decentralized communication) server setup using Ansible and Docker
|
||||||
|
|
||||||
## Purpose
|
## 🎯 Purpose
|
||||||
|
|
||||||
This [Ansible](https://www.ansible.com/) playbook is meant to help you run your own [Matrix](http://matrix.org/) homeserver, along with the [various services](#supported-services) related to that.
|
This [Ansible](https://www.ansible.com/) playbook is meant to help you run your own [Matrix](http://matrix.org/) homeserver, along with the [various services](#supported-services) related to that.
|
||||||
|
|
||||||
That is, it lets you join the Matrix network using your own `@<username>:<your-domain>` identifier, all hosted on your own server (see [prerequisites](docs/prerequisites.md)).
|
That is, it lets you join the Matrix network using your own user ID like `@alice:example.com`, all hosted on your own server (see [prerequisites](docs/prerequisites.md)).
|
||||||
|
|
||||||
We run all services in [Docker](https://www.docker.com/) containers (see [the container images we use](docs/container-images.md)), which lets us have a predictable and up-to-date setup, across multiple supported distros (see [prerequisites](docs/prerequisites.md)) and [architectures](docs/alternative-architectures.md) (x86/amd64 being recommended).
|
We run all [supported services](#-supported-services) in [Docker](https://www.docker.com/) containers (see [the container images we use](docs/container-images.md)), which lets us have a predictable and up-to-date setup, across multiple supported distros (see [prerequisites](docs/prerequisites.md)) and [architectures](docs/alternative-architectures.md) (x86/amd64 being recommended).
|
||||||
|
|
||||||
[Installation](docs/README.md) (upgrades) and some maintenance tasks are automated using [Ansible](https://www.ansible.com/) (see [our Ansible guide](docs/ansible.md)).
|
Installation (upgrades) and some maintenance tasks are automated using [Ansible](https://www.ansible.com/) (see [our Ansible guide](docs/ansible.md)).
|
||||||
|
|
||||||
|
## ☁ Self-hosting or Managed / SaaS
|
||||||
|
|
||||||
## Self-hosting or SaaS
|
This Ansible playbook tries to make self-hosting and maintaining a Matrix server fairly easy (see [Getting started](#-getting-started)). Still, running any service smoothly requires knowledge, time and effort.
|
||||||
|
|
||||||
This Ansible playbook tries to make self-hosting and maintaining a Matrix server fairly easy. Still, running any service smoothly requires knowledge, time and effort.
|
If you like the [FOSS](https://en.wikipedia.org/wiki/Free_and_open-source_software) spirit of this Ansible playbook, but prefer to put the responsibility on someone else, you can also [get a managed Matrix server from etke.cc](https://etke.cc?utm_source=github&utm_medium=readme&utm_campaign=mdad) (both hosting and on-premises) - a service built on top of this Ansible playbook but with [additional components](https://etke.cc/help/extras/?utm_source=github&utm_medium=readme&utm_campaign=mdad) and [services](https://etke.cc/services/?utm_source=github&utm_medium=readme&utm_campaign=mdad) which all help you run a Matrix server with ease. Be advised that etke.cc operates on a subscription-based approach and there is no "just set up my server once and be done with it" option.
|
||||||
|
|
||||||
If you like the [FOSS](https://en.wikipedia.org/wiki/Free_and_open-source_software) spirit of this Ansible playbook, but prefer to put the responsibility on someone else, you can also [get a managed Matrix server from etke.cc](https://etke.cc?utm_source=github&utm_medium=readme&utm_campaign=mdad) - a service built on top of this Ansible playbook, which can help you run a Matrix server with ease.
|
## 🚀 Getting started
|
||||||
|
|
||||||
If you like learning and experimentation, but would rather reduce future maintenance effort, you can even go for a hybrid approach - self-hosting manually using this Ansible playbook at first and then transferring server maintenance to etke.cc at a later time.
|
We have detailed documentation in the [docs/](./docs) directory - see the Table of Contents in the [documentation README](./docs/README.md).
|
||||||
|
|
||||||
|
While the [list of supported services](#-supported-services) and documentation is very extensive, you don't need to read through everything. We recommend:
|
||||||
|
|
||||||
## Supported services
|
- Starting with the basics. You can always add/remove or tweak services later on.
|
||||||
|
|
||||||
|
- Following our installation guide. There are two guides available for beginners and advanced users:
|
||||||
|
|
||||||
|
- ⚡ **[Quick start](./docs/quick-start.md) (for beginners)**: this is recommended for those who do not have an existing Matrix server and want to start quickly with "opinionated defaults".
|
||||||
|
|
||||||
|
- **Full installation guide (for advanced users)**: if you need to import an existing Matrix server's data into the new server or want to learn more while setting up the server, follow this guide by starting with the **[Prerequisites](./docs/prerequisites.md)** documentation page.
|
||||||
|
|
||||||
|
If you experience an issue on configuring the playbook, setting up your server, maintaining services on it, etc., please take a look at our [FAQ](./docs/faq.md). If you cannot find an answer to your question, feel free to ask for [help and support](#-support).
|
||||||
|
|
||||||
|
## ✔ Supported services
|
||||||
|
|
||||||
Using this playbook, you can get the following list of services configured on your server. Basically, this playbook aims to get you up-and-running with all the necessities around Matrix, without you having to do anything else.
|
Using this playbook, you can get the following list of services configured on your server. Basically, this playbook aims to get you up-and-running with all the necessities around Matrix, without you having to do anything else.
|
||||||
|
|
||||||
**Note**: the list below is exhaustive. It includes optional or even some advanced components that you will most likely not need.
|
**Notes**:
|
||||||
Sticking with the defaults (which install a subset of the above components) is the best choice, especially for a new installation.
|
|
||||||
You can always re-run the playbook later to add or remove components.
|
|
||||||
|
|
||||||
|
- The list below is exhaustive. It includes optional or even some advanced components that you will most likely not need. Sticking with the defaults (which install a subset of the above components) is the best choice, especially for a new installation. You can always re-run the playbook later to add or remove components.
|
||||||
|
|
||||||
|
- Deprecated or unmaintained services are not listed. You can find documentations for them [here](docs/configuring-playbook.md#deprecated--unmaintained--removed-services).
|
||||||
|
|
||||||
### Homeserver
|
### Homeserver
|
||||||
|
|
||||||
The homeserver is the backbone of your matrix system. Choose one from the following list.
|
The homeserver is the backbone of your Matrix system. Choose one from the following list.
|
||||||
|
|
||||||
| Name | Default? | Description | Documentation |
|
| Name | Default? | Description | Documentation |
|
||||||
| ---- | -------- | ----------- | ------------- |
|
| ---- | -------- | ----------- | ------------- |
|
||||||
| [Synapse](https://github.com/matrix-org/synapse) | ✓ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network | [Link](docs/configuring-playbook-synapse.md) |
|
| [Synapse](https://github.com/element-hq/synapse) | ✅ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network | [Link](docs/configuring-playbook-synapse.md) |
|
||||||
| [Conduit](https://conduit.rs) | x | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network. Conduit is a lightweight open-source server implementation of the Matrix Specification with a focus on easy setup and low system requirements | [Link](docs/configuring-playbook-conduit.md) |
|
| [Conduit](https://conduit.rs) | ❌ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network. Conduit is a lightweight open-source server implementation of the Matrix Specification with a focus on easy setup and low system requirements | [Link](docs/configuring-playbook-conduit.md) |
|
||||||
| [Dendrite](https://github.com/matrix-org/dendrite) | x | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network. Dendrite is a second-generation Matrix homeserver written in Go, an alternative to Synapse. | [Link](docs/configuring-playbook-dendrite.md) |
|
| [Dendrite](https://github.com/matrix-org/dendrite) | ❌ | Storing your data and managing your presence in the [Matrix](http://matrix.org/) network. Dendrite is a second-generation Matrix homeserver written in Go, an alternative to Synapse. | [Link](docs/configuring-playbook-dendrite.md) |
|
||||||
|
|
||||||
### Clients
|
### Clients
|
||||||
|
|
||||||
Web clients for matrix that you can host on your own domains.
|
Web clients for Matrix that you can host on your own domains.
|
||||||
|
|
||||||
| Name | Default? | Description | Documentation |
|
| Name | Default? | Description | Documentation |
|
||||||
| ---- | -------- | ----------- | ------------- |
|
| ---- | -------- | ----------- | ------------- |
|
||||||
| [Element](https://app.element.io/) | ✓ | Web UI, which is configured to connect to your own Synapse server by default | [Link](docs/configuring-playbook-client-element.md) |
|
| [Element Web](https://github.com/element-hq/element-web) | ✅ | Default Matrix web client, configured to connect to your own Synapse server | [Link](docs/configuring-playbook-client-element-web.md) |
|
||||||
| [Hydrogen](https://github.com/vector-im/hydrogen-web) | x | Lightweight matrix client with legacy and mobile browser support | [Link](docs/configuring-playbook-client-hydrogen.md) |
|
| [Hydrogen](https://github.com/element-hq/hydrogen-web) | ❌ | Lightweight Matrix client with legacy and mobile browser support | [Link](docs/configuring-playbook-client-hydrogen.md) |
|
||||||
| [Cinny](https://github.com/ajbura/cinny) | x | Simple, elegant and secure web client | [Link](docs/configuring-playbook-client-cinny.md) |
|
| [Cinny](https://github.com/ajbura/cinny) | ❌ | Simple, elegant and secure web client | [Link](docs/configuring-playbook-client-cinny.md) |
|
||||||
| [SchildiChat](https://schildi.chat/) | x | Based on Element, with a more traditional instant messaging experience | [Link](docs/configuring-playbook-client-schildichat.md) |
|
| [SchildiChat Web](https://schildi.chat/) | ❌ | Based on Element Web, with a more traditional instant messaging experience | [Link](docs/configuring-playbook-client-schildichat-web.md) |
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Server Components
|
### Server Components
|
||||||
|
|
||||||
@ -60,17 +71,13 @@ Services that run on the server to make the various parts of your installation w
|
|||||||
|
|
||||||
| Name | Default? | Description | Documentation |
|
| Name | Default? | Description | Documentation |
|
||||||
| ---- | -------- | ----------- | ------------- |
|
| ---- | -------- | ----------- | ------------- |
|
||||||
| [PostgreSQL](https://www.postgresql.org/)| ✓ | Database for Synapse. [Using an external PostgreSQL server](docs/configuring-playbook-external-postgres.md) is also possible. | [Link](docs/configuring-playbook-external-postgres.md) |
|
| [PostgreSQL](https://www.postgresql.org/)| ✅ | Database for Synapse. [Using an external PostgreSQL server](docs/configuring-playbook-external-postgres.md) is also possible. | [Link](docs/configuring-playbook-external-postgres.md) |
|
||||||
| [Coturn](https://github.com/coturn/coturn) | ✓ | STUN/TURN server for WebRTC audio/video calls | [Link](docs/configuring-playbook-turn.md) |
|
| [Coturn](https://github.com/coturn/coturn) | ✅ | STUN/TURN server for WebRTC audio/video calls | [Link](docs/configuring-playbook-turn.md) |
|
||||||
| [Traefik](https://doc.traefik.io/traefik/) | ✓ | Web server, listening on ports 80, 443 and 8448 - standing in front of all the other services. Using your own webserver [is possible](docs/configuring-playbook-own-webserver.md) | [Link](docs/configuring-playbook-traefik.md) |
|
| [Traefik](https://doc.traefik.io/traefik/) | ✅ | Web server, listening on ports 80, 443 and 8448 - standing in front of all the other services. Using your own webserver [is possible](docs/configuring-playbook-own-webserver.md) | [Link](docs/configuring-playbook-traefik.md) |
|
||||||
| [nginx](http://nginx.org/) | x | (Deprecated) Web server, listening on ports 80, 443 and 8448 - standing in front of all the other services. Deprecated in favor of Traefik | [Link](docs/configuring-playbook-nginx.md) |
|
| [Let's Encrypt](https://letsencrypt.org/) | ✅ | Free SSL certificate, which secures the connection to all components | [Link](docs/configuring-playbook-ssl-certificates.md) |
|
||||||
| [Let's Encrypt](https://letsencrypt.org/) | ✓ | Free SSL certificate, which secures the connection to all components | [Link](docs/configuring-playbook-ssl-certificates.md) |
|
| [Exim](https://www.exim.org/) | ✅ | Mail server, through which all Matrix services send outgoing email (can be configured to relay through another SMTP server) | [Link](docs/configuring-playbook-email.md) |
|
||||||
| [ma1sd](https://github.com/ma1uta/ma1sd) | x | Matrix Identity Server | [Link](docs/configuring-playbook-ma1sd.md)
|
| [ma1sd](https://github.com/ma1uta/ma1sd) | ❌ | Matrix Identity Server | [Link](docs/configuring-playbook-ma1sd.md)
|
||||||
| [Exim](https://www.exim.org/) | ✓ | Mail server, through which all Matrix services send outgoing email (can be configured to relay through another SMTP server) | [Link](docs/configuring-playbook-email.md) |
|
| [ddclient](https://github.com/linuxserver/docker-ddclient) | ❌ | Dynamic DNS | [Link](docs/configuring-playbook-dynamic-dns.md) |
|
||||||
| [Dimension](https://github.com/turt2live/matrix-dimension) | x | An open source integrations manager for matrix clients | [Link](docs/configuring-playbook-dimension.md) |
|
|
||||||
| [Sygnal](https://github.com/matrix-org/sygnal) | x | Push gateway | [Link](docs/configuring-playbook-sygnal.md) |
|
|
||||||
| [ntfy](https://ntfy.sh) | x | Push notifications server | [Link](docs/configuring-playbook-ntfy.md) |
|
|
||||||
|
|
||||||
|
|
||||||
### Authentication
|
### Authentication
|
||||||
|
|
||||||
@ -78,12 +85,13 @@ Extend and modify how users are authenticated on your homeserver.
|
|||||||
|
|
||||||
| Name | Default? | Description | Documentation |
|
| Name | Default? | Description | Documentation |
|
||||||
| ---- | -------- | ----------- | ------------- |
|
| ---- | -------- | ----------- | ------------- |
|
||||||
| [matrix-synapse-rest-auth](https://github.com/ma1uta/matrix-synapse-rest-password-provider) (advanced) | x | REST authentication password provider module | [Link](docs/configuring-playbook-rest-auth.md) |
|
| [matrix-synapse-rest-auth](https://github.com/ma1uta/matrix-synapse-rest-password-provider) (advanced) | ❌ | REST authentication password provider module | [Link](docs/configuring-playbook-rest-auth.md) |
|
||||||
|[matrix-synapse-shared-secret-auth](https://github.com/devture/matrix-synapse-shared-secret-auth) (advanced) | x | Password provider module | [Link](docs/configuring-playbook-shared-secret-auth.md) |
|
|[matrix-synapse-shared-secret-auth](https://github.com/devture/matrix-synapse-shared-secret-auth) (advanced) | ❌ | Password provider module | [Link](docs/configuring-playbook-shared-secret-auth.md) |
|
||||||
| [matrix-synapse-ldap3](https://github.com/matrix-org/matrix-synapse-ldap3) (advanced) | x | LDAP Auth password provider module | [Link](docs/configuring-playbook-ldap-auth.md) |
|
| [matrix-synapse-ldap3](https://github.com/matrix-org/matrix-synapse-ldap3) (advanced) | ❌ | LDAP Auth password provider module | [Link](docs/configuring-playbook-ldap-auth.md) |
|
||||||
| [matrix-ldap-registration-proxy](https://gitlab.com/activism.international/matrix_ldap_registration_proxy) (advanced) | x | A proxy that handles Matrix registration requests and forwards them to LDAP. | [Link](docs/configuring-playbook-matrix-ldap-registration-proxy.md) |
|
| [matrix-ldap-registration-proxy](https://gitlab.com/activism.international/matrix_ldap_registration_proxy) (advanced) | ❌ | A proxy that handles Matrix registration requests and forwards them to LDAP. | [Link](docs/configuring-playbook-matrix-ldap-registration-proxy.md) |
|
||||||
| [matrix-registration](https://github.com/ZerataX/matrix-registration) | x | A simple python application to have a token based matrix registration | [Link](docs/configuring-playbook-matrix-registration.md) |
|
| [matrix-registration](https://github.com/ZerataX/matrix-registration) | ❌ | A simple python application to have a token based Matrix registration | [Link](docs/configuring-playbook-matrix-registration.md) |
|
||||||
|
| [Matrix User Verification Service](https://github.com/matrix-org/matrix-user-verification-service) (UVS) | ❌ | Service to verify details of a user based on an Open ID token | [Link](docs/configuring-playbook-user-verification-service.md) |
|
||||||
|
| [synapse-simple-antispam](https://github.com/t2bot/synapse-simple-antispam) (advanced) | ❌ | A spam checker module | [Link](docs/configuring-playbook-synapse-simple-antispam.md) |
|
||||||
|
|
||||||
### File Storage
|
### File Storage
|
||||||
|
|
||||||
@ -91,44 +99,44 @@ Use alternative file storage to the default `media_store` folder.
|
|||||||
|
|
||||||
| Name | Default? | Description | Documentation |
|
| Name | Default? | Description | Documentation |
|
||||||
| ---- | -------- | ----------- | ------------- |
|
| ---- | -------- | ----------- | ------------- |
|
||||||
| [Goofys](https://github.com/kahing/goofys) | x | [Amazon S3](https://aws.amazon.com/s3/) (or other S3-compatible object store) storage for Synapse's content repository (`media_store`) files | [Link](docs/configuring-playbook-s3-goofys.md) |
|
| [Goofys](https://github.com/kahing/goofys) | ❌ | [Amazon S3](https://aws.amazon.com/s3/) (or other S3-compatible object store) storage for Synapse's content repository (`media_store`) files | [Link](docs/configuring-playbook-s3-goofys.md) |
|
||||||
| [synapse-s3-storage-provider](https://github.com/matrix-org/synapse-s3-storage-provider) | x | [Amazon S3](https://aws.amazon.com/s3/) (or other S3-compatible object store) storage for Synapse's content repository (`media_store`) files | [Link](docs/configuring-playbook-s3.md) |
|
| [synapse-s3-storage-provider](https://github.com/matrix-org/synapse-s3-storage-provider) | ❌ | [Amazon S3](https://aws.amazon.com/s3/) (or other S3-compatible object store) storage for Synapse's content repository (`media_store`) files | [Link](docs/configuring-playbook-s3.md) |
|
||||||
| [matrix-media-repo](https://github.com/turt2live/matrix-media-repo) | x | matrix-media-repo is a highly customizable multi-domain media repository for Matrix. Intended for medium to large deployments, this media repo de-duplicates media while being fully compliant with the specification. | [Link](docs/configuring-playbook-matrix-media-repo.md) |
|
| [matrix-media-repo](https://github.com/turt2live/matrix-media-repo) | ❌ | matrix-media-repo is a highly customizable multi-domain media repository for Matrix. Intended for medium to large deployments, this media repo de-duplicates media while being fully compliant with the specification. | [Link](docs/configuring-playbook-matrix-media-repo.md) |
|
||||||
|
|
||||||
### Bridges
|
### Bridges
|
||||||
|
|
||||||
Bridges can be used to connect your matrix installation with third-party communication networks.
|
Bridges can be used to connect your Matrix installation with third-party communication networks.
|
||||||
|
|
||||||
| Name | Default? | Description | Documentation |
|
| Name | Default? | Description | Documentation |
|
||||||
| ---- | -------- | ----------- | ------------- |
|
| ---- | -------- | ----------- | ------------- |
|
||||||
| [mautrix-discord](https://github.com/mautrix/discord) | x | Bridge to [Discord](https://discord.com/) | [Link](docs/configuring-playbook-bridge-mautrix-discord.md) |
|
| [mautrix-discord](https://github.com/mautrix/discord) | ❌ | Bridge to [Discord](https://discord.com/) | [Link](docs/configuring-playbook-bridge-mautrix-discord.md) |
|
||||||
| [mautrix-slack](https://github.com/mautrix/slack) | x | Bridge to [Slack](https://slack.com/) | [Link](docs/configuring-playbook-bridge-mautrix-slack.md) |
|
| [mautrix-slack](https://github.com/mautrix/slack) | ❌ | Bridge to [Slack](https://slack.com/) | [Link](docs/configuring-playbook-bridge-mautrix-slack.md) |
|
||||||
| [mautrix-telegram](https://github.com/mautrix/telegram) | x | Bridge to [Telegram](https://telegram.org/) | [Link](docs/configuring-playbook-bridge-mautrix-telegram.md) |
|
| [mautrix-telegram](https://github.com/mautrix/telegram) | ❌ | Bridge to [Telegram](https://telegram.org/) | [Link](docs/configuring-playbook-bridge-mautrix-telegram.md) |
|
||||||
| [mautrix-gmessages](https://github.com/mautrix/gmessages) | x | Bridge to [Google Messages](https://messages.google.com/) | [Link](docs/configuring-playbook-bridge-mautrix-gmessages.md) |
|
| [mautrix-gmessages](https://github.com/mautrix/gmessages) | ❌ | Bridge to [Google Messages](https://messages.google.com/) | [Link](docs/configuring-playbook-bridge-mautrix-gmessages.md) |
|
||||||
| [mautrix-whatsapp](https://github.com/mautrix/whatsapp) | x | Bridge to [WhatsApp](https://www.whatsapp.com/) | [Link](docs/configuring-playbook-bridge-mautrix-whatsapp.md) |
|
| [mautrix-whatsapp](https://github.com/mautrix/whatsapp) | ❌ | Bridge to [WhatsApp](https://www.whatsapp.com/) | [Link](docs/configuring-playbook-bridge-mautrix-whatsapp.md) |
|
||||||
| [mautrix-facebook](https://github.com/mautrix/facebook) | x | Bridge to [Facebook](https://facebook.com/) | [Link](docs/configuring-playbook-bridge-mautrix-facebook.md) |
|
| [mautrix-wsproxy](https://github.com/mautrix/wsproxy) | ❌ | Bridge to Android SMS or Apple iMessage | [Link](docs/configuring-playbook-bridge-mautrix-wsproxy.md) |
|
||||||
| [mautrix-twitter](https://github.com/mautrix/twitter) | x | Bridge to [Twitter](https://twitter.com/) | [Link](docs/configuring-playbook-bridge-mautrix-twitter.md) |
|
| [mautrix-twitter](https://github.com/mautrix/twitter) | ❌ | Bridge to [Twitter](https://twitter.com/) | [Link](docs/configuring-playbook-bridge-mautrix-twitter.md) |
|
||||||
| [mautrix-hangouts](https://github.com/mautrix/hangouts) | x | Bridge to [Google Hangouts](https://en.wikipedia.org/wiki/Google_Hangouts) | [Link](docs/configuring-playbook-bridge-mautrix-hangouts.md) |
|
| [mautrix-googlechat](https://github.com/mautrix/googlechat) | ❌ | Bridge to [Google Chat](https://en.wikipedia.org/wiki/Google_Chat) | [Link](docs/configuring-playbook-bridge-mautrix-googlechat.md) |
|
||||||
| [mautrix-googlechat](https://github.com/mautrix/googlechat) | x | Bridge to [Google Chat](https://en.wikipedia.org/wiki/Google_Chat) | [Link](docs/configuring-playbook-bridge-mautrix-googlechat.md) |
|
| [mautrix-meta](https://github.com/mautrix/instagram) | ❌ | Bridge to [Messenger](https://messenger.com/) and [Instagram](https://instagram.com/) | Link for [Messenger](docs/configuring-playbook-bridge-mautrix-meta-messenger.md) / [Instagram](docs/configuring-playbook-bridge-mautrix-meta-instagram.md) |
|
||||||
| [mautrix-instagram](https://github.com/mautrix/instagram) | x | Bridge to [Instagram](https://instagram.com/) | [Link](docs/configuring-playbook-bridge-mautrix-instagram.md) |
|
| [mautrix-signal](https://github.com/mautrix/signal) | ❌ | Bridge to [Signal](https://www.signal.org/) | [Link](docs/configuring-playbook-bridge-mautrix-signal.md) |
|
||||||
| [mautrix-signal](https://github.com/mautrix/signal) | x | Bridge to [Signal](https://www.signal.org/) | [Link](docs/configuring-playbook-bridge-mautrix-signal.md) |
|
| [beeper-linkedin](https://github.com/beeper/linkedin) | ❌ | Bridge to [LinkedIn](https://www.linkedin.com/) | [Link](docs/configuring-playbook-bridge-beeper-linkedin.md) |
|
||||||
| [beeper-linkedin](https://github.com/beeper/linkedin) | x | Bridge to [LinkedIn](https://www.linkedin.com/) | [Link](docs/configuring-playbook-bridge-beeper-linkedin.md) |
|
| [matrix-appservice-irc](https://github.com/matrix-org/matrix-appservice-irc) | ❌ | Bridge to [IRC](https://wikipedia.org/wiki/Internet_Relay_Chat) | [Link](docs/configuring-playbook-bridge-appservice-irc.md) |
|
||||||
| [matrix-appservice-irc](https://github.com/matrix-org/matrix-appservice-irc) | x | Bridge to [IRC](https://wikipedia.org/wiki/Internet_Relay_Chat) | [Link](docs/configuring-playbook-bridge-appservice-irc.md) |
|
| [matrix-appservice-kakaotalk](https://src.miscworks.net/fair/matrix-appservice-kakaotalk) | ❌ | Bridge to [Kakaotalk](https://www.kakaocorp.com/page/service/service/KakaoTalk?lang=ENG) | [Link](docs/configuring-playbook-bridge-appservice-kakaotalk.md) |
|
||||||
| [matrix-appservice-discord](https://github.com/Half-Shot/matrix-appservice-discord) | x | Bridge to [Discord](https://discordapp.com/) | [Link](docs/configuring-playbook-bridge-appservice-discord.md) |
|
| [matrix-appservice-discord](https://github.com/matrix-org/matrix-appservice-discord) | ❌ | Bridge to [Discord](https://discordapp.com/) | [Link](docs/configuring-playbook-bridge-appservice-discord.md) |
|
||||||
| [matrix-appservice-slack](https://github.com/matrix-org/matrix-appservice-slack) | x | Bridge to [Slack](https://slack.com/) | [Link](docs/configuring-playbook-bridge-appservice-slack.md) |
|
| [matrix-appservice-slack](https://github.com/matrix-org/matrix-appservice-slack) | ❌ | Bridge to [Slack](https://slack.com/) | [Link](docs/configuring-playbook-bridge-appservice-slack.md) |
|
||||||
| [matrix-appservice-webhooks](https://github.com/turt2live/matrix-appservice-webhooks) | x | Bridge for slack compatible webhooks ([ConcourseCI](https://concourse-ci.org/), [Slack](https://slack.com/) etc. pp.) | [Link](docs/configuring-playbook-bridge-appservice-webhooks.md) |
|
| [matrix-hookshot](https://github.com/matrix-org/matrix-hookshot) | ❌ | Bridge for generic webhooks and multiple project management services, such as GitHub, GitLab, Figma, and Jira in particular | [Link](docs/configuring-playbook-bridge-hookshot.md) |
|
||||||
| [matrix-hookshot](https://github.com/Half-Shot/matrix-hookshot) | x | Bridge for generic webhooks and multiple project management services, such as GitHub, GitLab, Figma, and Jira in particular | [Link](docs/configuring-playbook-bridge-hookshot.md) |
|
| [matrix-sms-bridge](https://github.com/benkuly/matrix-sms-bridge) | ❌ | Bridge to SMS | [Link](docs/configuring-playbook-bridge-matrix-bridge-sms.md) |
|
||||||
| [matrix-sms-bridge](https://github.com/benkuly/matrix-sms-bridge) | x | Bridge to SMS | [Link](docs/configuring-playbook-bridge-matrix-bridge-sms.md) |
|
| [matrix-wechat](https://github.com/duo/matrix-wechat) | ❌ | Bridge to [WeChat](https://www.wechat.com/) | [Link](docs/configuring-playbook-bridge-wechat.md) |
|
||||||
| [Heisenbridge](https://github.com/hifi/heisenbridge) | x | Bouncer-style bridge to [IRC](https://wikipedia.org/wiki/Internet_Relay_Chat) | [Link](docs/configuring-playbook-bridge-heisenbridge.md) |
|
| [Heisenbridge](https://github.com/hifi/heisenbridge) | ❌ | Bouncer-style bridge to [IRC](https://wikipedia.org/wiki/Internet_Relay_Chat) | [Link](docs/configuring-playbook-bridge-heisenbridge.md) |
|
||||||
| [go-skype-bridge](https://github.com/kelaresg/go-skype-bridge) | x | Bridge to [Skype](https://www.skype.com) | [Link](docs/configuring-playbook-bridge-go-skype-bridge.md) |
|
| [go-skype-bridge](https://github.com/kelaresg/go-skype-bridge) | ❌ | Bridge to [Skype](https://www.skype.com) | [Link](docs/configuring-playbook-bridge-go-skype-bridge.md) |
|
||||||
| [mx-puppet-slack](https://hub.docker.com/r/sorunome/mx-puppet-slack) | x | Bridge to [Slack](https://slack.com) | [Link](docs/configuring-playbook-bridge-mx-puppet-slack.md) |
|
| [mx-puppet-slack](https://gitlab.com/mx-puppet/slack/mx-puppet-slack) | ❌ | Bridge to [Slack](https://slack.com) | [Link](docs/configuring-playbook-bridge-mx-puppet-slack.md) |
|
||||||
| [mx-puppet-instagram](https://github.com/Sorunome/mx-puppet-instagram) | x | Bridge for Instagram-DMs ([Instagram](https://www.instagram.com/)) | [Link](docs/configuring-playbook-bridge-mx-puppet-instagram.md) |
|
| [mx-puppet-instagram](https://github.com/Sorunome/mx-puppet-instagram) | ❌ | Bridge for Instagram-DMs ([Instagram](https://www.instagram.com/)) | [Link](docs/configuring-playbook-bridge-mx-puppet-instagram.md) |
|
||||||
| [mx-puppet-twitter](https://github.com/Sorunome/mx-puppet-twitter) | x | Bridge for Twitter-DMs ([Twitter](https://twitter.com/)) | [Link](docs/configuring-playbook-bridge-mx-puppet-twitter.md) |
|
| [mx-puppet-twitter](https://github.com/Sorunome/mx-puppet-twitter) | ❌ | Bridge for Twitter-DMs ([Twitter](https://twitter.com/)) | [Link](docs/configuring-playbook-bridge-mx-puppet-twitter.md) |
|
||||||
| [mx-puppet-discord](https://github.com/matrix-discord/mx-puppet-discord) | x | Bridge to [Discord](https://discordapp.com/) | [Link](docs/configuring-playbook-bridge-mx-puppet-discord.md) |
|
| [mx-puppet-discord](https://gitlab.com/mx-puppet/discord/mx-puppet-discord) | ❌ | Bridge to [Discord](https://discordapp.com/) | [Link](docs/configuring-playbook-bridge-mx-puppet-discord.md) |
|
||||||
| [mx-puppet-groupme](https://gitlab.com/xangelix-pub/matrix/mx-puppet-groupme) | x | Bridge to [GroupMe](https://groupme.com/) | [Link](docs/configuring-playbook-bridge-mx-puppet-groupme.md) |
|
| [mx-puppet-groupme](https://gitlab.com/xangelix-pub/matrix/mx-puppet-groupme) | ❌ | Bridge to [GroupMe](https://groupme.com/) | [Link](docs/configuring-playbook-bridge-mx-puppet-groupme.md) |
|
||||||
| [mx-puppet-steam](https://github.com/icewind1991/mx-puppet-steam) | x | Bridge to [Steam](https://steamapp.com/) | [Link](docs/configuring-playbook-bridge-mx-puppet-steam.md) |
|
| [mx-puppet-steam](https://github.com/icewind1991/mx-puppet-steam) | ❌ | Bridge to [Steam](https://steamapp.com/) | [Link](docs/configuring-playbook-bridge-mx-puppet-steam.md) |
|
||||||
| [Email2Matrix](https://github.com/devture/email2matrix) | x | Bridge for relaying emails to Matrix rooms | [Link](docs/configuring-playbook-email2matrix.md) |
|
| [Email2Matrix](https://github.com/devture/email2matrix) | ❌ | Bridge for relaying emails to Matrix rooms | [Link](docs/configuring-playbook-email2matrix.md) |
|
||||||
|
| [Postmoogle](https://github.com/etkecc/postmoogle) | ❌ | Email to Matrix bridge | [Link](docs/configuring-playbook-bridge-postmoogle.md) |
|
||||||
|
|
||||||
### Bots
|
### Bots
|
||||||
|
|
||||||
@ -136,57 +144,53 @@ Bots provide various additional functionality to your installation.
|
|||||||
|
|
||||||
| Name | Default? | Description | Documentation |
|
| Name | Default? | Description | Documentation |
|
||||||
| ---- | -------- | ----------- | ------------- |
|
| ---- | -------- | ----------- | ------------- |
|
||||||
| [matrix-reminder-bot](https://github.com/anoadragon453/matrix-reminder-bot) | x | Bot for scheduling one-off & recurring reminders and alarms | [Link](docs/configuring-playbook-bot-matrix-reminder-bot.md) |
|
| [baibot](https://github.com/etkecc/baibot) | ❌ | A bot that exposes the power of [AI](https://en.wikipedia.org/wiki/Artificial_intelligence) / [Large Language Models](https://en.wikipedia.org/wiki/Large_language_model) to you | [Link](docs/configuring-playbook-bot-baibot.md) |
|
||||||
| [matrix-registration-bot](https://github.com/moan0s/matrix-registration-bot) | x | Bot for invitations by creating and managing registration tokens | [Link](docs/configuring-playbook-bot-matrix-registration-bot.md) |
|
| [matrix-reminder-bot](https://github.com/anoadragon453/matrix-reminder-bot) | ❌ | Bot for scheduling one-off & recurring reminders and alarms | [Link](docs/configuring-playbook-bot-matrix-reminder-bot.md) |
|
||||||
| [maubot](https://github.com/maubot/maubot) | x | A plugin-based Matrix bot system | [Link](docs/configuring-playbook-bot-maubot.md) |
|
| [matrix-registration-bot](https://github.com/moan0s/matrix-registration-bot) | ❌ | Bot for invitations by creating and managing registration tokens | [Link](docs/configuring-playbook-bot-matrix-registration-bot.md) |
|
||||||
| [honoroit](https://gitlab.com/etke.cc/honoroit) | x | A helpdesk bot | [Link](docs/configuring-playbook-bot-honoroit.md) |
|
| [maubot](https://github.com/maubot/maubot) | ❌ | A plugin-based Matrix bot system | [Link](docs/configuring-playbook-bot-maubot.md) |
|
||||||
| [Postmoogle](https://gitlab.com/etke.cc/postmoogle) | x | Email to matrix bot | [Link](docs/configuring-playbook-bot-postmoogle.md) |
|
| [Honoroit](https://github.com/etkecc/honoroit) | ❌ | A helpdesk bot | [Link](docs/configuring-playbook-bot-honoroit.md) |
|
||||||
| [Go-NEB](https://github.com/matrix-org/go-neb) | x | A multi functional bot written in Go | [Link](docs/configuring-playbook-bot-go-neb.md) |
|
| [Mjolnir](https://github.com/matrix-org/mjolnir) | ❌ | A moderation tool for Matrix | [Link](docs/configuring-playbook-bot-mjolnir.md) |
|
||||||
| [Mjolnir](https://github.com/matrix-org/mjolnir) | x | A moderation tool for Matrix | [Link](docs/configuring-playbook-bot-mjolnir.md) |
|
| [Draupnir](https://github.com/the-draupnir-project/Draupnir) | ❌ | A moderation tool for Matrix (Fork of Mjolnir) | [Link](docs/configuring-playbook-bot-draupnir.md) (for [appservice mode](docs/configuring-playbook-appservice-draupnir-for-all.md))|
|
||||||
| [Draupnir](https://github.com/the-draupnir-project/Draupnir) | x | A moderation tool for Matrix (Fork of Mjolnir) | [Link](docs/configuring-playbook-bot-draupnir.md) |
|
| [Buscarron](https://github.com/etkecc/buscarron) | ❌ | Web forms (HTTP POST) to Matrix | [Link](docs/configuring-playbook-bot-buscarron.md) |
|
||||||
| [Buscarron](https://gitlab.com/etke.cc/buscarron) | x | Web forms (HTTP POST) to matrix | [Link](docs/configuring-playbook-bot-buscarron.md) |
|
|
||||||
| [matrix-chatgpt-bot](https://github.com/matrixgpt/matrix-chatgpt-bot) | x | ChatGPT from matrix | [Link](docs/configuring-playbook-bot-chatgpt.md) |
|
|
||||||
|
|
||||||
### Administration
|
### Administration
|
||||||
|
|
||||||
Services that help you in administrating and monitoring your matrix installation.
|
Services that help you in administrating and monitoring your Matrix installation.
|
||||||
|
|
||||||
|
|
||||||
| Name | Default? | Description | Documentation |
|
| Name | Default? | Description | Documentation |
|
||||||
| ---- | -------- | ----------- | ------------- |
|
| ---- | -------- | ----------- | ------------- |
|
||||||
| [synapse-admin](https://github.com/Awesome-Technologies/synapse-admin) | x | A web UI tool for administrating users and rooms on your Matrix server | [Link](docs/configuring-playbook-synapse-admin.md) |
|
| [matrix-alertmanager-receiver](https://github.com/metio/matrix-alertmanager-receiver) | ❌ | Prometheus' [Alertmanager](https://prometheus.io/docs/alerting/latest/alertmanager/) client | [Link](docs/configuring-playbook-alertmanager-receiver.md) |
|
||||||
| Metrics and Graphs | x | Consists of the [Prometheus](https://prometheus.io) time-series database server, the Prometheus [node-exporter](https://prometheus.io/docs/guides/node-exporter/) host metrics exporter, and the [Grafana](https://grafana.com/) web UI | [Link](docs/configuring-playbook-prometheus-grafana.md) |
|
| [Matrix Authentication Service](https://github.com/element-hq/matrix-authentication-service/) | ❌ | OAuth 2.0 and OpenID Provider server | [Link](docs/configuring-playbook-matrix-authentication-service.md) |
|
||||||
| [Borg](https://borgbackup.org) | x | Backups | [Link](docs/configuring-playbook-backup-borg.md) |
|
| [synapse-admin](https://github.com/etkecc/synapse-admin) | ❌ | A web UI tool for administrating users and rooms on your Matrix server | [Link](docs/configuring-playbook-synapse-admin.md) |
|
||||||
| [Rageshake](https://github.com/matrix-org/rageshake) | x | Bug report server | [Link](docs/configuring-playbook-rageshake.md) |
|
| Metrics and Graphs | ❌ | Consists of the [Prometheus](https://prometheus.io) time-series database server, the Prometheus [node-exporter](https://prometheus.io/docs/guides/node-exporter/) host metrics exporter, and the [Grafana](https://grafana.com/) web UI, with [prometheus-nginxlog-exporter](https://github.com/martin-helmich/prometheus-nginxlog-exporter/) being available too | [Link](docs/configuring-playbook-prometheus-grafana.md) (for [prometheus-nginxlog-exporter](docs/configuring-playbook-prometheus-nginxlog.md)) |
|
||||||
|
| [Borg](https://borgbackup.org) | ❌ | Backups | [Link](docs/configuring-playbook-backup-borg.md) |
|
||||||
|
| [rageshake](https://github.com/matrix-org/rageshake) | ❌ | Bug report server | [Link](docs/configuring-playbook-rageshake.md) |
|
||||||
|
| [synapse-usage-exporter](https://github.com/loelkes/synapse-usage-exporter) | ❌ | Export the usage statistics of a Synapse homeserver to be scraped by Prometheus. | [Link](docs/configuring-playbook-synapse-usage-exporter.md) |
|
||||||
|
|
||||||
### Misc
|
### Misc
|
||||||
|
|
||||||
Various services that don't fit any other category.
|
Various services that don't fit any other categories.
|
||||||
|
|
||||||
| Name | Default? | Description | Documentation |
|
| Name | Default? | Description | Documentation |
|
||||||
| ---- | -------- | ----------- | ------------- |
|
| ---- | -------- | ----------- | ------------- |
|
||||||
| [sliding-sync](https://github.com/matrix-org/sliding-sync)| x | Sliding Sync support for clients which require it (e.g. Element X) | [Link](docs/configuring-playbook-sliding-sync-proxy.md) |
|
| [sliding-sync](https://github.com/matrix-org/sliding-sync)| ❌ | (Superseded by Simplified Sliding Sync integrated into Synapse > `1.114` and Conduit > `0.6.0`) Sliding Sync support for clients which require it (e.g. old Element X versions before Simplified Sliding Sync was developed) | [Link](docs/configuring-playbook-sliding-sync-proxy.md) |
|
||||||
| [synapse_auto_compressor](https://github.com/matrix-org/rust-synapse-compress-state/#automated-tool-synapse_auto_compressor) | x | A cli tool that automatically compresses `state_groups` database table in background. | [Link](docs/configuring-playbook-synapse-auto-compressor.md) |
|
| [synapse_auto_accept_invite](https://github.com/matrix-org/synapse-auto-accept-invite) | ❌ | A Synapse module to automatically accept invites. | [Link](docs/configuring-playbook-synapse-auto-accept-invite.md) |
|
||||||
| [synapse-simple-antispam](https://github.com/t2bot/synapse-simple-antispam) (advanced) | x | A spam checker module | [Link](docs/configuring-playbook-synapse-simple-antispam.md) |
|
| [synapse_auto_compressor](https://github.com/matrix-org/rust-synapse-compress-state/#automated-tool-synapse_auto_compressor) | ❌ | A cli tool that automatically compresses `state_groups` database table in background. | [Link](docs/configuring-playbook-synapse-auto-compressor.md) |
|
||||||
| [Matrix Corporal](https://github.com/devture/matrix-corporal) (advanced) | x | Reconciliator and gateway for a managed Matrix server | [Link](docs/configuring-playbook-matrix-corporal.md) |
|
| [Matrix Corporal](https://github.com/devture/matrix-corporal) (advanced) | ❌ | Reconciliator and gateway for a managed Matrix server | [Link](docs/configuring-playbook-matrix-corporal.md) |
|
||||||
| [Etherpad](https://etherpad.org) | x | An open source collaborative text editor | [Link](docs/configuring-playbook-etherpad.md) |
|
| [Etherpad](https://etherpad.org) | ❌ | An open source collaborative text editor | [Link](docs/configuring-playbook-etherpad.md) |
|
||||||
| [Jitsi](https://jitsi.org/) | x | An open source video-conferencing platform | [Link](docs/configuring-playbook-jitsi.md) |
|
| [Jitsi](https://jitsi.org/) | ❌ | An open source video-conferencing platform | [Link](docs/configuring-playbook-jitsi.md) |
|
||||||
| [Cactus Comments](https://cactus.chat) | x | A federated comment system built on matrix | [Link](docs/configuring-playbook-cactus-comments.md) |
|
| [Cactus Comments](https://cactus.chat) | ❌ | A federated comment system built on Matrix | [Link](docs/configuring-playbook-cactus-comments.md) |
|
||||||
|
| [Pantalaimon](https://github.com/matrix-org/pantalaimon) | ❌ | An E2EE aware proxy daemon | [Link](docs/configuring-playbook-pantalaimon.md) |
|
||||||
|
| [Sygnal](https://github.com/matrix-org/sygnal) | ❌ | Push gateway | [Link](docs/configuring-playbook-sygnal.md) |
|
||||||
|
| [ntfy](https://ntfy.sh) | ❌ | Push notifications server | [Link](docs/configuring-playbook-ntfy.md) |
|
||||||
|
|
||||||
|
## 🆕 Changes
|
||||||
## Installation
|
|
||||||
|
|
||||||
To configure and install Matrix on your own server, follow the [README in the docs/ directory](docs/README.md).
|
|
||||||
|
|
||||||
|
|
||||||
## Changes
|
|
||||||
|
|
||||||
This playbook evolves over time, sometimes with backward-incompatible changes.
|
This playbook evolves over time, sometimes with backward-incompatible changes.
|
||||||
|
|
||||||
When updating the playbook, refer to [the changelog](CHANGELOG.md) to catch up with what's new.
|
When updating the playbook, refer to [the changelog](CHANGELOG.md) to catch up with what's new.
|
||||||
|
|
||||||
|
## 🆘 Support
|
||||||
## Support
|
|
||||||
|
|
||||||
- Matrix room: [#matrix-docker-ansible-deploy:devture.com](https://matrix.to/#/#matrix-docker-ansible-deploy:devture.com)
|
- Matrix room: [#matrix-docker-ansible-deploy:devture.com](https://matrix.to/#/#matrix-docker-ansible-deploy:devture.com)
|
||||||
|
|
||||||
@ -194,8 +198,13 @@ When updating the playbook, refer to [the changelog](CHANGELOG.md) to catch up w
|
|||||||
|
|
||||||
- GitHub issues: [spantaleev/matrix-docker-ansible-deploy/issues](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues)
|
- GitHub issues: [spantaleev/matrix-docker-ansible-deploy/issues](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues)
|
||||||
|
|
||||||
|
## 🌐 Translation
|
||||||
|
|
||||||
## Related
|
See the [i18n/README.md](i18n/README.md) file for more information about translation.
|
||||||
|
|
||||||
|
Translations are still work in progress.
|
||||||
|
|
||||||
|
## 🤝 Related
|
||||||
|
|
||||||
You may also be interested in [mash-playbook](https://github.com/mother-of-all-self-hosting/mash-playbook) - another Ansible playbook for self-hosting non-Matrix services (see its [List of supported services](https://github.com/mother-of-all-self-hosting/mash-playbook/blob/main/docs/supported-services.md)).
|
You may also be interested in [mash-playbook](https://github.com/mother-of-all-self-hosting/mash-playbook) - another Ansible playbook for self-hosting non-Matrix services (see its [List of supported services](https://github.com/mother-of-all-self-hosting/mash-playbook/blob/main/docs/supported-services.md)).
|
||||||
|
|
||||||
|
106
YEAR-IN-REVIEW.md
Normal file
106
YEAR-IN-REVIEW.md
Normal file
@ -0,0 +1,106 @@
|
|||||||
|
# 2023
|
||||||
|
|
||||||
|
2023 was a year filled with many changes for matrix-docker-ansible-deploy. In this post, we're looking backward at some of the major changes that happened this year, as well as taking a glimpse of what's ahead in 2024.
|
||||||
|
|
||||||
|
2023 is probably [the year of AI](https://journal.everypixel.com/2023-the-year-of-ai), with millions of people jumping aboard [OpenAI](https://openai.com/)'s [ChatGPT](https://openai.com/chatgpt) train. matrix-docker-ansible-deploy is no stranger to this and 2023 began with a PR from [bertybuttface](https://github.com/bertybuttface) who added support for [matrix-chatgpt-bot](https://github.com/matrixgpt/matrix-chatgpt-bot) (see the [changelog entry](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#chatgpt-support)). While OpenAI's chat GPT website was frequently overloaded in the past, their API was up which made using this bot both convenient and more reliable.
|
||||||
|
|
||||||
|
AI aside, with the playbook's focus being containers, we're **doubling down on being "container native"** and becoming more interoperable for people hosting other containers on the Matrix server. In [2022](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/YEAR-IN-REVIEW.md#2022), we've announced a few sibling Ansible playbooks, their use of [Traefik](https://doc.traefik.io/traefik/) and the possiblity of matrix-docker-ansible-deploy also switching to this reverse-proxy. This prediction materialized quickly. The **largest change** in the playbook in 2023 happened way back in February - matrix-docker-ansible-deploy [starting the switch from nginx to Traefik](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#backward-compatibility-reverse-proxy-configuration-changes-and-initial-traefik-support) and then quickly [making Treafik the default reverse-proxy](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#traefik-is-the-default-reverse-proxy-now). As noted in the changelog entries, we envisioned a quick and complete elimination of `matrix-nginx-proxy`, but at the end of 2023, it hasn't happened yet. The playbook is already using Traefik as the front-most reverse-proxy, but nginx (via `matrix-nginx-proxy`) is still around - it has taken a step back and is only used internally for new setups. Work got to a stall due to:
|
||||||
|
|
||||||
|
* complexity: untangling the overly large and messy `matrix-nginx-proxy` component is difficult
|
||||||
|
* the current setup became "good enough" because nginx has become an internal implementation detail for those who have migrated to Traefik. Traefik is already the default public reverse-proxy and gives better possibilities to people wishing to run other web-exposed containers on their Matrix server via [Docker Compose](https://docs.docker.com/compose/), other Ansible playbooks like [mash-playbook](https://github.com/mother-of-all-self-hosting/mash-playbook) (more about this one, below) or any other way.
|
||||||
|
|
||||||
|
`matrix-nginx-proxy` is no longer in the way of us being interoperable, but its ugly internal details are still there. It is one more proxy in the long chain of reverse-proxies we have and we'd like to cut it out. This would both make things simpler and also boost performance.
|
||||||
|
|
||||||
|
The delay in eliminating `matrix-nginx-proxy` has probably been welcome by many existing users who decided to postpone the Traefik migration a bit longer. In 2024, work on eliminating `matrix-nginx-proxy` will continue with rapid pace. People who are still using `matrix-nginx-proxy` as their front-most reverse-proxy will need to rework their setup. About a year of putting it off has been long enough.
|
||||||
|
|
||||||
|
This large Traefik reverse-proxy change was also accompanied by another internal change which began in 2022, but continued in 2023 - **moving non-Matrix-related roles from being internal to the playbook to living their own life outside of it**. Various roles were made more decoupled and moved outside of the playbook, so that other projects (like the [mash-playbook](https://github.com/mother-of-all-self-hosting/mash-playbook) Ansible playbook or other Ansible playbooks) could benefit from them. This led to the **death of a few sibling playbooks** ([gitea-docker-ansible-deploy](https://github.com/spantaleev/gitea-docker-ansible-deploy), [nextcloud-docker-ansible-deploy](https://github.com/spantaleev/nextcloud-docker-ansible-deploy), [peertube-docker-ansible-deploy](https://github.com/spantaleev/peertube-docker-ansible-deploy), [vaultwarden-docker-ansible-deploy](https://github.com/spantaleev/vaultwarden-docker-ansible-deploy)), but brought life to something better, which supports all these services and more.
|
||||||
|
|
||||||
|
[mash-playbook](https://github.com/mother-of-all-self-hosting/mash-playbook) is a new Ansible playbook that a few of us (matrix-docker-ansible-deploy contributors) have launched in 2023. It has quickly grown to supports [60+ services](https://github.com/mother-of-all-self-hosting/mash-playbook/blob/main/docs/supported-services.md) and aims to do the same for [FOSS](https://en.wikipedia.org/wiki/Free_and_open-source_software) service hosting, as matrix-docker-ansible-deploy has done for Matrix - providing a clean and secure way to run a bunch of services in containers on a regular server (that is to say, without Kubernetes, etc.). Thanks to Traefik and Ansible role reuse, it's easy to host both mash-playbook services and matrix-docker-ansible-deploy services on the same server - see mash-playbook's [interoperability](https://github.com/mother-of-all-self-hosting/mash-playbook/blob/main/docs/interoperability.md) documentation page. If you've been looking for a holiday project or your New Year's Resolutions list contains "self-hosting more services", then you're welcome to give this new playbook a try and join its Matrix room ([#mash-playbook:devture.com](https://matrix.to/#/#mash-playbook:devture.com)).
|
||||||
|
|
||||||
|
Because many of the roles are now external to this playbook (defined in the [requirements.yml](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/da27655ef34999fa924bc0a5e641dbd9ba06f133/requirements.yml) file), running `make roles` (or better yet `just roles` via the [just tool](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#support-for-running-commands-via-just)) becomes a necessity each time one pulls playbook updates (`git pull`). Pulling external roles happens via the [ansible-galaxy](https://docs.ansible.com/ansible/latest/cli/ansible-galaxy.html) command-line tool, but if available, the playbook would also use the much faster [agru](https://github.com/etkecc/agru) tool (developed by [Aine](https://gitlab.com/etke.cc) from [etke.cc](https://etke.cc/) this year).
|
||||||
|
|
||||||
|
With the internal (but important) details out of the way, we can now talk more about **new features that landed in matrix-docker-ansible-deploy in 2023**.
|
||||||
|
|
||||||
|
The following **new** **bridges** were added to the playbook in 2023:
|
||||||
|
|
||||||
|
* (2023-01-11) [mautrix-slack](https://mau.dev/mautrix/slack), thanks to a PR by [Cody Neiman](https://github.com/xangelix) (see the [changelog entry](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#mautrix-slack-support))
|
||||||
|
* (2023-07-21) [mautrix-gmessages](https://github.com/mautrix/gmessages), thanks to a PR by [Shreyas Ajjarapu](https://github.com/shreyasajj) (see the [changelog entry](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#mautrix-gmessages-support))
|
||||||
|
* (2023-08-23) [mautrix-wsproxy](https://github.com/mautrix/wsproxy) for Apple iMessage bridging (when combined with the [mautrix-imessage](https://github.com/mautrix/imessage) bridge running on your Mac or Android phone), thanks to a PR by [Johan Swetzén](https://github.com/jswetzen)
|
||||||
|
|
||||||
|
This brings the total number of **[bridges that the playbook supports](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/docs/configuring-playbook.md#bridging-other-networks) up to 30**. There are alternative bridge implementations for various networks and protocols, so the number of "unique bridged networks" is surely much smaller.
|
||||||
|
|
||||||
|
A few other **major components and changes** landed in 2023:
|
||||||
|
|
||||||
|
* (2023-02-10) The [Draupnir](https://github.com/the-draupnir-project/Draupnir) moderation tool (successor to [Mjolnir](https://github.com/matrix-org/mjolnir)), thanks to a PR by [FSG-Cat](https://github.com/FSG-Cat) (see the [changelog entry](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#draupnir-moderation-tool-bot-support))
|
||||||
|
* (2023-02-10) [Matrix User Verification Service](https://github.com/matrix-org/matrix-user-verification-service) to add Matrix Authentication Support to our Jitsi setup, thanks to a PR by [Jakob S.](https://github.com/jakicoll) from [zakk gGmbH](https://github.com/zakk-it) (see the [changelog entry](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#matrix-authentication-support-for-jitsi))
|
||||||
|
* (2023-02-25) The [rageshake](https://github.com/matrix-org/rageshake) bug report server, thanks to a PR by [Benjamin Kampmann](https://github.com/gnunicorn) (see the [changelog entry](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#rageshake-support))
|
||||||
|
* (2023-03-07) [Sliding Sync proxy](https://github.com/matrix-org/sliding-sync) (currently a necessary component for [Element X](https://element.io/labs/element-x) to work), thanks to: [Benjamin Kampmann](https://github.com/gnunicorn) and [FSG-Cat](https://github.com/FSG-Cat) (see the [changelog entry](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#sliding-sync-proxy-element-x-support))
|
||||||
|
* (2023-03-12) synapse-auto-compressor to periodically and automatically run [rust-synapse-compress-state](https://github.com/matrix-org/rust-synapse-compress-state), thanks to a PR by [Aine](https://gitlab.com/etke.cc) from [etke.cc](https://etke.cc/) (see the [changelog entry](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#synapse-auto-compressor-support))
|
||||||
|
* (2023-07-17) [matrix-media-repo](https://github.com/turt2live/matrix-media-repo), thanks to a PR by [Michael Hollister](https://github.com/Michael-Hollister) from [FUTO](https://www.futo.org/), the creators of the [Circles app](https://circu.li/) (see the [changelog entry](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#matrix-media-repo-support))
|
||||||
|
* (2023-08-31) [SchildiChat Web](https://github.com/SchildiChat/schildichat-desktop) client app (fork of [Element Web)](https://github.com/element-hq/element-web), thanks to a PR by [Aine](https://gitlab.com/etke.cc) from [etke.cc](https://etke.cc/) (see the [changelog entry](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#schildichat-support))
|
||||||
|
* (2023-10-18) Postgres parameters auto-tuning, thanks to a PR by [Aine](https://gitlab.com/etke.cc) from [etke.cc](https://etke.cc/) (see the [changelog entry](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#postgres-parameters-are-automatically-tuned-now))
|
||||||
|
* (2023-10-23) Enabling federation of the room directory for Synapse (see the [changelog entry](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#enabling-allow_public_rooms_over_federation-by-default-for-synapse))
|
||||||
|
|
||||||
|
The most recent change in the list above (Enabling federation of the room directory for Synapse) has been somewhat **controversial** as it goes against upstream defaults for Synapse. Nevertheless, we believe it **promotes the well-being of the Matrix Federation by improving room discovery**.
|
||||||
|
|
||||||
|
**Matrix Federation Stats** (containing the percentage of servers publishing their room directory publicly) are posted to [TWIM](https://matrix.org/category/this-week-in-matrix/) each week by [Aine](https://gitlab.com/etke.cc) from [etke.cc](https://etke.cc/). The number of servers which [currently published their room directory publicly](https://matrix.org/blog/2023/12/2/this-week-in-matrix-2023-12-22/#matrix-federation-stats) stands at `26.6%`, which is:
|
||||||
|
|
||||||
|
- **2.4% more** than when it was when [first published to TWIM](https://matrix.org/blog/2023/11/03/this-week-in-matrix-2023-11-03/#matrix-federation-stats) (1 month earlier, in November)
|
||||||
|
- likely about **15+% more** than from before we flipped the switch (in October)
|
||||||
|
|
||||||
|
Hopefully, Synapse defaults would also change the same way and we'd see the number of servers publicly listing their room directory grow faster.
|
||||||
|
|
||||||
|
With this configuration change in place, projects like [MatrixRooms.info](https://matrixrooms.info/) (made by [etke.cc](https://etke.cc/)) and potentially others in the future, can discover, index the metadata (room address, title, topic, number of users, etc.) and make public rooms browsable & searchable across the whole Matrix Federation. It'd be great if users joining Matrix could more easily find interesting communities that match their interests!
|
||||||
|
|
||||||
|
On the **media side of things**, besides Jitsi getting better Matrix integration (via the aforementioned Matrix User Verification Service), we've also had some [Coturn security tightening](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#backward-compatibility-tightening-coturn-security-can-lead-to-connectivity-issues) as well as [performance optimizations](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md#coturn-can-now-use-host-networking) for configurations exposing lots of network ports.
|
||||||
|
|
||||||
|
[Element Call](https://github.com/element-hq/element-call) seems to have become a nice and polished product lately (as proclaimed in [The Matrix Holiday Update 2023](https://matrix.org/blog/2023/12/25/the-matrix-holiday-update-2023/)), so 2024 is likely the year we'll see support for it in the playbook. Element Call depends on the [LiveKit](https://livekit.io/) streaming server (which is also useful to developers even by itself), so the first step is likely to see LiveKit support in mash-playbook via a reusable Ansible role. Such a LiveKit Ansible role could later easily land in matrix-docker-ansible-deploy and an Element Call static website could be hooked to it.
|
||||||
|
|
||||||
|
Besides these highlights, there were many other relatively large changes announced in our [CHANGELOG](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/850078b7e37401ce91a0f9b686f60b945f6c3a96/CHANGELOG.md) and hundreds of other more minor (but still important) playbook changes that didn't get a mention.
|
||||||
|
|
||||||
|
We have **hundreds of contributors to thank for their hard work** on making Matrix self-hosting better for all of us! It should be noted that **support comes in many shapes**, not only in raw code commits and financial help (via [donations](https://liberapay.com/s.pantaleev) or using the [etke.cc managed Matrix hosting service](https://etke.cc/) which is based on matrix-docker-ansible-deploy). It also comes in the shape of code reviews, helping others with [issues](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues), reporting new issues, participating in our support room on Matrix ([#matrix-docker-ansible-deploy:devture.com](https://matrix.to/#/#matrix-docker-ansible-deploy:devture.com)), etc. To everyone who has been there to make matrix-docker-ansible-deploy better in 2023, thank you! 🙇♂️
|
||||||
|
|
||||||
|
|
||||||
|
# 2022
|
||||||
|
|
||||||
|
For [matrix-docker-ansible-deploy](https://github.com/spantaleev/matrix-docker-ansible-deploy/), 2022 started with **breaking the** [**Synapse**](https://github.com/element-hq/synapse) **monopoly** by [adding support](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#dendrite-support) for the [Dendrite](https://github.com/matrix-org/dendrite) Matrix homeserver in early January. This required various internal changes so that the [Ansible](https://www.ansible.com/) playbook would not be Synapse-centric anymore. This groundwork paved the way for continuing in this direction and we [added support](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#conduit-support) for [Conduit](https://conduit.rs/) in August.
|
||||||
|
|
||||||
|
When it comes to the `matrix-docker-ansible-deploy` Ansible playbook, 2022 was the year of the non-Synapse homeserver implementation. In practice, none of these homeserver implementations seem ready for prime-time yet and there is no migration path when coming from Synapse. Having done our job of adding support for these alternative homeserver implementations, we can say that we're not getting in the way of future progress. It's time for the Dendrite developers to push harder (development-wise) and for the Synapse developers to take a well-deserved long (infinite) break, and we may get to see more people migrating away from Synapse in the next year(s).
|
||||||
|
|
||||||
|
Support for the following new **bridges** was added:
|
||||||
|
|
||||||
|
* [Postmoogle](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#postmoogle-email-bridge-support) for bi-directional email bridging, which supersedes my old and simplistic [email2matrix](https://github.com/devture/email2matrix) one-way bridge-bot
|
||||||
|
* [mautrix-discord](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#mautrix-discord-support)
|
||||||
|
* [go-skype-bridge](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#go-skype-bridge-bridging-support)
|
||||||
|
* [matrix-appservice-kakaotalk](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#matrix-appservice-kakaotalk-support)
|
||||||
|
|
||||||
|
Support for the following new **bots** was added:
|
||||||
|
|
||||||
|
* [buscarron bot](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#buscarron-bot-support)
|
||||||
|
* [Honoroit bot](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#honoroit-bot-support)
|
||||||
|
* [matrix-registration-bot](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#matrix-registration-bot-support)
|
||||||
|
* [matrix-hookshot](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#matrix-hookshot-bridging-support)
|
||||||
|
* [maubot](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#maubot-support)
|
||||||
|
|
||||||
|
Support for the following new **components and services** was added:
|
||||||
|
|
||||||
|
* [BorgBackup](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#borg-backup-support)
|
||||||
|
* [Cactus Comments](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#cactus-comments-support)
|
||||||
|
* [Cinny](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#cinny-support) client support
|
||||||
|
* [ntfy](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#ntfy-push-notifications-support) notifications
|
||||||
|
* [matrix-ldap-registration-proxy](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#matrix-ldap-registration-proxy-support)
|
||||||
|
* [matrix\_encryption\_disabler support](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#matrix_encryption_disabler-support)
|
||||||
|
* [synapse-s3-storage-provider](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#synapse-s3-storage-provider-support) to stop the Synapse media store from being a scalability problem. This brought along [another feature](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#synapse-container-image-customization-support) - an easier way to customize the Synapse container image without having to fork and self-build all of it from scratch
|
||||||
|
|
||||||
|
Besides these major user-visible changes, a lot of work also happened **under the hood**:
|
||||||
|
|
||||||
|
* we made [major improvements to Synapse workers](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#potential-backward-compatibility-break-major-improvements-to-synapse-workers) - adding support for stream writers and for running multiple workers of various kinds (federation senders, pushers, background task processing workers, etc.)
|
||||||
|
* we [improved the compatibility of (Synapse + workers) with the rest of the playbook](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#backward-compatibility-break-changing-how-reverse-proxying-to-synapse-works---now-via-a-matrix-synapse-reverse-proxy-companion-service) by introducing a new `matrix-synapse-reverse-proxy-companion-service` service
|
||||||
|
* we started [splitting various Ansible roles out of the Matrix playbook and into independent roles](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#the-playbook-now-uses-external-roles-for-some-things) (e.g. `matrix-postgres` -> [ansible-role-postgres](https://github.com/mother-of-all-self-hosting/ansible-role-postgres)), which could be included in other Ansible playbooks. In fact, these roles already power a few **interesting other sibling playbooks**:
|
||||||
|
* [gitea-docker-ansible-deploy](https://github.com/spantaleev/gitea-docker-ansible-deploy), for deploying a [Gitea](https://gitea.io/) (self-hosted [Git](https://git-scm.com/) service) server
|
||||||
|
* [nextcloud-docker-ansible-deploy](https://github.com/spantaleev/nextcloud-docker-ansible-deploy), for deploying a [Nextcloud](https://nextcloud.com/) groupware server
|
||||||
|
* [vaultwarden-docker-ansible-deploy](https://github.com/spantaleev/vaultwarden-docker-ansible-deploy), for deploying a [Vaultwarden](https://github.com/dani-garcia/vaultwarden) password manager server (unofficial [Bitwarden](https://bitwarden.com/) compatible server)
|
||||||
|
|
||||||
|
These sibling playbooks co-exist nicely with one another due to using [Traefik](https://traefik.io/) for reverse-proxying, instead of trying to overtake the whole server by running their own [nginx](https://nginx.org/) reverse-proxy. Hopefully soon, the Matrix playbook will follow suit and be powered by Traefik by default.
|
||||||
|
|
||||||
|
Last, but not least, to optimize our [etke.cc managed Matrix hosting service](https://etke.cc/)'s performance (but also individual Ansible playbook runs for people self-hosting by themselves using the playbook), we've [improved playbook runtime 2-5x](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/ba09705f7fbaf0108652ecbe209793b1d935eba7/CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) by employing various Ansible tricks.
|
@ -4,11 +4,11 @@
|
|||||||
# It defaults to ansible tags "setup-all,start". You can pass alternative tags
|
# It defaults to ansible tags "setup-all,start". You can pass alternative tags
|
||||||
# to this script as arguments, e.g.
|
# to this script as arguments, e.g.
|
||||||
#
|
#
|
||||||
# ./inventory/scripts/ansible-all-hosts.sh self-check
|
# ./bin/ansible-all-hosts.sh self-check
|
||||||
#
|
#
|
||||||
|
|
||||||
# set playbook root path
|
# set playbook root path
|
||||||
root=$(dirname "$(readlink -f "$0")")/../..
|
root=$(dirname "$(readlink -f "$0")")/..
|
||||||
|
|
||||||
# set default tags or get from first argument if any
|
# set default tags or get from first argument if any
|
||||||
tags="${1:-setup-all,start}"
|
tags="${1:-setup-all,start}"
|
39
bin/rebuild-mautrix-meta-instagram.sh
Normal file
39
bin/rebuild-mautrix-meta-instagram.sh
Normal file
@ -0,0 +1,39 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
set -euxo pipefail
|
||||||
|
|
||||||
|
# This script rebuilds the mautrix-meta-instagram Ansible role, using the mautrix-meta-messenger role as a source.
|
||||||
|
|
||||||
|
if [ $# -eq 0 ]; then
|
||||||
|
echo "Error: No argument supplied. Please provide the path to the roles/custom directory."
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
roles_path=$1
|
||||||
|
|
||||||
|
messenger_role_path=$roles_path/matrix-bridge-mautrix-meta-messenger
|
||||||
|
instagram_role_path=$roles_path/matrix-bridge-mautrix-meta-instagram
|
||||||
|
|
||||||
|
if [ ! -d $messenger_role_path ]; then
|
||||||
|
echo "Cannot find: $messenger_role_path"
|
||||||
|
exit 1
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ -d $instagram_role_path ]; then
|
||||||
|
rm -rf $instagram_role_path
|
||||||
|
fi
|
||||||
|
|
||||||
|
cp -ar $messenger_role_path $instagram_role_path
|
||||||
|
|
||||||
|
find "$instagram_role_path" -type f | while read -r file; do
|
||||||
|
sed --in-place 's/matrix_mautrix_meta_messenger_/matrix_mautrix_meta_instagram_/g' "$file"
|
||||||
|
sed --in-place 's/mautrix-meta-messenger/mautrix-meta-instagram/g' "$file"
|
||||||
|
done
|
||||||
|
|
||||||
|
sed --in-place 's/matrix_mautrix_meta_instagram_meta_mode: \(.*\)/matrix_mautrix_meta_instagram_meta_mode: instagram/g' $instagram_role_path/defaults/main.yml
|
||||||
|
sed --in-place 's/matrix_mautrix_meta_instagram_identifier: \(.*\)/matrix_mautrix_meta_instagram_identifier: matrix-mautrix-meta-instagram/g' $instagram_role_path/defaults/main.yml
|
||||||
|
|
||||||
|
echo "# matrix-mautrix-meta-instagram" > $instagram_role_path/README.md
|
||||||
|
echo "" >> $instagram_role_path/README.md
|
||||||
|
echo "This bridge role is derived from the matrix-mautrix-meta-messenger Ansible role via automatic changes (see \`just rebuild-mautrix-meta-instagram\` or \`bin/rebuild-mautrix-meta-instagram.sh\`)." >> $instagram_role_path/README.md
|
||||||
|
echo "" >> $instagram_role_path/README.md
|
||||||
|
echo "If you'd like to make a change to this role, consider making it to the \`matrix-mautrix-meta-messenger\` role instead." >> $instagram_role_path/README.md
|
48
conf.py
Normal file
48
conf.py
Normal file
@ -0,0 +1,48 @@
|
|||||||
|
# SPDX-FileCopyrightText: 2024 Slavi Pantaleev <slavi@devture.com>
|
||||||
|
# SPDX-FileCopyrightText: 2024 Suguru Hirahara <acioustick@noreply.codeberg.org>
|
||||||
|
#
|
||||||
|
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||||
|
|
||||||
|
# Configuration file for the Sphinx documentation builder.
|
||||||
|
# Also see the `i18n/` directory.
|
||||||
|
#
|
||||||
|
# For the full list of built-in configuration values, see the documentation:
|
||||||
|
# https://www.sphinx-doc.org/en/master/usage/configuration.html
|
||||||
|
|
||||||
|
# -- Project information -----------------------------------------------------
|
||||||
|
# https://www.sphinx-doc.org/en/master/usage/configuration.html#project-information
|
||||||
|
|
||||||
|
project = 'matrix-docker-ansible-deploy'
|
||||||
|
copyright = '2018-%Y, Slavi Pantaleev, Aine Etke, MDAD community members'
|
||||||
|
author = 'Slavi Pantaleev, Aine Etke, MDAD community members'
|
||||||
|
|
||||||
|
# -- General configuration ---------------------------------------------------
|
||||||
|
# https://www.sphinx-doc.org/en/master/usage/configuration.html#general-configuration
|
||||||
|
|
||||||
|
needs_sphinx = '8.1' # For the copyright year placeholder (%Y). Specified with pyproject.toml as well.
|
||||||
|
|
||||||
|
extensions = [
|
||||||
|
'myst_parser',
|
||||||
|
'sphinx_markdown_builder'
|
||||||
|
]
|
||||||
|
myst_gfm_only = True
|
||||||
|
myst_heading_anchors = 4 # https://myst-parser.readthedocs.io/en/latest/syntax/optional.html#auto-generated-header-anchors
|
||||||
|
|
||||||
|
master_doc = 'README'
|
||||||
|
source_suffix = {'.md': 'markdown'}
|
||||||
|
|
||||||
|
# Though the default config file advocates exclude_patterns, it is straightforward for us to use include_patterns to select directories explicitly.
|
||||||
|
include_patterns = [
|
||||||
|
'docs/*',
|
||||||
|
'i18n/README.md',
|
||||||
|
'*.md',
|
||||||
|
]
|
||||||
|
|
||||||
|
locale_dirs = ['i18n/locales/']
|
||||||
|
gettext_compact = False
|
||||||
|
|
||||||
|
# -- Options for HTML output -------------------------------------------------
|
||||||
|
# https://www.sphinx-doc.org/en/master/usage/configuration.html#options-for-html-output
|
||||||
|
|
||||||
|
# html_theme = 'alabaster'
|
||||||
|
# html_static_path = ['_static']
|
@ -1,39 +1,86 @@
|
|||||||
# Table of Contents
|
# Table of Contents
|
||||||
|
|
||||||
- [FAQ](faq.md) - lots of questions and answers. Jump to [Prerequisites](prerequisites.md) to avoid reading too much and to just start a guided installation.
|
## ⬇️ Installaton guides <!-- NOTE: the 🚀 emoji is used by "Getting started" on README.md -->
|
||||||
|
|
||||||
- [Prerequisites](prerequisites.md) - go here to a guided installation using this Ansible playbook
|
There are two installation guides available for beginners and advanced users.
|
||||||
|
|
||||||
- [Configuring your DNS server](configuring-dns.md)
|
- ⚡ **[Quick start](quick-start.md) (for beginners)**: this is recommended for those who do not have an existing Matrix server and want to start quickly with "opinionated defaults".
|
||||||
|
|
||||||
- [Getting this playbook's source code](getting-the-playbook.md)
|
- **Full installation guide (for advanced users)**: if you need to import an existing Matrix server's data into the new server or want to learn more while setting up the server, follow this guide.
|
||||||
|
|
||||||
- [Configuring the playbook](configuring-playbook.md)
|
- [Prerequisites](prerequisites.md)
|
||||||
|
|
||||||
- [Installing](installing.md)
|
- [Configuring your DNS settings](configuring-dns.md)
|
||||||
|
|
||||||
- **Importing data from another server installation**
|
- [Getting the playbook](getting-the-playbook.md)
|
||||||
|
|
||||||
- [Importing an existing SQLite database (from another Synapse installation)](importing-synapse-sqlite.md) (optional)
|
- [Configuring the playbook](configuring-playbook.md)
|
||||||
|
|
||||||
- [Importing an existing Postgres database (from another installation)](importing-postgres.md) (optional)
|
- [Installing](installing.md)
|
||||||
|
|
||||||
- [Importing `media_store` data files from an existing Synapse installation](importing-synapse-media-store.md) (optional)
|
## 🛠️ Configuration options
|
||||||
|
|
||||||
- [Registering users](registering-users.md)
|
<!--
|
||||||
|
NOTE:
|
||||||
|
- Avoid putting the same anchor links as configuring-playbook.md lists under the "configuration options" section. Note that most of them are linked to "configure-playbook-*.md" and their titles start with "Setting up" (e.g. "Setting up Hydrogen").
|
||||||
|
-->
|
||||||
|
|
||||||
- [Updating users passwords](updating-users-passwords.md)
|
You can check useful documentation for configuring components here: [Configuring the playbook](configuring-playbook.md)
|
||||||
|
|
||||||
- [Configuring service discovery via .well-known](configuring-well-known.md)
|
- [Administration](configuring-playbook.md#administration) - services that help you in administrating and monitoring your Matrix installation
|
||||||
|
|
||||||
- [Maintenance / checking if services work](maintenance-checking-services.md)
|
- [Authentication and user-related](configuring-playbook.md#authentication-and-user-related) - extend and modify how users are authenticated on your homeserver
|
||||||
|
|
||||||
- [Maintenance / upgrading services](maintenance-upgrading-services.md)
|
- [Bots](configuring-playbook.md#bots) - bots provide various additional functionality to your installation
|
||||||
|
|
||||||
- [Maintenance / Synapse](maintenance-synapse.md)
|
- [Bridges](configuring-playbook.md#bridging-other-networks) - bridges can be used to connect your Matrix installation with third-party communication networks
|
||||||
|
|
||||||
- [Maintenance / PostgreSQL](maintenance-postgres.md)
|
- [Clients](configuring-playbook.md#clients) - web clients for Matrix that you can host on your own domains
|
||||||
|
|
||||||
|
- [Core service adjustments](configuring-playbook.md#core-service-adjustments) - backbone of your Matrix system
|
||||||
|
|
||||||
|
- [File Storage](configuring-playbook.md#file-storage) - use alternative file storage to the default `media_store` folder
|
||||||
|
|
||||||
|
<!-- NOTE: sort list items above alphabetically -->
|
||||||
|
|
||||||
|
- [Other specialized services](configuring-playbook.md#other-specialized-services) - various services that don't fit any other categories
|
||||||
|
|
||||||
|
## 👨🔧 Maintenance
|
||||||
|
|
||||||
|
If your server and services experience issues, feel free to come to [our support room](https://matrix.to/#/#matrix-docker-ansible-deploy:devture.com) and ask for help.
|
||||||
|
|
||||||
|
<!-- NOTE: sort list items alphabetically -->
|
||||||
|
|
||||||
|
- [Checking if services work](maintenance-checking-services.md)
|
||||||
|
|
||||||
- [Maintenance and Troubleshooting](maintenance-and-troubleshooting.md)
|
- [Maintenance and Troubleshooting](maintenance-and-troubleshooting.md)
|
||||||
|
|
||||||
|
- [PostgreSQL maintenance](maintenance-postgres.md)
|
||||||
|
|
||||||
|
- [Synapse maintenance](maintenance-synapse.md)
|
||||||
|
|
||||||
|
- [Upgrading services](maintenance-upgrading-services.md)
|
||||||
|
|
||||||
|
## Other documentation pages <!-- NOTE: this header's title and the section below need optimization -->
|
||||||
|
|
||||||
|
- ℹ️ **[FAQ](faq.md)** - various Frequently Asked Questions about Matrix, with a focus on this Ansible playbook
|
||||||
|
|
||||||
|
<!-- NOTE: sort list items under faq.md alphabetically -->
|
||||||
|
|
||||||
|
- [Alternative architectures](alternative-architectures.md)
|
||||||
|
|
||||||
|
- [Container images used by the playbook](container-images.md)
|
||||||
|
|
||||||
|
- [Obtaining an Access Token](obtaining-access-tokens.md)
|
||||||
|
|
||||||
|
- [Playbook tags](playbook-tags.md)
|
||||||
|
|
||||||
|
- [Registering users](registering-users.md)
|
||||||
|
|
||||||
|
- [Running `just` commands](just.md)
|
||||||
|
|
||||||
|
- [Self-building](self-building.md)
|
||||||
|
|
||||||
- [Uninstalling](uninstalling.md)
|
- [Uninstalling](uninstalling.md)
|
||||||
|
|
||||||
|
- [Updating users passwords](updating-users-passwords.md)
|
||||||
|
@ -10,7 +10,6 @@ The playbook automatically determines the target server's architecture (the `mat
|
|||||||
|
|
||||||
Some tools and container images can be built on the host or other measures can be used to install on that architecture.
|
Some tools and container images can be built on the host or other measures can be used to install on that architecture.
|
||||||
|
|
||||||
|
|
||||||
## Implementation details
|
## Implementation details
|
||||||
|
|
||||||
For `amd64`, prebuilt container images (see the [container images we use](container-images.md)) are used for all components (except [Hydrogen](configuring-playbook-client-hydrogen.md), which goes through self-building).
|
For `amd64`, prebuilt container images (see the [container images we use](container-images.md)) are used for all components (except [Hydrogen](configuring-playbook-client-hydrogen.md), which goes through self-building).
|
||||||
|
@ -3,9 +3,7 @@
|
|||||||
|
|
||||||
This playbook is meant to be run using [Ansible](https://www.ansible.com/).
|
This playbook is meant to be run using [Ansible](https://www.ansible.com/).
|
||||||
|
|
||||||
Ansible typically runs on your local computer and carries out tasks on a remote server.
|
Ansible typically runs on your local computer and carries out tasks on a remote server. If your local computer cannot run Ansible, you can also run Ansible on some server somewhere (including the server you wish to install to).
|
||||||
If your local computer cannot run Ansible, you can also run Ansible on some server somewhere (including the server you wish to install to).
|
|
||||||
|
|
||||||
|
|
||||||
## Supported Ansible versions
|
## Supported Ansible versions
|
||||||
|
|
||||||
@ -13,12 +11,10 @@ To manually check which version of Ansible you're on, run: `ansible --version`.
|
|||||||
|
|
||||||
For the **best experience**, we recommend getting the **latest version of Ansible available**.
|
For the **best experience**, we recommend getting the **latest version of Ansible available**.
|
||||||
|
|
||||||
We're not sure what's the minimum version of Ansible that can run this playbook successfully.
|
We're not sure what's the minimum version of Ansible that can run this playbook successfully. The lowest version that we've confirmed (on 2022-11-26) to be working fine is: `ansible-core` (`2.11.7`) combined with `ansible` (`4.10.0`).
|
||||||
The lowest version that we've confirmed (on 2022-11-26) to be working fine is: `ansible-core` (`2.11.7`) combined with `ansible` (`4.10.0`).
|
|
||||||
|
|
||||||
If your distro ships with an Ansible version older than this, you may run into issues. Consider [Upgrading Ansible](#upgrading-ansible) or [using Ansible via Docker](#using-ansible-via-docker).
|
If your distro ships with an Ansible version older than this, you may run into issues. Consider [Upgrading Ansible](#upgrading-ansible) or [using Ansible via Docker](#using-ansible-via-docker).
|
||||||
|
|
||||||
|
|
||||||
## Upgrading Ansible
|
## Upgrading Ansible
|
||||||
|
|
||||||
Depending on your distribution, you may be able to upgrade Ansible in a few different ways:
|
Depending on your distribution, you may be able to upgrade Ansible in a few different ways:
|
||||||
@ -29,10 +25,7 @@ Depending on your distribution, you may be able to upgrade Ansible in a few diff
|
|||||||
|
|
||||||
If using the `pip` method, do note that the `ansible-playbook` binary may not be on the `$PATH` (https://linuxconfig.org/linux-path-environment-variable), but in some more special location like `/usr/local/bin/ansible-playbook`. You may need to invoke it using the full path.
|
If using the `pip` method, do note that the `ansible-playbook` binary may not be on the `$PATH` (https://linuxconfig.org/linux-path-environment-variable), but in some more special location like `/usr/local/bin/ansible-playbook`. You may need to invoke it using the full path.
|
||||||
|
|
||||||
|
**Note**: Both of the above methods are a bad way to run system software such as Ansible. If you find yourself needing to resort to such hacks, please consider reporting a bug to your distribution and/or switching to a sane distribution, which provides up-to-date software.
|
||||||
**Note**: Both of the above methods are a bad way to run system software such as Ansible.
|
|
||||||
If you find yourself needing to resort to such hacks, please consider reporting a bug to your distribution and/or switching to a sane distribution, which provides up-to-date software.
|
|
||||||
|
|
||||||
|
|
||||||
## Using Ansible via Docker
|
## Using Ansible via Docker
|
||||||
|
|
||||||
@ -42,11 +35,9 @@ This ensures that you're using a very recent Ansible version, which is less like
|
|||||||
|
|
||||||
You can either [run Ansible in a container on the Matrix server itself](#running-ansible-in-a-container-on-the-matrix-server-itself) or [run Ansible in a container on another computer (not the Matrix server)](#running-ansible-in-a-container-on-another-computer-not-the-matrix-server).
|
You can either [run Ansible in a container on the Matrix server itself](#running-ansible-in-a-container-on-the-matrix-server-itself) or [run Ansible in a container on another computer (not the Matrix server)](#running-ansible-in-a-container-on-another-computer-not-the-matrix-server).
|
||||||
|
|
||||||
|
|
||||||
### Running Ansible in a container on the Matrix server itself
|
### Running Ansible in a container on the Matrix server itself
|
||||||
|
|
||||||
To run Ansible in a (Docker) container on the Matrix server itself, you need to have a working Docker installation.
|
To run Ansible in a (Docker) container on the Matrix server itself, you need to have a working Docker installation. Docker is normally installed by the playbook, so this may be a bit of a chicken and egg problem. To solve it:
|
||||||
Docker is normally installed by the playbook, so this may be a bit of a chicken and egg problem. To solve it:
|
|
||||||
|
|
||||||
- you **either** need to install Docker manually first. Follow [the upstream instructions](https://docs.docker.com/engine/install/) for your distribution and consider setting `matrix_playbook_docker_installation_enabled: false` in your `vars.yml` file, to prevent the playbook from installing Docker
|
- you **either** need to install Docker manually first. Follow [the upstream instructions](https://docs.docker.com/engine/install/) for your distribution and consider setting `matrix_playbook_docker_installation_enabled: false` in your `vars.yml` file, to prevent the playbook from installing Docker
|
||||||
- **or** you need to run the playbook in another way (e.g. [Running Ansible in a container on another computer (not the Matrix server)](#running-ansible-in-a-container-on-another-computer-not-the-matrix-server)) at least the first time around
|
- **or** you need to run the playbook in another way (e.g. [Running Ansible in a container on another computer (not the Matrix server)](#running-ansible-in-a-container-on-another-computer-not-the-matrix-server)) at least the first time around
|
||||||
@ -54,61 +45,59 @@ Docker is normally installed by the playbook, so this may be a bit of a chicken
|
|||||||
Once you have a working Docker installation on the server, **clone the playbook** somewhere on the server and configure it as per usual (`inventory/hosts`, `inventory/host_vars/..`, etc.), as described in [configuring the playbook](configuring-playbook.md).
|
Once you have a working Docker installation on the server, **clone the playbook** somewhere on the server and configure it as per usual (`inventory/hosts`, `inventory/host_vars/..`, etc.), as described in [configuring the playbook](configuring-playbook.md).
|
||||||
|
|
||||||
You would then need to add `ansible_connection=community.docker.nsenter` to the host line in `inventory/hosts`. This tells Ansible to connect to the "remote" machine by switching Linux namespaces with [nsenter](https://man7.org/linux/man-pages/man1/nsenter.1.html), instead of using SSH.
|
You would then need to add `ansible_connection=community.docker.nsenter` to the host line in `inventory/hosts`. This tells Ansible to connect to the "remote" machine by switching Linux namespaces with [nsenter](https://man7.org/linux/man-pages/man1/nsenter.1.html), instead of using SSH.
|
||||||
Alternatively, you can leave your `inventory/hosts` as is and specify the connection type in **each** `ansible-playbook` call you do later, like this: `ansible-playbook --connection=community.docker.nsenter ...`
|
|
||||||
|
Alternatively, you can leave your `inventory/hosts` as is and specify the connection type in **each** `ansible-playbook` call you do later, like this: `ansible-playbook --connection=community.docker.nsenter …`
|
||||||
|
|
||||||
Run this from the playbook's directory:
|
Run this from the playbook's directory:
|
||||||
|
|
||||||
```bash
|
```sh
|
||||||
docker run -it --rm \
|
docker run -it --rm \
|
||||||
--privileged \
|
--privileged \
|
||||||
--pid=host \
|
--pid=host \
|
||||||
-w /work \
|
-w /work \
|
||||||
-v `pwd`:/work \
|
-v `pwd`:/work \
|
||||||
--entrypoint=/bin/sh \
|
--entrypoint=/bin/sh \
|
||||||
docker.io/devture/ansible:2.14.5-r0-0
|
docker.io/devture/ansible:2.18.1-r0-0
|
||||||
```
|
```
|
||||||
|
|
||||||
Once you execute the above command, you'll be dropped into a `/work` directory inside a Docker container.
|
Once you execute the above command, you'll be dropped into a `/work` directory inside a Docker container. The `/work` directory contains the playbook's code.
|
||||||
The `/work` directory contains the playbook's code.
|
|
||||||
|
|
||||||
First, consider running `git config --global --add safe.directory /work` to [resolve directory ownership issues](#resolve-directory-ownership-issues).
|
First, consider running `git config --global --add safe.directory /work` to [resolve directory ownership issues](#resolve-directory-ownership-issues).
|
||||||
|
|
||||||
Finally, you can execute `ansible-playbook ...` (or `ansible-playbook --connection=community.docker.nsenter ...`) commands as per normal now.
|
Finally, you can execute `ansible-playbook …` (or `ansible-playbook --connection=community.docker.nsenter …`) commands as per normal now.
|
||||||
|
|
||||||
|
|
||||||
### Running Ansible in a container on another computer (not the Matrix server)
|
### Running Ansible in a container on another computer (not the Matrix server)
|
||||||
|
|
||||||
Run this from the playbook's directory:
|
Run this from the playbook's directory:
|
||||||
|
|
||||||
```bash
|
```sh
|
||||||
docker run -it --rm \
|
docker run -it --rm \
|
||||||
-w /work \
|
-w /work \
|
||||||
-v `pwd`:/work \
|
-v `pwd`:/work \
|
||||||
-v $HOME/.ssh/id_rsa:/root/.ssh/id_rsa:ro \
|
-v $HOME/.ssh/id_rsa:/root/.ssh/id_rsa:ro \
|
||||||
--entrypoint=/bin/sh \
|
--entrypoint=/bin/sh \
|
||||||
docker.io/devture/ansible:2.14.5-r0-0
|
docker.io/devture/ansible:2.18.1-r0-0
|
||||||
```
|
```
|
||||||
|
|
||||||
The above command tries to mount an SSH key (`$HOME/.ssh/id_rsa`) into the container (at `/root/.ssh/id_rsa`).
|
The above command tries to mount an SSH key (`$HOME/.ssh/id_rsa`) into the container (at `/root/.ssh/id_rsa`). If your SSH key is at a different path (not in `$HOME/.ssh/id_rsa`), adjust that part.
|
||||||
If your SSH key is at a different path (not in `$HOME/.ssh/id_rsa`), adjust that part.
|
|
||||||
|
|
||||||
Once you execute the above command, you'll be dropped into a `/work` directory inside a Docker container.
|
Once you execute the above command, you'll be dropped into a `/work` directory inside a Docker container. The `/work` directory contains the playbook's code.
|
||||||
The `/work` directory contains the playbook's code.
|
|
||||||
|
|
||||||
First, consider running `git config --global --add safe.directory /work` to [resolve directory ownership issues](#resolve-directory-ownership-issues).
|
First, consider running `git config --global --add safe.directory /work` to [resolve directory ownership issues](#resolve-directory-ownership-issues).
|
||||||
|
|
||||||
Finally, you execute `ansible-playbook ...` commands as per normal now.
|
Finally, you execute `ansible-playbook …` commands as per normal now.
|
||||||
|
|
||||||
|
|
||||||
#### If you don't use SSH keys for authentication
|
#### If you don't use SSH keys for authentication
|
||||||
|
|
||||||
If you don't use SSH keys for authentication, simply remove that whole line (`-v $HOME/.ssh/id_rsa:/root/.ssh/id_rsa:ro`).
|
If you don't use SSH keys for authentication, simply remove that whole line (`-v $HOME/.ssh/id_rsa:/root/.ssh/id_rsa:ro`).
|
||||||
To authenticate at your server using a password, you need to add a package. So, when you are in the shell of the ansible docker container (the previously used `docker run -it ...` command), run:
|
|
||||||
```bash
|
To authenticate at your server using a password, you need to add a package. So, when you are in the shell of the ansible docker container (the previously used `docker run -it …` command), run:
|
||||||
|
|
||||||
|
```sh
|
||||||
apk add sshpass
|
apk add sshpass
|
||||||
```
|
```
|
||||||
Then, to be asked for the password whenever running an `ansible-playbook` command add `--ask-pass` to the arguments of the command.
|
|
||||||
|
|
||||||
|
Then, to be asked for the password whenever running an `ansible-playbook` command add `--ask-pass` to the arguments of the command.
|
||||||
|
|
||||||
#### Resolve directory ownership issues
|
#### Resolve directory ownership issues
|
||||||
|
|
||||||
|
Before Width: | Height: | Size: 205 KiB After Width: | Height: | Size: 205 KiB |
@ -1,7 +1,9 @@
|
|||||||
(Adapted from the [upstream project](https://github.com/matrix-org/synapse/blob/develop/docs/CAPTCHA_SETUP.md))
|
(Adapted from the [upstream project](https://github.com/element-hq/synapse/blob/develop/docs/CAPTCHA_SETUP.md))
|
||||||
|
|
||||||
# Overview
|
# Overview
|
||||||
|
|
||||||
Captcha can be enabled for this home server. This file explains how to do that.
|
Captcha can be enabled for this home server. This file explains how to do that.
|
||||||
|
|
||||||
The captcha mechanism used is Google's [ReCaptcha](https://www.google.com/recaptcha/). This requires API keys from Google. If your homeserver is Dendrite then [hCapcha](https://www.hcaptcha.com) can be used instead.
|
The captcha mechanism used is Google's [ReCaptcha](https://www.google.com/recaptcha/). This requires API keys from Google. If your homeserver is Dendrite then [hCapcha](https://www.hcaptcha.com) can be used instead.
|
||||||
|
|
||||||
## ReCaptcha
|
## ReCaptcha
|
||||||
@ -16,7 +18,7 @@ Must be a reCAPTCHA **v2** key using the "I'm not a robot" Checkbox option
|
|||||||
|
|
||||||
### Setting ReCaptcha keys
|
### Setting ReCaptcha keys
|
||||||
|
|
||||||
Once registered as above, set the following values:
|
Once registered as above, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
# for Synapse
|
# for Synapse
|
||||||
|
@ -1,99 +1,78 @@
|
|||||||
# Configuring your DNS server
|
# Configuring your DNS settings
|
||||||
|
|
||||||
|
<sup>[Prerequisites](prerequisites.md) > Configuring your DNS settings > [Getting the playbook](getting-the-playbook.md) > [Configuring the playbook](configuring-playbook.md) > [Installing](installing.md)</sup>
|
||||||
|
|
||||||
To set up Matrix on your domain, you'd need to do some DNS configuration.
|
To set up Matrix on your domain, you'd need to do some DNS configuration.
|
||||||
|
|
||||||
To use an identifier like `@<username>:<your-domain>`, you don't actually need
|
## DNS setting for server delegation (optional)
|
||||||
to install anything on the actual `<your-domain>` server.
|
|
||||||
|
|
||||||
You do, however need to instruct the Matrix network that Matrix services for `<your-domain>` are delegated
|
In the sample `vars.yml` ([`examples/vars.yml`](../examples/vars.yml)), we recommend to use a short user ID like `@alice:example.com` instead of `@alice:matrix.example.com`.
|
||||||
over to `matrix.<your-domain>`.
|
|
||||||
As we discuss in [Server Delegation](howto-server-delegation.md), there are 2 different ways to set up such delegation:
|
|
||||||
|
|
||||||
- either by serving a `https://<your-domain>/.well-known/matrix/server` file (from the base domain!)
|
To use such an ID, you don't need to install anything on the actual `example.com` server. Instead, you need to instruct the Matrix network that Matrix services for `example.com` are redirected over to `matrix.example.com`. This redirection is also known as "delegation".
|
||||||
- or by using a `_matrix._tcp` DNS SRV record (don't confuse this with the `_matrix-identity._tcp` SRV record described below)
|
|
||||||
|
|
||||||
This playbook mostly discusses the well-known file method, because it's easier to manage with regard to certificates.
|
As we discuss in [Server Delegation](howto-server-delegation.md), server delegation can be configured in either of these ways:
|
||||||
If you decide to go with the alternative method ([Server Delegation via a DNS SRV record (advanced)](howto-server-delegation.md#server-delegation-via-a-dns-srv-record-advanced)), please be aware that the general flow that this playbook guides you through may not match what you need to do.
|
|
||||||
|
- Setting up a `/.well-known/matrix/server` file on the base domain (`example.com`)
|
||||||
|
- Setting up a `_matrix._tcp` DNS SRV record
|
||||||
|
|
||||||
|
For simplicity reasons, this playbook recommends you to set up server delegation via a `/.well-known/matrix/server` file, instead of using a DNS SRV record.
|
||||||
|
|
||||||
|
If you choose the recommended method (file-based delegation), you do not need to configure the DNS record to enable server delegation. You will need to add a necessary configuration later, when you [finalize the installation](installing.md#finalize-the-installation) after installing and starting Matrix services.
|
||||||
|
|
||||||
|
On the other hand, if you choose this method (setting up a DNS SRV record), you need to configure the additional DNS record as well as adjust SSL certificate handling. Take a look at this documentation for more information: [Server Delegation via a DNS SRV record (advanced)](howto-server-delegation.md#server-delegation-via-a-dns-srv-record-advanced)
|
||||||
|
|
||||||
## DNS settings for services enabled by default
|
## DNS settings for services enabled by default
|
||||||
|
|
||||||
| Type | Host | Priority | Weight | Port | Target |
|
To serve the base domain (`example.com`) and [Element Web](configuring-playbook-client-element-web.md) with the default subdomain, adjust DNS records as below.
|
||||||
| ----- | ---------------------------- | -------- | ------ | ---- | ---------------------- |
|
|
||||||
| A | `matrix` | - | - | - | `matrix-server-IP` |
|
| Type | Host | Priority | Weight | Port | Target |
|
||||||
| CNAME | `element` | - | - | - | `matrix.<your-domain>` |
|
| ----- | ---------------------------- | -------- | ------ | ---- | ---------------------|
|
||||||
|
| A | `matrix` | - | - | - | `matrix-server-IP` |
|
||||||
|
| CNAME | `element` | - | - | - | `matrix.example.com` |
|
||||||
|
|
||||||
|
As the table illustrates, you need to create 2 subdomains (`matrix.example.com` and `element.example.com`) and point both of them to your server's IP address (DNS `A` record or `CNAME` record is fine).
|
||||||
|
|
||||||
|
The `element.example.com` subdomain is necessary, because this playbook installs the [Element Web](https://github.com/element-hq/element-web) client for you by default. If you'd rather instruct the playbook not to install Element Web (`matrix_client_element_enabled: false` when [Configuring the playbook](configuring-playbook.md) later), feel free to skip the `element.example.com` DNS record.
|
||||||
|
|
||||||
Be mindful as to how long it will take for the DNS records to propagate.
|
Be mindful as to how long it will take for the DNS records to propagate.
|
||||||
|
|
||||||
If you are using Cloudflare DNS, make sure to disable the proxy and set all records to `DNS only`. Otherwise, fetching certificates will fail.
|
If you are using Cloudflare DNS, make sure to disable the proxy and set all records to "DNS only". Otherwise, fetching certificates will fail.
|
||||||
|
|
||||||
When you're done configuring DNS, proceed to [Configuring the playbook](configuring-playbook.md).
|
|
||||||
|
|
||||||
## DNS settings for optional services/features
|
## DNS settings for optional services/features
|
||||||
|
|
||||||
| Used by component | Type | Host | Priority | Weight | Port | Target |
|
For other services which may need subdomain settings, see the table below and configure the DNS (`CNAME`) records accordingly.
|
||||||
| ----------------------------------------------------------------------------------------------------------------------- | ----- | ------------------------------ | -------- | ------ | ---- | --------------------------- |
|
|
||||||
| [ma1sd](configuring-playbook-ma1sd.md) identity server | SRV | `_matrix-identity._tcp` | 10 | 0 | 443 | `matrix.<your-domain>` |
|
| Used by component | Type | Host | Priority | Weight | Port | Target |
|
||||||
| [Dimension](configuring-playbook-dimension.md) integration server | CNAME | `dimension` | - | - | - | `matrix.<your-domain>` |
|
| -------------------------------------------------------------------------------------------------------------------------- | ----- | ------------------------------ | -------- | ------ | ---- | -----------------------------------|
|
||||||
| [Jitsi](configuring-playbook-jitsi.md) video-conferencing platform | CNAME | `jitsi` | - | - | - | `matrix.<your-domain>` |
|
| [Dimension](configuring-playbook-dimension.md) integration server | CNAME | `dimension` | - | - | - | `matrix.example.com` |
|
||||||
| [Prometheus/Grafana](configuring-playbook-prometheus-grafana.md) monitoring system | CNAME | `stats` | - | - | - | `matrix.<your-domain>` |
|
| [Jitsi](configuring-playbook-jitsi.md) video-conferencing platform | CNAME | `jitsi` | - | - | - | `matrix.example.com` |
|
||||||
| [Go-NEB](configuring-playbook-bot-go-neb.md) bot | CNAME | `goneb` | - | - | - | `matrix.<your-domain>` |
|
| [Prometheus/Grafana](configuring-playbook-prometheus-grafana.md) monitoring system | CNAME | `stats` | - | - | - | `matrix.example.com` |
|
||||||
| [Sygnal](configuring-playbook-sygnal.md) push notification gateway | CNAME | `sygnal` | - | - | - | `matrix.<your-domain>` |
|
| [Go-NEB](configuring-playbook-bot-go-neb.md) bot | CNAME | `goneb` | - | - | - | `matrix.example.com` |
|
||||||
| [ntfy](configuring-playbook-ntfy.md) push notifications server | CNAME | `ntfy` | - | - | - | `matrix.<your-domain>` |
|
| [Sygnal](configuring-playbook-sygnal.md) push notification gateway | CNAME | `sygnal` | - | - | - | `matrix.example.com` |
|
||||||
| [Etherpad](configuring-playbook-etherpad.md) collaborative text editor | CNAME | `etherpad` | - | - | - | `matrix.<your-domain>` |
|
| [ntfy](configuring-playbook-ntfy.md) push notifications server | CNAME | `ntfy` | - | - | - | `matrix.example.com` |
|
||||||
| [Hydrogen](configuring-playbook-client-hydrogen.md) web client | CNAME | `hydrogen` | - | - | - | `matrix.<your-domain>` |
|
| [Etherpad](configuring-playbook-etherpad.md) collaborative text editor | CNAME | `etherpad` | - | - | - | `matrix.example.com` |
|
||||||
| [Cinny](configuring-playbook-client-cinny.md) web client | CNAME | `cinny` | - | - | - | `matrix.<your-domain>` |
|
| [Hydrogen](configuring-playbook-client-hydrogen.md) web client | CNAME | `hydrogen` | - | - | - | `matrix.example.com` |
|
||||||
| [SchildiChat](configuring-playbook-client-schildichat.md) web client | CNAME | `schildichat` | - | - | - | `matrix.<your-domain>` |
|
| [Cinny](configuring-playbook-client-cinny.md) web client | CNAME | `cinny` | - | - | - | `matrix.example.com` |
|
||||||
| [wsproxy](configuring-playbook-bridge-mautrix-wsproxy.md) sms bridge | CNAME | `wsproxy` | - | - | - | `matrix.<your-domain>` |
|
| [SchildiChat Web](configuring-playbook-client-schildichat-web.md) client | CNAME | `schildichat` | - | - | - | `matrix.example.com` |
|
||||||
| [Buscarron](configuring-playbook-bot-buscarron.md) helpdesk bot | CNAME | `buscarron` | - | - | - | `matrix.<your-domain>` |
|
| [wsproxy](configuring-playbook-bridge-mautrix-wsproxy.md) sms bridge | CNAME | `wsproxy` | - | - | - | `matrix.example.com` |
|
||||||
| [Postmoogle](configuring-playbook-bot-postmoogle.md)/[Email2Matrix](configuring-playbook-email2matrix.md) email bridges | MX | `matrix` | 10 | 0 | - | `matrix.<your-domain>` |
|
| [Buscarron](configuring-playbook-bot-buscarron.md) helpdesk bot | CNAME | `buscarron` | - | - | - | `matrix.example.com` |
|
||||||
| [Postmoogle](configuring-playbook-bot-postmoogle.md) email bridge | TXT | `matrix` | - | - | - | `v=spf1 ip4:<your-ip> -all` |
|
| [rageshake](configuring-playbook-rageshake.md) bug report server | CNAME | `rageshake` | - | - | - | `matrix.example.com` |
|
||||||
| [Postmoogle](configuring-playbook-bot-postmoogle.md) email bridge | TXT | `_dmarc.matrix` | - | - | - | `v=DMARC1; p=quarantine;` |
|
| [ma1sd](configuring-playbook-ma1sd.md) identity server | SRV | `_matrix-identity._tcp` | 10 | 0 | 443 | `matrix.example.com` |
|
||||||
| [Postmoogle](configuring-playbook-bot-postmoogle.md) email bridge | TXT | `postmoogle._domainkey.matrix` | - | - | - | get it from `!pm dkim` |
|
| [Postmoogle](configuring-playbook-bridge-postmoogle.md)/[Email2Matrix](configuring-playbook-email2matrix.md) email bridges | MX | `matrix` | 10 | 0 | - | `matrix.example.com` |
|
||||||
|
| [Postmoogle](configuring-playbook-bridge-postmoogle.md) email bridge | TXT | `matrix` | - | - | - | `v=spf1 ip4:matrix-server-IP -all` |
|
||||||
|
| [Postmoogle](configuring-playbook-bridge-postmoogle.md) email bridge | TXT | `_dmarc.matrix` | - | - | - | `v=DMARC1; p=quarantine;` |
|
||||||
|
| [Postmoogle](configuring-playbook-bridge-postmoogle.md) email bridge | TXT | `postmoogle._domainkey.matrix` | - | - | - | get it from `!pm dkim` |
|
||||||
|
|
||||||
|
### SRV record for ma1sd
|
||||||
|
|
||||||
|
To make ma1sd enable its federation features, you need to set up a `_matrix-identity._tcp` SRV record. Don't confuse this with the `_matrix._tcp` SRV record for server delegation. See the table above and [this section](configuring-playbook-ma1sd.md#adjusting-dns-records) for values which need to be specified.
|
||||||
|
|
||||||
When setting up a SRV record, if you are asked for a service and protocol instead of a hostname split the host value from the table where the period is. For example use service as `_matrix-identity` and protocol as `_tcp`.
|
When setting up a SRV record, if you are asked for a service and protocol instead of a hostname split the host value from the table where the period is. For example use service as `_matrix-identity` and protocol as `_tcp`.
|
||||||
|
|
||||||
## Subdomains setup
|
### MX and TXT records for Postmoogle
|
||||||
|
|
||||||
As the table above illustrates, you need to create 2 subdomains (`matrix.<your-domain>` and `element.<your-domain>`) and point both of them to your new server's IP address (DNS `A` record or `CNAME` record is fine).
|
To make Postmoogle enable its email sending features, you need to configure MX and TXT (SPF, DMARC, and DKIM) records. See the table above for values which need to be specified.
|
||||||
|
|
||||||
The `element.<your-domain>` subdomain may be necessary, because this playbook installs the [Element](https://github.com/vector-im/element-web) web client for you.
|
---------------------------------------------
|
||||||
If you'd rather instruct the playbook not to install Element (`matrix_client_element_enabled: false` when [Configuring the playbook](configuring-playbook.md) later), feel free to skip the `element.<your-domain>` DNS record.
|
|
||||||
|
|
||||||
The `dimension.<your-domain>` subdomain may be necessary, because this playbook could install the [Dimension integrations manager](http://dimension.t2bot.io/) for you. Dimension installation is disabled by default, because it's only possible to install it after the other Matrix services are working (see [Setting up Dimension](configuring-playbook-dimension.md) later). If you do not wish to set up Dimension, feel free to skip the `dimension.<your-domain>` DNS record.
|
[▶️](getting-the-playbook.md) When you're done with the DNS configuration and ready to proceed, continue with [Getting the playbook](getting-the-playbook.md).
|
||||||
|
|
||||||
The `jitsi.<your-domain>` subdomain may be necessary, because this playbook could install the [Jitsi video-conferencing platform](https://jitsi.org/) for you. Jitsi installation is disabled by default, because it may be heavy and is not a core required component. To learn how to install it, see our [Jitsi](configuring-playbook-jitsi.md) guide. If you do not wish to set up Jitsi, feel free to skip the `jitsi.<your-domain>` DNS record.
|
|
||||||
|
|
||||||
The `stats.<your-domain>` subdomain may be necessary, because this playbook could install [Grafana](https://grafana.com/) and setup performance metrics for you. Grafana installation is disabled by default, it is not a core required component. To learn how to install it, see our [metrics and graphs guide](configuring-playbook-prometheus-grafana.md). If you do not wish to set up Grafana, feel free to skip the `stats.<your-domain>` DNS record. It is possible to install Prometheus without installing Grafana, this would also not require the `stats.<your-domain>` subdomain.
|
|
||||||
|
|
||||||
The `goneb.<your-domain>` subdomain may be necessary, because this playbook could install the [Go-NEB](https://github.com/matrix-org/go-neb) bot. The installation of Go-NEB is disabled by default, it is not a core required component. To learn how to install it, see our [configuring Go-NEB guide](configuring-playbook-bot-go-neb.md). If you do not wish to set up Go-NEB, feel free to skip the `goneb.<your-domain>` DNS record.
|
|
||||||
|
|
||||||
The `sygnal.<your-domain>` subdomain may be necessary, because this playbook could install the [Sygnal](https://github.com/matrix-org/sygnal) push gateway. The installation of Sygnal is disabled by default, it is not a core required component. To learn how to install it, see our [configuring Sygnal guide](configuring-playbook-sygnal.md). If you do not wish to set up Sygnal (you probably don't, unless you're also developing/building your own Matrix apps), feel free to skip the `sygnal.<your-domain>` DNS record.
|
|
||||||
|
|
||||||
The `ntfy.<your-domain>` subdomain may be necessary, because this playbook could install the [ntfy](https://ntfy.sh/) UnifiedPush-compatible push notifications server. The installation of ntfy is disabled by default, it is not a core required component. To learn how to install it, see our [configuring ntfy guide](configuring-playbook-ntfy.md). If you do not wish to set up ntfy, feel free to skip the `ntfy.<your-domain>` DNS record.
|
|
||||||
|
|
||||||
The `etherpad.<your-domain>` subdomain may be necessary, because this playbook could install the [Etherpad](https://etherpad.org/) a highly customizable open source online editor providing collaborative editing in really real-time. The installation of etherpad is disabled by default, it is not a core required component. To learn how to install it, see our [configuring etherpad guide](configuring-playbook-etherpad.md). If you do not wish to set up etherpad, feel free to skip the `etherpad.<your-domain>` DNS record.
|
|
||||||
|
|
||||||
The `hydrogen.<your-domain>` subdomain may be necessary, because this playbook could install the [Hydrogen](https://github.com/vector-im/hydrogen-web) web client. The installation of Hydrogen is disabled by default, it is not a core required component. To learn how to install it, see our [configuring Hydrogen guide](configuring-playbook-client-hydrogen.md). If you do not wish to set up Hydrogen, feel free to skip the `hydrogen.<your-domain>` DNS record.
|
|
||||||
|
|
||||||
The `cinny.<your-domain>` subdomain may be necessary, because this playbook could install the [Cinny](https://github.com/ajbura/cinny) web client. The installation of cinny is disabled by default, it is not a core required component. To learn how to install it, see our [configuring cinny guide](configuring-playbook-client-cinny.md). If you do not wish to set up cinny, feel free to skip the `cinny.<your-domain>` DNS record.
|
|
||||||
|
|
||||||
The `wsproxy.<your-domain>` subdomain may be necessary, because this playbook could install the [wsproxy](https://github.com/mautrix/wsproxy) web client. The installation of wsproxy is disabled by default, it is not a core required component. To learn how to install it, see our [configuring wsproxy guide](configuring-playbook-bridge-mautrix-wsproxy.md). If you do not wish to set up wsproxy, feel free to skip the `wsproxy.<your-domain>` DNS record.
|
|
||||||
|
|
||||||
The `buscarron.<your-domain>` subdomain may be necessary, because this playbook could install the [buscarron](https://gitlab.com/etke.cc/buscarron) bot. The installation of buscarron is disabled by default, it is not a core required component. To learn how to install it, see our [configuring buscarron guide](configuring-playbook-bot-buscarron.md). If you do not wish to set up buscarron, feel free to skip the `buscarron.<your-domain>` DNS record.
|
|
||||||
|
|
||||||
## `_matrix-identity._tcp` SRV record setup
|
|
||||||
|
|
||||||
To make the [ma1sd](https://github.com/ma1uta/ma1sd) Identity Server (which this playbook may optionally install for you) enable its federation features, set up an SRV record that looks like this:
|
|
||||||
- Name: `_matrix-identity._tcp` (use this text as-is)
|
|
||||||
- Content: `10 0 443 matrix.<your-domain>` (replace `<your-domain>` with your own)
|
|
||||||
|
|
||||||
This is an optional feature for the optionally-installed [ma1sd service](configuring-playbook-ma1sd.md). See [ma1sd's documentation](https://github.com/ma1uta/ma1sd/wiki/mxisd-and-your-privacy#choices-are-never-easy) for information on the privacy implications of setting up this SRV record.
|
|
||||||
|
|
||||||
Note: This `_matrix-identity._tcp` SRV record for the identity server is different from the `_matrix._tcp` that can be used for Synapse delegation. See [howto-server-delegation.md](howto-server-delegation.md) for more information about delegation.
|
|
||||||
|
|
||||||
When you're done with the DNS configuration and ready to proceed, continue with [Getting the playbook](getting-the-playbook.md).
|
|
||||||
|
|
||||||
## `_dmarc`, `postmoogle._domainkey` TXT and `matrix` MX records setup
|
|
||||||
|
|
||||||
To make the [postmoogle](configuring-playbook-bot-postmoogle.md) email bridge enable its email sending features, you need to configure
|
|
||||||
SPF (TXT), DMARC (TXT), DKIM (TXT) and MX records
|
|
||||||
|
124
docs/configuring-playbook-alertmanager-receiver.md
Normal file
124
docs/configuring-playbook-alertmanager-receiver.md
Normal file
@ -0,0 +1,124 @@
|
|||||||
|
# Setting up Prometheus Alertmanager integration via matrix-alertmanager-receiver (optional)
|
||||||
|
|
||||||
|
The playbook can install and configure the [matrix-alertmanager-receiver](https://github.com/metio/matrix-alertmanager-receiver) service for you. It's a [client](https://prometheus.io/docs/alerting/latest/clients/) for Prometheus' [Alertmanager](https://prometheus.io/docs/alerting/latest/alertmanager/), allowing you to deliver alerts to Matrix rooms.
|
||||||
|
|
||||||
|
See the project's [documentation](https://github.com/metio/matrix-alertmanager-receiver/blob/main/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
This service is meant to be used with an external [Alertmanager](https://prometheus.io/docs/alerting/latest/alertmanager/) instance. It's **not** meant to be integrated with the [Prometheus & Grafana stack](./configuring-playbook-prometheus-grafana.md) installed by this playbook, because the Alertmanager component is not installed by it.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
### Register the bot account
|
||||||
|
|
||||||
|
This service uses a bot (with a username specified in `matrix_alertmanager_receiver_config_matrix_user_id_localpart`) for delivering messages.
|
||||||
|
|
||||||
|
The playbook does not automatically create users for you. You **need to register the bot user manually** before setting up the bot.
|
||||||
|
|
||||||
|
Generate a strong password for the bot. You can create one with a command like `pwgen -s 64 1`.
|
||||||
|
|
||||||
|
You can use the playbook to [register a new user](registering-users.md):
|
||||||
|
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --extra-vars='username=bot.alertmanager.receiver password=PASSWORD_FOR_THE_BOT admin=no' --tags=register-user
|
||||||
|
```
|
||||||
|
|
||||||
|
### Obtain an access token
|
||||||
|
|
||||||
|
The bot requires an access token to be able to connect to your homeserver. Refer to the documentation on [how to obtain an access token](obtaining-access-tokens.md).
|
||||||
|
|
||||||
|
⚠️ **Warning**: Access tokens are sensitive information. Do not include them in any bug reports, messages, or logs. Do not share the access token with anyone.
|
||||||
|
|
||||||
|
### Join to rooms as the bot manually
|
||||||
|
|
||||||
|
ℹ️ **This bot does not accept room invitations automatically**. To deliver messages to rooms, the bot must be joined to all rooms manually.
|
||||||
|
|
||||||
|
For each new room you would like the bot to deliver alerts to, invite the bot to the room.
|
||||||
|
|
||||||
|
Then, log in as the bot using any Matrix client of your choosing, accept the room invitation from the bot's account, and log out.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
Add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file. Make sure to replace `ACCESS_TOKEN_HERE` with the one created [above](#obtain-an-access-token).
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_alertmanager_receiver_enabled: true
|
||||||
|
|
||||||
|
# Uncomment and adjust this part if you'd like to use a username different than the default
|
||||||
|
# matrix_alertmanager_receiver_config_matrix_user_id_localpart: "bot.alertmanager.receiver"
|
||||||
|
|
||||||
|
matrix_alertmanager_receiver_config_matrix_access_token: "ACCESS_TOKEN_HERE"
|
||||||
|
|
||||||
|
# Optionally, configure some mappings (URL-friendly room name -> actual Matrix room ID).
|
||||||
|
#
|
||||||
|
# If you don't configure mappings, you can still deliver alerts using URLs like this:
|
||||||
|
# https://matrix.example.com/matrix-alertmanager-receiver-RANDOM_VALUE_HERE/alert/!qporfwt:example.com
|
||||||
|
#
|
||||||
|
# If a mapping like the one below is configured, you can deliver alerts using friendlier URLs like this:
|
||||||
|
# https://matrix.example.com/matrix-alertmanager-receiver-RANDOM_VALUE_HERE/alert/some-room-name
|
||||||
|
matrix_alertmanager_receiver_config_matrix_room_mapping:
|
||||||
|
some-room-name: "!qporfwt:{{ matrix_domain }}"
|
||||||
|
```
|
||||||
|
|
||||||
|
See `roles/custom/matrix-alertmanager-receiver/defaults/main.yml` for additional configuration variables.
|
||||||
|
|
||||||
|
### Adjusting the matrix-alertmanager-receiver URL
|
||||||
|
|
||||||
|
By default, this playbook installs matrix-alertmanager-receiver on the `matrix.` subdomain, at the `/matrix-alertmanager-receiver` path (https://matrix.example.com/matrix-alertmanager-receiver). This makes it easy to install it, because it **doesn't require additional DNS records to be set up**. If that's okay, you can skip this section.
|
||||||
|
|
||||||
|
By tweaking the `matrix_alertmanager_receiver_hostname` and `matrix_alertmanager_receiver_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Change the default hostname and path prefix
|
||||||
|
matrix_alertmanager_receiver_hostname: alertmanager.example.com
|
||||||
|
matrix_alertmanager_receiver_path_prefix: /
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
If you've changed the default hostname, **you may need to adjust your DNS** records to point the matrix-alertmanager-receiver domain to the Matrix server.
|
||||||
|
|
||||||
|
See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to use the default hostname, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
Configure your Prometheus Alertmanager with configuration like this:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
receivers:
|
||||||
|
- name: matrix
|
||||||
|
webhook_configs:
|
||||||
|
- send_resolved: true
|
||||||
|
url: URL_HERE
|
||||||
|
route:
|
||||||
|
group_by:
|
||||||
|
- namespace
|
||||||
|
group_interval: 5m
|
||||||
|
group_wait: 30s
|
||||||
|
receiver: "matrix"
|
||||||
|
repeat_interval: 12h
|
||||||
|
routes:
|
||||||
|
- receiver: matrix
|
||||||
|
```
|
||||||
|
|
||||||
|
where `URL_HERE` looks like `https://matrix.example.com/matrix-alertmanager-receiver-RANDOM_VALUE_HERE/alert/some-room-name` or `https://matrix.example.com/matrix-alertmanager-receiver-RANDOM_VALUE_HERE/alert/!qporfwt:example.com`.
|
36
docs/configuring-playbook-appservice-double-puppet.md
Normal file
36
docs/configuring-playbook-appservice-double-puppet.md
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
# Setting up Appservice Double Puppet (optional)
|
||||||
|
|
||||||
|
Appservice Double Puppet is a homeserver appservice through which bridges (and potentially other services) can impersonate any user on the homeserver.
|
||||||
|
|
||||||
|
This is useful for performing [double-puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) via the [appservice method](https://docs.mau.fi/bridges/general/double-puppeting.html#appservice-method-new). The Appservice Double Puppet service is an implementation of this approach.
|
||||||
|
|
||||||
|
Previously, bridges supported performing [double-puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) with the help of the [Shared Secret Auth password provider module](./configuring-playbook-shared-secret-auth.md), but this old and hacky solution has been superseded by this Appservice Double Puppet method.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the Appservice Double Puppet service, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_appservice_double_puppet_enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
When enabled, double puppeting will automatically be enabled for all bridges that support double puppeting via the appservice method.
|
112
docs/configuring-playbook-appservice-draupnir-for-all.md
Normal file
112
docs/configuring-playbook-appservice-draupnir-for-all.md
Normal file
@ -0,0 +1,112 @@
|
|||||||
|
# Setting up Draupnir for All/D4A (optional)
|
||||||
|
|
||||||
|
The playbook can install and configure the [Draupnir](https://github.com/the-draupnir-project/Draupnir) moderation tool for you in appservice mode.
|
||||||
|
|
||||||
|
Appservice mode can be used together with the regular [Draupnir bot](configuring-playbook-bot-draupnir.md) or independently. Details about the differences between the 2 modes are described below.
|
||||||
|
|
||||||
|
## Draupnir Appservice mode compared to Draupnir bot mode
|
||||||
|
|
||||||
|
The administrative functions for managing the appservice are alpha quality and very limited. However, the experience of using an appservice-provisioned Draupnir is on par with the experience of using Draupnir from bot mode except in the case of avatar customisation as described later on in this document.
|
||||||
|
|
||||||
|
Draupnir for all is the way to go if you need more than 1 Draupnir instance, but you don't need access to Synapse Admin features as they are not accessible through Draupnir for All (Even though the commands do show up in help).
|
||||||
|
|
||||||
|
Draupnir for all in the playbook is rate-limit-exempt automatically as its appservice configuration file does not specify any rate limits.
|
||||||
|
|
||||||
|
Normal Draupnir does come with the benefit of access to Synapse Admin features. You are also able to more easily customise your normal Draupnir than D4A as D4A even on the branch with the Avatar command (To be Upstreamed to Mainline Draupnir) that command is clunky as it requires the use of things like Element Web devtools. In normal Draupnir this is a quick operation where you login to Draupnir with a normal client and set Avatar and Display name normally.
|
||||||
|
|
||||||
|
Draupnir for all does not support external tooling like [MRU](https://mru.rory.gay) as it can't access Draupnir's user account.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
### Create a main management room
|
||||||
|
|
||||||
|
The playbook does not create a management room for your Main Draupnir. You **need to create the room manually** before setting up the bot.
|
||||||
|
|
||||||
|
Note that the room must be unencrypted.
|
||||||
|
|
||||||
|
<!-- TODO: enable Pantalaimon as configuring-playbook-bot-draupnir.md -->
|
||||||
|
|
||||||
|
The management room has to be given an alias and be public when you are setting up the bot for the first time as the bot does not differentiate between invites and invites to the management room.
|
||||||
|
|
||||||
|
This management room is used to control who has access to your D4A deployment. The room stores this data inside of the control room state so your bot must have sufficient powerlevel to send custom state events. This is default 50 or moderator as Element clients call this powerlevel.
|
||||||
|
|
||||||
|
As noted in the Draupnir install instructions the control room is sensitive. **Anyone in this room can control the bot so it is important that you only invite trusted users to this room.**
|
||||||
|
|
||||||
|
### Set an alias to the management room
|
||||||
|
|
||||||
|
Next, set an alias to the management room.
|
||||||
|
|
||||||
|
This alias can be anything you want. However, for increased security during the setup phase, it is recommended to make this alias be a random string. When it has been locked down after setup phase, you can give your room a secondary human readable alias.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
Add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file. Make sure to replace `MANAGEMENT_ROOM_ALIAS_HERE`.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_appservice_draupnir_for_all_enabled: true
|
||||||
|
|
||||||
|
matrix_appservice_draupnir_for_all_master_control_room_alias: "MANAGEMENT_ROOM_ALIAS_HERE"
|
||||||
|
```
|
||||||
|
|
||||||
|
### Extending the configuration
|
||||||
|
|
||||||
|
You can configure additional options by adding the `matrix_appservice_draupnir_for_all_extension_yaml` variable.
|
||||||
|
|
||||||
|
For example, to change Draupnir's `protectAllJoinedRooms` option to `true`, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_appservice_draupnir_for_all_extension_yaml: |
|
||||||
|
# Your custom YAML configuration goes here.
|
||||||
|
# This configuration extends the default starting configuration (`matrix_appservice_draupnir_for_all_yaml`).
|
||||||
|
#
|
||||||
|
# You can override individual variables from the default configuration, or introduce new ones.
|
||||||
|
#
|
||||||
|
# If you need something more special, you can take full control by
|
||||||
|
# completely redefining `matrix_appservice_draupnir_for_all_yaml`.
|
||||||
|
protectAllJoinedRooms: true
|
||||||
|
```
|
||||||
|
|
||||||
|
You can refer to the upstream [documentation](https://github.com/the-draupnir-project/Draupnir) for more configuration documentation.
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The playbook ships a full copy of the example config that does transfer to provisioned Draupnirs in the production-bots.yaml.j2 file in the template directory of the role.
|
||||||
|
|
||||||
|
- Config extension does not affect the appservices config as this config is not extensible in current Draupnir anyway. It instead touches the config passed to the Draupnirs that your Appservice creates. So the example above (`protectAllJoinedRooms: true`) makes all provisioned Draupnirs protect all joined rooms.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
If you made it through all the steps above and your main control room was joined by a user called `@draupnir-main:example.com` you have succesfully installed Draupnir for All and can now start using it.
|
||||||
|
|
||||||
|
The installation of Draupnir for all in this playbook is very much Alpha quality. Usage-wise, Draupnir for all is almost identical to Draupnir bot mode.
|
||||||
|
|
||||||
|
### Granting Users the ability to use D4A
|
||||||
|
|
||||||
|
Draupnir for all includes several security measures like that it only allows users that are on its allow list to ask for a bot. To add a user to this list we have 2 primary options. Using the chat to tell Draupnir to do this for us or if you want to automatically do it by sending `m.policy.rule.user` events that target the subject you want to allow provisioning for with the `org.matrix.mjolnir.allow` recomendation. Using the chat is recomended.
|
||||||
|
|
||||||
|
The bot requires a powerlevel of 50 in the management room to control who is allowed to use the bot. The bot does currently not say anything if this is true or false. (This is considered a bug and is documented in issue [#297](https://github.com/the-draupnir-project/Draupnir/issues/297))
|
||||||
|
|
||||||
|
To allow users or whole homeservers you type /plain @draupnir-main:example.com allow `target` and target can be either a MXID or a wildcard like `@*:example.com` to allow all users on example.com to register. We use /plain to force the client to not attempt to mess with this command as it can break Wildcard commands especially.
|
||||||
|
|
||||||
|
### How to provision a D4A once you are allowed to
|
||||||
|
|
||||||
|
To provision a D4A, you need to start a chat with `@draupnir-main:example.com`. The bot will reject this invite and you will shortly get invited to the Draupnir control room for your newly provisioned Draupnir. From here its just a normal Draupnir experience.
|
||||||
|
|
||||||
|
Congratulations if you made it all the way here because you now have a fully working Draupnir for all deployment.
|
@ -1,41 +1,44 @@
|
|||||||
# Setting up borg backup (optional)
|
# Setting up BorgBackup (optional)
|
||||||
|
|
||||||
The playbook can install and configure [borgbackup](https://www.borgbackup.org/) with [borgmatic](https://torsion.org/borgmatic/) for you.
|
The playbook can install and configure [BorgBackup](https://www.borgbackup.org/) (short: Borg) with [borgmatic](https://torsion.org/borgmatic/) for you.
|
||||||
BorgBackup is a deduplicating backup program with optional compression and encryption.
|
|
||||||
That means your daily incremental backups can be stored in a fraction of the space and is safe whether you store it at home or on a cloud service.
|
|
||||||
|
|
||||||
You will need a remote server where borg will store the backups. There are hosted, borg compatible solutions available, such as [BorgBase](https://www.borgbase.com).
|
BorgBackup is a deduplicating backup program with optional compression and encryption. That means your daily incremental backups can be stored in a fraction of the space and is safe whether you store it at home or on a cloud service.
|
||||||
|
|
||||||
|
You will need a remote server where BorgBackup will store the backups. There are hosted, BorgBackup compatible solutions available, such as [BorgBase](https://www.borgbase.com).
|
||||||
|
|
||||||
The backup will run based on `backup_borg_schedule` var (systemd timer calendar), default: 4am every day.
|
The backup will run based on `backup_borg_schedule` var (systemd timer calendar), default: 4am every day.
|
||||||
|
|
||||||
By default, if you're using the integrated Postgres database server (as opposed to [an external Postgres server](configuring-playbook-external-postgres.md)), Borg backups will also include dumps of your Postgres database. An alternative solution for backing up the Postgres database is [postgres backup](configuring-playbook-postgres-backup.md). If you decide to go with another solution, you can disable Postgres-backup support for Borg using the `backup_borg_postgresql_enabled` variable.
|
By default, if you're using the integrated Postgres database server (as opposed to [an external Postgres server](configuring-playbook-external-postgres.md)), backups with BorgBackup will also include dumps of your Postgres database. An alternative solution for backing up the Postgres database is [postgres backup](configuring-playbook-postgres-backup.md). If you decide to go with another solution, you can disable Postgres-backup support for BorgBackup using the `backup_borg_postgresql_enabled` variable.
|
||||||
|
|
||||||
|
**Note**: the component is not managed by this repository but its [own repository](https://github.com/mother-of-all-self-hosting/ansible-role-backup_borg).
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
|
|
||||||
1. Create a new SSH key:
|
1. If you do not disable Postgres-backup support, make sure that the Postgres version of your homeserver's database is compatible with borgmatic.
|
||||||
|
|
||||||
```bash
|
2. Create a new SSH key:
|
||||||
ssh-keygen -t ed25519 -N '' -f matrix-borg-backup -C matrix
|
|
||||||
```
|
|
||||||
|
|
||||||
This can be done on any machine and you don't need to place the key in the `.ssh` folder. It will be added to the Ansible config later.
|
```sh
|
||||||
|
ssh-keygen -t ed25519 -N '' -f matrix-borg-backup -C matrix
|
||||||
|
```
|
||||||
|
|
||||||
2. Add the **public** part of this SSH key (the `matrix-borg-backup.pub` file) to your borg provider/server:
|
This can be done on any machine and you don't need to place the key in the `.ssh` folder. It will be added to the Ansible config later.
|
||||||
|
|
||||||
If you plan to use a hosted solution, follow their instructions. If you have your own server, copy the key over:
|
3. Add the **public** part of this SSH key (the `matrix-borg-backup.pub` file) to your BorgBackup provider/server:
|
||||||
|
|
||||||
```bash
|
If you plan to use a hosted solution, follow their instructions. If you have your own server, copy the key over:
|
||||||
# example to append the new PUBKEY contents, where:
|
|
||||||
# PUBKEY is path to the public key,
|
```sh
|
||||||
# USER is a ssh user on a provider / server
|
# example to append the new PUBKEY contents, where:
|
||||||
# HOST is a ssh host of a provider / server
|
# PUBKEY is path to the public key,
|
||||||
cat PUBKEY | ssh USER@HOST 'dd of=.ssh/authorized_keys oflag=append conv=notrunc'
|
# USER is a ssh user on a provider / server
|
||||||
```
|
# HOST is a ssh host of a provider / server
|
||||||
|
cat PUBKEY | ssh USER@HOST 'dd of=.ssh/authorized_keys oflag=append conv=notrunc'
|
||||||
|
```
|
||||||
|
|
||||||
## Adjusting the playbook configuration
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
Minimal working configuration (`inventory/host_vars/matrix.DOMAIN/vars.yml`) to enable borg backup:
|
Minimal working configuration (`inventory/host_vars/matrix.example.com/vars.yml`) to enable BorgBackup:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
backup_borg_enabled: true
|
backup_borg_enabled: true
|
||||||
@ -56,26 +59,29 @@ where:
|
|||||||
|
|
||||||
* USER - SSH user of a provider/server
|
* USER - SSH user of a provider/server
|
||||||
* HOST - SSH host of a provider/server
|
* HOST - SSH host of a provider/server
|
||||||
* REPO - borg repository name, it will be initialized on backup start, eg: `matrix`, regarding Syntax see [Remote repositories](https://borgbackup.readthedocs.io/en/stable/usage/general.html#repository-urls)
|
* REPO - BorgBackup repository name, it will be initialized on backup start, eg: `matrix`, regarding Syntax see [Remote repositories](https://borgbackup.readthedocs.io/en/stable/usage/general.html#repository-urls)
|
||||||
* PASSPHRASE - passphrase used for encrypting backups, you may generate it with `pwgen -s 64 1` or use any password manager
|
* PASSPHRASE - passphrase used for encrypting backups. You can create one with a command like `pwgen -s 64 1`.
|
||||||
* PRIVATE KEY - the content of the **private** part of the SSH key you created before. The whole key (all of its belonging lines) under `backup_borg_ssh_key_private` needs to be indented with 2 spaces
|
* PRIVATE KEY - the content of the **private** part of the SSH key you created before. The whole key (all of its belonging lines) under `backup_borg_ssh_key_private` needs to be indented with 2 spaces
|
||||||
|
|
||||||
To backup without encryption, add `backup_borg_encryption: 'none'` to your vars. This will also enable the `backup_borg_unknown_unencrypted_repo_access_is_ok` variable.
|
To backup without encryption, add `backup_borg_encryption: 'none'` to your vars. This will also enable the `backup_borg_unknown_unencrypted_repo_access_is_ok` variable.
|
||||||
|
|
||||||
`backup_borg_location_source_directories` defines the list of directories to back up: it's set to `{{ matrix_base_data_path }}` by default, which is the base directory for every service's data, such as Synapse, Postgres and the bridges. You might want to exclude certain directories or file patterns from the backup using the `backup_borg_location_exclude_patterns` variable.
|
`backup_borg_location_source_directories` defines the list of directories to back up: it's set to `{{ matrix_base_data_path }}` by default, which is the base directory for every service's data, such as Synapse, Postgres and the bridges. You might want to exclude certain directories or file patterns from the backup using the `backup_borg_location_exclude_patterns` variable.
|
||||||
|
|
||||||
Check the [backup_borg role](https://gitlab.com/etke.cc/roles/backup_borg)'s [defaults/main.yml](https://gitlab.com/etke.cc/roles/backup_borg/-/blob/main/defaults/main.yml) file for the full list of available options.
|
Check the [backup_borg role](https://github.com/mother-of-all-self-hosting/ansible-role-backup_borg)'s [defaults/main.yml](https://github.com/mother-of-all-self-hosting/ansible-role-backup_borg/blob/main/defaults/main.yml) file for the full list of available options.
|
||||||
|
|
||||||
## Installing
|
## Installing
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command again:
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
```
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
```
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
|
||||||
## Manually start a backup
|
## Manually start a backup
|
||||||
|
|
||||||
For testing your setup it can be helpful to not wait until 4am. If you want to run the backup immediately, log onto the server
|
For testing your setup it can be helpful to not wait until 4am. If you want to run the backup immediately, log onto the server and run `systemctl start matrix-backup-borg`. This will not return until the backup is done, so possibly a long time. Consider using [tmux](https://en.wikipedia.org/wiki/Tmux) if your SSH connection is unstable.
|
||||||
and run `systemctl start matrix-backup-borg`. This will not return until the backup is done, so possibly a long time.
|
|
||||||
Consider using [tmux](https://en.wikipedia.org/wiki/Tmux) if your SSH connection is unstable.
|
|
||||||
|
@ -1,52 +1,76 @@
|
|||||||
# Serving the base domain
|
# Serving the base domain (optional)
|
||||||
|
|
||||||
This playbook sets up services on your Matrix server (`matrix.DOMAIN`).
|
By default, this playbook sets up services on your Matrix server (`matrix.example.com`), but has it configured so that it presents itself as the base domain (`example.com`). To have this server officially be responsible for Matrix services for the base domain (`example.com`), you need to set up server delegation / redirection.
|
||||||
To have this server officially be responsible for Matrix services for the base domain (`DOMAIN`), you need to set up [Server Delegation](howto-server-delegation.md).
|
|
||||||
This is normally done by [configuring well-known](configuring-well-known.md) files on the base domain.
|
|
||||||
|
|
||||||
People who don't have a separate server to dedicate to the base domain have trouble arranging this.
|
As we discuss in [Server Delegation](howto-server-delegation.md), server delegation / redirection can be configured in either of these ways:
|
||||||
|
|
||||||
|
- Setting up a `/.well-known/matrix/server` file on the base domain (`example.com`)
|
||||||
|
- Setting up a `_matrix._tcp` DNS SRV record
|
||||||
|
|
||||||
|
For simplicity reasons, this playbook recommends you to set up server delegation via a `/.well-known/matrix/server` file.
|
||||||
|
|
||||||
|
However, those who don't have a separate server to dedicate to the base domain have trouble arranging this.
|
||||||
|
|
||||||
Usually, there are 2 options:
|
Usually, there are 2 options:
|
||||||
|
|
||||||
- either get a separate server for the base domain, just for serving the files necessary for [Server Delegation via a well-known file](howto-server-delegation.md#server-delegation-via-a-well-known-file)
|
- either get a separate server for the base domain, just for serving the files necessary for [Server Delegation via a well-known file](howto-server-delegation.md#server-delegation-via-a-well-known-file)
|
||||||
|
|
||||||
- or, arrange for the Matrix server to serve the base domain. This either involves you [using your own webserver](configuring-playbook-own-webserver.md) or making the integrated webserver (`matrix-nginx-proxy`) serve the base domain for you.
|
- or, arrange for the Matrix server to serve the base domain. This either involves you [using your own webserver](configuring-playbook-own-webserver.md) or making the integrated webserver serve the base domain for you.
|
||||||
|
|
||||||
This documentation page tells you how to do the latter. With some easy changes, we make it possible to serve the base domain from the Matrix server via the integrated webserver (`matrix-nginx-proxy`).
|
This documentation page tells you how to do the latter. With some easy changes, we make it possible to serve the base domain from the Matrix server via the integrated webserver.
|
||||||
|
|
||||||
Just **adjust your DNS records**, so that your base domain is pointed to the Matrix server's IP address (using a DNS `A` record) **and then use the following configuration**:
|
Just [**adjust your DNS records**](configuring-dns.md), so that your base domain is pointed to the Matrix server's IP address (using a DNS `A` record) **and then add the following configuration** to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_nginx_proxy_base_domain_serving_enabled: true
|
matrix_static_files_container_labels_base_domain_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
Doing this, the playbook will:
|
Doing this, the playbook will:
|
||||||
|
|
||||||
- obtain an SSL certificate for the base domain, just like it does for all other domains (see [how we handle SSL certificates](configuring-playbook-ssl-certificates.md))
|
- obtain an SSL certificate for the base domain, just like it does for all other domains (see [how we handle SSL certificates](configuring-playbook-ssl-certificates.md))
|
||||||
|
|
||||||
- serve the `/.well-known/matrix/*` files which are necessary for [Federation Server Discovery](configuring-well-known.md#introduction-to-client-server-discovery) (also see [Server Delegation](howto-server-delegation.md)) and [Client-Server discovery](configuring-well-known.md#introduction-to-client-server-discovery)
|
- serve the `/.well-known/matrix/*` files which are necessary for [Federation Server Discovery](configuring-well-known.md#federation-server-discovery) (also see [Server Delegation](howto-server-delegation.md)) and [Client-Server discovery](configuring-well-known.md#client-server-discovery)
|
||||||
|
|
||||||
- serve a simple homepage at `https://DOMAIN` with content `Hello from DOMAIN` (configurable via the `matrix_nginx_proxy_base_domain_homepage_template` variable). You can also [serve a more complicated static website](#serving-a-static-website-at-the-base-domain).
|
|
||||||
|
|
||||||
|
- serve a simple homepage at `https://example.com` with content `Hello from example.com` (configurable via the `matrix_static_files_file_index_html_template` variable). You can also [serve a more complicated static website](#serving-a-static-website-at-the-base-domain).
|
||||||
|
|
||||||
## Serving a static website at the base domain
|
## Serving a static website at the base domain
|
||||||
|
|
||||||
By default, when "serving the base domain" is enabled, the playbook hosts a simple `index.html` webpage in `/matrix/nginx-proxy/data/matrix-domain`.
|
By default, when "serving the base domain" is enabled, the playbook hosts a simple `index.html` webpage at `/matrix/static-files/public/index.html`. The content of this page is taken from the `matrix_static_files_file_index_html_template` variable.
|
||||||
The content of this page is taken from the `matrix_nginx_proxy_base_domain_homepage_template` variable.
|
|
||||||
|
|
||||||
If you'd like to host your own static website (more than a single `index.html` page) at the base domain, you can disable the creation of this default `index.html` page like this:
|
If you'd like to host your own static website (more than a single `index.html` page) at the base domain, you can disable the creation of this default `index.html` page like this:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_nginx_proxy_base_domain_homepage_enabled: false
|
# Enable base-domain serving
|
||||||
|
matrix_static_files_container_labels_base_domain_enabled: true
|
||||||
|
|
||||||
|
# Prevent the default index.html file from being installed
|
||||||
|
matrix_static_files_file_index_html_enabled: false
|
||||||
|
|
||||||
|
# Disable the automatic redirectin of `https://example.com/` to `https://matrix.example.com/`.
|
||||||
|
# This gets automatically enabled when you disable `matrix_static_files_file_index_html_enabled`, as we're doing above.
|
||||||
|
matrix_static_files_container_labels_base_domain_root_path_redirection_enabled: false
|
||||||
```
|
```
|
||||||
|
|
||||||
With this configuration, Ansible will no longer mess around with the `/matrix/nginx-proxy/data/matrix-domain/index.html` file.
|
With this configuration, Ansible will no longer mess around with the `/matrix/static-files/public/index.html` file.
|
||||||
|
|
||||||
You are then free to upload any static website files to `/matrix/nginx-proxy/data/matrix-domain` and they will get served at the base domain.
|
|
||||||
|
|
||||||
|
You are then free to upload any static website files to `/matrix/static-files/public` and they will get served at the base domain. You can do so manually or by using the [ansible-role-aux](https://github.com/mother-of-all-self-hosting/ansible-role-aux) Ansible role, which is part of this playbook already.
|
||||||
|
|
||||||
## Serving a more complicated website at the base domain
|
## Serving a more complicated website at the base domain
|
||||||
|
|
||||||
If you'd like to serve an even more complicated (dynamic) website from the Matrix server, relying on the playbook to serve the base domain is not the best choice.
|
If you'd like to serve an even more complicated (dynamic) website from the Matrix server, relying on the playbook to serve the base domain is not the best choice.
|
||||||
|
|
||||||
Instead, we recommend that you switch to [using your own webserver](configuring-playbook-own-webserver.md) (preferrably nginx). You can then make that webserver host anything you wish, and still easily plug in Matrix services into it.
|
You have 2 options.
|
||||||
|
|
||||||
|
**One way is to host your base domain elsewhere**. This involves:
|
||||||
|
- you stopping to serve it from the Matrix server: remove `matrix_static_files_container_labels_base_domain_enabled` from your configuration
|
||||||
|
- [configuring Matrix Delegation via well-known](./configuring-well-known.md)
|
||||||
|
|
||||||
|
**Another way is to serve the base domain from another (your own) container on the Matrix server**. This involves:
|
||||||
|
- telling the playbook to only serve `example.com/.well-known/matrix` files by adjusting your `vars.yml` configuration like this:
|
||||||
|
- keep `matrix_static_files_container_labels_base_domain_enabled: true`
|
||||||
|
- add an extra: `matrix_static_files_container_labels_base_domain_traefik_path_prefix: /.well-known/matrix`
|
||||||
|
- building and running a new container on the Matrix server:
|
||||||
|
- it should be connected to the `traefik` network, so that Traefik can reverse-proxy to it
|
||||||
|
- it should have appropriate [container labels](https://docs.docker.com/config/labels-custom-metadata/), which instruct Traefik to reverse-proxy to it
|
||||||
|
|
||||||
|
How you'll be managing building and running this container is up-to-you. You may use of the primitives from [ansible-role-aux](https://github.com/mother-of-all-self-hosting/ansible-role-aux) Ansible role to organize it yourself, or you can set it up in another way.
|
||||||
|
420
docs/configuring-playbook-bot-baibot.md
Normal file
420
docs/configuring-playbook-bot-baibot.md
Normal file
@ -0,0 +1,420 @@
|
|||||||
|
# Setting up baibot (optional)
|
||||||
|
|
||||||
|
<p align="center">
|
||||||
|
<img src="https://github.com/etkecc/baibot/raw/main/etc/assets/baibot.svg" alt="baibot logo" width="150" />
|
||||||
|
<h1 align="center">baibot</h1>
|
||||||
|
</p>
|
||||||
|
|
||||||
|
🤖 [baibot](https://github.com/etkecc/baibot) (pronounced bye-bot) is a [Matrix](https://matrix.org/) bot developed by [etke.cc](https://etke.cc/) that exposes the power of [AI](https://en.wikipedia.org/wiki/Artificial_intelligence) / [Large Language Models](https://en.wikipedia.org/wiki/Large_language_model) to you. 🤖
|
||||||
|
|
||||||
|
It supports [OpenAI](https://openai.com/)'s [ChatGPT](https://openai.com/blog/chatgpt/) models, as many well as other [☁️ providers](https://github.com/etkecc/baibot/blob/main/docs/providers.md).
|
||||||
|
|
||||||
|
It's designed as a more private and [✨ featureful](https://github.com/etkecc/baibot/?tab=readme-ov-file#-features) alternative to [matrix-chatgpt-bot](./configuring-playbook-bot-chatgpt.md). See the [baibot](https://github.com/etkecc/baibot) project and its documentation for more information.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
API access to one or more LLM [☁️ providers](https://github.com/etkecc/baibot/blob/main/docs/providers.md).
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
There are **a lot of configuration options** (some required, some possibly required, some optional), so they're **split into multiple sections below**:
|
||||||
|
|
||||||
|
<!-- no toc -->
|
||||||
|
- [Base configuration](#base-configuration)
|
||||||
|
- [👮♂️ Administrator configuration](#️-administrator-configuration)
|
||||||
|
- [👥 Initial users configuration](#-initial-users-configuration)
|
||||||
|
- [🤖 Configuring agents via Ansible](#-configuring-agents-via-ansible)
|
||||||
|
- [🤝 Configuring initial default handlers](#-configuring-initial-default-handlers)
|
||||||
|
|
||||||
|
Depending on your current `vars.yml` file and desired configuration, **you may require more than just the [base configuration](#base-configuration)**.
|
||||||
|
|
||||||
|
### Base configuration
|
||||||
|
|
||||||
|
To enable the bot, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_bot_baibot_enabled: true
|
||||||
|
|
||||||
|
# Uncomment and adjust this part if you'd like to use a username different than the default
|
||||||
|
# matrix_bot_baibot_config_user_mxid_localpart: baibot
|
||||||
|
|
||||||
|
# Generate a strong password for the bot. You can create one with a command like `pwgen -s 64 1`.
|
||||||
|
# If you'd like to change this password subsequently, see the details below.
|
||||||
|
matrix_bot_baibot_config_user_password: 'PASSWORD_FOR_THE_BOT'
|
||||||
|
|
||||||
|
# An optional passphrase to use for backing up and recovering the bot's encryption keys.
|
||||||
|
# You can create one with a command like `pwgen -s 64 1`.
|
||||||
|
#
|
||||||
|
# If set to null, the recovery module will not be used and losing your session/database
|
||||||
|
# will mean you lose access to old messages in encrypted room.
|
||||||
|
# It's highly recommended that you configure this to avoid losing access to encrypted messages.
|
||||||
|
#
|
||||||
|
# Changing this subsequently will also cause you to lose access to old messages in encrypted rooms.
|
||||||
|
# For details about changing this subsequently or resetting, see `defaults/main.yml` in the baibot role.
|
||||||
|
matrix_bot_baibot_config_user_encryption_recovery_passphrase: 'ANY_LONG_AND_SECURE_PASSPHRASE_STRING_HERE'
|
||||||
|
|
||||||
|
# An optional secret for encrypting the bot's session data (see `matrix_bot_baibot_data_path`).
|
||||||
|
# This must be 32-bytes (64 characters when HEX-encoded).
|
||||||
|
# Generate it with: `openssl rand -hex 32`
|
||||||
|
# Set to null or empty to avoid using encryption.
|
||||||
|
# Changing this subsequently requires that you also throw away all data (see `matrix_bot_baibot_data_path`)
|
||||||
|
matrix_bot_baibot_config_persistence_session_encryption_key: 'A_HEX_STRING_OF_64_CHARACTERS_HERE'
|
||||||
|
|
||||||
|
# An optional secret for encrypting bot configuration stored in Matrix's account data.
|
||||||
|
# This must be 32-bytes (64 characters when HEX-encoded).
|
||||||
|
# Generate it with: `openssl rand -hex 32`
|
||||||
|
# Set to null or empty to avoid using encryption.
|
||||||
|
# Changing this subsequently will make you lose your configuration.
|
||||||
|
matrix_bot_baibot_config_persistence_config_encryption_key: 'A_HEX_STRING_OF_64_CHARACTERS_HERE'
|
||||||
|
```
|
||||||
|
|
||||||
|
As mentioned above, **this may not be enough**. Continue with the configuration sections below.
|
||||||
|
|
||||||
|
### 👮♂️ Administrator configuration
|
||||||
|
|
||||||
|
This is an addition to the [base configuration](#base-configuration).
|
||||||
|
|
||||||
|
To specify who is considered a bot [👮♂️ Administrator](https://github.com/etkecc/baibot/blob/main/docs/access.md#administrators), you either need to specify `matrix_bot_baibot_config_access_admin_patterns` or `matrix_admin`. The latter is a single variable which affects all bridges and bots.
|
||||||
|
|
||||||
|
If `matrix_admin` is already configured in your `vars.yml` configuration, you can skip this section.
|
||||||
|
|
||||||
|
**If necessary**, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Uncomment to add one or more admins to this bridge:
|
||||||
|
#
|
||||||
|
# matrix_bot_baibot_config_access_admin_patterns:
|
||||||
|
# - "@*:example.com"
|
||||||
|
# - "@admin:example.net"
|
||||||
|
#
|
||||||
|
# .. unless you've made yourself an admin of all bots/bridges like this:
|
||||||
|
#
|
||||||
|
# matrix_admin: '@yourAdminAccount:{{ matrix_domain }}'
|
||||||
|
```
|
||||||
|
|
||||||
|
### 👥 Initial users configuration
|
||||||
|
|
||||||
|
By default, **all users on your homeserver are considered allowed users**. If that's OK, you can skip this section.
|
||||||
|
|
||||||
|
This is an addition to the [base configuration](#base-configuration).
|
||||||
|
|
||||||
|
To specify who is considered a bot [👥 User](https://github.com/etkecc/baibot/blob/main/docs/access.md#user), you may:
|
||||||
|
|
||||||
|
- define an **initial** value for `matrix_bot_baibot_config_initial_global_config_user_patterns` Ansible variable, as shown below
|
||||||
|
- configure the list at runtime via the bot's `!bai access set-users SPACE_SEPARATED_PATTERNS` command
|
||||||
|
|
||||||
|
Configuring `matrix_bot_baibot_config_initial_global_config_user_patterns` is optional, but it can be useful to pre-configure the bot with a list of users who should have access to the bot's features.
|
||||||
|
|
||||||
|
**Note**: Once initially configured, the allowed users list **cannot be managed via Ansible anymore**. It can only be managed subsequently via bot commands.
|
||||||
|
|
||||||
|
**If necessary**, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Uncomment and adjust the bot users if necessary:
|
||||||
|
#
|
||||||
|
# Subsequent changes to `matrix_bot_baibot_config_initial_global_config_user_patterns` do not affect the bot's behavior.
|
||||||
|
# Once initially configured, the allowed users list is managed via bot commands, not via Ansible.
|
||||||
|
#
|
||||||
|
# matrix_bot_baibot_config_initial_global_config_user_patterns:
|
||||||
|
# - "@*:{{ matrix_bot_baibot_config_homeserver_server_name }}"
|
||||||
|
```
|
||||||
|
|
||||||
|
### 🤖 Configuring agents via Ansible
|
||||||
|
|
||||||
|
You are **not required** to define agents [statically](https://github.com/etkecc/baibot/blob/main/docs/configuration/README.md#static-configuration) via Ansible. **To get started quickly**, you can **skip this section and define agents at runtime via chat commands** (following the bot's guidance).
|
||||||
|
|
||||||
|
Privileged users (like the [👮♂️ Administrator](#️-administrator-configuration), but potentially others too - see the upstream [🔒 access](https://github.com/etkecc/baibot/blob/main/docs/access.md) documentation) can **define agents dynamically at any time** via chat commands.
|
||||||
|
|
||||||
|
The Ansible role includes preset variables for easily enabling some [🤖 agents](https://github.com/etkecc/baibot/blob/main/docs/agents.md) on various [☁️ providers](https://github.com/etkecc/baibot/blob/main/docs/providers.md) (e.g. OpenAI, etc).
|
||||||
|
|
||||||
|
Besides the presets, the Ansible role also includes support for configuring additional statically-defined agents via the `matrix_bot_baibot_config_agents_static_definitions_custom` Ansible variable.
|
||||||
|
|
||||||
|
Agents defined statically and those created dynamically (via chat) are named differently, so **conflict cannot arise**.
|
||||||
|
|
||||||
|
Depending on your propensity for [GitOps](https://en.wikipedia.org/wiki/DevOps#GitOps), you may prefer to define agents statically via Ansible, or you may wish to do it dynamically via chat.
|
||||||
|
|
||||||
|
Before proceeding, we recommend reading the upstream documentation on [How to choose a provider](https://github.com/etkecc/baibot/blob/main/docs/providers.md#how-to-choose-a-provider). In short, it's probably best to go with [OpenAI](#openai).
|
||||||
|
|
||||||
|
#### Anthropic
|
||||||
|
|
||||||
|
You can statically-define a single [🤖 agent](https://github.com/etkecc/baibot/blob/main/docs/agents.md) instance powered by the [Anthropic provider](https://github.com/etkecc/baibot/blob/main/docs/providers.md#anthropic) with the help of the playbook's preset variables.
|
||||||
|
|
||||||
|
Here's an example **addition** to your `vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_bot_baibot_config_agents_static_definitions_anthropic_enabled: true
|
||||||
|
|
||||||
|
matrix_bot_baibot_config_agents_static_definitions_anthropic_config_api_key: "YOUR_API_KEY_HERE"
|
||||||
|
|
||||||
|
# If you'd like to use another text-generation agent, uncomment and adjust:
|
||||||
|
# matrix_bot_baibot_config_agents_static_definitions_anthropic_config_text_generation_model_id: claude-3-5-sonnet-20240620
|
||||||
|
|
||||||
|
# The playbook defines a default prompt for all statically-defined agents.
|
||||||
|
# You can adjust it in the `matrix_bot_baibot_config_agents_static_definitions_prompt` variable,
|
||||||
|
# or you can adjust it below only for the Anthropic agent.
|
||||||
|
# matrix_bot_baibot_config_agents_static_definitions_anthropic_config_text_generation_prompt: "{{ matrix_bot_baibot_config_agents_static_definitions_prompt }}"
|
||||||
|
|
||||||
|
# See `defaults/main.yml` in the baibot role for more configuration options.
|
||||||
|
```
|
||||||
|
|
||||||
|
If you'd like to use more than one model, take a look at the [Configuring additional agents (without a preset)](#configuring-additional-agents-without-a-preset) section below.
|
||||||
|
|
||||||
|
💡 You may also wish to use this new agent for [🤝 Configuring initial default handlers](#-configuring-initial-default-handlers).
|
||||||
|
|
||||||
|
#### Groq
|
||||||
|
|
||||||
|
You can statically-define a single [🤖 agent](https://github.com/etkecc/baibot/blob/main/docs/agents.md) instance powered by the [Groq provider](https://github.com/etkecc/baibot/blob/main/docs/providers.md#groq) with the help of the playbook's preset variables.
|
||||||
|
|
||||||
|
Here's an example **addition** to your `vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_bot_baibot_config_agents_static_definitions_groq_enabled: true
|
||||||
|
|
||||||
|
matrix_bot_baibot_config_agents_static_definitions_groq_config_api_key: "YOUR_API_KEY_HERE"
|
||||||
|
|
||||||
|
# Specify the text-generation agent you'd like to use
|
||||||
|
matrix_bot_baibot_config_agents_static_definitions_groq_config_text_generation_model_id: "llama3-70b-8192"
|
||||||
|
|
||||||
|
# The playbook defines a default prompt for all statically-defined agents.
|
||||||
|
# You can adjust it in the `matrix_bot_baibot_config_agents_static_definitions_prompt` variable,
|
||||||
|
# or you can adjust it below only for the Groq agent.
|
||||||
|
# matrix_bot_baibot_config_agents_static_definitions_groq_config_text_generation_prompt: "{{ matrix_bot_baibot_config_agents_static_definitions_prompt }}"
|
||||||
|
|
||||||
|
# Uncomment and adjust this part if you're not happy with these speech-to-text defaults:
|
||||||
|
#
|
||||||
|
# matrix_bot_baibot_config_agents_static_definitions_groq_config_speech_to_text_enabled: true
|
||||||
|
# matrix_bot_baibot_config_agents_static_definitions_groq_config_speech_to_text_model_id: whisper-large-v3
|
||||||
|
|
||||||
|
# See `defaults/main.yml` in the baibot role for more configuration options.
|
||||||
|
```
|
||||||
|
|
||||||
|
Because this is a [statically](https://github.com/etkecc/baibot/blob/main/docs/configuration/README.md#static-configuration)-defined agent, it will be given a `static/` ID prefix and will be named `static/groq`.
|
||||||
|
|
||||||
|
If you'd like to use more than one model, take a look at the [Configuring additional agents (without a preset)](#configuring-additional-agents-without-a-preset) section below.
|
||||||
|
|
||||||
|
💡 You may also wish to use this new agent for [🤝 Configuring initial default handlers](#-configuring-initial-default-handlers).
|
||||||
|
|
||||||
|
#### Mistral
|
||||||
|
|
||||||
|
You can statically-define a single [🤖 agent](https://github.com/etkecc/baibot/blob/main/docs/agents.md) instance powered by the [🇫🇷 Mistral provider](https://github.com/etkecc/baibot/blob/main/docs/providers.md#mistral) with the help of the playbook's preset variables.
|
||||||
|
|
||||||
|
Here's an example **addition** to your `vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_bot_baibot_config_agents_static_definitions_mistral_enabled: true
|
||||||
|
|
||||||
|
matrix_bot_baibot_config_agents_static_definitions_mistral_config_api_key: "YOUR_API_KEY_HERE"
|
||||||
|
|
||||||
|
# The playbook defines a default prompt for all statically-defined agents.
|
||||||
|
# You can adjust it in the `matrix_bot_baibot_config_agents_static_definitions_prompt` variable,
|
||||||
|
# or you can adjust it below only for the Mistral agent.
|
||||||
|
# matrix_bot_baibot_config_agents_static_definitions_mistral_config_text_generation_prompt: "{{ matrix_bot_baibot_config_agents_static_definitions_prompt }}"
|
||||||
|
|
||||||
|
# Uncomment and adjust this part if you're not happy with these defaults:
|
||||||
|
# matrix_bot_baibot_config_agents_static_definitions_mistral_config_text_generation_model_id: mistral-large-latest
|
||||||
|
|
||||||
|
# See `defaults/main.yml` in the baibot role for more configuration options.
|
||||||
|
```
|
||||||
|
|
||||||
|
Because this is a [statically](https://github.com/etkecc/baibot/blob/main/docs/configuration/README.md#static-configuration)-defined agent, it will be given a `static/` ID prefix and will be named `static/mistral`.
|
||||||
|
|
||||||
|
If you'd like to use more than one model, take a look at the [Configuring additional agents (without a preset)](#configuring-additional-agents-without-a-preset) section below.
|
||||||
|
|
||||||
|
💡 You may also wish to use this new agent for [🤝 Configuring initial default handlers](#-configuring-initial-default-handlers).
|
||||||
|
|
||||||
|
#### OpenAI
|
||||||
|
|
||||||
|
You can statically-define a single [🤖 agent](https://github.com/etkecc/baibot/blob/main/docs/agents.md) instance powered by the [OpenAI provider](https://github.com/etkecc/baibot/blob/main/docs/providers.md#openai) with the help of the playbook's preset variables.
|
||||||
|
|
||||||
|
The OpenAI provider is **only meant to be used with OpenAI's official API** and compatibility with other services (which do not fully adhere to the OpenAI API spec completely) is limited. **If you're targeting an OpenAI-compatible service**, use the [OpenAI Compatible](#openai-compatible) provider instead.
|
||||||
|
|
||||||
|
Here's an example **addition** to your `vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_bot_baibot_config_agents_static_definitions_openai_enabled: true
|
||||||
|
|
||||||
|
matrix_bot_baibot_config_agents_static_definitions_openai_config_api_key: "YOUR_API_KEY_HERE"
|
||||||
|
|
||||||
|
# The playbook defines a default prompt for all statically-defined agents.
|
||||||
|
# You can adjust it in the `matrix_bot_baibot_config_agents_static_definitions_prompt` variable,
|
||||||
|
# or you can adjust it below only for the OpenAI agent.
|
||||||
|
# matrix_bot_baibot_config_agents_static_definitions_openai_config_text_generation_prompt: "{{ matrix_bot_baibot_config_agents_static_definitions_prompt }}"
|
||||||
|
|
||||||
|
# If you'd like to use another text-generation agent, uncomment and adjust:
|
||||||
|
# matrix_bot_baibot_config_agents_static_definitions_openai_config_text_generation_model_id: gpt-4o
|
||||||
|
|
||||||
|
# See `defaults/main.yml` in the baibot role for more configuration options.
|
||||||
|
```
|
||||||
|
|
||||||
|
Because this is a [statically](https://github.com/etkecc/baibot/blob/main/docs/configuration/README.md#static-configuration)-defined agent, it will be given a `static/` ID prefix and will be named `static/openai`.
|
||||||
|
|
||||||
|
If you'd like to use more than one model, take a look at the [Configuring additional agents (without a preset)](#configuring-additional-agents-without-a-preset) section below.
|
||||||
|
|
||||||
|
💡 You may also wish to use this new agent for [🤝 Configuring initial default handlers](#-configuring-initial-default-handlers).
|
||||||
|
|
||||||
|
#### OpenAI Compatible
|
||||||
|
|
||||||
|
You can statically-define a single [🤖 agent](https://github.com/etkecc/baibot/blob/main/docs/agents.md) instance powered by the [OpenAI Compatible provider](https://github.com/etkecc/baibot/blob/main/docs/providers.md#openai-compatible) with the help of the playbook's preset variables.
|
||||||
|
|
||||||
|
This provider allows you to use OpenAI-compatible API services like [OpenRouter](https://github.com/etkecc/baibot/blob/main/docs/providers.md#openrouter), [Together AI](https://github.com/etkecc/baibot/blob/main/docs/providers.md#together-ai), etc.
|
||||||
|
|
||||||
|
Some of these popular services already have **shortcut** providers (see [supported providers](https://github.com/etkecc/baibot/blob/main/docs/providers.md#supported-providers) leading to this one behind the scenes - this make it easier to get started.
|
||||||
|
|
||||||
|
As of this moment, the playbook does not include presets for any of these services, so you'll need to [Configuring additional agents (without a preset)](#configuring-additional-agents-without-a-preset).
|
||||||
|
|
||||||
|
#### Configuring additional agents (without a preset)
|
||||||
|
|
||||||
|
The Ansible role may be lacking preset variables for some [☁️ provider](https://github.com/etkecc/baibot/blob/main/docs/providers.md), or you may wish to statically-define an agent on the same provider twice (or more) with different configuration.
|
||||||
|
|
||||||
|
It's possible to inject your own agent configuration using the `matrix_bot_baibot_config_agents_static_definitions_custom` Ansible variable.
|
||||||
|
|
||||||
|
You can also define providers at runtime, by chatting with the bot, so using Ansible is not a requirement.
|
||||||
|
|
||||||
|
Below is an an **example** demonstrating **statically-defining agents via Ansible without using presets**:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_bot_baibot_config_agents_static_definitions_custom:
|
||||||
|
# This agent will use the GPT 3.5 model and will only support text-generation,
|
||||||
|
# even though the `openai` provider could support other features (e.g. image-generation).
|
||||||
|
- id: my-openai-gpt-3.5-turbo-agent
|
||||||
|
provider: openai
|
||||||
|
config:
|
||||||
|
base_url: https://api.openai.com/v1
|
||||||
|
api_key: "YOUR_API_KEY_HERE"
|
||||||
|
text_generation:
|
||||||
|
model_id: gpt-3.5-turbo-0125
|
||||||
|
prompt: "{{ matrix_bot_baibot_config_agents_static_definitions_prompt }}"
|
||||||
|
temperature: 1.0
|
||||||
|
max_response_tokens: 4096
|
||||||
|
max_context_tokens: 16385
|
||||||
|
speech_to_text: null
|
||||||
|
text_to_speech: null
|
||||||
|
image_generation: null
|
||||||
|
|
||||||
|
# This agent uses the `openai` provider, but adjusts the base URL, so that it points to some Ollama instance
|
||||||
|
# (which supports an OpenAI-compatible API).
|
||||||
|
- id: my-ollama-agent
|
||||||
|
provider: openai
|
||||||
|
config:
|
||||||
|
base_url: http://ollama-service:1234/v1
|
||||||
|
api_key: ""
|
||||||
|
text_generation:
|
||||||
|
model_id: "llama3.1:8b"
|
||||||
|
prompt: "{{ matrix_bot_baibot_config_agents_static_definitions_prompt }}"
|
||||||
|
temperature: 1.0
|
||||||
|
max_response_tokens: 4096
|
||||||
|
max_context_tokens: 128000
|
||||||
|
speech_to_text: null
|
||||||
|
text_to_speech: null
|
||||||
|
image_generation: null
|
||||||
|
```
|
||||||
|
|
||||||
|
Because these are [statically](https://github.com/etkecc/baibot/blob/main/docs/configuration/README.md#static-configuration)-defined agents, they will be given a `static/` ID prefix and will be named `static/my-openai-gpt-3.5-turbo-agent` and `static/my-ollama-agent`, respectively.
|
||||||
|
|
||||||
|
💡 To figure out what to put in the `config` section, refer to the [☁️ provider](https://github.com/etkecc/baibot/blob/main/docs/providers.md) page, which contains **sample configuration YAML for each provider**.
|
||||||
|
|
||||||
|
As with any [🤖 agent](https://github.com/etkecc/baibot/blob/main/docs/agents.md), defining them means they exist. To actually make use of them, they need to be configured as handlers globally or in a specific room - see [Mixing & matching models](https://github.com/etkecc/baibot/blob/main/docs/features.md#mixing--matching-models).
|
||||||
|
|
||||||
|
💡 You may also wish to use these new agents for [🤝 Configuring initial default handlers](#-configuring-initial-default-handlers).
|
||||||
|
|
||||||
|
### 🤝 Configuring initial default handlers
|
||||||
|
|
||||||
|
This section is only useful if you're [🤖 Configuring agents via Ansible](#-configuring-agents-via-ansible), as it lets you put these agents to use as soon as the bot starts (by adjusting the bot's **initial global configuration**).
|
||||||
|
|
||||||
|
If you're not configuring agents via Ansible, you can skip this section.
|
||||||
|
|
||||||
|
This section is only useful the first time around. **Once initially configured the global configuration cannot be managed Ansible**, but only via bot commands.
|
||||||
|
|
||||||
|
baibot supports [various purposes](https://github.com/etkecc/baibot/blob/main/docs/features.md):
|
||||||
|
|
||||||
|
- [💬 text-generation](https://github.com/etkecc/baibot/blob/main/docs/features.md#-text-generation): communicating with you via text
|
||||||
|
|
||||||
|
- [🦻 speech-to-text](https://github.com/etkecc/baibot/blob/main/docs/features.md#-speech-to-text): turning your voice messages into text
|
||||||
|
|
||||||
|
- [🗣️ text-to-speech](https://github.com/etkecc/baibot/blob/main/docs/features.md#-text-to-speech): turning bot or users text messages into voice messages
|
||||||
|
|
||||||
|
- [🖌️ image-generation](https://github.com/etkecc/baibot/blob/main/docs/features.md#-image-generation): generating images based on instructions
|
||||||
|
|
||||||
|
- ❓ catch-all: special purposes, indicating use as a fallback (when no specific handler is configured)
|
||||||
|
|
||||||
|
[Mixing & matching models](https://github.com/etkecc/baibot/blob/main/docs/features.md#mixing--matching-models) is made possible by the bot's ability to have different [🤝 handlers](https://github.com/etkecc/baibot/blob/main/docs/configuration/handlers.md) configured for different purposes.
|
||||||
|
|
||||||
|
This configuration can be done as a global fallback, or per-room. Both of these [🛠️ configurations](https://github.com/etkecc/baibot/blob/main/docs/configuration/README.md) are managed at runtime (viat chat), but **the global configuration can have some initial defaults configured via Ansible**.
|
||||||
|
|
||||||
|
You can configure the **initial values** for these via Ansible, via the `matrix_bot_baibot_config_initial_global_config_handler_*` variables.
|
||||||
|
|
||||||
|
Example **additional** `vars.yml` configuration:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Note: these are initial defaults for the bot's global configuration.
|
||||||
|
# As such, changing any of these values subsequently has no effect on the bot's behavior.
|
||||||
|
# Once initially configured, the global configuration is managed via bot commands, not via Ansible.
|
||||||
|
|
||||||
|
matrix_bot_baibot_config_initial_global_config_handler_catch_all: static/openai
|
||||||
|
|
||||||
|
# In this example, there's no need to define any of these below.
|
||||||
|
# Configuring the catch-all purpose handler is enough.
|
||||||
|
matrix_bot_baibot_config_initial_global_config_handler_text_generation: null
|
||||||
|
matrix_bot_baibot_config_initial_global_config_handler_text_to_speech: null
|
||||||
|
matrix_bot_baibot_config_initial_global_config_handler_speech_to_text: null
|
||||||
|
matrix_bot_baibot_config_initial_global_config_handler_image_generation: null
|
||||||
|
```
|
||||||
|
|
||||||
|
**Note**: these are initial defaults for the bot's global configuration. As such, changing any of these values subsequently has no effect on the bot's behavior. **Once initially configured the global configuration cannot be managed Ansible**, but only via bot commands.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
- If you change the bot password (`matrix_bot_baibot_config_user_password` in your `vars.yml` file) subsequently, the bot user's credentials on the homeserver won't be updated automatically. If you'd like to change the bot user's password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_bot_baibot_config_user_password` to let the bot know its new password.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
To use the bot, invite it to any existing Matrix room (`/invite @baibot:example.com` where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
|
If you're an allowed bot [👥 user](https://github.com/etkecc/baibot/blob/main/docs/access.md#user) (see [👥 Initial users configuration](#-initial-users-configuration)), the bot will accept your invitation and join the room.
|
||||||
|
|
||||||
|
After joining, the bot will introduce itself and show information about the [✨ features](https://github.com/etkecc/baibot/blob/main/docs/features.md) that are enabled for it.
|
||||||
|
|
||||||
|
If you've [🤖 configured one or more agents via Ansible](#-configuring-agents-via-ansible) and have [🤝 configured initial default handlers](#configuring-initial-default-handlers), the bot will immediately be able to make use of these agents for this new room. Otherwise, you will need to configure agents and/or handlers via chat commands.
|
||||||
|
|
||||||
|
Send `!bai help` to the bot in the room to see the available commands.
|
||||||
|
|
||||||
|
You can also refer to the upstream [baibot](https://github.com/etkecc/baibot) project's documentation.
|
||||||
|
|
||||||
|
## Debugging
|
||||||
|
|
||||||
|
As with all other services, you can find service logs in [systemd-journald](https://www.freedesktop.org/software/systemd/man/systemd-journald.service.html) by running something like `journalctl -fu matrix-bot-baibot`
|
||||||
|
|
||||||
|
The default logging level for this service is `info`, but you can increase it to `debug` (or even `trace`) with the following additional configuration:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Adjust the bot's own logging level.
|
||||||
|
matrix_bot_baibot_config_logging_level_baibot: debug
|
||||||
|
|
||||||
|
# Adjust the logging level for the mxlink bot library used by the bot.
|
||||||
|
matrix_bot_baibot_config_logging_level_mxlink: debug
|
||||||
|
|
||||||
|
# Adjust the logging level for other libraries used by the bot.
|
||||||
|
# Having this set to a value other than "warn" can be very noisy.
|
||||||
|
matrix_bot_baibot_config_logging_level_other_libs: debug
|
||||||
|
```
|
||||||
|
|
||||||
|
**Alternatively**, you can use a single variable to set the logging level for all of the above (bot + all libraries):
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_bot_baibot_config_logging: debug
|
||||||
|
```
|
@ -1,38 +1,12 @@
|
|||||||
# Setting up Buscarron (optional)
|
# Setting up Buscarron (optional)
|
||||||
|
|
||||||
The playbook can install and configure [buscarron](https://gitlab.com/etke.cc/buscarron) for you.
|
The playbook can install and configure [Buscarron](https://github.com/etkecc/buscarron) for you.
|
||||||
|
|
||||||
Buscarron is bot that receives HTTP POST submissions of web forms and forwards them to a Matrix room.
|
Buscarron is bot that receives HTTP POST submissions of web forms and forwards them to a Matrix room.
|
||||||
|
|
||||||
|
|
||||||
## Decide on a domain and path
|
|
||||||
|
|
||||||
By default, Buscarron is configured to use its own dedicated domain (`buscarron.DOMAIN`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
|
||||||
|
|
||||||
You can override the domain and path like this:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
# Switch to the domain used for Matrix services (`matrix.DOMAIN`),
|
|
||||||
# so we won't need to add additional DNS records for Buscarron.
|
|
||||||
matrix_bot_buscarron_hostname: "{{ matrix_server_fqn_matrix }}"
|
|
||||||
|
|
||||||
# Expose under the /buscarron subpath
|
|
||||||
matrix_bot_buscarron_path_prefix: /buscarron
|
|
||||||
```
|
|
||||||
|
|
||||||
**NOTE**: When using `matrix-nginx-proxy` instead of Traefik, you won't be able to override the path prefix. You can only override the domain, but that needs to happen using another variable: `matrix_server_fqn_buscarron` (e.g. `matrix_server_fqn_buscarron: "form.{{ matrix_domain }}"`).
|
|
||||||
|
|
||||||
|
|
||||||
## Adjusting DNS records
|
|
||||||
|
|
||||||
Once you've decided on the domain and path, **you may need to adjust your DNS** records to point the Buscarron domain to the Matrix server.
|
|
||||||
|
|
||||||
If you've decided to reuse the `matrix.` domain, you won't need to do any extra DNS configuration.
|
|
||||||
|
|
||||||
|
|
||||||
## Adjusting the playbook configuration
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file:
|
To enable the bot, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_bot_buscarron_enabled: true
|
matrix_bot_buscarron_enabled: true
|
||||||
@ -40,14 +14,14 @@ matrix_bot_buscarron_enabled: true
|
|||||||
# Uncomment and adjust this part if you'd like to use a username different than the default
|
# Uncomment and adjust this part if you'd like to use a username different than the default
|
||||||
# matrix_bot_buscarron_login: bot.buscarron
|
# matrix_bot_buscarron_login: bot.buscarron
|
||||||
|
|
||||||
# Generate a strong password here. Consider generating it with `pwgen -s 64 1`
|
# Generate a strong password for the bot. You can create one with a command like `pwgen -s 64 1`.
|
||||||
matrix_bot_buscarron_password: PASSWORD_FOR_THE_BOT
|
matrix_bot_buscarron_password: PASSWORD_FOR_THE_BOT
|
||||||
|
|
||||||
# Adjust accepted forms
|
# Adjust accepted forms
|
||||||
matrix_bot_buscarron_forms:
|
matrix_bot_buscarron_forms:
|
||||||
- name: contact # (mandatory) Your form name, will be used as endpoint, eg: buscarron.DOMAIN/contact
|
- name: contact # (mandatory) Your form name, will be used as endpoint, eg: buscarron.example.com/contact
|
||||||
room: "!yourRoomID:DOMAIN" # (mandatory) Room ID where form submission will be posted
|
room: "!qporfwt:{{ matrix_domain }}" # (mandatory) Room ID where form submission will be posted
|
||||||
redirect: https://DOMAIN # (mandatory) To what page user will be redirected after the form submission
|
redirect: https://example.com # (mandatory) To what page user will be redirected after the form submission
|
||||||
ratelimit: 1r/m # (optional) rate limit of the form, format: <max requests>r/<interval:s,m>, eg: 1r/s or 54r/m
|
ratelimit: 1r/m # (optional) rate limit of the form, format: <max requests>r/<interval:s,m>, eg: 1r/s or 54r/m
|
||||||
hasemail: 1 # (optional) form has "email" field that should be validated
|
hasemail: 1 # (optional) form has "email" field that should be validated
|
||||||
extensions: [] # (optional) list of form extensions (not used yet)
|
extensions: [] # (optional) list of form extensions (not used yet)
|
||||||
@ -55,38 +29,70 @@ matrix_bot_buscarron_forms:
|
|||||||
matrix_bot_buscarron_spamlist: [] # (optional) list of emails/domains/hosts (with wildcards support) that should be rejected automatically
|
matrix_bot_buscarron_spamlist: [] # (optional) list of emails/domains/hosts (with wildcards support) that should be rejected automatically
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Adjusting the Buscarron URL
|
||||||
|
|
||||||
|
By default, this playbook installs Buscarron on the `buscarron.` subdomain (`buscarron.example.com`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
||||||
|
|
||||||
|
By tweaking the `matrix_bot_buscarron_hostname` and `matrix_bot_buscarron_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Switch to the domain used for Matrix services (`matrix.example.com`),
|
||||||
|
# so we won't need to add additional DNS records for Buscarron.
|
||||||
|
matrix_bot_buscarron_hostname: "{{ matrix_server_fqn_matrix }}"
|
||||||
|
|
||||||
|
# Expose under the /buscarron subpath
|
||||||
|
matrix_bot_buscarron_path_prefix: /buscarron
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
Once you've decided on the domain and path, **you may need to adjust your DNS** records to point the Buscarron domain to the Matrix server.
|
||||||
|
|
||||||
|
By default, you will need to create a CNAME record for `buscarron`. See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to reuse the `matrix.` domain, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
## Installing
|
## Installing
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command again:
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
```sh
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
```
|
```
|
||||||
|
|
||||||
**Notes**:
|
**Notes**:
|
||||||
|
|
||||||
- the `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
- if you change the bot password (`matrix_bot_buscarron_password` in your `vars.yml` file) subsequently, the bot user's credentials on the homeserver won't be updated automatically. If you'd like to change the bot user's password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_bot_buscarron_password` to let the bot know its new password
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
- If you change the bot password (`matrix_bot_buscarron_password` in your `vars.yml` file) subsequently, the bot user's credentials on the homeserver won't be updated automatically. If you'd like to change the bot user's password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_bot_buscarron_password` to let the bot know its new password.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
To use the bot, invite the `@bot.buscarron:DOMAIN` to the room you specified in a config, after that any point your form to the form url, example for the `contact` form:
|
To use the bot, invite it to the room you specified on your `vars.yml` file (`/invite @bot.buscarron:example.com` where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
|
After the bot joins the room, anyone can call the web form via HTTP POST method.
|
||||||
|
|
||||||
|
Here is an example for the `contact` form:
|
||||||
|
|
||||||
```html
|
```html
|
||||||
<form method="POST" action="https://buscarron.DOMAIN/contact">
|
<form method="POST" action="https://buscarron.example.com/contact">
|
||||||
<!--your fields-->
|
<!--your fields-->
|
||||||
</form>
|
</form>
|
||||||
```
|
```
|
||||||
|
|
||||||
**NOTE**: to fight against spam, Buscarron is **very aggressive when it comes to banning** and will ban you if:
|
**Note**: to fight against spam, Buscarron is **very aggressive when it comes to banning** and will ban you if:
|
||||||
|
|
||||||
- if you hit the homepage (HTTP `GET` request to `/`)
|
- you hit the homepage (HTTP `GET` request to `/`)
|
||||||
- if you submit a form to the wrong URL (`POST` request to `/non-existing-form`)
|
- you submit a form to the wrong URL (`POST` request to `/non-existing-form`)
|
||||||
- if `hasemail` is enabled for the form (like in the example above) and you don't submit an `email` field
|
- `hasemail` is enabled for the form (like in the example above) and you don't submit an `email` field
|
||||||
|
|
||||||
If you get banned, you'd need to restart the process by running the playbook with `--tags=start` or running `systemctl restart matrix-bot-buscarron` on the server.
|
If you get banned, you'd need to restart the process by running the playbook with `--tags=start` or running `systemctl restart matrix-bot-buscarron` on the server.
|
||||||
|
|
||||||
You can also refer to the upstream [documentation](https://gitlab.com/etke.cc/buscarron).
|
You can also refer to the upstream [documentation](https://github.com/etkecc/buscarron).
|
||||||
|
@ -1,69 +1,77 @@
|
|||||||
# Setting up ChatGPT (optional)
|
# Setting up matrix-bot-chatgpt (optional, unmaintained)
|
||||||
|
|
||||||
|
**Note**: [matrix-chatgpt-bot](https://github.com/matrixgpt/matrix-chatgpt-bot) is now an archived (**unmaintained**) project. Talking to ChatGPT (and many other LLM providers) can happen via the much more featureful [baibot](https://github.com/etkecc/baibot), which can be installed using [this playbook](configuring-playbook-bot-baibot.md). Consider using that bot instead of this one.
|
||||||
|
|
||||||
The playbook can install and configure [matrix-chatgpt-bot](https://github.com/matrixgpt/matrix-chatgpt-bot) for you.
|
The playbook can install and configure [matrix-chatgpt-bot](https://github.com/matrixgpt/matrix-chatgpt-bot) for you.
|
||||||
|
|
||||||
Talk to [ChatGPT](https://openai.com/blog/chatgpt/) via your favourite Matrix client!
|
Talk to [ChatGPT](https://openai.com/blog/chatgpt/) via your favourite Matrix client!
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
## 1. Register the bot account
|
### Obtain an OpenAI API key
|
||||||
|
|
||||||
The playbook does not automatically create users for you. The bot requires an access token to be able to connect to your homeserver.
|
To use the bot, you'd need to obtain an API key from [https://platform.openai.com/account/api-keys](https://platform.openai.com/account/api-keys).
|
||||||
|
|
||||||
You **need to register the bot user manually** before setting up the bot.
|
### Register the bot account
|
||||||
|
|
||||||
Choose a strong password for the bot. You can generate a good password with a command like this: `pwgen -s 64 1`.
|
The playbook does not automatically create users for you. You **need to register the bot user manually** before setting up the bot.
|
||||||
|
|
||||||
|
Generate a strong password for the bot. You can create one with a command like `pwgen -s 64 1`.
|
||||||
|
|
||||||
You can use the playbook to [register a new user](registering-users.md):
|
You can use the playbook to [register a new user](registering-users.md):
|
||||||
|
|
||||||
```
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml --extra-vars='username=bot.chatgpt password=PASSWORD_FOR_THE_BOT admin=no' --tags=register-user
|
ansible-playbook -i inventory/hosts setup.yml --extra-vars='username=bot.chatgpt password=PASSWORD_FOR_THE_BOT admin=no' --tags=register-user
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Obtain an access token and create encryption keys
|
||||||
|
|
||||||
## 2. Get an access token and create encryption keys
|
The bot requires an access token to be able to connect to your homeserver. Refer to the documentation on [how to obtain an access token](obtaining-access-tokens.md).
|
||||||
|
|
||||||
Refer to the documentation on [how to obtain an access token](obtaining-access-tokens.md).
|
⚠️ **Warning**: Access tokens are sensitive information. Do not include them in any bug reports, messages, or logs. Do not share the access token with anyone.
|
||||||
|
|
||||||
To make sure the bot can read encrypted messages, it will need an encryption key, just like any other new user. While obtaining the access token, follow the prompts to setup a backup key. More information can be found in the [element documentation](https://element.io/help#encryption6).
|
To make sure the bot can read encrypted messages, it will need an encryption key, just like any other new user. While obtaining the access token, follow the prompts to setup a backup key. More information can be found in the [Element documentation](https://element.io/help#encryption6).
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
## 3. Adjusting the playbook configuration
|
To enable the bot, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file. Make sure to replace `API_KEY_HERE` with the API key retrieved [here](#obtain-an-openai-api-key) and `ACCESS_TOKEN_HERE` with the access token created [here](#obtain-an-access-token-and-create-encryption-keys), respectively.
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file (adapt to your needs):
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_bot_chatgpt_enabled: true
|
matrix_bot_chatgpt_enabled: true
|
||||||
|
|
||||||
# Obtain a new API key from https://platform.openai.com/account/api-keys
|
matrix_bot_chatgpt_openai_api_key: 'API_KEY_HERE'
|
||||||
matrix_bot_chatgpt_openai_api_key: ''
|
|
||||||
|
|
||||||
# This is the default username
|
# Uncomment and adjust this part if you'd like to use a username different than the default
|
||||||
# matrix_bot_chatgpt_matrix_bot_username_localpart: 'bot.chatgpt'
|
# matrix_bot_chatgpt_matrix_bot_username_localpart: 'bot.chatgpt'
|
||||||
|
|
||||||
# Matrix access token (from bot user above)
|
matrix_bot_chatgpt_matrix_access_token: 'ACCESS_TOKEN_HERE'
|
||||||
# see: https://webapps.stackexchange.com/questions/131056/how-to-get-an-access-token-for-element-riot-matrix
|
|
||||||
matrix_bot_chatgpt_matrix_access_token: ''
|
|
||||||
|
|
||||||
# Configuring the system promt used, needed if the bot is used for special tasks.
|
# Configuring the system promt used, needed if the bot is used for special tasks.
|
||||||
# More information: https://github.com/mustvlad/ChatGPT-System-Prompts
|
# More information: https://github.com/mustvlad/ChatGPT-System-Prompts
|
||||||
matrix_bot_chatgpt_matrix_bot_prompt_prefix: 'Instructions:\nYou are ChatGPT, a large language model trained by OpenAI.'
|
matrix_bot_chatgpt_matrix_bot_prompt_prefix: 'Instructions:\nYou are ChatGPT, a large language model trained by OpenAI.'
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
You will need to get tokens for ChatGPT.
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
## 4. Installing
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command again:
|
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=install-all,start
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
```
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
To use the bot, invite the `@bot.chatgpt:DOMAIN` to the room you specified in a config, after that start speaking to it, use the prefix if you configured one or mention the bot.
|
To use the bot, invite it to the room you specified on your `vars.yml` file (`/invite @bot.chatgpt:example.com` where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
|
After the bot joins the room, you can send a message to it. When you do so, use the prefix if you configured it or mention the bot.
|
||||||
|
|
||||||
You can also refer to the upstream [documentation](https://github.com/matrixgpt/matrix-chatgpt-bot).
|
You can also refer to the upstream [documentation](https://github.com/matrixgpt/matrix-chatgpt-bot).
|
||||||
|
@ -1,87 +1,143 @@
|
|||||||
# Setting up draupnir (optional)
|
# Setting up Draupnir (optional)
|
||||||
|
|
||||||
The playbook can install and configure the [draupnir](https://github.com/the-draupnir-project/Draupnir) moderation bot for you.
|
The playbook can install and configure the [Draupnir](https://github.com/the-draupnir-project/Draupnir) moderation bot for you.
|
||||||
|
|
||||||
See the project's [documentation](https://github.com/the-draupnir-project/Draupnir) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/the-draupnir-project/Draupnir/blob/main/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
If your migrating from Mjolnir skip to step 5b.
|
This documentation page is about installing Draupnir in bot mode. As an alternative, you can run a multi-instance Draupnir deployment by installing [Draupnir in appservice mode](./configuring-playbook-appservice-draupnir-for-all.md) (called Draupnir-for-all) instead.
|
||||||
|
|
||||||
## 1. Register the bot account
|
If your migrating from Mjolnir skip to [this section](#migrating-from-mjolnir-only-required-if-migrating).
|
||||||
|
|
||||||
The playbook does not automatically create users for you. The bot requires an access token to be able to connect to your homeserver.
|
## Prerequisites
|
||||||
|
|
||||||
You **need to register the bot user manually** before setting up the bot.
|
### Register the bot account
|
||||||
|
|
||||||
Choose a strong password for the bot. You can generate a good password with a command like this: `pwgen -s 64 1`.
|
The playbook does not automatically create users for you. You **need to register the bot user manually** before setting up the bot.
|
||||||
|
|
||||||
|
Generate a strong password for the bot. You can create one with a command like `pwgen -s 64 1`.
|
||||||
|
|
||||||
You can use the playbook to [register a new user](registering-users.md):
|
You can use the playbook to [register a new user](registering-users.md):
|
||||||
|
|
||||||
```
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml --extra-vars='username=bot.draupnir password=PASSWORD_FOR_THE_BOT admin=no' --tags=register-user
|
ansible-playbook -i inventory/hosts setup.yml --extra-vars='username=bot.draupnir password=PASSWORD_FOR_THE_BOT admin=no' --tags=register-user
|
||||||
```
|
```
|
||||||
|
|
||||||
If you would like draupnir to be able to deactivate users, move aliases, shutdown rooms, show abuse reports ([see below](#abuse-reports)), etc then it must be a server admin so you need to change `admin=no` to `admin=yes` in the command above.
|
If you would like Draupnir to be able to deactivate users, move aliases, shutdown rooms, show abuse reports (see [below](#abuse-reports)), etc then it must be a server admin so you need to change `admin=no` to `admin=yes` in the command above.
|
||||||
|
|
||||||
|
### Obtain an access token
|
||||||
|
|
||||||
## 2. Get an access token
|
The bot requires an access token to be able to connect to your homeserver. Refer to the documentation on [how to obtain an access token](obtaining-access-tokens.md).
|
||||||
|
|
||||||
Refer to the documentation on [how to obtain an access token](obtaining-access-tokens.md).
|
⚠️ **Warning**: Access tokens are sensitive information. Do not include them in any bug reports, messages, or logs. Do not share the access token with anyone.
|
||||||
|
|
||||||
|
### Make sure the account is free from rate limiting
|
||||||
|
|
||||||
## 3. Make sure the account is free from rate limiting
|
If your homeserver's implementation is Synapse, you will need to prevent it from rate limiting the bot's account. **This is a required step. If you do not configure it, Draupnir will crash.**
|
||||||
|
|
||||||
You will need to prevent Synapse from rate limiting the bot's account. This is not an optional step. If you do not do this step draupnir will crash. This can be done using Synapse's [admin API](https://matrix-org.github.io/synapse/latest/admin_api/user_admin_api.html#override-ratelimiting-for-users). Please ask for help if you are uncomfortable with these steps or run into issues.
|
This can be done using Synapse's [Admin APIs](https://element-hq.github.io/synapse/latest/admin_api/user_admin_api.html#override-ratelimiting-for-users). They can be accessed both externally and internally.
|
||||||
|
|
||||||
If your Synapse Admin API is exposed to the internet for some reason like running the Synapse Admin Role [Link](/docs/configuring-playbook-synapse-admin.md) or running `matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_admin_api_enabled: true` in your playbook config. If your API is not externally exposed you should still be able to on the local host for your synapse run these commands.
|
To expose the APIs publicly, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file.
|
||||||
|
|
||||||
The following command works on semi up to date Windows 10 installs and All Windows 11 installations and other systems that ship curl. `curl --header "Authorization: Bearer <access_token>" -X POST https://matrix.example.com/_synapse/admin/v1/users/@example:example.com/override_ratelimit` Replace `@example:example.com` with the MXID of your Draupnir and example.com with your homeserver domain. You can easily obtain an access token for a homeserver admin account the same way you can obtain an access token for Draupnir it self. If you made Draupnir Admin you can just use the Draupnir token.
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## 4. Create a management room
|
|
||||||
|
|
||||||
Using your own account, create a new invite only room that you will use to manage the bot. This is the room where you will see the status of the bot and where you will send commands to the bot, such as the command to ban a user from another room. Anyone in this room can control the bot so it is important that you only invite trusted users to this room. The room must be unencrypted since the playbook does not support installing Pantalaimon yet.
|
|
||||||
|
|
||||||
Once you have created the room you need to copy the room ID so you can tell the bot to use that room. In Element you can do this by going to the room's settings, clicking Advanced, and then coping the internal room ID. The room ID will look something like `!QvgVuKq0ha8glOLGMG:DOMAIN`.
|
|
||||||
|
|
||||||
Finally invite the `@bot.draupnir:DOMAIN` account you created earlier into the room.
|
|
||||||
|
|
||||||
|
|
||||||
## 5a. Adjusting the playbook configuration
|
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file (adapt to your needs):
|
|
||||||
|
|
||||||
You must replace `ACCESS_TOKEN_FROM_STEP_2_GOES_HERE` and `ROOM_ID_FROM_STEP_4_GOES_HERE` with the your own values.
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
|
matrix_synapse_container_labels_public_client_synapse_admin_api_enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
The APIs can also be accessed via [Synapse Admin](https://github.com/etkecc/synapse-admin), a web UI tool you can use to administrate users, rooms, media, etc. on your Matrix server. The playbook can install and configure Synapse Admin for you. For details about it, see [this page](configuring-playbook-synapse-admin.md).
|
||||||
|
|
||||||
|
**Note**: access to the APIs is restricted with a valid access token, so exposing them publicly should not be a real security concern. Still, doing so is not recommended for additional security. See [official Synapse reverse-proxying recommendations](https://element-hq.github.io/synapse/latest/reverse_proxy.html#synapse-administration-endpoints).
|
||||||
|
|
||||||
|
To discharge rate limiting, run the following command on systems that ship curl (note that it does not work on outdated Windows 10). Even if the APIs are not exposed to the internet, you should still be able to run the command on the homeserver locally. Before running it, make sure to replace `@bot.draupnir:example.com` with the MXID of your Draupnir:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
curl --header "Authorization: Bearer <access_token>" -X POST https://matrix.example.com/_synapse/admin/v1/users/@bot.draupnir:example.com/override_ratelimit
|
||||||
|
```
|
||||||
|
|
||||||
|
You can obtain an access token for a homeserver admin account in the same way as you can do so for Draupnir itself. If you have made Draupnir an admin, you can just use the Draupnir token.
|
||||||
|
|
||||||
|
### Create a management room
|
||||||
|
|
||||||
|
Using your own account, create a new invite only room that you will use to manage the bot. This is the room where you will see the status of the bot and where you will send commands to the bot, such as the command to ban a user from another room. Anyone in this room can control the bot so it is important that you only invite trusted users to this room.
|
||||||
|
|
||||||
|
If you make the management room encrypted (E2EE), then you MUST enable and use Pantalaimon (see [below](#configuration-with-e2ee-support)).
|
||||||
|
|
||||||
|
Once you have created the room you need to copy the room ID so you can tell the bot to use that room. In Element Web you can do this by going to the room's settings, clicking Advanced, and then copying the internal room ID. The room ID will look something like `!qporfwt:example.com`.
|
||||||
|
|
||||||
|
Finally invite the `@bot.draupnir:example.com` account you created earlier into the room.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bot, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file. Make sure to replace `MANAGEMENT_ROOM_ID_HERE`.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Enable Draupnir
|
||||||
matrix_bot_draupnir_enabled: true
|
matrix_bot_draupnir_enabled: true
|
||||||
|
|
||||||
matrix_bot_draupnir_access_token: "ACCESS_TOKEN_FROM_STEP_2_GOES_HERE"
|
matrix_bot_draupnir_management_room: "MANAGEMENT_ROOM_ID_HERE"
|
||||||
|
|
||||||
matrix_bot_draupnir_management_room: "ROOM_ID_FROM_STEP_4_GOES_HERE"
|
|
||||||
```
|
```
|
||||||
|
|
||||||
## 5b. Migrating from Mjolnir (Only required if migrating.)
|
### End-to-End Encryption support
|
||||||
|
|
||||||
Replace your `matrix_bot_mjolnir` config with `matrix_bot_draupnir` config. Also disable mjolnir if you're doing migration.
|
Decide whether you want Draupnir to be capable of operating in end-to-end encrypted (E2EE) rooms. This includes the management room and the moderated rooms.
|
||||||
That is all you need to do due to that Draupnir can complete migration on its own.
|
|
||||||
|
|
||||||
## 6. Installing
|
To support E2EE, Draupnir needs to [use Pantalaimon](configuring-playbook-pantalaimon.md).
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command:
|
#### Configuration with E2EE support
|
||||||
|
|
||||||
```
|
When using Pantalaimon, Draupnir will log in to its bot account itself through Pantalaimon, so configure its username and password.
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
|
||||||
|
Add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file (adapt to your needs):
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Enable Pantalaimon. See docs/configuring-playbook-pantalaimon.md
|
||||||
|
matrix_pantalaimon_enabled: true
|
||||||
|
|
||||||
|
# Tell Draupnir to use Pantalaimon
|
||||||
|
matrix_bot_draupnir_pantalaimon_use: true
|
||||||
|
|
||||||
|
# User name and password for the bot you have created above. Required when using Pantalaimon.
|
||||||
|
matrix_bot_draupnir_pantalaimon_username: "bot.draupnir"
|
||||||
|
matrix_bot_draupnir_pantalaimon_password: "PASSWORD_FOR_THE_BOT"
|
||||||
```
|
```
|
||||||
|
|
||||||
|
The playbook's `group_vars` will configure other required settings. If using this role separately without the playbook, you also need to configure the two URLs that Draupnir uses to reach the homeserver, one through Pantalaimon and one "raw". This example is taken from the playbook's `group_vars`:
|
||||||
|
|
||||||
## Usage
|
```yaml
|
||||||
|
# Endpoint URL that Draupnir uses to interact with the Matrix homeserver (client-server API).
|
||||||
|
# Set this to the pantalaimon URL if you're using that.
|
||||||
|
matrix_bot_draupnir_homeserver_url: "{{ 'http://matrix-pantalaimon:8009' if matrix_bot_draupnir_pantalaimon_use else matrix_addons_homeserver_client_api_url }}"
|
||||||
|
|
||||||
You can refer to the upstream [documentation](https://github.com/the-draupnir-project/Draupnir) for additional ways to use and configure draupnir. Check out their [quickstart guide](https://github.com/the-draupnir-project/Draupnir/blob/main/docs/moderators.md#quick-usage) for some basic commands you can give to the bot.
|
# Endpoint URL that Draupnir could use to fetch events related to reports (client-server API and /_synapse/),
|
||||||
|
# only set this to the public-internet homeserver client API URL, do NOT set this to the pantalaimon URL.
|
||||||
|
matrix_bot_draupnir_raw_homeserver_url: "{{ matrix_addons_homeserver_client_api_url }}"
|
||||||
|
```
|
||||||
|
|
||||||
You can configure additional options by adding the `matrix_bot_draupnir_configuration_extension_yaml` variable to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file.
|
#### Configuration without E2EE support
|
||||||
|
|
||||||
For example to change draupnir's `recordIgnoredInvites` option to `true` you would add the following to your `vars.yml` file.
|
When NOT using Pantalaimon, Draupnir does not log in by itself and you must give it an access token for its bot account.
|
||||||
|
|
||||||
|
Add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file. Make sure to replace `ACCESS_TOKEN_HERE` with the one created [above](#obtain-an-access-token).
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_bot_draupnir_access_token: "ACCESS_TOKEN_HERE"
|
||||||
|
```
|
||||||
|
|
||||||
|
### Abuse Reports
|
||||||
|
|
||||||
|
Draupnir supports two methods to receive reports in the management room.
|
||||||
|
|
||||||
|
The first method intercepts the report API endpoint of the client-server API, which requires integration with the reverse proxy in front of the homeserver. If you are using traefik, this playbook can set this up for you:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_bot_draupnir_abuse_reporting_enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
The other method polls an Synapse Admin API endpoint, hence it is available only if using Synapse and if the Draupnir user is an admin (see [above](#register-the-bot-account)). To enable it, set `pollReports: true` on `vars.yml` file as below.
|
||||||
|
|
||||||
|
### Extending the configuration
|
||||||
|
|
||||||
|
You can configure additional options by adding the `matrix_bot_draupnir_configuration_extension_yaml` variable.
|
||||||
|
|
||||||
|
For example, to change Draupnir's `pollReports` option to `true`, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_bot_draupnir_configuration_extension_yaml: |
|
matrix_bot_draupnir_configuration_extension_yaml: |
|
||||||
@ -92,19 +148,98 @@ matrix_bot_draupnir_configuration_extension_yaml: |
|
|||||||
#
|
#
|
||||||
# If you need something more special, you can take full control by
|
# If you need something more special, you can take full control by
|
||||||
# completely redefining `matrix_bot_draupnir_configuration_yaml`.
|
# completely redefining `matrix_bot_draupnir_configuration_yaml`.
|
||||||
recordIgnoredInvites: true
|
|
||||||
```
|
|
||||||
|
|
||||||
## Abuse Reports
|
|
||||||
|
|
||||||
Draupnir supports two methods to receive reports in the management room.
|
|
||||||
|
|
||||||
The first method intercepts the report API endpoint of the client-server API, which requires integration with the reverse proxy in front of the homeserver.
|
|
||||||
While this playbook uses reverse proxies, it does not yet implement this.
|
|
||||||
|
|
||||||
The other method polls an synapse admin API endpoint and is hence only available when using synapse and when the Draupnir user is an admin user (see step 1).
|
|
||||||
To enable it, set `pollReports: true` in Draupnir's config:
|
|
||||||
```yaml
|
|
||||||
matrix_bot_draupnir_configuration_extension_yaml: |
|
|
||||||
pollReports: true
|
pollReports: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Migrating from Mjolnir (Only required if migrating)
|
||||||
|
|
||||||
|
Replace your `matrix_bot_mjolnir` config with `matrix_bot_draupnir` config. Also disable Mjolnir if you're doing migration.
|
||||||
|
|
||||||
|
That is all you need to do due to that Draupnir can complete migration on its own.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
- If you change the Pantalaimon's password (`matrix_bot_draupnir_pantalaimon_password` in your `vars.yml` file) subsequently, its credentials on the homeserver won't be updated automatically. If you'd like to change the password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_bot_draupnir_pantalaimon_password` to let Pantalaimon know its new password.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
You can refer to the upstream [documentation](https://the-draupnir-project.github.io/draupnir-documentation/) for additional ways to use and configure Draupnir and for a more detailed usage guide.
|
||||||
|
|
||||||
|
Below is a **non-exhaustive quick-start guide** for the impatient.
|
||||||
|
|
||||||
|
### Making Draupnir join and protect a room
|
||||||
|
|
||||||
|
Draupnir can be told to self-join public rooms, but it's better to follow this flow which works well for all kinds of rooms:
|
||||||
|
|
||||||
|
1. Invite the bot to the room manually ([inviting Draupnir to rooms](https://the-draupnir-project.github.io/draupnir-documentation/moderator/managing-protected-rooms#inviting-draupnir-to-rooms)). Before joining, the bot *may* ask for confirmation in the Management Room
|
||||||
|
|
||||||
|
2. [Give the bot permissions to do its job](#giving-draupnir-permissions-to-do-its-job)
|
||||||
|
|
||||||
|
3. Tell it to protect the room (using the [rooms command](https://the-draupnir-project.github.io/draupnir-documentation/moderator/managing-protected-rooms#using-the-draupnir-rooms-command)) by sending the following command to the Management Room: `!draupnir rooms add !qporfwt:example.com`
|
||||||
|
|
||||||
|
To have Draupnir provide useful room protection, you need do to a bit more work (at least the first time around). You may wish to [Subscribe to a public policy list](#subscribing-to-a-public-policy-list), [Create your own own policy and rules](#creating-your-own-policy-lists-and-rules) and [Enabling built-in protections](#enabling-built-in-protections).
|
||||||
|
|
||||||
|
### Giving Draupnir permissions to do its job
|
||||||
|
|
||||||
|
For Draupnir to do its job, you need to [give it permissions](https://the-draupnir-project.github.io/draupnir-documentation/moderator/managing-protected-rooms#giving-draupnir-permissions) in rooms it's protecting. This involves **giving it an Administrator power level**.
|
||||||
|
|
||||||
|
**We recommend setting this power level as soon as the bot joins your room** (and before you create new rules), so that it can apply rules as soon as they are available. If the bot is under-privileged, it may fail to apply protections and may not retry for a while (or until your restart it).
|
||||||
|
|
||||||
|
### Subscribing to a public policy list
|
||||||
|
|
||||||
|
We recommend **subscribing to a public [policy list](https://the-draupnir-project.github.io/draupnir-documentation/concepts/policy-lists)** using the [watch command](https://the-draupnir-project.github.io/draupnir-documentation/moderator/managing-policy-lists#using-draupnirs-watch-command-to-subscribe-to-policy-rooms).
|
||||||
|
|
||||||
|
Polcy lists are maintained in Matrix rooms. A popular policy list is maintained in the public `#community-moderation-effort-bl:neko.dev` room.
|
||||||
|
|
||||||
|
You can tell Draupnir to subscribe to it by sending the following command to the Management Room: `!draupnir watch #community-moderation-effort-bl:neko.dev`
|
||||||
|
|
||||||
|
#### Creating your own policy lists and rules
|
||||||
|
|
||||||
|
We also recommend **creating your own policy lists** with the [list create](https://the-draupnir-project.github.io/draupnir-documentation/moderator/managing-policy-lists#using-draupnirs-list-create-command-to-create-a-policy-room) command.
|
||||||
|
|
||||||
|
You can do so by sending the following command to the Management Room: `!draupnir list create my-bans my-bans-bl`. This will create a policy list having a name (shortcode) of `my-bans` and stored in a public `#my-bans-bl:example.com` room on your server. As soon as you run this command, the bot will invite you to the policy list room.
|
||||||
|
|
||||||
|
A policy list does nothing by itself, so the next step is **adding some rules to your policy list**. Policies target a so-called `entity` (one of: `user`, `room` or `server`). These entities are mentioned on the [policy lists](https://the-draupnir-project.github.io/draupnir-documentation/concepts/policy-lists) documentation page and in the Matrix Spec [here](https://spec.matrix.org/v1.11/client-server-api/#mban-recommendation).
|
||||||
|
|
||||||
|
The simplest and most useful entity to target is `user`. Below are a few examples using the [ban command](https://the-draupnir-project.github.io/draupnir-documentation/moderator/managing-users#the-ban-command) and targeting users.
|
||||||
|
|
||||||
|
To create rules, you run commands in the Management Room (**not** in the policy list room).
|
||||||
|
|
||||||
|
- (ban a single user on a given homeserver): `!draupnir ban @charles:example.com my-bans Rude to others`
|
||||||
|
- (ban all users on a given homeserver by using a [wildcard](https://the-draupnir-project.github.io/draupnir-documentation/moderator/managing-users#wildcards)): `!draupnir ban @*:example.org my-bans Spam server - all users are fake`
|
||||||
|
|
||||||
|
As a result of running these commands, you may observe:
|
||||||
|
|
||||||
|
- Draupnir creating `m.policy.rule.user` state events in the `#my-bans-bl:example.com` room on your server
|
||||||
|
- applying these rules against all rooms that Draupnir is an Administrator in
|
||||||
|
|
||||||
|
You can undo bans with the [unban command](https://the-draupnir-project.github.io/draupnir-documentation/moderator/managing-users#the-unban-command).
|
||||||
|
|
||||||
|
### Enabling built-in protections
|
||||||
|
|
||||||
|
You can also **turn on various built-in [protections](https://the-draupnir-project.github.io/draupnir-documentation/protections)** like `JoinWaveShortCircuit` ("If X amount of users join in Y time, set the room to invite-only").
|
||||||
|
|
||||||
|
To **see which protections are available and which are enabled**, send a `!draupnir protections` command to the Management Room.
|
||||||
|
|
||||||
|
To **see the configuration options for a given protection**, send a `!draupnir config get PROTECTION_NAME` (e.g. `!draupnir config get JoinWaveShortCircuit`).
|
||||||
|
|
||||||
|
To **set a specific option for a given protection**, send a command like this: `!draupnir config set PROTECTION_NAME.OPTION VALUE` (e.g. `!draupnir config set JoinWaveShortCircuit.timescaleMinutes 30`).
|
||||||
|
|
||||||
|
To **enable a given protection**, send a command like this: `!draupnir enable PROTECTION_NAME` (e.g. `!draupnir enable JoinWaveShortCircuit`).
|
||||||
|
|
||||||
|
To **disable a given protection**, send a command like this: `!draupnir disable PROTECTION_NAME` (e.g. `!draupnir disable JoinWaveShortCircuit`).
|
||||||
|
@ -1,57 +1,36 @@
|
|||||||
# Setting up Go-NEB (optional)
|
# Setting up Go-NEB (optional, unmaintained)
|
||||||
|
|
||||||
|
**Note**: [Go-NEB](https://github.com/matrix-org/go-neb) is now an archived (**unmaintained**) project. We recommend not bothering with installing it. While not a 1:1 replacement, the bridge's author suggests taking a look at [matrix-hookshot](https://github.com/matrix-org/matrix-hookshot) as a replacement, which can also be installed using [this playbook](configuring-playbook-bridge-hookshot.md). Consider using that bot instead of this one.
|
||||||
|
|
||||||
The playbook can install and configure [Go-NEB](https://github.com/matrix-org/go-neb) for you.
|
The playbook can install and configure [Go-NEB](https://github.com/matrix-org/go-neb) for you.
|
||||||
|
|
||||||
Go-NEB is a Matrix bot written in Go. It is the successor to Matrix-NEB, the original Matrix bot written in Python.
|
Go-NEB is a Matrix bot written in Go. It is the successor to Matrix-NEB, the original Matrix bot written in Python.
|
||||||
|
|
||||||
See the project's [documentation](https://github.com/matrix-org/go-neb) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/matrix-org/go-neb/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
## Registering the bot user
|
### Register the bot account
|
||||||
|
|
||||||
The playbook does not automatically create users for you. The bot requires at least 1 access token to be able to connect to your homeserver.
|
The playbook does not automatically create users for you. You **need to register the bot user manually** before setting up the bot.
|
||||||
|
|
||||||
You **need to register the bot user manually** before setting up the bot.
|
Generate a strong password for the bot. You can create one with a command like `pwgen -s 64 1`.
|
||||||
|
|
||||||
Choose a strong password for the bot. You can generate a good password with a command like this: `pwgen -s 64 1`.
|
|
||||||
|
|
||||||
You can use the playbook to [register a new user](registering-users.md):
|
You can use the playbook to [register a new user](registering-users.md):
|
||||||
|
|
||||||
```
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml --extra-vars='username=bot.go-neb password=PASSWORD_FOR_THE_BOT admin=no' --tags=register-user
|
ansible-playbook -i inventory/hosts setup.yml --extra-vars='username=bot.go-neb password=PASSWORD_FOR_THE_BOT admin=no' --tags=register-user
|
||||||
```
|
```
|
||||||
|
|
||||||
Once the user is created you can [obtain an access token](obtaining-access-tokens.md).
|
### Obtain an access token
|
||||||
|
|
||||||
|
The bot requires an access token to be able to connect to your homeserver. Refer to the documentation on [how to obtain an access token](obtaining-access-tokens.md).
|
||||||
|
|
||||||
## Decide on a domain and path
|
⚠️ **Warning**: Access tokens are sensitive information. Do not include them in any bug reports, messages, or logs. Do not share the access token with anyone.
|
||||||
|
|
||||||
By default, Go-NEB is configured to use its own dedicated domain (`goneb.DOMAIN`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
|
||||||
|
|
||||||
You can override the domain and path like this:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
# Switch to the domain used for Matrix services (`matrix.DOMAIN`),
|
|
||||||
# so we won't need to add additional DNS records for Go-NEB.
|
|
||||||
matrix_bot_go_neb_hostname: "{{ matrix_server_fqn_matrix }}"
|
|
||||||
|
|
||||||
# Expose under the /go-neb subpath
|
|
||||||
matrix_bot_go_neb_path_prefix: /go-neb
|
|
||||||
```
|
|
||||||
|
|
||||||
**NOTE**: When using `matrix-nginx-proxy` instead of Traefik, you won't be able to override the path prefix. You can only override the domain, but that needs to happen using another variable: `matrix_server_fqn_go_neb` (e.g. `matrix_server_fqn_go_neb: "mybot.{{ matrix_domain }}"`).
|
|
||||||
|
|
||||||
|
|
||||||
## Adjusting DNS records
|
|
||||||
|
|
||||||
Once you've decided on the domain and path, **you may need to adjust your DNS** records to point the Go-NEB domain to the Matrix server.
|
|
||||||
|
|
||||||
If you've decided to reuse the `matrix.` domain, you won't need to do any extra DNS configuration.
|
|
||||||
|
|
||||||
|
|
||||||
## Adjusting the playbook configuration
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file (adapt to your needs):
|
To enable the bot, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file. Make sure to replace `ACCESS_TOKEN_FOR_GONEB_HERE` and `ACCESS_TOKEN_FOR_ANOTHER_GONEB_HERE` with the ones created [above](#obtain-an-access-token).
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_bot_go_neb_enabled: true
|
matrix_bot_go_neb_enabled: true
|
||||||
@ -60,18 +39,18 @@ matrix_bot_go_neb_enabled: true
|
|||||||
# Use the access token you obtained in the step above.
|
# Use the access token you obtained in the step above.
|
||||||
matrix_bot_go_neb_clients:
|
matrix_bot_go_neb_clients:
|
||||||
- UserID: "@goneb:{{ matrix_domain }}"
|
- UserID: "@goneb:{{ matrix_domain }}"
|
||||||
AccessToken: "MDASDASJDIASDJASDAFGFRGER"
|
AccessToken: "ACCESS_TOKEN_FOR_GONEB_HERE"
|
||||||
DeviceID: "DEVICE1"
|
DeviceID: "DEVICE1"
|
||||||
HomeserverURL: "{{ matrix_homeserver_container_url }}"
|
HomeserverURL: "{{ matrix_addons_homeserver_client_api_url }}"
|
||||||
Sync: true
|
Sync: true
|
||||||
AutoJoinRooms: true
|
AutoJoinRooms: true
|
||||||
DisplayName: "Go-NEB!"
|
DisplayName: "Go-NEB!"
|
||||||
AcceptVerificationFromUsers: [":{{ matrix_domain }}"]
|
AcceptVerificationFromUsers: [":{{ matrix_domain }}"]
|
||||||
|
|
||||||
- UserID: "@another_goneb:{{ matrix_domain }}"
|
- UserID: "@another_goneb:{{ matrix_domain }}"
|
||||||
AccessToken: "MDASDASJDIASDJASDAFGFRGER"
|
AccessToken: "ACCESS_TOKEN_FOR_ANOTHER_GONEB_HERE"
|
||||||
DeviceID: "DEVICE2"
|
DeviceID: "DEVICE2"
|
||||||
HomeserverURL: "{{ matrix_homeserver_container_url }}"
|
HomeserverURL: "{{ matrix_addons_homeserver_client_api_url }}"
|
||||||
Sync: false
|
Sync: false
|
||||||
AutoJoinRooms: false
|
AutoJoinRooms: false
|
||||||
DisplayName: "Go-NEB!"
|
DisplayName: "Go-NEB!"
|
||||||
@ -87,7 +66,7 @@ matrix_bot_go_neb_realms:
|
|||||||
matrix_bot_go_neb_sessions:
|
matrix_bot_go_neb_sessions:
|
||||||
- SessionID: "your_github_session"
|
- SessionID: "your_github_session"
|
||||||
RealmID: "github_realm"
|
RealmID: "github_realm"
|
||||||
UserID: "@YOUR_USER_ID:{{ matrix_domain }}" # This needs to be the username of the person that's allowed to use the !github commands
|
UserID: "@alice:{{ matrix_domain }}" # This needs to be the username of the person that's allowed to use the !github commands
|
||||||
Config:
|
Config:
|
||||||
# Populate these fields by generating a "Personal Access Token" on github.com
|
# Populate these fields by generating a "Personal Access Token" on github.com
|
||||||
AccessToken: "YOUR_GITHUB_ACCESS_TOKEN"
|
AccessToken: "YOUR_GITHUB_ACCESS_TOKEN"
|
||||||
@ -130,7 +109,7 @@ matrix_bot_go_neb_services:
|
|||||||
api_key: "AIzaSyA4FD39m9"
|
api_key: "AIzaSyA4FD39m9"
|
||||||
cx: "AIASDFWSRRtrtr"
|
cx: "AIASDFWSRRtrtr"
|
||||||
|
|
||||||
# Get a key via https://api.imgur.com/oauth2/addclient
|
# Obtain a key via https://api.imgur.com/oauth2/addclient
|
||||||
# Select "oauth2 without callback url"
|
# Select "oauth2 without callback url"
|
||||||
- ID: "imgur_service"
|
- ID: "imgur_service"
|
||||||
Type: "imgur"
|
Type: "imgur"
|
||||||
@ -150,7 +129,7 @@ matrix_bot_go_neb_services:
|
|||||||
Config:
|
Config:
|
||||||
feeds:
|
feeds:
|
||||||
"http://lorem-rss.herokuapp.com/feed?unit=second&interval=60":
|
"http://lorem-rss.herokuapp.com/feed?unit=second&interval=60":
|
||||||
rooms: ["!qmElAGdFYCHoCJuaNt:{{ matrix_domain }}"]
|
rooms: ["!qporfwt:{{ matrix_domain }}"]
|
||||||
must_include:
|
must_include:
|
||||||
author:
|
author:
|
||||||
- author1
|
- author1
|
||||||
@ -174,17 +153,17 @@ matrix_bot_go_neb_services:
|
|||||||
UserID: "@another_goneb:{{ matrix_domain }}"
|
UserID: "@another_goneb:{{ matrix_domain }}"
|
||||||
Config:
|
Config:
|
||||||
RealmID: "github_realm"
|
RealmID: "github_realm"
|
||||||
ClientUserID: "@YOUR_USER_ID:{{ matrix_domain }}" # needs to be an authenticated user so Go-NEB can create webhooks. Check the UserID field in the github_realm in matrix_bot_go_neb_sessions.
|
ClientUserID: "@alice:{{ matrix_domain }}" # needs to be an authenticated user so Go-NEB can create webhooks. Check the UserID field in the github_realm in matrix_bot_go_neb_sessions.
|
||||||
Rooms:
|
Rooms:
|
||||||
"!someroom:id":
|
"!qporfwt:example.com":
|
||||||
Repos:
|
Repos:
|
||||||
"matrix-org/synapse":
|
"element-hq/synapse":
|
||||||
Events: ["push", "issues"]
|
Events: ["push", "issues"]
|
||||||
"matrix-org/dendron":
|
"matrix-org/dendron":
|
||||||
Events: ["pull_request"]
|
Events: ["pull_request"]
|
||||||
"!anotherroom:id":
|
"!aaabaa:example.com":
|
||||||
Repos:
|
Repos:
|
||||||
"matrix-org/synapse":
|
"element-hq/synapse":
|
||||||
Events: ["push", "issues"]
|
Events: ["push", "issues"]
|
||||||
"matrix-org/dendron":
|
"matrix-org/dendron":
|
||||||
Events: ["pull_request"]
|
Events: ["pull_request"]
|
||||||
@ -195,7 +174,7 @@ matrix_bot_go_neb_services:
|
|||||||
Config:
|
Config:
|
||||||
Hooks:
|
Hooks:
|
||||||
"hook1":
|
"hook1":
|
||||||
RoomID: "!someroom:id"
|
RoomID: "!qporfwt:example.com"
|
||||||
MessageType: "m.text" # default is m.text
|
MessageType: "m.text" # default is m.text
|
||||||
|
|
||||||
- ID: "alertmanager_service"
|
- ID: "alertmanager_service"
|
||||||
@ -209,28 +188,60 @@ matrix_bot_go_neb_services:
|
|||||||
webhook_url: "http://localhost/services/hooks/YWxlcnRtYW5hZ2VyX3NlcnZpY2U"
|
webhook_url: "http://localhost/services/hooks/YWxlcnRtYW5hZ2VyX3NlcnZpY2U"
|
||||||
# Each room will get the notification with the alert rendered with the given template
|
# Each room will get the notification with the alert rendered with the given template
|
||||||
rooms:
|
rooms:
|
||||||
"!someroomid:domain.tld":
|
"!qporfwt:example.com":
|
||||||
text_template: "{% raw %}{{range .Alerts -}} [{{ .Status }}] {{index .Labels \"alertname\" }}: {{index .Annotations \"description\"}} {{ end -}}{% endraw %}"
|
text_template: "{% raw %}{{range .Alerts -}} [{{ .Status }}] {{index .Labels \"alertname\" }}: {{index .Annotations \"description\"}} {{ end -}}{% endraw %}"
|
||||||
html_template: "{% raw %}{{range .Alerts -}} {{ $severity := index .Labels \"severity\" }} {{ if eq .Status \"firing\" }} {{ if eq $severity \"critical\"}} <font color='red'><b>[FIRING - CRITICAL]</b></font> {{ else if eq $severity \"warning\"}} <font color='orange'><b>[FIRING - WARNING]</b></font> {{ else }} <b>[FIRING - {{ $severity }}]</b> {{ end }} {{ else }} <font color='green'><b>[RESOLVED]</b></font> {{ end }} {{ index .Labels \"alertname\"}} : {{ index .Annotations \"description\"}} <a href=\"{{ .GeneratorURL }}\">source</a><br/>{{end -}}{% endraw %}"
|
html_template: "{% raw %}{{range .Alerts -}} {{ $severity := index .Labels \"severity\" }} {{ if eq .Status \"firing\" }} {{ if eq $severity \"critical\"}} <font color='red'><b>[FIRING - CRITICAL]</b></font> {{ else if eq $severity \"warning\"}} <font color='orange'><b>[FIRING - WARNING]</b></font> {{ else }} <b>[FIRING - {{ $severity }}]</b> {{ end }} {{ else }} <font color='green'><b>[RESOLVED]</b></font> {{ end }} {{ index .Labels \"alertname\"}} : {{ index .Annotations \"description\"}} <a href=\"{{ .GeneratorURL }}\">source</a><br/>{{end -}}{% endraw %}"
|
||||||
msg_type: "m.text" # Must be either `m.text` or `m.notice`
|
msg_type: "m.text" # Must be either `m.text` or `m.notice`
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Adjusting the Go-NEB URL
|
||||||
|
|
||||||
|
By default, this playbook installs Go-NEB on the `goneb.` subdomain (`goneb.example.com`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
||||||
|
|
||||||
|
By tweaking the `matrix_bot_go_neb_hostname` and `matrix_bot_go_neb_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Switch to the domain used for Matrix services (`matrix.example.com`),
|
||||||
|
# so we won't need to add additional DNS records for Go-NEB.
|
||||||
|
matrix_bot_go_neb_hostname: "{{ matrix_server_fqn_matrix }}"
|
||||||
|
|
||||||
|
# Expose under the /buscarron subpath
|
||||||
|
matrix_bot_go_neb_path_prefix: /go-neb
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
Once you've decided on the domain and path, **you may need to adjust your DNS** records to point the Go-NEB domain to the Matrix server.
|
||||||
|
|
||||||
|
By default, you will need to create a CNAME record for `goneb`. See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to reuse the `matrix.` domain, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
## Installing
|
## Installing
|
||||||
|
|
||||||
After potentially [adjusting DNS records](#adjusting-dns-records) and configuring the playbook, run the [installation](installing.md) command again:
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
```
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
```
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
To use the bot, invite it to any existing Matrix room (`/invite @whatever_you_chose:DOMAIN` where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain, make sure you have permission from the room owner if that's not you).
|
To use the bot, invite it to any existing Matrix room (`/invite @bot.go-neb:example.com` where `example.com` is your base domain, not the `matrix.` domain). Make sure you are granted with the sufficient permission if you are not the room owner.
|
||||||
|
|
||||||
Basic usage is like this: `!echo hi` or `!imgur puppies` or `!giphy matrix`
|
Basic usage is like this: `!echo hi` or `!imgur puppies` or `!giphy matrix`
|
||||||
|
|
||||||
If you enabled the github_cmd service you can get the supported commands via `!github help`
|
If you enabled the github_cmd service, send `!github help` to the bot in the room to see the available commands.
|
||||||
|
|
||||||
You can also refer to the upstream [Documentation](https://github.com/matrix-org/go-neb).
|
You can also refer to the upstream [Documentation](https://github.com/matrix-org/go-neb).
|
||||||
|
@ -1,53 +1,75 @@
|
|||||||
# Setting up Honoroit (optional)
|
# Setting up Honoroit (optional)
|
||||||
|
|
||||||
The playbook can install and configure [Honoroit](https://gitlab.com/etke.cc/honoroit) for you.
|
The playbook can install and configure [Honoroit](https://github.com/etkecc/honoroit) for you.
|
||||||
|
|
||||||
It's a bot you can use to setup **your own helpdesk on matrix**
|
It's a bot you can use to setup **your own helpdesk on matrix**
|
||||||
|
|
||||||
See the project's [documentation](https://gitlab.com/etke.cc/honoroit#how-it-looks-like) to learn what it does with screenshots and why it might be useful to you.
|
See the project's [documentation](https://github.com/etkecc/honoroit/blob/main/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
|
||||||
## Adjusting the playbook configuration
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file:
|
To enable the bot, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_bot_honoroit_enabled: true
|
matrix_bot_honoroit_enabled: true
|
||||||
|
|
||||||
# Uncomment and adjust if you'd like to change the hostname or path
|
|
||||||
# matrix_bot_honoroit_hostname: "{{ matrix_server_fqn_matrix }}"
|
|
||||||
# matrix_bot_honoroit_path_prefix: /honoroit
|
|
||||||
|
|
||||||
# Uncomment and adjust this part if you'd like to use a username different than the default
|
# Uncomment and adjust this part if you'd like to use a username different than the default
|
||||||
# matrix_bot_honoroit_login: honoroit
|
# matrix_bot_honoroit_login: honoroit
|
||||||
|
|
||||||
# Generate a strong password here. Consider generating it with `pwgen -s 64 1`
|
# Generate a strong password for the bot. You can create one with a command like `pwgen -s 64 1`.
|
||||||
matrix_bot_honoroit_password: PASSWORD_FOR_THE_BOT
|
matrix_bot_honoroit_password: PASSWORD_FOR_THE_BOT
|
||||||
|
|
||||||
# Adjust this to your room ID
|
# Adjust this to your room ID
|
||||||
matrix_bot_honoroit_roomid: "!yourRoomID:DOMAIN"
|
matrix_bot_honoroit_roomid: "!qporfwt:{{ matrix_domain }}"
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Adjusting the Honoroit URL
|
||||||
|
|
||||||
|
By default, this playbook installs Honoroit on the `matrix.` subdomain, at the `/honoroit` path (https://matrix.example.com/honoroit). This makes it easy to install it, because it **doesn't require additional DNS records to be set up**. If that's okay, you can skip this section.
|
||||||
|
|
||||||
|
By tweaking the `matrix_bot_honoroit_hostname` and `matrix_bot_honoroit_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Change the default hostname and path prefix
|
||||||
|
matrix_bot_honoroit_hostname: honoroit.example.com
|
||||||
|
matrix_bot_honoroit_path_prefix: /
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
If you've changed the default hostname, **you may need to adjust your DNS** records to point the Honoroit domain to the Matrix server.
|
||||||
|
|
||||||
|
See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to use the default hostname, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
## Installing
|
## Installing
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command again:
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
```sh
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
```
|
```
|
||||||
|
|
||||||
**Notes**:
|
**Notes**:
|
||||||
|
|
||||||
- the `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
- if you change the bot password (`matrix_bot_honoroit_password` in your `vars.yml` file) subsequently, the bot user's credentials on the homeserver won't be updated automatically. If you'd like to change the bot user's password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_bot_honoroit_password` to let the bot know its new password
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
- If you change the bot password (`matrix_bot_honoroit_password` in your `vars.yml` file) subsequently, the bot user's credentials on the homeserver won't be updated automatically. If you'd like to change the bot user's password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_bot_honoroit_password` to let the bot know its new password.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
To use the bot, invite the `@honoroit:DOMAIN` to the room you specified in config, after that any matrix user can send a message to the `@honoroit:DOMAIN` to start a new thread in that room.
|
To use the bot, invite it to the room you specified on your `vars.yml` file (`/invite @honoroit:example.com` where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
Send `!ho help` to the room to see the bot's help menu for additional commands.
|
After the bot joins the room, any Matrix user can send a message to it to start a new thread in that room.
|
||||||
|
|
||||||
You can also refer to the upstream [documentation](https://gitlab.com/etke.cc/honoroit#features).
|
Send `!ho help` to the bot in the room to see the available commands.
|
||||||
|
|
||||||
|
You can also refer to the upstream [documentation](https://github.com/etkecc/honoroit#features).
|
||||||
|
@ -2,27 +2,22 @@
|
|||||||
|
|
||||||
The playbook can install and configure [matrix-registration-bot](https://github.com/moan0s/matrix-registration-bot) for you.
|
The playbook can install and configure [matrix-registration-bot](https://github.com/moan0s/matrix-registration-bot) for you.
|
||||||
|
|
||||||
The bot allows you to easily **create and manage registration tokens** aka. invitation codes.
|
The bot allows you to easily **create and manage registration tokens** aka. invitation codes. It can be used for an invitation-based server, where you invite someone by sending them a registration token (tokens look like this: `rbalQ0zkaDSRQCOp`). They can register as per normal but have to provide a valid registration token in the final step of the registration process.
|
||||||
It can be used for an invitation-based server,
|
|
||||||
where you invite someone by sending them a registration token (loook like this: `rbalQ0zkaDSRQCOp`). They can register as normal but have to provide a valid registration token in a final step of the registration.
|
|
||||||
|
|
||||||
See the project's [documentation](https://github.com/moan0s/matrix-registration-bot#supported-commands) to learn what it
|
See the project's [documentation](https://github.com/moan0s/matrix-registration-bot/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
does and why it might be useful to you.
|
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
## Configuration
|
To enable the bot, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
To enable the bot, add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_bot_matrix_registration_bot_enabled: true
|
matrix_bot_matrix_registration_bot_enabled: true
|
||||||
|
|
||||||
#By default, the playbook will set use the bot with a username like
|
# By default, the playbook will set use the bot with a username like this: `@bot.matrix-registration-bot:example.com`.
|
||||||
## this: `@bot.matrix-registration-bot:DOMAIN`.
|
# Uncomment and adjust this part if you'd like to use a username different than the default
|
||||||
# To use a different username, uncomment & adjust the variable.
|
|
||||||
# matrix_bot_matrix_registration_bot_matrix_user_id_localpart: bot.matrix-registration-bot
|
# matrix_bot_matrix_registration_bot_matrix_user_id_localpart: bot.matrix-registration-bot
|
||||||
|
|
||||||
# Generate a strong password here. Consider generating it with `pwgen -s 64 1`
|
# Generate a strong password for the bot. You can create one with a command like `pwgen -s 64 1`.
|
||||||
matrix_bot_matrix_registration_bot_bot_password: PASSWORD_FOR_THE_BOT
|
matrix_bot_matrix_registration_bot_bot_password: PASSWORD_FOR_THE_BOT
|
||||||
|
|
||||||
# Enables registration
|
# Enables registration
|
||||||
@ -32,29 +27,39 @@ matrix_synapse_enable_registration: true
|
|||||||
matrix_synapse_registration_requires_token: true
|
matrix_synapse_registration_requires_token: true
|
||||||
```
|
```
|
||||||
|
|
||||||
The bot account will be automatically created.
|
The bot account will be created automatically.
|
||||||
|
|
||||||
## Installing
|
## Installing
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command again:
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
```
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
```
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
- If you change the bot password (`matrix_bot_matrix_registration_bot_bot_password` in your `vars.yml` file) subsequently, the bot user's credentials on the homeserver won't be updated automatically. If you'd like to change the bot user's password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_bot_matrix_registration_bot_bot_password` to let the bot know its new password.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
To use the bot, message `@bot.matrix-registration-bot:DOMAIN` (where `DOMAIN` is your base domain, not the `matrix.` domain).
|
To use the bot, start a chat with `@bot.matrix-registration-bot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
In this room send `help` and the bot will reply with all options.
|
Send `help` to the bot to see the available commands.
|
||||||
|
|
||||||
You can also refer to the upstream [Usage documentation](https://github.com/moan0s/matrix-registration-bot#supported-commands).
|
You can also refer to the upstream [Usage documentation](https://github.com/moan0s/matrix-registration-bot#supported-commands).
|
||||||
If you have any questions, or if you need help setting it up, read the [troublshooting guide](https://github.com/moan0s/matrix-registration-bot/blob/main/docs/troubleshooting.md)
|
|
||||||
or join [#matrix-registration-bot:hyteck.de](https://matrix.to/#/#matrix-registration-bot:hyteck.de).
|
|
||||||
|
|
||||||
To clean the cache (session&encryption data) after you changed the bot's username, changed the login methon form access_token to password etc.. you can use
|
If you have any questions, or if you need help setting it up, read the [troublshooting guide](https://github.com/moan0s/matrix-registration-bot/blob/main/docs/troubleshooting.md) or join [#matrix-registration-bot:hyteck.de](https://matrix.to/#/#matrix-registration-bot:hyteck.de).
|
||||||
|
|
||||||
```bash
|
To clean the cache (session & encryption data) after you changed the bot's username, changed the login method from access_token to password etc… you can use:
|
||||||
|
|
||||||
|
```sh
|
||||||
just run-tags bot-matrix-registration-bot-clean-cache
|
just run-tags bot-matrix-registration-bot-clean-cache
|
||||||
```
|
```
|
||||||
|
@ -4,12 +4,11 @@ The playbook can install and configure [matrix-reminder-bot](https://github.com/
|
|||||||
|
|
||||||
It's a bot you can use to **schedule one-off & recurring reminders and alarms**.
|
It's a bot you can use to **schedule one-off & recurring reminders and alarms**.
|
||||||
|
|
||||||
See the project's [documentation](https://github.com/anoadragon453/matrix-reminder-bot#usage) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/anoadragon453/matrix-reminder-bot/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
|
||||||
## Adjusting the playbook configuration
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file:
|
To enable the bot, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_bot_matrix_reminder_bot_enabled: true
|
matrix_bot_matrix_reminder_bot_enabled: true
|
||||||
@ -17,34 +16,37 @@ matrix_bot_matrix_reminder_bot_enabled: true
|
|||||||
# Uncomment and adjust this part if you'd like to use a username different than the default
|
# Uncomment and adjust this part if you'd like to use a username different than the default
|
||||||
# matrix_bot_matrix_reminder_bot_matrix_user_id_localpart: bot.matrix-reminder-bot
|
# matrix_bot_matrix_reminder_bot_matrix_user_id_localpart: bot.matrix-reminder-bot
|
||||||
|
|
||||||
# Generate a strong password here. Consider generating it with `pwgen -s 64 1`
|
# Generate a strong password for the bot. You can create one with a command like `pwgen -s 64 1`.
|
||||||
matrix_bot_matrix_reminder_bot_matrix_user_password: PASSWORD_FOR_THE_BOT
|
matrix_bot_matrix_reminder_bot_matrix_user_password: PASSWORD_FOR_THE_BOT
|
||||||
|
|
||||||
# Adjust this to your timezone
|
# Adjust this to your timezone
|
||||||
matrix_bot_matrix_reminder_bot_reminders_timezone: Europe/London
|
matrix_bot_matrix_reminder_bot_reminders_timezone: Europe/London
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
## Installing
|
## Installing
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command again:
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
```sh
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
```
|
```
|
||||||
|
|
||||||
**Notes**:
|
**Notes**:
|
||||||
|
|
||||||
- the `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
- if you change the bot password (`matrix_bot_matrix_reminder_bot_matrix_user_password` in your `vars.yml` file) subsequently, the bot user's credentials on the homeserver won't be updated automatically. If you'd like to change the bot user's password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_bot_matrix_reminder_bot_matrix_user_password` to let the bot know its new password
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
- If you change the bot password (`matrix_bot_matrix_reminder_bot_matrix_user_password` in your `vars.yml` file) subsequently, the bot user's credentials on the homeserver won't be updated automatically. If you'd like to change the bot user's password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_bot_matrix_reminder_bot_matrix_user_password` to let the bot know its new password.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
To use the bot, start a chat with `@bot.matrix-reminder-bot:DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
To use the bot, start a chat with `@bot.matrix-reminder-bot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
You can also add the bot to any existing Matrix room (`/invite @bot.matrix-reminder-bot:DOMAIN`).
|
You can also add the bot to any existing Matrix room (`/invite @bot.matrix-reminder-bot:example.com`).
|
||||||
|
|
||||||
Basic usage is like this: `!remindme in 2 minutes; This is a test`
|
Basic usage is like this: `!remindme in 2 minutes; This is a test`
|
||||||
|
|
||||||
|
@ -2,57 +2,83 @@
|
|||||||
|
|
||||||
The playbook can install and configure [maubot](https://github.com/maubot/maubot) for you.
|
The playbook can install and configure [maubot](https://github.com/maubot/maubot) for you.
|
||||||
|
|
||||||
After setting up maubot, you can use the web management interface to make it do things.
|
After setting up maubot, you can use the web management interface to make it do things. The default location of the management interface is `matrix.example.com/_matrix/maubot/`
|
||||||
The default location of the management interface is `matrix.<your-domain>/_matrix/maubot/`
|
|
||||||
|
|
||||||
See the project's [documentation](https://docs.mau.fi/maubot/usage/basic.html) to learn what it
|
See the project's [documentation](https://docs.mau.fi/maubot/usage/basic.html) to learn what it does and why it might be useful to you.
|
||||||
does and why it might be useful to you.
|
|
||||||
|
|
||||||
## Adjusting the playbook configuration
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file:
|
To enable the bot, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_bot_maubot_enabled: true
|
matrix_bot_maubot_enabled: true
|
||||||
|
|
||||||
|
# Uncomment and adjust this part if you'd like to use a username different than the default
|
||||||
|
# matrix_bot_maubot_login: bot.maubot
|
||||||
|
|
||||||
|
# Generate a strong password for the bot. You can create one with a command like `pwgen -s 64 1`.
|
||||||
|
matrix_bot_maubot_initial_password: PASSWORD_FOR_THE_BOT
|
||||||
|
|
||||||
matrix_bot_maubot_admins:
|
matrix_bot_maubot_admins:
|
||||||
- yourusername: securepassword
|
- yourusername: securepassword
|
||||||
```
|
```
|
||||||
|
|
||||||
You can add multiple admins. The admin accounts are not connected to any matrix ID and are only used to access the
|
You can add multiple admins. The admin accounts are only used to access the maubot administration interface.
|
||||||
maubot administration interface.
|
|
||||||
|
|
||||||
|
### Adjusting the maubot URL
|
||||||
|
|
||||||
|
By default, this playbook installs maubot on the `matrix.` subdomain, at the `/_matrix/maubot/` path (https://matrix.example.com/_matrix/maubot/). This makes it easy to install it, because it **doesn't require additional DNS records to be set up**. If that's okay, you can skip this section.
|
||||||
|
|
||||||
|
By tweaking the `matrix_bot_maubot_hostname` and `matrix_bot_maubot_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Change the default hostname and path prefix
|
||||||
|
matrix_bot_maubot_hostname: maubot.example.com
|
||||||
|
matrix_bot_maubot_path_prefix: /
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
If you've changed the default hostname, **you may need to adjust your DNS** records to point the maubot domain to the Matrix server.
|
||||||
|
|
||||||
|
See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to use the default hostname, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
## Installing
|
## Installing
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command again:
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
```
|
```
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
|
||||||
```
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
- If you change the bot password (`matrix_bot_maubot_initial_password` in your `vars.yml` file) subsequently, the bot user's credentials on the homeserver won't be updated automatically. If you'd like to change the bot user's password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_bot_maubot_initial_password` to let the bot know its new password.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
You can visit `matrix.<your-domain>/_matrix/maubot/` to manage your available plugins, clients and instances.
|
By default, you can visit `matrix.example.com/_matrix/maubot/` to manage your available plugins, clients and instances.
|
||||||
|
|
||||||
You should start in the following order
|
You should start in the following order
|
||||||
1. **Create one or more clients:** A client is a matrix account which the bot will use to message.
|
1. **Create one or more clients**: A client is a Matrix account which the bot will use to message. By default, the playbook creates a `bot.maubot` account (as per the configuration above). You only need to [obtain an access token](#obtaining-an-access-token) for it
|
||||||
2. **Upload some Plugins:** Plugins can be obtained from [here](https://github.com/maubot/maubot#plugins) or any other source.
|
2. **Upload some Plugins**: Plugins can be obtained from [here](https://github.com/maubot/maubot#plugins) or any other source.
|
||||||
3. **Create an instance:** An instance is the actual bot. You have to specify a client which the bot instance will use
|
3. **Create an instance**: An instance is the actual bot. You have to specify a client which the bot instance will use and the plugin (how the bot will behave)
|
||||||
and the plugin (how the bot will behave)
|
|
||||||
|
|
||||||
To add a client you first need to create an account and obtain a valid access token.
|
## Obtain an access token
|
||||||
|
|
||||||
## Registering the bot user
|
This can be done via `mbc login` then `mbc auth` (see the [maubot documentation](https://docs.mau.fi/maubot/usage/cli/auth.html)). To run these commands, you'll first need to `exec` into the maubot container with `docker exec -it matrix-bot-maubot sh`.
|
||||||
|
|
||||||
You **need to register the bot user manually** before setting up the bot. You can use the playbook to [register a new user](registering-users.md):
|
Alternatively, you can refer to the documentation on [how to obtain an access token](obtaining-access-tokens.md). Be aware that you'd better use the **Obtain an access token via curl** method (not **Obtain an access token via Element Web**) as the latter will causes issues to your bot in encrypted rooms. Read [more](https://docs.mau.fi/maubot/usage/basic.html#creating-clients).
|
||||||
|
|
||||||
```
|
⚠️ **Warning**: Access tokens are sensitive information. Do not include them in any bug reports, messages, or logs. Do not share the access token with anyone.
|
||||||
ansible-playbook -i inventory/hosts setup.yml --extra-vars='username=bot.maubot password=PASSWORD_FOR_THE_BOT admin=yes' --tags=register-user
|
|
||||||
```
|
|
||||||
|
|
||||||
Choose a strong password for the bot. You can generate a good password with a command like this: `pwgen -s 64 1`.
|
|
||||||
|
|
||||||
## Obtaining an admin access token
|
|
||||||
|
|
||||||
This can be done via `mbc login` then `mbc auth` (see the [maubot documentation](https://docs.mau.fi/maubot/usage/cli/auth.html)). To run these commands you'll need to open the bot docker container with `docker exec -it matrix-bot-maubot sh`
|
|
||||||
Alternatively, use Element or curl to [obtain an access token](obtaining-access-tokens.md). However these two methods won't allow the bot to work in encrypted rooms.
|
|
||||||
|
@ -2,66 +2,124 @@
|
|||||||
|
|
||||||
The playbook can install and configure the [Mjolnir](https://github.com/matrix-org/mjolnir) moderation bot for you.
|
The playbook can install and configure the [Mjolnir](https://github.com/matrix-org/mjolnir) moderation bot for you.
|
||||||
|
|
||||||
See the project's [documentation](https://github.com/matrix-org/mjolnir) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/matrix-org/mjolnir/blob/main/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
## 1. Register the bot account
|
### Register the bot account
|
||||||
|
|
||||||
The playbook does not automatically create users for you. The bot requires an access token to be able to connect to your homeserver.
|
The playbook does not automatically create users for you. You **need to register the bot user manually** before setting up the bot.
|
||||||
|
|
||||||
You **need to register the bot user manually** before setting up the bot.
|
Generate a strong password for the bot. You can create one with a command like `pwgen -s 64 1`.
|
||||||
|
|
||||||
Choose a strong password for the bot. You can generate a good password with a command like this: `pwgen -s 64 1`.
|
|
||||||
|
|
||||||
You can use the playbook to [register a new user](registering-users.md):
|
You can use the playbook to [register a new user](registering-users.md):
|
||||||
|
|
||||||
```
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml --extra-vars='username=bot.mjolnir password=PASSWORD_FOR_THE_BOT admin=no' --tags=register-user
|
ansible-playbook -i inventory/hosts setup.yml --extra-vars='username=bot.mjolnir password=PASSWORD_FOR_THE_BOT admin=no' --tags=register-user
|
||||||
```
|
```
|
||||||
|
|
||||||
If you would like Mjolnir to be able to deactivate users, move aliases, shutdown rooms, etc then it must be a server admin so you need to change `admin=no` to `admin=yes` in the command above.
|
If you would like Mjolnir to be able to deactivate users, move aliases, shutdown rooms, etc then it must be a server admin so you need to change `admin=no` to `admin=yes` in the command above.
|
||||||
|
|
||||||
|
### Obtain an access token
|
||||||
|
|
||||||
## 2. Get an access token
|
The bot requires an access token to be able to connect to your homeserver. Refer to the documentation on [how to obtain an access token](obtaining-access-tokens.md).
|
||||||
|
|
||||||
Refer to the documentation on [how to obtain an access token](obtaining-access-tokens.md).
|
⚠️ **Warning**: Access tokens are sensitive information. Do not include them in any bug reports, messages, or logs. Do not share the access token with anyone.
|
||||||
|
|
||||||
|
### Make sure the account is free from rate limiting
|
||||||
|
|
||||||
## 3. Make sure the account is free from rate limiting
|
If your homeserver's implementation is Synapse, you will need to prevent it from rate limiting the bot's account. **This is a required step. If you do not configure it, Mjolnir will crash.**
|
||||||
|
|
||||||
You will need to prevent Synapse from rate limiting the bot's account. This is not an optional step. If you do not do this step Mjolnir will crash. This can be done using Synapse's [admin API](https://matrix-org.github.io/synapse/latest/admin_api/user_admin_api.html#override-ratelimiting-for-users). Please ask for help if you are uncomfortable with these steps or run into issues.
|
This can be done using Synapse's [Admin APIs](https://element-hq.github.io/synapse/latest/admin_api/user_admin_api.html#override-ratelimiting-for-users). They can be accessed both externally and internally.
|
||||||
|
|
||||||
If your Synapse Admin API is exposed to the internet for some reason like running the Synapse Admin Role [Link](/docs/configuring-playbook-synapse-admin.md) or running `matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_admin_api_enabled: true` in your playbook config. If your API is not externally exposed you should still be able to on the local host for your synapse run these commands.
|
To expose the APIs publicly, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file.
|
||||||
|
|
||||||
The following command works on semi up to date Windows 10 installs and All Windows 11 installations and other systems that ship curl. `curl --header "Authorization: Bearer <access_token>" -X POST https://matrix.example.com/_synapse/admin/v1/users/@example:example.com/override_ratelimit` Replace `@example:example.com` with the MXID of your Mjolnir and example.com with your homeserver domain. You can easily obtain an access token for a homeserver admin account the same way you can obtain an access token for Mjolnir it self. If you made Mjolnir Admin you can just use the Mjolnir token.
|
|
||||||
|
|
||||||
## 4. Create a management room
|
|
||||||
|
|
||||||
Using your own account, create a new invite only room that you will use to manage the bot. This is the room where you will see the status of the bot and where you will send commands to the bot, such as the command to ban a user from another room. Anyone in this room can control the bot so it is important that you only invite trusted users to this room. The room must be unencrypted since the playbook does not support installing Pantalaimon yet.
|
|
||||||
|
|
||||||
Once you have created the room you need to copy the room ID so you can tell the bot to use that room. In Element you can do this by going to the room's settings, clicking Advanced, and then coping the internal room ID. The room ID will look something like `!QvgVuKq0ha8glOLGMG:DOMAIN`.
|
|
||||||
|
|
||||||
Finally invite the `@bot.mjolnir:DOMAIN` account you created earlier into the room.
|
|
||||||
|
|
||||||
|
|
||||||
## 5. Adjusting the playbook configuration
|
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file (adapt to your needs):
|
|
||||||
|
|
||||||
You must replace `ACCESS_TOKEN_FROM_STEP_2_GOES_HERE` and `ROOM_ID_FROM_STEP_4_GOES_HERE` with the your own values.
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_bot_mjolnir_enabled: true
|
matrix_synapse_container_labels_public_client_synapse_admin_api_enabled: true
|
||||||
|
|
||||||
matrix_bot_mjolnir_access_token: "ACCESS_TOKEN_FROM_STEP_2_GOES_HERE"
|
|
||||||
|
|
||||||
matrix_bot_mjolnir_management_room: "ROOM_ID_FROM_STEP_4_GOES_HERE"
|
|
||||||
```
|
```
|
||||||
|
|
||||||
## 6. Adding mjolnir synapse antispam module (optional)
|
The APIs can also be accessed via [Synapse Admin](https://github.com/etkecc/synapse-admin), a web UI tool you can use to administrate users, rooms, media, etc. on your Matrix server. The playbook can install and configure Synapse Admin for you. For details about it, see [this page](configuring-playbook-synapse-admin.md).
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file (adapt to your needs):
|
**Note**: access to the APIs is restricted with a valid access token, so exposing them publicly should not be a real security concern. Still, doing so is not recommended for additional security. See [official Synapse reverse-proxying recommendations](https://element-hq.github.io/synapse/latest/reverse_proxy.html#synapse-administration-endpoints).
|
||||||
|
|
||||||
|
To discharge rate limiting, run the following command on systems that ship curl (note that it does not work on outdated Windows 10). Even if the APIs are not exposed to the internet, you should still be able to run the command on the homeserver locally. Before running it, make sure to replace `@bot.mjolnir:example.com` with the MXID of your Mjolnir:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
curl --header "Authorization: Bearer <access_token>" -X POST https://matrix.example.com/_synapse/admin/v1/users/@bot.mjolnir:example.com/override_ratelimit
|
||||||
|
```
|
||||||
|
|
||||||
|
You can obtain an access token for a homeserver admin account in the same way as you can do so for Mjolnir itself. If you have made Mjolnir an admin, you can just use the Mjolnir token.
|
||||||
|
|
||||||
|
### Create a management room
|
||||||
|
|
||||||
|
Using your own account, create a new invite only room that you will use to manage the bot. This is the room where you will see the status of the bot and where you will send commands to the bot, such as the command to ban a user from another room. Anyone in this room can control the bot so it is important that you only invite trusted users to this room.
|
||||||
|
|
||||||
|
If you make the management room encrypted (E2EE), then you MUST enable and use Pantalaimon (see [below](#configuration-with-e2ee-support)).
|
||||||
|
|
||||||
|
Once you have created the room you need to copy the room ID so you can tell the bot to use that room. In Element Web you can do this by going to the room's settings, clicking Advanced, and then copying the internal room ID. The room ID will look something like `!qporfwt:example.com`.
|
||||||
|
|
||||||
|
Finally invite the `@bot.mjolnir:example.com` account you created earlier into the room.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bot, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file. Make sure to replace `MANAGEMENT_ROOM_ID_HERE`.
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Enable Mjolnir
|
||||||
|
matrix_bot_mjolnir_enabled: true
|
||||||
|
|
||||||
|
matrix_bot_mjolnir_management_room: "MANAGEMENT_ROOM_ID_HERE"
|
||||||
|
```
|
||||||
|
|
||||||
|
### End-to-End Encryption support
|
||||||
|
|
||||||
|
Decide whether you want Mjolnir to be capable of operating in end-to-end encrypted (E2EE) rooms. This includes the management room and the moderated rooms.
|
||||||
|
|
||||||
|
To support E2EE, Mjolnir needs to [use Pantalaimon](configuring-playbook-pantalaimon.md).
|
||||||
|
|
||||||
|
#### Configuration with E2EE support
|
||||||
|
|
||||||
|
When using Pantalaimon, Mjolnir will log in to its bot account itself through Pantalaimon, so configure its username and password.
|
||||||
|
|
||||||
|
Add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file (adapt to your needs):
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Enable Pantalaimon. See docs/configuring-playbook-pantalaimon.md
|
||||||
|
matrix_pantalaimon_enabled: true
|
||||||
|
|
||||||
|
# Tell Mjolnir to use Pantalaimon
|
||||||
|
matrix_bot_mjolnir_pantalaimon_use: true
|
||||||
|
|
||||||
|
# User name and password for the bot you have created above. Required when using Pantalaimon.
|
||||||
|
matrix_bot_mjolnir_pantalaimon_username: "bot.mjolnir"
|
||||||
|
matrix_bot_mjolnir_pantalaimon_password: "PASSWORD_FOR_THE_BOT"
|
||||||
|
```
|
||||||
|
|
||||||
|
The playbook's `group_vars` will configure other required settings. If using this role separately without the playbook, you also need to configure the two URLs that Mjolnir uses to reach the homeserver, one through Pantalaimon and one "raw". This example is taken from the playbook's `group_vars`:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Endpoint URL that Mjolnir uses to interact with the Matrix homeserver (client-server API).
|
||||||
|
# Set this to the pantalaimon URL if you're using that.
|
||||||
|
matrix_bot_mjolnir_homeserver_url: "{{ 'http://matrix-pantalaimon:8009' if matrix_bot_mjolnir_pantalaimon_use else matrix_addons_homeserver_client_api_url }}"
|
||||||
|
|
||||||
|
# Endpoint URL that Mjolnir could use to fetch events related to reports (client-server API and /_synapse/),
|
||||||
|
# only set this to the public-internet homeserver client API URL, do NOT set this to the pantalaimon URL.
|
||||||
|
matrix_bot_mjolnir_raw_homeserver_url: "{{ matrix_addons_homeserver_client_api_url }}"
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Configuration without E2EE support
|
||||||
|
|
||||||
|
When NOT using Pantalaimon, Mjolnir does not log in by itself and you must give it an access token for its bot account.
|
||||||
|
|
||||||
|
Add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file. Make sure to replace `ACCESS_TOKEN_HERE` with the one created [above](#obtain-an-access-token).
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_bot_mjolnir_access_token: "ACCESS_TOKEN_HERE"
|
||||||
|
```
|
||||||
|
|
||||||
|
### Adding Mjolnir synapse antispam module (optional)
|
||||||
|
|
||||||
|
To enable Mjolnir synapse antispam module, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file (adapt to your needs):
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_synapse_ext_spam_checker_mjolnir_antispam_enabled: true
|
matrix_synapse_ext_spam_checker_mjolnir_antispam_enabled: true
|
||||||
@ -71,23 +129,11 @@ matrix_synapse_ext_spam_checker_mjolnir_antispam_config_block_usernames: false
|
|||||||
matrix_synapse_ext_spam_checker_mjolnir_antispam_config_ban_lists: []
|
matrix_synapse_ext_spam_checker_mjolnir_antispam_config_ban_lists: []
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Extending the configuration
|
||||||
|
|
||||||
## 7. Installing
|
You can configure additional options by adding the `matrix_bot_mjolnir_configuration_extension_yaml` variable to your `inventory/host_vars/matrix.example.com/vars.yml` file.
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command:
|
For example, to change Mjolnir's `recordIgnoredInvites` option to `true`, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```
|
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
## Usage
|
|
||||||
|
|
||||||
You can refer to the upstream [documentation](https://github.com/matrix-org/mjolnir) for additional ways to use and configure mjolnir. Check out their [quickstart guide](https://github.com/matrix-org/mjolnir#quickstart-guide) for some basic commands you can give to the bot.
|
|
||||||
|
|
||||||
You can configure additional options by adding the `matrix_bot_mjolnir_configuration_extension_yaml` variable to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file.
|
|
||||||
|
|
||||||
For example to change mjolnir's `recordIgnoredInvites` option to `true` you would add the following to your `vars.yml` file.
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_bot_mjolnir_configuration_extension_yaml: |
|
matrix_bot_mjolnir_configuration_extension_yaml: |
|
||||||
@ -100,3 +146,26 @@ matrix_bot_mjolnir_configuration_extension_yaml: |
|
|||||||
# completely redefining `matrix_bot_mjolnir_configuration_yaml`.
|
# completely redefining `matrix_bot_mjolnir_configuration_yaml`.
|
||||||
recordIgnoredInvites: true
|
recordIgnoredInvites: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
- If you change the Pantalaimon's password (`matrix_bot_mjolnir_pantalaimon_password` in your `vars.yml` file) subsequently, its credentials on the homeserver won't be updated automatically. If you'd like to change the password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_bot_mjolnir_pantalaimon_password` to let Pantalaimon know its new password.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
You can refer to the upstream [documentation](https://github.com/matrix-org/mjolnir) for additional ways to use and configure Mjolnir. Check out their [quickstart guide](https://github.com/matrix-org/mjolnir#quickstart-guide) for some basic commands you can give to the bot.
|
||||||
|
@ -1,88 +0,0 @@
|
|||||||
# Setting up Postmoogle (optional)
|
|
||||||
|
|
||||||
**Note**: email bridging can also happen via the [email2matrix](configuring-playbook-email2matrix.md) bridge supported by the playbook.
|
|
||||||
|
|
||||||
The playbook can install and configure [Postmoogle](https://gitlab.com/etke.cc/postmoogle) for you.
|
|
||||||
|
|
||||||
It's a bot/bridge you can use to forward emails to Matrix rooms.
|
|
||||||
Postmoogle runs an SMTP email server and allows you to assign mailbox addresses to Matrix rooms.
|
|
||||||
|
|
||||||
See the project's [documentation](https://gitlab.com/etke.cc/postmoogle) to learn what it does and why it might be useful to you.
|
|
||||||
|
|
||||||
## Prerequisites
|
|
||||||
|
|
||||||
### Networking
|
|
||||||
|
|
||||||
Open the following ports on your server to be able to receive incoming emails:
|
|
||||||
|
|
||||||
- `25/tcp`: SMTP
|
|
||||||
- `587/tcp`: Submission (TLS-encrypted SMTP)
|
|
||||||
|
|
||||||
If you don't open these ports, you will still be able to send emails, but not receive any.
|
|
||||||
|
|
||||||
These port numbers are configurable via the `matrix_bot_postmoogle_smtp_host_bind_port` and `matrix_bot_postmoogle_submission_host_bind_port` variables, but other email servers will try to deliver on these default (standard) ports, so changing them is of little use.
|
|
||||||
|
|
||||||
|
|
||||||
### Adjusting the playbook configuration
|
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
matrix_bot_postmoogle_enabled: true
|
|
||||||
|
|
||||||
# Uncomment and adjust this part if you'd like to use a username different than the default
|
|
||||||
# matrix_bot_postmoogle_login: postmoogle
|
|
||||||
|
|
||||||
# Generate a strong password here. Consider generating it with `pwgen -s 64 1`
|
|
||||||
matrix_bot_postmoogle_password: PASSWORD_FOR_THE_BOT
|
|
||||||
|
|
||||||
# Uncomment to add one or more admins to this bridge:
|
|
||||||
#
|
|
||||||
# matrix_bot_postmoogle_admins:
|
|
||||||
# - '@yourAdminAccount:domain.com'
|
|
||||||
#
|
|
||||||
# .. unless you've made yourself an admin of all bridges like this:
|
|
||||||
#
|
|
||||||
# matrix_admin: '@yourAdminAccount:domain.com'
|
|
||||||
```
|
|
||||||
|
|
||||||
### DNS
|
|
||||||
|
|
||||||
You will also need to add several DNS records so that Postmoogle can send emails.
|
|
||||||
See [Configuring DNS](configuring-dns.md).
|
|
||||||
|
|
||||||
|
|
||||||
## Installing
|
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command again:
|
|
||||||
|
|
||||||
```sh
|
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
|
||||||
```
|
|
||||||
|
|
||||||
**Notes**:
|
|
||||||
|
|
||||||
- the `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account
|
|
||||||
|
|
||||||
- if you change the bot password (`matrix_bot_postmoogle_password` in your `vars.yml` file) subsequently, the bot user's credentials on the homeserver won't be updated automatically. If you'd like to change the bot user's password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_bot_postmoogle_password` to let the bot know its new password
|
|
||||||
|
|
||||||
|
|
||||||
## Usage
|
|
||||||
|
|
||||||
To use the bot, invite the `@postmoogle:DOMAIN` into a room you want to use as a mailbox.
|
|
||||||
|
|
||||||
Then send `!pm mailbox NAME` to expose this Matrix room as an inbox with the email address `NAME@matrix.domain`. Emails sent to that email address will be forwarded to the room.
|
|
||||||
|
|
||||||
Send `!pm help` to the room to see the bot's help menu for additional commands.
|
|
||||||
|
|
||||||
You can also refer to the upstream [documentation](https://gitlab.com/etke.cc/postmoogle).
|
|
||||||
|
|
||||||
### Debug/Logs
|
|
||||||
|
|
||||||
As with all other services, you can find their logs in [systemd-journald](https://www.freedesktop.org/software/systemd/man/systemd-journald.service.html) by running something like `journalctl -fu matrix-bot-postmoogle`
|
|
||||||
|
|
||||||
The default logging level for this bridge is `INFO`, but you can increase it to `DEBUG` with the following additional configuration:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
matrix_bot_postmoogle_loglevel: 'DEBUG'
|
|
||||||
```
|
|
@ -1,70 +1,86 @@
|
|||||||
# Setting up Appservice Discord (optional)
|
# Setting up Appservice Discord bridging (optional)
|
||||||
|
|
||||||
**Note**: bridging to [Discord](https://discordapp.com/) can also happen via the [mx-puppet-discord](configuring-playbook-bridge-mx-puppet-discord.md) and [mautrix-discord](configuring-playbook-bridge-mautrix-discord.md) bridges supported by the playbook.
|
**Note**: bridging to [Discord](https://discordapp.com/) can also happen via the [mx-puppet-discord](configuring-playbook-bridge-mx-puppet-discord.md) and [mautrix-discord](configuring-playbook-bridge-mautrix-discord.md) bridges supported by the playbook.
|
||||||
- For using as a Bot we are recommend the Appservice Discord bridge (the one being discussed here), because it supports plumbing.
|
- For using as a Bot we are recommend the Appservice Discord bridge (the one being discussed here), because it supports plumbing.
|
||||||
- For personal use we recommend the [mautrix-discord](configuring-playbook-bridge-mautrix-discord.md) bridge, because it is the most fully-featured and stable of the 3 Discord bridges supported by the playbook.
|
- For personal use we recommend the [mautrix-discord](configuring-playbook-bridge-mautrix-discord.md) bridge, because it is the most fully-featured and stable of the 3 Discord bridges supported by the playbook.
|
||||||
|
|
||||||
The playbook can install and configure [matrix-appservice-discord](https://github.com/Half-Shot/matrix-appservice-discord) for you.
|
The playbook can install and configure [matrix-appservice-discord](https://github.com/matrix-org/matrix-appservice-discord) for you.
|
||||||
|
|
||||||
See the project's [documentation](https://github.com/Half-Shot/matrix-appservice-discord/blob/master/README.md) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/matrix-org/matrix-appservice-discord/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
## Setup Instructions
|
Create a Discord Application [here](https://discordapp.com/developers/applications). Then retrieve Client ID, and create a bot from the Bot tab and retrieve the Bot token.
|
||||||
|
|
||||||
Instructions loosely based on [this](https://github.com/Half-Shot/matrix-appservice-discord#setting-up).
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
1. Create a Discord Application [here](https://discordapp.com/developers/applications).
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
2. Retrieve Client ID.
|
|
||||||
3. Create a bot from the Bot tab and retrieve the Bot token.
|
|
||||||
4. Enable the bridge with the following configuration in your `vars.yml` file:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_appservice_discord_enabled: true
|
matrix_appservice_discord_enabled: true
|
||||||
matrix_appservice_discord_client_id: "YOUR DISCORD APP CLIENT ID"
|
matrix_appservice_discord_client_id: "YOUR DISCORD APP CLIENT ID"
|
||||||
matrix_appservice_discord_bot_token: "YOUR DISCORD APP BOT TOKEN"
|
matrix_appservice_discord_bot_token: "YOUR DISCORD APP BOT TOKEN"
|
||||||
```
|
|
||||||
5. As of Synapse 1.90.0, you will need to add the following to `matrix_synapse_configuration_extension_yaml` to enable the [backwards compatibility](https://matrix-org.github.io/synapse/latest/upgrade#upgrading-to-v1900) that this bridge needs:
|
|
||||||
```yaml
|
|
||||||
matrix_synapse_configuration_extension_yaml: |
|
|
||||||
use_appservice_legacy_authorization: true
|
|
||||||
```
|
|
||||||
*Note*: This deprecated method is considered insecure.
|
|
||||||
|
|
||||||
6. If you've already installed Matrix services using the playbook before, you'll need to re-run it (`--tags=setup-all,start`). If not, proceed with [configuring other playbook services](configuring-playbook.md) and then with [Installing](installing.md). Get back to this guide once ready.
|
# As of Synapse 1.90.0, uncomment to enable the backwards compatibility (https://matrix-org.github.io/synapse/latest/upgrade#upgrading-to-v1900) that this bridge needs.
|
||||||
|
# Note: This deprecated method is considered insecure.
|
||||||
|
#
|
||||||
|
# matrix_synapse_configuration_extension_yaml: |
|
||||||
|
# use_appservice_legacy_authorization: true
|
||||||
|
```
|
||||||
|
|
||||||
Other configuration options are available via the `matrix_appservice_discord_configuration_extension_yaml` variable.
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Self-Service Bridging (Manual)
|
## Self-Service Bridging (Manual)
|
||||||
|
|
||||||
Self-service bridging allows you to bridge specific and existing Matrix rooms to specific Discord rooms. This is disabled by default, so it must be enabled by adding this to your `vars.yml`:
|
Self-service bridging allows you to bridge specific and existing Matrix rooms to specific Discord rooms. To enable it, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_appservice_discord_bridge_enableSelfServiceBridging: true
|
matrix_appservice_discord_bridge_enableSelfServiceBridging: true
|
||||||
```
|
```
|
||||||
|
|
||||||
_Note: If self-service bridging is not enabled, `!discord help` commands will return no results._
|
**Note**: If self-service bridging is not enabled, `!discord help` commands will return no results.
|
||||||
|
|
||||||
Once self-service is enabled:
|
### Usage
|
||||||
|
|
||||||
1. Start a chat with `@_discord_bot:<YOUR_DOMAIN>` and say `!discord help bridge`.
|
Once self-service is enabled, start a chat with `@_discord_bot:example.com` and say `!discord help bridge`.
|
||||||
2. Follow the instructions in the help output message. If the bot is not already in the Discord server, follow the provided invite link. This may require you to be a administrator of the Discord server.
|
|
||||||
|
|
||||||
_Note: Encrypted Matrix rooms are not supported as of writing._
|
Then, follow the instructions in the help output message.
|
||||||
|
|
||||||
On the Discord side, you can say `!matrix help` to get a list of available commands to manage the bridge and Matrix users.
|
If the bot is not already in the Discord server, follow the provided invite link. This may require you to be a administrator of the Discord server.
|
||||||
|
|
||||||
|
On the Discord side, send `!matrix help` to the bot to see the available commands for managing the bridge and Matrix users.
|
||||||
|
|
||||||
|
**Note**: Encrypted Matrix rooms are not supported as of writing.
|
||||||
|
|
||||||
## Portal Bridging (Automatic)
|
## Portal Bridging (Automatic)
|
||||||
|
|
||||||
Through portal bridging, Matrix rooms will automatically be created by the bot and bridged to the relevant Discord room. This is done by simply joining a room with a specific name pattern (`#_discord_<guildID>_<channlID>`).
|
Through portal bridging, Matrix rooms will automatically be created by the bot and bridged to the relevant Discord room. This is done by simply joining a room with a specific name pattern (`#_discord_<guildID>_<channelID>`).
|
||||||
|
|
||||||
All Matrix rooms created this way are **listed publicly** by default, and you will not have admin permissions to change this. To get more control, [make yourself a room Administrator](#getting-administrator-access-in-a-portal-bridged-room). You can then unlist the room from the directory and change the join rules.
|
All Matrix rooms created this way are **listed publicly** by default, and you will not have admin permissions to change this. To get more control, [make yourself a room Administrator](#getting-administrator-access-in-a-portal-bridged-room). You can then unlist the room from the directory and change the join rules.
|
||||||
|
|
||||||
If you want to disable portal bridging, set the following in `vars.yml`:
|
To disable portal bridging, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_appservice_discord_bridge_disablePortalBridging: true
|
matrix_appservice_discord_bridge_disablePortalBridging: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Usage
|
||||||
|
|
||||||
To get started with Portal Bridging:
|
To get started with Portal Bridging:
|
||||||
|
|
||||||
1. To invite the bot to Discord, retrieve the invite link from the `{{ matrix_appservice_discord_config_path }}/invite_link` file on the server (this defaults to `/matrix/appservice-discord/config/invite_link`). You need to peek at the file on the server via SSH, etc., because it's not available via HTTP(S).
|
1. To invite the bot to Discord, retrieve the invite link from the `{{ matrix_appservice_discord_config_path }}/invite_link` file on the server (this defaults to `/matrix/appservice-discord/config/invite_link`). You need to peek at the file on the server via SSH, etc., because it's not available via HTTP(S).
|
||||||
@ -77,9 +93,9 @@ By default, you won't have Administrator access in rooms created by the bridge.
|
|||||||
|
|
||||||
To adjust room access privileges or do various other things (change the room name subsequently, etc.), you'd wish to become an Administrator.
|
To adjust room access privileges or do various other things (change the room name subsequently, etc.), you'd wish to become an Administrator.
|
||||||
|
|
||||||
There's the Discord bridge's guide for [setting privileges on bridge managed rooms](https://github.com/Half-Shot/matrix-appservice-discord/blob/master/docs/howto.md#set-privileges-on-bridge-managed-rooms). To do the same with our container setup, run the following command on the server:
|
There's the Discord bridge's guide for [setting privileges on bridge managed rooms](https://github.com/matrix-org/matrix-appservice-discord/blob/master/docs/howto.md#set-privileges-on-bridge-managed-rooms). To do the same with our container setup, run the following command on the server:
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
docker exec -it matrix-appservice-discord \
|
docker exec -it matrix-appservice-discord \
|
||||||
/bin/sh -c 'cp /cfg/registration.yaml /tmp/discord-registration.yaml && cd /tmp && node /build/tools/adminme.js -c /cfg/config.yaml -m "!ROOM_ID:SERVER" -u "@USER:SERVER" -p 100'
|
/bin/sh -c 'cp /cfg/registration.yaml /tmp/discord-registration.yaml && cd /tmp && node /build/tools/adminme.js -c /cfg/config.yaml -m "!qporfwt:example.com" -u "@alice:example.com" -p 100'
|
||||||
```
|
```
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
# Setting up Appservice IRC (optional)
|
# Setting up Appservice IRC bridging (optional)
|
||||||
|
|
||||||
**Note**: bridging to [IRC](https://en.wikipedia.org/wiki/Internet_Relay_Chat) can also happen via the [Heisenbridge](configuring-playbook-bridge-heisenbridge.md) bridge supported by the playbook.
|
**Note**: bridging to [IRC](https://en.wikipedia.org/wiki/Internet_Relay_Chat) can also happen via the [Heisenbridge](configuring-playbook-bridge-heisenbridge.md) bridge supported by the playbook.
|
||||||
|
|
||||||
@ -6,7 +6,9 @@ The playbook can install and configure the [matrix-appservice-irc](https://githu
|
|||||||
|
|
||||||
See the project's [documentation](https://github.com/matrix-org/matrix-appservice-irc/blob/master/HOWTO.md) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/matrix-org/matrix-appservice-irc/blob/master/HOWTO.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
You'll need to use the following playbook configuration:
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_appservice_irc_enabled: true
|
matrix_appservice_irc_enabled: true
|
||||||
@ -58,4 +60,23 @@ matrix_appservice_irc_ircService_servers:
|
|||||||
lineLimit: 3
|
lineLimit: 3
|
||||||
```
|
```
|
||||||
|
|
||||||
You then need to start a chat with `@irc_bot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
To use the bridge, you need to start a chat with `@irc_bot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
@ -1,15 +1,20 @@
|
|||||||
# Setting up Appservice Kakaotalk (optional)
|
# Setting up Appservice Kakaotalk bridging (optional)
|
||||||
|
|
||||||
The playbook can install and configure [matrix-appservice-kakaotalk](https://src.miscworks.net/fair/matrix-appservice-kakaotalk) for you. `matrix-appservice-kakaotalk` is a bridge to [Kakaotalk](https://www.kakaocorp.com/page/service/service/KakaoTalk?lang=ENG) based on [node-kakao](https://github.com/storycraft/node-kakao) (now unmaintained) and some [mautrix-facebook](https://github.com/mautrix/facebook) code.
|
The playbook can install and configure [matrix-appservice-kakaotalk](https://src.miscworks.net/fair/matrix-appservice-kakaotalk) for you. `matrix-appservice-kakaotalk` is a bridge to [Kakaotalk](https://www.kakaocorp.com/page/service/service/KakaoTalk?lang=ENG) based on [node-kakao](https://github.com/storycraft/node-kakao) (now unmaintained) and some [mautrix-facebook](https://github.com/mautrix/facebook) code.
|
||||||
|
|
||||||
**NOTE**: there have been recent reports (~2022-09-16) that **using this bridge may get your account banned**.
|
⚠️ **Warning**: there have been recent reports (~2022-09-16) that **using this bridge may get your account banned**.
|
||||||
|
|
||||||
See the project's [documentation](https://src.miscworks.net/fair/matrix-appservice-kakaotalk) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://src.miscworks.net/fair/matrix-appservice-kakaotalk/src/branch/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
## Prerequisite (optional)
|
||||||
|
|
||||||
## Installing
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
||||||
|
|
||||||
To enable the bridge, add this to your `vars.yml` file:
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_appservice_kakaotalk_enabled: true
|
matrix_appservice_kakaotalk_enabled: true
|
||||||
@ -17,11 +22,6 @@ matrix_appservice_kakaotalk_enabled: true
|
|||||||
|
|
||||||
You may optionally wish to add some [Additional configuration](#additional-configuration), or to [prepare for double-puppeting](#set-up-double-puppeting) before the initial installation.
|
You may optionally wish to add some [Additional configuration](#additional-configuration), or to [prepare for double-puppeting](#set-up-double-puppeting) before the initial installation.
|
||||||
|
|
||||||
After adjusting your `vars.yml` file, re-run the playbook and restart all services: `ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start`
|
|
||||||
|
|
||||||
To make use of the Kakaotalk bridge, see [Usage](#usage) below.
|
|
||||||
|
|
||||||
|
|
||||||
### Additional configuration
|
### Additional configuration
|
||||||
|
|
||||||
There are some additional things you may wish to configure about the bridge.
|
There are some additional things you may wish to configure about the bridge.
|
||||||
@ -31,34 +31,47 @@ Take a look at:
|
|||||||
- `roles/custom/matrix-bridge-appservice-kakaotalk/defaults/main.yml` for some variables that you can customize via your `vars.yml` file
|
- `roles/custom/matrix-bridge-appservice-kakaotalk/defaults/main.yml` for some variables that you can customize via your `vars.yml` file
|
||||||
- `roles/custom/matrix-bridge-appservice-kakaotalk/templates/config.yaml.j2` for the bridge's default configuration. You can override settings (even those that don't have dedicated playbook variables) using the `matrix_appservice_kakaotalk_configuration_extension_yaml` variable
|
- `roles/custom/matrix-bridge-appservice-kakaotalk/templates/config.yaml.j2` for the bridge's default configuration. You can override settings (even those that don't have dedicated playbook variables) using the `matrix_appservice_kakaotalk_configuration_extension_yaml` variable
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
### Set up Double Puppeting
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have 2 ways of going about it.
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
To use the bridge, you need to start a chat with `@kakaotalkbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
|
Send `login --save EMAIL_OR_PHONE_NUMBER` to the bridge bot to enable bridging for your Kakaotalk account. The `--save` flag may be omitted, if you'd rather not save your password.
|
||||||
|
|
||||||
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
#### Method 1: automatically, by enabling Shared Secret Auth
|
#### Method 1: automatically, by enabling Shared Secret Auth
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
The bridge automatically performs Double Puppeting if [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
#### Method 2: manually, by asking each user to provide a working access token
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
**Note**: This method for enabling Double Puppeting can be configured only after you've already set up bridging (see [Usage](#usage)).
|
|
||||||
|
|
||||||
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to do that](obtaining-access-tokens.md).
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
||||||
|
|
||||||
- make sure you don't log out the `Appservice-Kakaotalk` device some time in the future, as that would break the Double Puppeting feature
|
- make sure you don't log out the `Appservice-Kakaotalk` device some time in the future, as that would break the Double Puppeting feature
|
||||||
|
|
||||||
|
|
||||||
## Usage
|
|
||||||
|
|
||||||
Start a chat with `@kakaotalkbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
|
||||||
|
|
||||||
Send `login --save EMAIL_OR_PHONE_NUMBER` to the bridge bot to enable bridging for your Kakaotalk account. The `--save` flag may be omitted, if you'd rather not save your password.
|
|
||||||
|
|
||||||
After successfully enabling bridging, you may wish to [set up Double Puppeting](#set-up-double-puppeting), if you haven't already done so.
|
|
||||||
|
@ -1,112 +1,136 @@
|
|||||||
# Setting up Appservice Slack (optional)
|
# Setting up Appservice Slack bridging (optional)
|
||||||
|
|
||||||
**Note**: bridging to [Slack](https://slack.com) can also happen via the [mx-puppet-slack](configuring-playbook-bridge-mx-puppet-slack.md) and [mautrix-slack](configuring-playbook-bridge-mautrix-slack.md) bridges supported by the playbook.
|
**Notes**:
|
||||||
|
- Bridging to [Slack](https://slack.com) can also happen via the [mx-puppet-slack](configuring-playbook-bridge-mx-puppet-slack.md) and [mautrix-slack](configuring-playbook-bridge-mautrix-slack.md) bridges supported by the playbook.
|
||||||
|
- Currently (as of November, 2024) **this component is not available for new installation unless you have already created a classic Slack application** (which the bridge makes use of in order to enable bridging between Slack and Matrix), because the creation of classic Slack applications has been discontinued since June 4 2024. The author of the bridge claims [here](https://github.com/matrix-org/matrix-appservice-slack/issues/789#issuecomment-2172947787) that he plans to support the modern Slack application and until then "the best (and only) option for new installations is to use the webhook bridging".
|
||||||
|
|
||||||
The playbook can install and configure [matrix-appservice-slack](https://github.com/matrix-org/matrix-appservice-slack) for you.
|
The playbook can install and configure [matrix-appservice-slack](https://github.com/matrix-org/matrix-appservice-slack) for you.
|
||||||
|
|
||||||
See the project's [documentation](https://github.com/matrix-org/matrix-appservice-slack/blob/master/README.md) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/matrix-org/matrix-appservice-slack/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
## Setup Instructions:
|
## Prerequisites
|
||||||
|
|
||||||
loosely based on [this](https://github.com/matrix-org/matrix-appservice-slack#Setup)
|
### Create a Classic Slack App
|
||||||
|
|
||||||
1. Create a new Matrix room to act as the administration control room. Note its internal room ID. This can
|
First, you need to create a Classic Slack App [here](https://api.slack.com/apps?new_classic_app=1).
|
||||||
be done in Element by making a message, opening the options for that message and choosing "view source". The
|
|
||||||
room ID will be displayed near the top.
|
Name the app "matrixbot" (or anything else you'll remember). Select the team/workspace this app will belong to. Click on bot users and add a new bot user. We will use this account to bridge the the rooms.
|
||||||
2. Enable the bridge with the following configuration in your `vars.yml` file:
|
|
||||||
|
Then, click on Event Subscriptions and enable them and use the request url: `https://matrix.example.com/appservice-slack`.
|
||||||
|
|
||||||
|
Add the following events as `Bot User Events` and save:
|
||||||
|
|
||||||
|
- team_domain_change
|
||||||
|
- message.channels
|
||||||
|
- message.groups (if you want to bridge private channels)
|
||||||
|
- reaction_added
|
||||||
|
- reaction_removed
|
||||||
|
|
||||||
|
Next, click on "OAuth & Permissions" and add the following scopes:
|
||||||
|
|
||||||
|
- chat:write:bot
|
||||||
|
- users:read
|
||||||
|
- reactions:write
|
||||||
|
- files:write:user (if you want to bridge files)
|
||||||
|
|
||||||
|
**Note**: In order to make Slack files visible to Matrix users, this bridge will make Slack files visible to anyone with the url (including files in private channels). This is different than the current behavior in Slack, which only allows authenticated access to media posted in private channels. See MSC701 for details.
|
||||||
|
|
||||||
|
Click on "Install App" and "Install App to Workspace". Note the access tokens shown. You will need the Bot User OAuth Access Token and if you want to bridge files, the OAuth Access Token whenever you link a room.
|
||||||
|
|
||||||
|
### Create an administration control room on Matrix
|
||||||
|
|
||||||
|
Create a new Matrix room to act as the administration control room.
|
||||||
|
|
||||||
|
Note its internal room ID. This can be done in Element Web by sending a message, opening the options for that message and choosing "view source". The room ID will be displayed near the top.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_appservice_slack_enabled: true
|
matrix_appservice_slack_enabled: true
|
||||||
matrix_appservice_slack_control_room_id: "Your matrix admin room id"
|
matrix_appservice_slack_control_room_id: "Your Matrix admin room ID"
|
||||||
|
|
||||||
|
# Uncomment to enable puppeting (optional, but recommended)
|
||||||
|
# matrix_appservice_slack_puppeting_enabled: true
|
||||||
|
# matrix_appservice_slack_puppeting_slackapp_client_id: "Your Classic Slack App Client ID"
|
||||||
|
# matrix_appservice_slack_puppeting_slackapp_client_secret: "Your Classic Slack App Client Secret"
|
||||||
|
|
||||||
|
# Uncomment to enable Team Sync (optional)
|
||||||
|
# See https://matrix-appservice-slack.readthedocs.io/en/latest/team_sync/
|
||||||
|
# matrix_appservice_slack_team_sync_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
3. If you've already installed Matrix services using the playbook before, you'll need to re-run it (`--tags=setup-all,start`). If not, proceed with [configuring other playbook services](configuring-playbook.md) and then with [Installing](installing.md). Get back to this guide once ready.
|
|
||||||
4. Invite the bridge bot user into the admin room:
|
|
||||||
|
|
||||||
```
|
|
||||||
/invite @slackbot:MY.DOMAIN
|
|
||||||
```
|
|
||||||
|
|
||||||
Note that the bot's domain is your server's domain **without the `matrix.` prefix.**
|
|
||||||
|
|
||||||
5. Create a Classic Slack App [here](https://api.slack.com/apps?new_classic_app=1).
|
|
||||||
|
|
||||||
Name the app "matrixbot" (or anything else you'll remember).
|
|
||||||
|
|
||||||
Select the team/workspace this app will belong to.
|
|
||||||
|
|
||||||
Click on bot users and add a new bot user. We will use this account to bridge the the rooms.
|
|
||||||
|
|
||||||
6. Click on Event Subscriptions and enable them and use the request url `https://matrix.DOMAIN/appservice-slack`. Then add the following events and save:
|
|
||||||
|
|
||||||
Bot User Events:
|
|
||||||
|
|
||||||
- team_domain_change
|
|
||||||
- message.channels
|
|
||||||
- message.groups (if you want to bridge private channels)
|
|
||||||
- reaction_added
|
|
||||||
- reaction_removed
|
|
||||||
|
|
||||||
7. Click on OAuth & Permissions and add the following scopes:
|
|
||||||
|
|
||||||
- chat:write:bot
|
|
||||||
- users:read
|
|
||||||
- reactions:write
|
|
||||||
|
|
||||||
If you want to bridge files, also add the following:
|
|
||||||
|
|
||||||
- files:write:user
|
|
||||||
|
|
||||||
Note: In order to make Slack files visible to matrix users, this bridge will make Slack files visible to anyone with the url (including files in private channels). This is different than the current behavior in Slack, which only allows authenticated access to media posted in private channels. See MSC701 for details.
|
|
||||||
|
|
||||||
8. Click on Install App and Install App to Workspace. Note the access tokens shown. You will need the Bot User OAuth Access Token and if you want to bridge files, the OAuth Access Token whenever you link a room.
|
|
||||||
|
|
||||||
9. For each channel you would like to bridge, perform the following steps:
|
|
||||||
|
|
||||||
* Create a Matrix room in the usual manner for your client. Take a note of its Matrix room ID - it will look something like !aBcDeF:example.com.
|
|
||||||
|
|
||||||
* Invite the bot user to both the Slack and Matrix channels you would like to bridge using `/invite @matrixbot` for slack and `/invite @slackbot:MY.DOMAIN` for matrix.
|
|
||||||
|
|
||||||
* Determine the "channel ID" that Slack uses to identify the channel. You can see it when you open a given Slack channel in a browser. The URL reads like this: `https://app.slack.com/client/XXX/<the channel id>/details/`.
|
|
||||||
|
|
||||||
* Issue a link command in the administration control room with these collected values as arguments:
|
|
||||||
|
|
||||||
with file bridging:
|
|
||||||
```
|
|
||||||
link --channel_id CHANNELID --room !the-matrix:room.id --slack_bot_token xoxb-xxxxxxxxxx-xxxxxxxxxxxxxxxxxxxx --slack_user_token xoxp-xxxxxxxx-xxxxxxxxx-xxxxxxxx-xxxxxxxx
|
|
||||||
```
|
|
||||||
without file bridging:
|
|
||||||
```
|
|
||||||
link --channel_id CHANNELID --room !the-matrix:room.id --slack_bot_token xoxb-xxxxxxxxxx-xxxxxxxxxxxxxxxxxxxx
|
|
||||||
```
|
|
||||||
These arguments can be shortened to single-letter forms:
|
|
||||||
```
|
|
||||||
link -I CHANNELID -R !the-matrix:room.id -t xoxb-xxxxxxxxxx-xxxxxxxxxxxxxxxxxxxx
|
|
||||||
```
|
|
||||||
|
|
||||||
Other configuration options are available via the `matrix_appservice_slack_configuration_extension_yaml` variable.
|
Other configuration options are available via the `matrix_appservice_slack_configuration_extension_yaml` variable.
|
||||||
|
|
||||||
10. Unlinking
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
To use the bridge, you need to send `/invite @slackbot:example.com` to invite the bridge bot user into the admin room.
|
||||||
|
|
||||||
|
If Team Sync is not enabled, for each channel you would like to bridge, perform the following steps:
|
||||||
|
|
||||||
|
- Create a Matrix room in the usual manner for your client. Take a note of its Matrix room ID - it will look something like `!qporfwt:example.com`.
|
||||||
|
- Invite the bot user to both the Slack and Matrix channels you would like to bridge using `/invite @matrixbot` for Slack and `/invite @slackbot:example.com` for Matrix.
|
||||||
|
- Determine the "channel ID" that Slack uses to identify the channel. You can see it when you open a given Slack channel in a browser. The URL reads like this: `https://app.slack.com/client/XXX/<the channel ID>/details/`.
|
||||||
|
- Issue a link command in the administration control room with these collected values as arguments:
|
||||||
|
|
||||||
|
with file bridging:
|
||||||
|
|
||||||
Channels can be unlinked again like this:
|
|
||||||
```
|
```
|
||||||
unlink --room !the-matrix:room.id
|
link --channel_id CHANNELID --room !qporfwt:example.com --slack_bot_token xoxb-xxxxxxxxxx-xxxxxxxxxxxxxxxxxxxx --slack_user_token xoxp-xxxxxxxx-xxxxxxxxx-xxxxxxxx-xxxxxxxx
|
||||||
```
|
```
|
||||||
|
|
||||||
Unlinking doesn't only disconnect the bridge, but also makes the slackbot leave the bridged matrix room. So in case you want to re-link later, don't forget to re-invite the slackbot into this room again.
|
without file bridging:
|
||||||
|
|
||||||
|
```
|
||||||
|
link --channel_id CHANNELID --room !qporfwt:example.com --slack_bot_token xoxb-xxxxxxxxxx-xxxxxxxxxxxxxxxxxxxx
|
||||||
|
```
|
||||||
|
|
||||||
|
These arguments can be shortened to single-letter forms:
|
||||||
|
|
||||||
|
```
|
||||||
|
link -I CHANNELID -R !qporfwt:example.com -t xoxb-xxxxxxxxxx-xxxxxxxxxxxxxxxxxxxx
|
||||||
|
```
|
||||||
|
|
||||||
|
### Unlinking
|
||||||
|
|
||||||
|
Channels can be unlinked again by sending this:
|
||||||
|
|
||||||
|
```
|
||||||
|
unlink --room !qporfwt:example.com
|
||||||
|
```
|
||||||
|
|
||||||
|
Unlinking doesn't only disconnect the bridge, but also makes the slackbot leave the bridged Matrix room. So in case you want to re-link later, don't forget to re-invite the slackbot into this room again.
|
||||||
|
|
||||||
## Troubleshooting
|
## Troubleshooting
|
||||||
|
|
||||||
* as always, check the logs:
|
As always, check the logs: `journalctl -fu matrix-appservice-slack`
|
||||||
`journalctl -fu matrix-appservice-slack`
|
|
||||||
|
|
||||||
* linking: "Room is now pending-name"
|
### Linking: "Room is now pending-name"
|
||||||
This typically means that you haven't used the correct slack channel id. Unlink the room and recheck 'Determine the "channel ID"' from above.
|
|
||||||
|
This typically means that you haven't used the correct Slack channel ID. Unlink the room and recheck 'Determine the "channel ID"' from above.
|
||||||
|
|
||||||
|
### Messages work from Matrix to Slack, but not the other way around
|
||||||
|
|
||||||
* Messages work from M to S, but not the other way around
|
|
||||||
Check you logs, if they say something like
|
Check you logs, if they say something like
|
||||||
|
|
||||||
`WARN SlackEventHandler Ignoring message from unrecognised slack channel id : %s (%s) <the channel id> <some other id>`
|
`WARN SlackEventHandler Ignoring message from unrecognised Slack channel ID : %s (%s) <the channel ID> <some other ID>`
|
||||||
|
|
||||||
then unlink your room, reinvite the bot and re-link it again. This may particularly hit you, if you tried to unsuccessfully link
|
then unlink your room, reinvite the bot and re-link it again. This may particularly hit you, if you tried to unsuccessfully link your room multiple times without unlinking it after each failed attempt.
|
||||||
your room multiple times without unlinking it after each failed attempt.
|
|
||||||
|
@ -1,54 +1,61 @@
|
|||||||
# Setting up Appservice Webhooks (optional)
|
# Setting up Appservice Webhooks bridging (optional, deprecated)
|
||||||
|
|
||||||
The playbook can install and configure [matrix-appservice-webhooks](https://github.com/turt2live/matrix-appservice-webhooks) for you.
|
**Note**: This bridge has been deprecated. We recommend not bothering with installing it. While not a 1:1 replacement, the bridge's author suggests taking a look at [matrix-hookshot](https://github.com/matrix-org/matrix-hookshot) as a replacement, which can also be installed using [this playbook](configuring-playbook-bridge-hookshot.md). Consider using that bridge instead of this one.
|
||||||
|
|
||||||
Note: This bridge is no longer maintained. While not a 1:1 replacement, the bridge's author suggests taking a look at [matrix-hookshot](https://github.com/Half-Shot/matrix-hookshot) as a replacement, which can also be installed using [this playbook](configuring-playbook-bridge-hookshot.md).
|
The playbook can install and configure [matrix-appservice-webhooks](https://github.com/turt2live/matrix-appservice-webhooks) for you. This bridge provides support for Slack-compatible webhooks.
|
||||||
|
|
||||||
This bridge provides support for Slack-compatible webhooks.
|
See the project's [documentation](https://github.com/turt2live/matrix-appservice-webhooks/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
Setup Instructions:
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
loosely based on [this](https://github.com/turt2live/matrix-appservice-webhooks/blob/master/README.md)
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
1. All you basically need is to adjust your `inventory/host_vars/matrix.<domain-name>/vars.yml`:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_appservice_webhooks_enabled: true
|
matrix_appservice_webhooks_enabled: true
|
||||||
matrix_appservice_webhooks_api_secret: '<your_secret>'
|
matrix_appservice_webhooks_api_secret: '<your_secret>'
|
||||||
|
|
||||||
|
# Uncomment to increase the verbosity of logging via `journalctl -fu matrix-appservice-webhooks.service`
|
||||||
|
# matrix_appservice_webhooks_log_level: 'verbose'
|
||||||
|
|
||||||
|
# As of Synapse 1.90.0, uncomment to enable the backwards compatibility (https://matrix-org.github.io/synapse/latest/upgrade#upgrading-to-v1900) that this bridge needs.
|
||||||
|
# Note: This deprecated method is considered insecure.
|
||||||
|
#
|
||||||
|
# matrix_synapse_configuration_extension_yaml: |
|
||||||
|
# use_appservice_legacy_authorization: true
|
||||||
```
|
```
|
||||||
|
|
||||||
2. In case you want to change the verbosity of logging via `journalctl -fu matrix-appservice-webhooks.service`
|
## Installing
|
||||||
you can adjust this in `inventory/host_vars/matrix.<domain-name>/vars.yml` as well.
|
|
||||||
|
|
||||||
*Note*: default value is: `info` and availabe log levels are : `info`, `verbose`
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
```yaml
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
matrix_appservice_webhooks_log_level: '<log_level>'
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
```
|
```
|
||||||
|
|
||||||
3. As of Synapse 1.90.0, you will need to add the following to `matrix_synapse_configuration_extension_yaml` to enable the [backwards compatibility](https://matrix-org.github.io/synapse/latest/upgrade#upgrading-to-v1900) that this bridge needs:
|
**Notes**:
|
||||||
```yaml
|
|
||||||
matrix_synapse_configuration_extension_yaml: |
|
|
||||||
use_appservice_legacy_authorization: true
|
|
||||||
```
|
|
||||||
*Note*: This deprecated method is considered insecure.
|
|
||||||
|
|
||||||
4. If you've already installed Matrix services using the playbook before, you'll need to re-run it (`--tags=setup-all,start`). If not, proceed with [configuring other playbook services](configuring-playbook.md) and then with [Installing](installing.md). Get back to this guide once ready.
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
5. If you're using the [Dimension Integration Manager](configuring-playbook-dimension.md), you can configure the Webhooks bridge by opening the Dimension integration manager -> Settings -> Bridges and selecting edit action for "Webhook Bridge". Press "Add self-hosted Bridge" button and populate "Provisioning URL" & "Shared Secret" values from `/matrix/appservice-webhooks/config/config.yaml` file's homeserver URL value and provisioning secret value, respectively.
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
6. Invite the bridge bot user to your room:
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
- either with `/invite @_webhook:<domain.name>` (*Note*: Make sure you have administration permissions in your room)
|
## Usage
|
||||||
|
|
||||||
- or simply add the bridge bot to a private channel (personal channels imply you being an administrator)
|
To use the bridge, you need to invite the bridge bot user to your room in either way.
|
||||||
|
|
||||||
|
- Send `/invite @_webhook:example.com` (**Note**: Make sure you have administration permissions in your room)
|
||||||
|
- Add the bridge bot to a private channel (personal channels imply you being an administrator)
|
||||||
|
|
||||||
|
You then need to send a message to the bridge bot in order to receive a private message including the webhook link:
|
||||||
|
|
||||||
7. Send a message to the bridge bot in order to receive a private message including the webhook link.
|
|
||||||
```
|
```
|
||||||
!webhook
|
!webhook
|
||||||
```
|
```
|
||||||
|
|
||||||
8. The JSON body for posting messages will have to look like this:
|
The JSON body for posting messages will have to look like this:
|
||||||
|
|
||||||
```json
|
```json
|
||||||
{
|
{
|
||||||
"text": "Hello world!",
|
"text": "Hello world!",
|
||||||
@ -60,7 +67,7 @@ matrix_synapse_configuration_extension_yaml: |
|
|||||||
|
|
||||||
You can test this via curl like so:
|
You can test this via curl like so:
|
||||||
|
|
||||||
```
|
```sh
|
||||||
curl --header "Content-Type: application/json" \
|
curl --header "Content-Type: application/json" \
|
||||||
--data '{
|
--data '{
|
||||||
"text": "Hello world!",
|
"text": "Hello world!",
|
||||||
@ -68,5 +75,13 @@ curl --header "Content-Type: application/json" \
|
|||||||
"displayName": "My Cool Webhook",
|
"displayName": "My Cool Webhook",
|
||||||
"avatar_url": "http://i.imgur.com/IDOBtEJ.png"
|
"avatar_url": "http://i.imgur.com/IDOBtEJ.png"
|
||||||
}' \
|
}' \
|
||||||
<the link you've gotten in 5.>
|
<the webhook link you've gotten from the bridge bot>
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Setting Webhooks with Dimension integration manager
|
||||||
|
|
||||||
|
If you're using the [Dimension integration manager](configuring-playbook-dimension.md), you can configure the Webhooks bridge with it.
|
||||||
|
|
||||||
|
To configure it, open the Dimension integration manager, and go to "Settings" and "Bridges", then select edit action for "Webhook Bridge".
|
||||||
|
|
||||||
|
On the UI, press "Add self-hosted Bridge" button and populate "Provisioning URL" and "Shared Secret" values from `/matrix/appservice-webhooks/config/config.yaml` file's homeserver URL value and provisioning secret value, respectively.
|
||||||
|
@ -1,9 +1,13 @@
|
|||||||
# Setting up Beeper Linkedin (optional)
|
# Setting up Beeper Linkedin bridging (optional)
|
||||||
|
|
||||||
The playbook can install and configure [beeper-linkedin](https://github.com/beeper/linkedin) for you, for bridging to [LinkedIn](https://www.linkedin.com/) Messaging. This bridge is based on the mautrix-python framework and can be configured in a similar way to the other mautrix bridges
|
The playbook can install and configure [beeper-linkedin](https://github.com/beeper/linkedin) for you, for bridging to [LinkedIn](https://www.linkedin.com/) Messaging. This bridge is based on the mautrix-python framework and can be configured in a similar way to the other mautrix bridges
|
||||||
|
|
||||||
See the project's [documentation](https://github.com/beeper/linkedin/blob/master/README.md) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/beeper/linkedin/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_beeper_linkedin_enabled: true
|
matrix_beeper_linkedin_enabled: true
|
||||||
```
|
```
|
||||||
@ -11,42 +15,57 @@ matrix_beeper_linkedin_enabled: true
|
|||||||
There are some additional things you may wish to configure about the bridge before you continue.
|
There are some additional things you may wish to configure about the bridge before you continue.
|
||||||
|
|
||||||
Encryption support is off by default. If you would like to enable encryption, add the following to your `vars.yml` file:
|
Encryption support is off by default. If you would like to enable encryption, add the following to your `vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_beeper_linkedin_configuration_extension_yaml: |
|
matrix_beeper_linkedin_bridge_encryption_allow: true
|
||||||
bridge:
|
matrix_beeper_linkedin_bridge_encryption_default: true
|
||||||
encryption:
|
|
||||||
allow: true
|
|
||||||
default: true
|
|
||||||
```
|
```
|
||||||
|
|
||||||
If you would like to be able to administrate the bridge from your account it can be configured like this:
|
If you would like to be able to administrate the bridge from your account it can be configured like this:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_beeper_linkedin_configuration_extension_yaml: |
|
matrix_beeper_linkedin_configuration_extension_yaml: |
|
||||||
bridge:
|
bridge:
|
||||||
permissions:
|
permissions:
|
||||||
'@YOUR_USERNAME:YOUR_DOMAIN': admin
|
'@alice:{{ matrix_domain }}': admin
|
||||||
```
|
```
|
||||||
|
|
||||||
You may wish to look at `roles/custom/matrix-bridge-beeper-linkedin/templates/config.yaml.j2` to find other things you would like to configure.
|
You may wish to look at `roles/custom/matrix-bridge-beeper-linkedin/templates/config.yaml.j2` to find other things you would like to configure.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
## Set up Double Puppeting
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have to enable Shared Secred Auth.
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Set up Double Puppeting by enabling Appservice Double Puppet or Shared Secret Auth
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) or [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
|
Enabling [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
|
Enabling double puppeting by enabling the [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service works at the time of writing, but is deprecated and will stop working in the future.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
You then need to start a chat with `@linkedinbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
To use the bridge, you need to start a chat with `@linkedinbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
Send `login YOUR_LINKEDIN_EMAIL_ADDRESS` to the bridge bot to enable bridging for your LinkedIn account.
|
Send `login YOUR_LINKEDIN_EMAIL_ADDRESS` to the bridge bot to enable bridging for your LinkedIn account.
|
||||||
|
|
||||||
If you run into trouble, check the [Troubleshooting](#troubleshooting) section below.
|
If you run into trouble, check the [Troubleshooting](#troubleshooting) section below.
|
||||||
|
|
||||||
After successfully enabling bridging, you may wish to [set up Double Puppeting](#set-up-double-puppeting), if you haven't already done so.
|
After successfully enabling bridging, you may wish to [set up Double Puppeting](#set-up-double-puppeting-by-enabling-appservice-double-puppet-or-shared-secret-auth), if you haven't already done so.
|
||||||
|
|
||||||
|
|
||||||
## Troubleshooting
|
## Troubleshooting
|
||||||
|
|
||||||
|
@ -1,23 +1,36 @@
|
|||||||
# Setting up Go Skype Bridge (optional)
|
# Setting up Go Skype Bridge bridging (optional)
|
||||||
|
|
||||||
The playbook can install and configure
|
The playbook can install and configure [go-skype-bridge](https://github.com/kelaresg/go-skype-bridge) for you.
|
||||||
[go-skype-bridge](https://github.com/kelaresg/go-skype-bridge) for you.
|
|
||||||
|
|
||||||
See the project page to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/kelaresg/go-skype-bridge/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
To enable the [Skype](https://www.skype.com/) bridge just use the following
|
## Adjusting the playbook configuration
|
||||||
playbook configuration:
|
|
||||||
|
|
||||||
|
To enable the [Skype](https://www.skype.com/) bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_go_skype_bridge_enabled: true
|
matrix_go_skype_bridge_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Once the bot is enabled, you need to start a chat with `Skype bridge bot`
|
To use the bridge, you need to start a chat with `Skype bridge bot` with the handle `@skypebridgebot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
with the handle `@skypebridgebot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base
|
|
||||||
domain, not the `matrix.` domain).
|
|
||||||
|
|
||||||
Send `help` to the bot to see the commands available.
|
Send `help` to the bot to see the available commands.
|
||||||
|
@ -1,37 +1,74 @@
|
|||||||
# Setting up Heisenbridge (optional)
|
# Setting up Heisenbridge bouncer-style IRC bridging (optional)
|
||||||
|
|
||||||
**Note**: bridging to [IRC](https://en.wikipedia.org/wiki/Internet_Relay_Chat) can also happen via the [matrix-appservice-irc](configuring-playbook-bridge-appservice-irc.md) bridge supported by the playbook.
|
**Note**: bridging to [IRC](https://en.wikipedia.org/wiki/Internet_Relay_Chat) can also happen via the [matrix-appservice-irc](configuring-playbook-bridge-appservice-irc.md) bridge supported by the playbook.
|
||||||
|
|
||||||
The playbook can install and configure [Heisenbridge](https://github.com/hifi/heisenbridge) - the bouncer-style [IRC](https://en.wikipedia.org/wiki/Internet_Relay_Chat) bridge for you.
|
The playbook can install and configure [Heisenbridge](https://github.com/hifi/heisenbridge) - the bouncer-style [IRC](https://en.wikipedia.org/wiki/Internet_Relay_Chat) bridge for you.
|
||||||
|
|
||||||
See the project's [README](https://github.com/hifi/heisenbridge/blob/master/README.md) to learn what it does and why it might be useful to you. You can also take a look at [this demonstration video](https://www.youtube.com/watch?v=nQk1Bp4tk4I).
|
See the project's [documentation](https://github.com/hifi/heisenbridge/blob/master/README.md) to learn what it does and why it might be useful to you. You can also take a look at [this demonstration video](https://www.youtube.com/watch?v=nQk1Bp4tk4I).
|
||||||
|
|
||||||
## Configuration
|
## Configuration
|
||||||
|
|
||||||
Below are the common configuration options that you may want to set, exhaustive list is in [the bridge's defaults var file](../roles/custom/matrix-bridge-heisenbridge/defaults/main.yml).
|
To enable Heisenbridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
At a minimum, you only need to enable the bridge to get it up and running (`inventory/host_vars/matrix.DOMAIN/vars.yml`):
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_heisenbridge_enabled: true
|
matrix_heisenbridge_enabled: true
|
||||||
|
|
||||||
# set owner (optional)
|
# Setting the owner is optional as the first local user to DM `@heisenbridge:example.com` will be made the owner.
|
||||||
matrix_heisenbridge_owner: "@you:your-homeserver"
|
# If you are not using a local user you must set it as otherwise you can't DM it at all.
|
||||||
|
matrix_heisenbridge_owner: "@alice:{{ matrix_domain }}"
|
||||||
|
|
||||||
# to enable identd on host port 113/TCP (optional)
|
# Uncomment to enable identd on host port 113/TCP (optional)
|
||||||
matrix_heisenbridge_identd_enabled: true
|
# matrix_heisenbridge_identd_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
That's it! A registration file is automatically generated during the setup phase.
|
For a more complete list of variables that you could override, see the [`defaults/main.yml` file](../roles/custom/matrix-bridge-heisenbridge/defaults/main.yml) of the Heisenbridge Ansible role.
|
||||||
|
|
||||||
Setting the owner is optional as the first local user to DM `@heisenbridge:your-homeserver` will be made the owner.
|
### Adjusting the Heisenbridge URL
|
||||||
If you are not using a local user you must set it as otherwise you can't DM it at all.
|
|
||||||
|
By default, this playbook installs Heisenbridge on the `matrix.` subdomain, at the `/heisenbridge` path (https://matrix.example.com/heisenbridge). It would handle media requests there (see the [release notes for Heisenbridge v1.15.0](https://github.com/hifi/heisenbridge/releases/tag/v1.15.0)).
|
||||||
|
|
||||||
|
This makes it easy to install it, because it **doesn't require additional DNS records to be set up**. If that's okay, you can skip this section.
|
||||||
|
|
||||||
|
By tweaking the `matrix_heisenbridge_hostname` and `matrix_heisenbridge_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Change the default hostname and path prefix
|
||||||
|
matrix_heisenbridge_hostname: heisenbridge.example.com
|
||||||
|
matrix_heisenbridge_path_prefix: /
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
If you've changed the default hostname, **you may need to adjust your DNS** records to point the Heisenbridge domain to the Matrix server.
|
||||||
|
|
||||||
|
See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to use the default hostname, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
After the bridge is successfully running just DM `@heisenbridge:your-homeserver` to start setting it up.
|
To use the bridge, you need to start a chat with `@heisenbridge:example.com` (where `example.com` is your base domain, not the `matrix.` domain). If the bridge ignores you and a DM is not accepted then the owner setting may be wrong.
|
||||||
|
|
||||||
Help is available for all commands with the `-h` switch.
|
Help is available for all commands with the `-h` switch.
|
||||||
If the bridge ignores you and a DM is not accepted then the owner setting may be wrong.
|
|
||||||
|
|
||||||
You can also learn the basics by watching [this demonstration video](https://www.youtube.com/watch?v=nQk1Bp4tk4I).
|
You can also learn the basics by watching [this demonstration video](https://www.youtube.com/watch?v=nQk1Bp4tk4I).
|
||||||
|
|
||||||
|
@ -1,41 +1,79 @@
|
|||||||
# Setting up Hookshot (optional)
|
# Setting up matrix-hookshot (optional)
|
||||||
|
|
||||||
The playbook can install and configure [matrix-hookshot](https://github.com/matrix-org/matrix-hookshot) for you.
|
The playbook can install and configure [matrix-hookshot](https://github.com/matrix-org/matrix-hookshot) for you.
|
||||||
|
|
||||||
Hookshot can bridge [Webhooks](https://en.wikipedia.org/wiki/Webhook) from software project management services such as GitHub, GitLab, JIRA, and Figma, as well as generic webhooks.
|
Hookshot can bridge [Webhooks](https://en.wikipedia.org/wiki/Webhook) from software project management services such as GitHub, GitLab, Jira, and Figma, as well as generic webhooks.
|
||||||
|
|
||||||
See the project's [documentation](https://matrix-org.github.io/matrix-hookshot/latest/hookshot.html) to learn what it does in detail and why it might be useful to you.
|
See the project's [documentation](https://matrix-org.github.io/matrix-hookshot/latest/hookshot.html) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
Note: the playbook also supports [matrix-appservice-webhooks](configuring-playbook-bridge-appservice-webhooks.md), which however is soon to be archived by its author and to be replaced by hookshot.
|
**Note**: the playbook also supports [matrix-appservice-webhooks](configuring-playbook-bridge-appservice-webhooks.md), which however was deprecated by its author.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
## Setup Instructions
|
### Download GitHub app private key (optional)
|
||||||
|
|
||||||
Refer to the [official instructions](https://matrix-org.github.io/matrix-hookshot/latest/setup.html) to learn what the individual options do.
|
If you're setting up the GitHub bridge, you need to create your GitHub app, and generate a private key file of it.
|
||||||
|
|
||||||
1. Enable the bridge by adding `matrix_hookshot_enabled: true` to your `vars.yml` file
|
You need to download the private key file, if you will install the file manually or with the `aux` role. For details, see [the section below](#manage-github-private-key-with-aux-role).
|
||||||
2. For each of the services (GitHub, GitLab, Jira, Figma, generic webhooks) fill in the respective variables `matrix_hookshot_service_*` listed in [main.yml](/roles/custom/matrix-bridge-hookshot/defaults/main.yml) as required.
|
|
||||||
3. Take special note of the `matrix_hookshot_*_enabled` variables. Services that need no further configuration are enabled by default (GitLab, Generic), while you must first add the required configuration and enable the others (GitHub, Jira, Figma).
|
|
||||||
4. If you're setting up the GitHub bridge, you'll need to generate and download a private key file after you created your GitHub app. Copy the contents of that file to the variable `matrix_hookshot_github_private_key` so the playbook can install it for you, or use one of the [other methods](#manage-github-private-key-with-aux-role) explained below.
|
|
||||||
5. If you've already installed Matrix services using the playbook before, you'll need to re-run it (`--tags=setup-all,start`). If not, proceed with [configuring other playbook services](configuring-playbook.md) and then with [Installing](installing.md). Get back to this guide once ready. Hookshot can be set up individually using the tag `setup-hookshot`.
|
|
||||||
|
|
||||||
Other configuration options are available via the `matrix_hookshot_configuration_extension_yaml` and `matrix_hookshot_registration_extension_yaml` variables, see the comments in [main.yml](/roles/custom/matrix-bridge-hookshot/defaults/main.yml) for how to use them.
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
Finally, run the playbook (see [installing](installing.md)).
|
Add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file. Make sure to replace `GITHUB_PRIVATE_KEY_HERE` with the one created [above](#download-github-app-private-key).
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_hookshot_enabled: true
|
||||||
|
|
||||||
|
# Uncomment to enable end-to-bridge encryption.
|
||||||
|
# See: https://matrix-org.github.io/matrix-hookshot/latest/advanced/encryption.html
|
||||||
|
# matrix_hookshot_experimental_encryption_enabled: true
|
||||||
|
|
||||||
|
# Uncomment and paste the contents of GitHub app private key to enable GitHub bridge.
|
||||||
|
# Alternatively, you can use one of the other methods explained below on the "Manage GitHub Private Key with aux role" section.
|
||||||
|
# matrix_hookshot_github_private_key: "GITHUB_PRIVATE_KEY_HERE"
|
||||||
|
```
|
||||||
|
|
||||||
|
For each of the services (GitHub, GitLab, Jira, Figma, and generic webhooks) fill in the respective variables `matrix_hookshot_service_*` listed in [main.yml](../roles/custom/matrix-bridge-hookshot/defaults/main.yml) as required.
|
||||||
|
|
||||||
|
Take special note of the `matrix_hookshot_*_enabled` variables. Services that need no further configuration are enabled by default (GitLab and generic webhooks), while you must first add the required configuration and enable the others (GitHub, Jira, and Figma).
|
||||||
|
|
||||||
|
### Extending the configuration
|
||||||
|
|
||||||
|
You can configure additional options by adding the `matrix_hookshot_configuration_extension_yaml` and `matrix_hookshot_registration_extension_yaml` variables.
|
||||||
|
|
||||||
|
Refer the [official instructions](https://matrix-org.github.io/matrix-hookshot/latest/setup.html) and the comments in [main.yml](../roles/custom/matrix-bridge-hookshot/defaults/main.yml) to learn what the individual options do.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-service hookshot` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-service hookshot` is useful for maintaining your setup quickly when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note `just setup-all` runs the `ensure-matrix-users-created` tag too.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Create a room and invite the Hookshot bot (`@hookshot:DOMAIN`) to it.
|
To use the bridge, you need to create a room and invite the Hookshot bot (`@hookshot:example.com`) to it.
|
||||||
|
|
||||||
Make sure the bot is able to send state events (usually the Moderator power level in clients).
|
Make sure the bot is able to send state events (usually the Moderator power level in clients).
|
||||||
|
|
||||||
Send a `!hookshot help` message to see a list of help commands.
|
Send `!hookshot help` to the bot to see the available commands.
|
||||||
|
|
||||||
Refer to [Hookshot's documentation](https://matrix-org.github.io/matrix-hookshot/latest/usage.html) for more details about using the brige's various features.
|
Refer to [Hookshot's documentation](https://matrix-org.github.io/matrix-hookshot/latest/usage.html) for more details about using the bridge's various features.
|
||||||
|
|
||||||
**Important:** Note that the different listeners are bound to certain paths which might differ from those assumed by the hookshot documentation, see [URLs for bridges setup](#urls-for-bridges-setup) below.
|
💡 **Note**: the different listeners are bound to certain paths which might differ from those assumed by the hookshot documentation. See [URLs for bridges setup](#urls-for-bridges-setup) below.
|
||||||
|
|
||||||
|
### Reset crypto store
|
||||||
|
|
||||||
|
Should the crypto store be corrupted, you can reset it by executing this Ansible playbook with the tag `reset-hookshot-encryption` added:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=reset-hookshot-encryption
|
||||||
|
```
|
||||||
|
|
||||||
## More setup documentation
|
## More setup documentation
|
||||||
|
|
||||||
@ -43,29 +81,32 @@ Refer to [Hookshot's documentation](https://matrix-org.github.io/matrix-hookshot
|
|||||||
|
|
||||||
Unless indicated otherwise, the following endpoints are reachable on your `matrix.` subdomain (if the feature is enabled).
|
Unless indicated otherwise, the following endpoints are reachable on your `matrix.` subdomain (if the feature is enabled).
|
||||||
|
|
||||||
| listener | default path | variable | used as |
|
| Listener | Default path | Variable | Used as |
|
||||||
|---|---|---|---|
|
|---|---|---|---|
|
||||||
| webhooks | `/hookshot/webhooks/` | `matrix_hookshot_webhook_endpoint` | generics, GitHub "Webhook URL", GitLab "URL", etc. |
|
| - | `/hookshot/webhooks/` | `matrix_hookshot_webhook_endpoint` | Webhook-prefix, which affects all webhook-related URLs below |
|
||||||
|
| generic | `/hookshot/webhooks/webhook` | `matrix_hookshot_generic_endpoint` | Generic webhooks |
|
||||||
| github oauth | `/hookshot/webhooks/oauth` | `matrix_hookshot_github_oauth_endpoint` | GitHub "Callback URL" |
|
| github oauth | `/hookshot/webhooks/oauth` | `matrix_hookshot_github_oauth_endpoint` | GitHub "Callback URL" |
|
||||||
| jira oauth | `/hookshot/webhooks/jira/oauth` | `matrix_hookshot_jira_oauth_endpoint` | JIRA OAuth |
|
| jira oauth | `/hookshot/webhooks/jira/oauth` | `matrix_hookshot_jira_oauth_endpoint` | Jira OAuth |
|
||||||
| figma endpoint | `/hookshot/webhooks/figma/webhook` | `matrix_hookshot_figma_endpoint` | Figma |
|
| figma endpoint | `/hookshot/webhooks/figma/webhook` | `matrix_hookshot_figma_endpoint` | Figma |
|
||||||
| provisioning | `/hookshot/v1/` | `matrix_hookshot_provisioning_endpoint` | Dimension [provisioning](#provisioning-api) |
|
| provisioning | `/hookshot/v1/` | `matrix_hookshot_provisioning_endpoint` | Dimension [provisioning](#provisioning-api) |
|
||||||
| appservice | `/hookshot/_matrix/app/` | `matrix_hookshot_appservice_endpoint` | Matrix server |
|
| appservice | `/hookshot/_matrix/app/` | `matrix_hookshot_appservice_endpoint` | Matrix server |
|
||||||
| widgets | `/hookshot/widgetapi/` | `matrix_hookshot_widgets_endpoint` | Widgets |
|
| widgets | `/hookshot/widgetapi/` | `matrix_hookshot_widgets_endpoint` | Widgets |
|
||||||
| metrics | `/metrics/hookshot` | `matrix_hookshot_metrics_enabled` and `matrix_hookshot_metrics_proxying_enabled`. Requires `/metrics/*` endpoints to also be enabled via `matrix_nginx_proxy_proxy_matrix_metrics_enabled` (see the `matrix-nginx-proxy` role). Read more in the [Metrics section](#metrics) below. | Prometheus |
|
| metrics | `/metrics/hookshot` | `matrix_hookshot_metrics_enabled` and exposure enabled via `matrix_hookshot_metrics_proxying_enabled` or `matrix_metrics_exposure_enabled`. Read more in the [Metrics section](#metrics) below. | Prometheus |
|
||||||
|
|
||||||
See also `matrix_hookshot_matrix_nginx_proxy_configuration` in [init.yml](/roles/custom/matrix-bridge-hookshot/tasks/inject_into_nginx_proxy.yml).
|
Also see the various `matrix_hookshot_container_labels_*` variables in [main.yml](../roles/custom/matrix-bridge-hookshot/defaults/main.yml), which expose URLs publicly
|
||||||
|
|
||||||
The different listeners are also reachable *internally* in the docker-network via the container's name (configured by `matrix_hookshot_container_url`) and on different ports (e.g. `matrix_hookshot_appservice_port`). Read [main.yml](/roles/custom/matrix-bridge-hookshot/defaults/main.yml) in detail for more info.
|
The different listeners are also reachable *internally* in the docker-network via the container's name (configured by `matrix_hookshot_container_url`) and on different ports (e.g. `matrix_hookshot_appservice_port`). Read [main.yml](../roles/custom/matrix-bridge-hookshot/defaults/main.yml) in detail for more info.
|
||||||
|
|
||||||
### Manage GitHub Private Key with aux role
|
### Manage GitHub Private Key with aux role
|
||||||
|
|
||||||
The GitHub bridge requires you to install a private key file. This can be done in multiple ways:
|
The GitHub bridge requires you to install a private key file. This can be done in multiple ways:
|
||||||
- copy the *contents* of the downloaded file and set the variable `matrix_hookshot_github_private_key` to the contents (see example in [main.yml](/roles/custom/matrix-bridge-hookshot/defaults/main.yml)).
|
|
||||||
|
- copy the *contents* of the downloaded file and set the variable `matrix_hookshot_github_private_key` to the contents (see example in [main.yml](../roles/custom/matrix-bridge-hookshot/defaults/main.yml)).
|
||||||
- somehow copy the file to the path `{{ matrix_hookshot_base_path }}/{{ matrix_hookshot_github_private_key_file }}` (default: `/matrix/hookshot/private-key.pem`) on the server manually.
|
- somehow copy the file to the path `{{ matrix_hookshot_base_path }}/{{ matrix_hookshot_github_private_key_file }}` (default: `/matrix/hookshot/private-key.pem`) on the server manually.
|
||||||
- use the [`aux` role](https://github.com/mother-of-all-self-hosting/ansible-role-aux) to copy the file from an arbitrary path on your ansible client to the correct path on the server.
|
- use the [`aux` role](https://github.com/mother-of-all-self-hosting/ansible-role-aux) to copy the file from an arbitrary path on your ansible client to the correct path on the server.
|
||||||
|
|
||||||
To use the `aux` role, make sure the `matrix_hookshot_github_private_key` variable is empty. Then add the following additional configuration:
|
To use the `aux` role, make sure the `matrix_hookshot_github_private_key` variable is empty. Then add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
aux_file_definitions:
|
aux_file_definitions:
|
||||||
- dest: "{{ matrix_hookshot_base_path }}/{{ matrix_hookshot_github_private_key_file }}"
|
- dest: "{{ matrix_hookshot_base_path }}/{{ matrix_hookshot_github_private_key_file }}"
|
||||||
@ -74,6 +115,7 @@ aux_file_definitions:
|
|||||||
owner: "{{ matrix_user_username }}"
|
owner: "{{ matrix_user_username }}"
|
||||||
group: "{{ matrix_user_groupname }}"
|
group: "{{ matrix_user_groupname }}"
|
||||||
```
|
```
|
||||||
|
|
||||||
For more information, see the documentation in the [default configuration of the aux role](https://github.com/mother-of-all-self-hosting/ansible-role-aux/blob/main/defaults/main.yml).
|
For more information, see the documentation in the [default configuration of the aux role](https://github.com/mother-of-all-self-hosting/ansible-role-aux/blob/main/defaults/main.yml).
|
||||||
|
|
||||||
### Provisioning API
|
### Provisioning API
|
||||||
@ -86,10 +128,12 @@ Metrics are **only enabled by default** if the builtin [Prometheus](configuring-
|
|||||||
|
|
||||||
To explicitly enable metrics, use `matrix_hookshot_metrics_enabled: true`. This only exposes metrics over the container network, however.
|
To explicitly enable metrics, use `matrix_hookshot_metrics_enabled: true`. This only exposes metrics over the container network, however.
|
||||||
|
|
||||||
**To collect metrics from an external Prometheus server**, besides enabling metrics as described above, you will also need to:
|
**To collect metrics from an external Prometheus server**, besides enabling metrics as described above, you will also need to enable metrics exposure on `https://matrix.example.com/metrics/hookshot` by:
|
||||||
|
|
||||||
- enable the `https://matrix.DOMAIN/metrics/*` endpoints on `matrix.DOMAIN` using `matrix_nginx_proxy_proxy_matrix_metrics_enabled: true` (see the `matrix-nginx-role` or [the Prometheus and Grafana docs](configuring-playbook-prometheus-grafana.md) for enabling this feature)
|
- either enabling metrics exposure for Hookshot via `matrix_hookshot_metrics_proxying_enabled: true`
|
||||||
- expose the Hookshot metrics under `https://matrix.DOMAIN/metrics/hookshot` by setting `matrix_hookshot_metrics_proxying_enabled: true`
|
- or enabling metrics exposure for all services via `matrix_metrics_exposure_enabled: true`
|
||||||
|
|
||||||
|
Whichever one you go with, by default metrics are exposed publicly **without** password-protection. See [the Prometheus and Grafana docs](configuring-playbook-prometheus-grafana.md) for details about password-protection for metrics.
|
||||||
|
|
||||||
### Collision with matrix-appservice-webhooks
|
### Collision with matrix-appservice-webhooks
|
||||||
|
|
||||||
|
@ -1,20 +1,20 @@
|
|||||||
# Setting up matrix-sms-bridge (optional)
|
# Setting up Matrix SMS bridging (optional)
|
||||||
|
|
||||||
The playbook can install and configure [matrix-sms-bridge](https://github.com/benkuly/matrix-sms-bridge) for you.
|
The playbook can install and configure [matrix-sms-bridge](https://github.com/benkuly/matrix-sms-bridge) for you.
|
||||||
|
|
||||||
See the project page to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/benkuly/matrix-sms-bridge/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
**The bridge uses [android-sms-gateway-server](https://github.com/RebekkaMa/android-sms-gateway-server). You need to configure it first.**
|
**The bridge uses [android-sms-gateway-server](https://github.com/RebekkaMa/android-sms-gateway-server). You need to configure it first.**
|
||||||
|
|
||||||
To enable the bridge just use the following
|
## Adjusting the playbook configuration
|
||||||
playbook configuration:
|
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_sms_bridge_enabled: true
|
matrix_sms_bridge_enabled: true
|
||||||
|
|
||||||
# (optional but recommended) a room id to a default room
|
# (optional but recommended) a room ID to a default room
|
||||||
matrix_sms_bridge_default_room: ""
|
matrix_sms_bridge_default_room: ""
|
||||||
|
|
||||||
# (optional but recommended) configure your server location
|
# (optional but recommended) configure your server location
|
||||||
matrix_sms_bridge_default_region: DE
|
matrix_sms_bridge_default_region: DE
|
||||||
@ -31,6 +31,22 @@ matrix_sms_bridge_provider_android_truststore_password: 123
|
|||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
# Setting up Mautrix Discord (optional)
|
# Setting up Mautrix Discord bridging (optional)
|
||||||
|
|
||||||
**Note**: bridging to [Discord](https://discordapp.com/) can also happen via the [mx-puppet-discord](configuring-playbook-bridge-mx-puppet-discord.md) and [matrix-appservice-discord](configuring-playbook-bridge-appservice-discord.md) bridges supported by the playbook.
|
**Note**: bridging to [Discord](https://discordapp.com/) can also happen via the [mx-puppet-discord](configuring-playbook-bridge-mx-puppet-discord.md) and [matrix-appservice-discord](configuring-playbook-bridge-appservice-discord.md) bridges supported by the playbook.
|
||||||
- For using as a Bot we recommend the [Appservice Discord](configuring-playbook-bridge-appservice-discord.md), because it supports plumbing.
|
- For using as a Bot we recommend the [Appservice Discord](configuring-playbook-bridge-appservice-discord.md), because it supports plumbing.
|
||||||
@ -8,16 +8,21 @@ The playbook can install and configure [mautrix-discord](https://github.com/maut
|
|||||||
|
|
||||||
See the project's [documentation](https://docs.mau.fi/bridges/go/discord/index.html) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://docs.mau.fi/bridges/go/discord/index.html) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
|
|
||||||
There are 2 ways to login to discord using this bridge, either by [scanning a QR code](#method-1-login-using-qr-code-recommended) using the Discord mobile app **or** by using a [Discord token](#method-2-login-using-discord-token-not-recommended).
|
There are 2 ways to login to discord using this bridge, either by [scanning a QR code](#method-1-login-using-qr-code-recommended) using the Discord mobile app **or** by using a [Discord token](#method-2-login-using-discord-token-not-recommended).
|
||||||
|
|
||||||
If this is a dealbreaker for you, consider using one of the other Discord bridges supported by the playbook: [mx-puppet-discord](configuring-playbook-bridge-mx-puppet-discord.md) or [matrix-appservice-discord](configuring-playbook-bridge-appservice-discord.md). These come with their own complexity and limitations, however, so we recommend that you proceed with this one if possible.
|
If this is a dealbreaker for you, consider using one of the other Discord bridges supported by the playbook: [mx-puppet-discord](configuring-playbook-bridge-mx-puppet-discord.md) or [matrix-appservice-discord](configuring-playbook-bridge-appservice-discord.md). These come with their own complexity and limitations, however, so we recommend that you proceed with this one if possible.
|
||||||
|
|
||||||
## Installing
|
### Enable Appservice Double Puppet or Shared Secret Auth (optional)
|
||||||
|
|
||||||
To enable the bridge, add this to your `vars.yml` file:
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) or [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service for this playbook.
|
||||||
|
|
||||||
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_discord_enabled: true
|
matrix_mautrix_discord_enabled: true
|
||||||
@ -25,11 +30,6 @@ matrix_mautrix_discord_enabled: true
|
|||||||
|
|
||||||
You may optionally wish to add some [Additional configuration](#additional-configuration), or to [prepare for double-puppeting](#set-up-double-puppeting) before the initial installation.
|
You may optionally wish to add some [Additional configuration](#additional-configuration), or to [prepare for double-puppeting](#set-up-double-puppeting) before the initial installation.
|
||||||
|
|
||||||
After adjusting your `vars.yml` file, re-run the playbook and restart all services: `ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start`
|
|
||||||
|
|
||||||
To make use of the bridge, see [Usage](#usage) below.
|
|
||||||
|
|
||||||
|
|
||||||
### Additional configuration
|
### Additional configuration
|
||||||
|
|
||||||
There are some additional things you may wish to configure about the bridge.
|
There are some additional things you may wish to configure about the bridge.
|
||||||
@ -39,29 +39,22 @@ Take a look at:
|
|||||||
- `roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml` for some variables that you can customize via your `vars.yml` file
|
- `roles/custom/matrix-bridge-mautrix-discord/defaults/main.yml` for some variables that you can customize via your `vars.yml` file
|
||||||
- `roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2` for the bridge's default configuration. You can override settings (even those that don't have dedicated playbook variables) using the `matrix_mautrix_discord_configuration_extension_yaml` variable
|
- `roles/custom/matrix-bridge-mautrix-discord/templates/config.yaml.j2` for the bridge's default configuration. You can override settings (even those that don't have dedicated playbook variables) using the `matrix_mautrix_discord_configuration_extension_yaml` variable
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
### Set up Double Puppeting
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have 2 ways of going about it.
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
#### Method 1: automatically, by enabling Shared Secret Auth
|
**Notes**:
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
#### Method 2: manually, by asking each user to provide a working access token
|
|
||||||
|
|
||||||
**Note**: This method for enabling Double Puppeting can be configured only after you've already set up bridging (see [Usage](#usage)).
|
|
||||||
|
|
||||||
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
|
||||||
|
|
||||||
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to do that](obtaining-access-tokens.md).
|
|
||||||
|
|
||||||
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
|
||||||
|
|
||||||
- make sure you don't log out the `Mautrix-Discord` device some time in the future, as that would break the Double Puppeting feature
|
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
@ -79,13 +72,37 @@ To acquire the token, open Discord in a private browser window. Then open the de
|
|||||||
|
|
||||||
### Bridging
|
### Bridging
|
||||||
|
|
||||||
1. Start a chat with `@discordbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
1. Start a chat with `@discordbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
2. If you would like to login to Discord using a token, send `login-token` command, otherwise, send `login-qr` command.
|
2. If you would like to login to Discord using a token, send `login-token` command, otherwise, send `login-qr` command.
|
||||||
3. You'll see a QR code which you need to scan with the Discord app on your phone. You can scan it with the camera app too, which will open Discord, which will then instruct you to scan it a 2nd time in the Discord app.
|
3. You'll see a QR code which you need to scan with the Discord app on your phone. You can scan it with the camera app too, which will open Discord, which will then instruct you to scan it a 2nd time in the Discord app.
|
||||||
4. After confirming (in the Discord app) that you'd like to allow this login, the bot should respond with "Succcessfully authenticated as ..."
|
4. After confirming (in the Discord app) that you'd like to allow this login, the bot should respond with "Succcessfully authenticated as …"
|
||||||
5. Now that you're logged in, you can send a `help` command to the bot again, to see additional commands you have access to
|
5. Now that you're logged in, you can send `help` to the bot to see the available commands.
|
||||||
6. Some Direct Messages from Discord should start syncing automatically
|
6. Some Direct Messages from Discord should start syncing automatically
|
||||||
7. If you'd like to bridge guilds:
|
7. If you'd like to bridge guilds:
|
||||||
- send `guilds status` to see the list of guilds
|
- send `guilds status` to see the list of guilds
|
||||||
- for each guild that you'd like bridged, send `guilds bridge GUILD_ID --entire`
|
- for each guild that you'd like bridged, send `guilds bridge GUILD_ID --entire`
|
||||||
8. You may wish to uninstall the Discord app from your phone now. It's not needed for the bridge to function.
|
8. You may wish to uninstall the Discord app from your phone now. It's not needed for the bridge to function.
|
||||||
|
|
||||||
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
|
#### Method 1: automatically, by enabling Appservice Double Puppet or Shared Secret Auth
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) or [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
|
Enabling [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
|
Enabling double puppeting by enabling the [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service works at the time of writing, but is deprecated and will stop working in the future.
|
||||||
|
|
||||||
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
|
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
||||||
|
|
||||||
|
- make sure you don't log out the `Mautrix-Discord` device some time in the future, as that would break the Double Puppeting feature
|
||||||
|
@ -1,9 +1,21 @@
|
|||||||
# Setting up Mautrix Facebook (optional)
|
# Setting up Mautrix Facebook bridging (optional, deprecated)
|
||||||
|
|
||||||
|
**Note**: This bridge has been deprecated in favor of the [mautrix-meta](https://github.com/mautrix/meta) Messenger/Instagram bridge, which can be installed using [this playbook](configuring-playbook-bridge-mautrix-meta-messenger.md). Consider using that bridge instead of this one.
|
||||||
|
|
||||||
The playbook can install and configure [mautrix-facebook](https://github.com/mautrix/facebook) for you.
|
The playbook can install and configure [mautrix-facebook](https://github.com/mautrix/facebook) for you.
|
||||||
|
|
||||||
See the project's [documentation](https://github.com/mautrix/facebook/blob/master/ROADMAP.md) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/mautrix/facebook/blob/master/ROADMAP.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
## Prerequisite (optional)
|
||||||
|
|
||||||
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
||||||
|
|
||||||
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_facebook_enabled: true
|
matrix_mautrix_facebook_enabled: true
|
||||||
```
|
```
|
||||||
@ -11,6 +23,7 @@ matrix_mautrix_facebook_enabled: true
|
|||||||
There are some additional things you may wish to configure about the bridge before you continue.
|
There are some additional things you may wish to configure about the bridge before you continue.
|
||||||
|
|
||||||
Encryption support is off by default. If you would like to enable encryption, add the following to your `vars.yml` file:
|
Encryption support is off by default. If you would like to enable encryption, add the following to your `vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_facebook_configuration_extension_yaml: |
|
matrix_mautrix_facebook_configuration_extension_yaml: |
|
||||||
bridge:
|
bridge:
|
||||||
@ -20,11 +33,12 @@ matrix_mautrix_facebook_configuration_extension_yaml: |
|
|||||||
```
|
```
|
||||||
|
|
||||||
If you would like to be able to administrate the bridge from your account it can be configured like this:
|
If you would like to be able to administrate the bridge from your account it can be configured like this:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_facebook_configuration_extension_yaml: |
|
matrix_mautrix_facebook_configuration_extension_yaml: |
|
||||||
bridge:
|
bridge:
|
||||||
permissions:
|
permissions:
|
||||||
'@YOUR_USERNAME:{{ matrix_domain }}': admin
|
'@alice:{{ matrix_domain }}': admin
|
||||||
```
|
```
|
||||||
|
|
||||||
Using both would look like
|
Using both would look like
|
||||||
@ -33,7 +47,7 @@ Using both would look like
|
|||||||
matrix_mautrix_facebook_configuration_extension_yaml: |
|
matrix_mautrix_facebook_configuration_extension_yaml: |
|
||||||
bridge:
|
bridge:
|
||||||
permissions:
|
permissions:
|
||||||
'@YOUR_USERNAME:{{ matrix_domain }}': admin
|
'@alice:{{ matrix_domain }}': admin
|
||||||
encryption:
|
encryption:
|
||||||
allow: true
|
allow: true
|
||||||
default: true
|
default: true
|
||||||
@ -41,40 +55,52 @@ matrix_mautrix_facebook_configuration_extension_yaml: |
|
|||||||
|
|
||||||
You may wish to look at `roles/custom/matrix-bridge-mautrix-facebook/templates/config.yaml.j2` and `roles/custom/matrix-bridge-mautrix-facebook/defaults/main.yml` to find other things you would like to configure.
|
You may wish to look at `roles/custom/matrix-bridge-mautrix-facebook/templates/config.yaml.j2` and `roles/custom/matrix-bridge-mautrix-facebook/defaults/main.yml` to find other things you would like to configure.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
## Set up Double Puppeting
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have 2 ways of going about it.
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
### Method 1: automatically, by enabling Shared Secret Auth
|
**Notes**:
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
### Method 2: manually, by asking each user to provide a working access token
|
|
||||||
|
|
||||||
**Note**: This method for enabling Double Puppeting can be configured only after you've already set up bridging (see [Usage](#usage)).
|
|
||||||
|
|
||||||
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
|
||||||
|
|
||||||
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to do that](obtaining-access-tokens.md).
|
|
||||||
|
|
||||||
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
|
||||||
|
|
||||||
- make sure you don't log out the `Mautrix-Facebook` device some time in the future, as that would break the Double Puppeting feature
|
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
You then need to start a chat with `@facebookbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
To use the bridge, you need to start a chat with `@facebookbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
Send `login YOUR_FACEBOOK_EMAIL_ADDRESS` to the bridge bot to enable bridging for your Facebook Messenger account. You can learn more here about authentication from the bridge's [official documentation on Authentication](https://docs.mau.fi/bridges/python/facebook/authentication.html).
|
Send `login YOUR_FACEBOOK_EMAIL_ADDRESS` to the bridge bot to enable bridging for your Facebook Messenger account. You can learn more here about authentication from the bridge's [official documentation on Authentication](https://docs.mau.fi/bridges/python/facebook/authentication.html).
|
||||||
|
|
||||||
If you run into trouble, check the [Troubleshooting](#troubleshooting) section below.
|
If you run into trouble, check the [Troubleshooting](#troubleshooting) section below.
|
||||||
|
|
||||||
After successfully enabling bridging, you may wish to [set up Double Puppeting](#set-up-double-puppeting), if you haven't already done so.
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
|
#### Method 1: automatically, by enabling Shared Secret Auth
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
|
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
|
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
||||||
|
|
||||||
|
- make sure you don't log out the `Mautrix-Facebook` device some time in the future, as that would break the Double Puppeting feature
|
||||||
|
|
||||||
## Troubleshooting
|
## Troubleshooting
|
||||||
|
|
||||||
@ -88,8 +114,8 @@ The easiest way to do this may be to use [sshuttle](https://sshuttle.readthedocs
|
|||||||
|
|
||||||
Example command for proxying your traffic through the Matrix server:
|
Example command for proxying your traffic through the Matrix server:
|
||||||
|
|
||||||
```
|
```sh
|
||||||
sshuttle -r root@matrix.DOMAIN:22 0/0
|
sshuttle -r root@matrix.example.com:22 0/0
|
||||||
```
|
```
|
||||||
|
|
||||||
Once connected, you should be able to verify that you're browsing the web through the Matrix server's IP by checking [icanhazip](https://icanhazip.com/).
|
Once connected, you should be able to verify that you're browsing the web through the Matrix server's IP by checking [icanhazip](https://icanhazip.com/).
|
||||||
@ -98,4 +124,4 @@ Then proceed to log in to [Facebook/Messenger](https://www.facebook.com/).
|
|||||||
|
|
||||||
Once logged in, proceed to [set up bridging](#usage).
|
Once logged in, proceed to [set up bridging](#usage).
|
||||||
|
|
||||||
If that doesn't work, enable 2FA [Facebook help page on enabling 2FA](https://www.facebook.com/help/148233965247823) and try to login again with a new password, and entering the 2FA code when prompted, it may take more then one try, in between attempts, check facebook.com to see if they are requiring another password change
|
If that doesn't work, enable 2FA (see: [Facebook help page on enabling 2FA](https://www.facebook.com/help/148233965247823)) and try to login again with a new password, and entering the 2FA code when prompted, it may take more then one try, in between attempts, check facebook.com to see if they are requiring another password change
|
||||||
|
@ -1,38 +1,62 @@
|
|||||||
# Setting up Mautrix gmessages (optional)
|
# Setting up Mautrix Google Messages bridging (optional)
|
||||||
|
|
||||||
The playbook can install and configure [mautrix-gmessages](https://github.com/mautrix/gmessages) for you, for bridging to [Google Messages](https://messages.google.com/).
|
The playbook can install and configure [mautrix-gmessages](https://github.com/mautrix/gmessages) for you, for bridging to [Google Messages](https://messages.google.com/).
|
||||||
|
|
||||||
See the project's [documentation](https://docs.mau.fi/bridges/go/gmessages/index.html) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://docs.mau.fi/bridges/go/gmessages/index.html) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
Use the following playbook configuration:
|
## Prerequisite (optional)
|
||||||
|
|
||||||
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) for this playbook.
|
||||||
|
|
||||||
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_gmessages_enabled: true
|
matrix_mautrix_gmessages_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
## Set up Double Puppeting
|
## Installing
|
||||||
|
|
||||||
If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have 2 ways of going about it.
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
### Method 1: automatically, by enabling Shared Secret Auth
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
To use the bridge, you need to start a chat with `@gmessagesbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
|
#### Method 1: automatically, by enabling Appservice Double Puppet
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
### Method 2: manually, by asking each user to provide a working access token
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
**Note**: This method for enabling Double Puppeting can be configured only after you've already set up bridging (see [Usage](#usage)).
|
|
||||||
|
|
||||||
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to do that](obtaining-access-tokens.md).
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
||||||
|
|
||||||
- make sure you don't log out the `Mautrix-gmessages` device some time in the future, as that would break the Double Puppeting feature
|
- make sure you don't log out the `Mautrix-gmessages` device some time in the future, as that would break the Double Puppeting feature
|
||||||
|
|
||||||
|
|
||||||
## Usage
|
|
||||||
|
|
||||||
You then need to start a chat with `@gmessagesbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
|
||||||
|
@ -1,44 +1,43 @@
|
|||||||
# Setting up Mautrix Google Chat (optional)
|
# Setting up Mautrix Google Chat bridging (optional)
|
||||||
|
|
||||||
The playbook can install and configure [mautrix-googlechat](https://github.com/mautrix/googlechat) for you.
|
The playbook can install and configure [mautrix-googlechat](https://github.com/mautrix/googlechat) for you.
|
||||||
|
|
||||||
See the project's [documentation](https://docs.mau.fi/bridges/python/googlechat/index.html) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://docs.mau.fi/bridges/python/googlechat/index.html) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
To enable the [Google Chat](https://chat.google.com/) bridge just use the following playbook configuration:
|
## Prerequisite (optional)
|
||||||
|
|
||||||
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) or [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service for this playbook.
|
||||||
|
|
||||||
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the [Google Chat](https://chat.google.com/) bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_googlechat_enabled: true
|
matrix_mautrix_googlechat_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
## Set up Double Puppeting
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have 2 ways of going about it.
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
### Method 1: automatically, by enabling Shared Secret Auth
|
**Notes**:
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
|
||||||
### Method 2: manually, by asking each user to provide a working access token
|
|
||||||
|
|
||||||
**Note**: This method for enabling Double Puppeting can be configured only after you've already set up bridging (see [Usage](#usage)).
|
|
||||||
|
|
||||||
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
|
||||||
|
|
||||||
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to do that](obtaining-access-tokens.md).
|
|
||||||
|
|
||||||
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
|
||||||
|
|
||||||
- make sure you don't log out the `Mautrix-googlechat` device some time in the future, as that would break the Double Puppeting feature
|
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Once the bot is enabled you need to start a chat with `googlechat bridge bot` with handle `@googlechatbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
To use the bridge, you need to start a chat with `googlechat bridge bot` with handle `@googlechatbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
Send `login` to the bridge bot to receive a link to the portal from which you can enable the bridging. Open the link sent by the bot and follow the instructions.
|
Send `login` to the bridge bot to receive a link to the portal from which you can enable the bridging. Open the link sent by the bot and follow the instructions.
|
||||||
|
|
||||||
@ -48,5 +47,26 @@ Once logged in, recent chats should show up as new conversations automatically.
|
|||||||
|
|
||||||
You can learn more about authentication from the bridge's [official documentation on Authentication](https://docs.mau.fi/bridges/python/googlechat/authentication.html).
|
You can learn more about authentication from the bridge's [official documentation on Authentication](https://docs.mau.fi/bridges/python/googlechat/authentication.html).
|
||||||
|
|
||||||
After successfully enabling bridging, you may wish to [set up Double Puppeting](#set-up-double-puppeting), if you haven't already done so.
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
|
#### Method 1: automatically, by enabling Appservice Double Puppet or Shared Secret Auth
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) or [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
|
Enabling [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
|
Enabling double puppeting by enabling the [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service works at the time of writing, but is deprecated and will stop working in the future.
|
||||||
|
|
||||||
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
|
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
||||||
|
|
||||||
|
- make sure you don't log out the `Mautrix-googlechat` device some time in the future, as that would break the Double Puppeting feature
|
||||||
|
@ -1,46 +1,45 @@
|
|||||||
# The [Mautrix Hangouts Bridge](https://mau.dev/mautrix/hangouts) is no longer maintained. It has changed to a [Google Chat Bridge](https://github.com/mautrix/googlechat). Setup instructions for the Google Chat Bridge can be [found here](configuring-playbook-bridge-mautrix-googlechat.md).
|
# Setting up Mautrix Hangouts bridging (optional, deprecated)
|
||||||
|
|
||||||
# Setting up Mautrix Hangouts (optional)
|
💡 **Note**: This bridge has been deprecated in favor of [Google Chat bridge](https://github.com/mautrix/googlechat), which can be installed using [this playbook](configuring-playbook-bridge-mautrix-googlechat.md). Installing the mautrix-hangouts bridge is **no longer possible**. For now, this documentation page remains here for historical purposes.
|
||||||
|
|
||||||
The playbook can install and configure [mautrix-hangouts](https://github.com/mautrix/hangouts) for you.
|
The playbook can install and configure [mautrix-hangouts](https://github.com/mautrix/hangouts) for you.
|
||||||
|
|
||||||
See the project's [documentation](https://docs.mau.fi/bridges/python/hangouts/index.html) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://docs.mau.fi/bridges/python/hangouts/index.html) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
To enable the [Google Hangouts](https://hangouts.google.com/) bridge just use the following playbook configuration:
|
## Prerequisite (optional)
|
||||||
|
|
||||||
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
||||||
|
|
||||||
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the [Google Hangouts](https://hangouts.google.com/) bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_hangouts_enabled: true
|
matrix_mautrix_hangouts_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
## Set up Double Puppeting
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have 2 ways of going about it.
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
### Method 1: automatically, by enabling Shared Secret Auth
|
**Notes**:
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
|
||||||
### Method 2: manually, by asking each user to provide a working access token
|
|
||||||
|
|
||||||
**Note**: This method for enabling Double Puppeting can be configured only after you've already set up bridging (see [Usage](#usage)).
|
|
||||||
|
|
||||||
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
|
||||||
|
|
||||||
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to do that](obtaining-access-tokens.md).
|
|
||||||
|
|
||||||
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
|
||||||
|
|
||||||
- make sure you don't log out the `Mautrix-Hangouts` device some time in the future, as that would break the Double Puppeting feature
|
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Once the bot is enabled you need to start a chat with `Hangouts bridge bot` with handle `@hangoutsbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
To use the bridge, you need to start a chat with `Hangouts bridge bot` with handle `@hangoutsbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
Send `login` to the bridge bot to receive a link to the portal from which you can enable the bridging. Open the link sent by the bot and follow the instructions.
|
Send `login` to the bridge bot to receive a link to the portal from which you can enable the bridging. Open the link sent by the bot and follow the instructions.
|
||||||
|
|
||||||
@ -50,5 +49,24 @@ Once logged in, recent chats should show up as new conversations automatically.
|
|||||||
|
|
||||||
You can learn more about authentication from the bridge's [official documentation on Authentication](https://docs.mau.fi/bridges/python/hangouts/authentication.html).
|
You can learn more about authentication from the bridge's [official documentation on Authentication](https://docs.mau.fi/bridges/python/hangouts/authentication.html).
|
||||||
|
|
||||||
After successfully enabling bridging, you may wish to [set up Double Puppeting](#set-up-double-puppeting), if you haven't already done so.
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
|
#### Method 1: automatically, by enabling Shared Secret Auth
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
|
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
|
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
||||||
|
|
||||||
|
- make sure you don't log out the `Mautrix-Hangouts` device some time in the future, as that would break the Double Puppeting feature
|
||||||
|
@ -1,15 +1,23 @@
|
|||||||
# Setting up Mautrix Instagram (optional)
|
# Setting up Mautrix Instagram bridging (optional, deprecated)
|
||||||
|
|
||||||
|
**Note**: This bridge has been deprecated in favor of the [mautrix-meta](https://github.com/mautrix/meta) Messenger/Instagram bridge, which can be installed using [this playbook](configuring-playbook-bridge-mautrix-meta-instagram.md). Consider using that bridge instead of this one.
|
||||||
|
|
||||||
The playbook can install and configure [mautrix-instagram](https://github.com/mautrix/instagram) for you.
|
The playbook can install and configure [mautrix-instagram](https://github.com/mautrix/instagram) for you.
|
||||||
|
|
||||||
See the project's [documentation](https://docs.mau.fi/bridges/python/instagram/index.html) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://docs.mau.fi/bridges/python/instagram/index.html) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_instagram_enabled: true
|
matrix_mautrix_instagram_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
There are some additional things you may wish to configure about the bridge before you continue.
|
There are some additional things you may wish to configure about the bridge before you continue.
|
||||||
|
|
||||||
Encryption support is off by default. If you would like to enable encryption, add the following to your `vars.yml` file:
|
Encryption support is off by default. If you would like to enable encryption, add the following to your `vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_instagram_configuration_extension_yaml: |
|
matrix_mautrix_instagram_configuration_extension_yaml: |
|
||||||
bridge:
|
bridge:
|
||||||
@ -19,24 +27,41 @@ matrix_mautrix_instagram_configuration_extension_yaml: |
|
|||||||
```
|
```
|
||||||
|
|
||||||
If you would like to be able to administrate the bridge from your account it can be configured like this:
|
If you would like to be able to administrate the bridge from your account it can be configured like this:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
# The easy way. The specified Matrix user ID will be made an admin of all bridges
|
# The easy way. The specified Matrix user ID will be made an admin of all bridges
|
||||||
matrix_admin: "@YOUR_USERNAME:{{ matrix_domain }}"
|
matrix_admin: "@alice:{{ matrix_domain }}"
|
||||||
|
|
||||||
# OR:
|
# OR:
|
||||||
# The more verbose way. Applies to this bridge only. You may define multiple Matrix users as admins.
|
# The more verbose way. Applies to this bridge only. You may define multiple Matrix users as admins.
|
||||||
matrix_mautrix_instagram_configuration_extension_yaml: |
|
matrix_mautrix_instagram_configuration_extension_yaml: |
|
||||||
bridge:
|
bridge:
|
||||||
permissions:
|
permissions:
|
||||||
'@YOUR_USERNAME:YOUR_DOMAIN': admin
|
'@alice:{{ matrix_domain }}': admin
|
||||||
```
|
```
|
||||||
|
|
||||||
You may wish to look at `roles/custom/matrix-bridge-mautrix-instagram/templates/config.yaml.j2` and `roles/custom/matrix-bridge-mautrix-instagram/defaults/main.yml` to find other things you would like to configure.
|
You may wish to look at `roles/custom/matrix-bridge-mautrix-instagram/templates/config.yaml.j2` and `roles/custom/matrix-bridge-mautrix-instagram/defaults/main.yml` to find other things you would like to configure.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
You then need to start a chat with `@instagrambot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
To use the bridge, you need to start a chat with `@instagrambot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
Send `login YOUR_INSTAGRAM_EMAIL_ADDRESS YOUR_INSTAGRAM_PASSWORD` to the bridge bot to enable bridging for your instagram/Messenger account.
|
Send `login YOUR_INSTAGRAM_EMAIL_ADDRESS YOUR_INSTAGRAM_PASSWORD` to the bridge bot to enable bridging for your instagram/Messenger account.
|
||||||
|
|
||||||
|
111
docs/configuring-playbook-bridge-mautrix-meta-instagram.md
Normal file
111
docs/configuring-playbook-bridge-mautrix-meta-instagram.md
Normal file
@ -0,0 +1,111 @@
|
|||||||
|
# Setting up Instagram bridging via Mautrix Meta (optional)
|
||||||
|
|
||||||
|
The playbook can install and configure the [mautrix-meta](https://github.com/mautrix/meta) Messenger/Instagram bridge for you.
|
||||||
|
|
||||||
|
Since this bridge component can bridge to both [Messenger](https://messenger.com/) and [Instagram](https://instagram.com/) and you may wish to do both at the same time, the playbook makes it available via 2 different Ansible roles (`matrix-bridge-mautrix-meta-messenger` and `matrix-bridge-mautrix-meta-instagram`). The latter is a reconfigured copy of the first one (created by `just rebuild-mautrix-meta-instagram` and `bin/rebuild-mautrix-meta-instagram.sh`).
|
||||||
|
|
||||||
|
This documentation page only deals with the bridge's ability to bridge to Instagram. For bridging to Facebook/Messenger, see [Setting up Messenger bridging via Mautrix Meta](configuring-playbook-bridge-mautrix-meta-messenger.md).
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
### Migrating from the old mautrix-instagram bridge
|
||||||
|
|
||||||
|
If you've been using the [mautrix-instagram](./configuring-playbook-bridge-mautrix-instagram.md) bridge, **you'd better get rid of it first** or the 2 bridges will be in conflict:
|
||||||
|
|
||||||
|
- both trying to use `@instagrambot:example.com` as their username. This conflict may be resolved by adjusting `matrix_mautrix_instagram_appservice_bot_username` or `matrix_mautrix_meta_instagram_appservice_username`
|
||||||
|
- both trying to bridge the same DMs
|
||||||
|
|
||||||
|
To do so, send a `clean-rooms` command to the management room with the old bridge bot (`@instagrambot:example.com`). It gives you a list of portals and groups of portals you may purge. Proceed with sending commands like `clean recommended`, etc.
|
||||||
|
|
||||||
|
Then, consider disabling the old bridge in your configuration, so it won't recreate the portals when you receive new messages.
|
||||||
|
|
||||||
|
### Enable Appservice Double Puppet (optional)
|
||||||
|
|
||||||
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) service for this playbook.
|
||||||
|
|
||||||
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_mautrix_meta_instagram_enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
Before proceeding to [re-running the playbook](./installing.md), you may wish to adjust the configuration further. See below.
|
||||||
|
|
||||||
|
### Bridge permissions
|
||||||
|
|
||||||
|
By default, any user on your homeserver will be able to use the bridge.
|
||||||
|
|
||||||
|
Different levels of permission can be granted to users:
|
||||||
|
|
||||||
|
- `relay` - Allowed to be relayed through the bridge, no access to commands
|
||||||
|
- `user` - Use the bridge with puppeting
|
||||||
|
- `admin` - Use and administer the bridge
|
||||||
|
|
||||||
|
The permissions are following the sequence: nothing < `relay` < `user` < `admin`.
|
||||||
|
|
||||||
|
The default permissions are set via `matrix_mautrix_meta_instagram_bridge_permissions_default` and are somewhat like this:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_mautrix_meta_instagram_bridge_permissions_default:
|
||||||
|
'*': relay
|
||||||
|
example.com: user
|
||||||
|
'{{ matrix_admin }}': admin
|
||||||
|
```
|
||||||
|
|
||||||
|
If you don't define the `matrix_admin` in your configuration (e.g. `matrix_admin: @alice:example.com`), then there's no admin by default.
|
||||||
|
|
||||||
|
You may redefine `matrix_mautrix_meta_instagram_bridge_permissions_default` any way you see fit, or add extra permissions using `matrix_mautrix_meta_instagram_bridge_permissions_custom` like this:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_mautrix_meta_instagram_bridge_permissions_custom:
|
||||||
|
'@alice:{{ matrix_domain }}': admin
|
||||||
|
```
|
||||||
|
|
||||||
|
You may wish to look at `roles/custom/matrix-bridge-mautrix-meta-instagram/templates/config.yaml.j2` to find more information on the permissions settings and other options you would like to configure.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
To use the bridge, you need to start a chat with `@instagrambot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
|
#### Method 1: automatically, by enabling Appservice Double Puppet
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
|
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
|
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
||||||
|
|
||||||
|
- make sure you don't log out the session for which you obtained an access token some time in the future, as that would break the Double Puppeting feature
|
128
docs/configuring-playbook-bridge-mautrix-meta-messenger.md
Normal file
128
docs/configuring-playbook-bridge-mautrix-meta-messenger.md
Normal file
@ -0,0 +1,128 @@
|
|||||||
|
# Setting up Messenger bridging via Mautrix Meta (optional)
|
||||||
|
|
||||||
|
The playbook can install and configure the [mautrix-meta](https://github.com/mautrix/meta) Messenger/Instagram bridge for you.
|
||||||
|
|
||||||
|
Since this bridge component can bridge to both [Messenger](https://messenger.com/) and [Instagram](https://instagram.com/) and you may wish to do both at the same time, the playbook makes it available via 2 different Ansible roles (`matrix-bridge-mautrix-meta-messenger` and `matrix-bridge-mautrix-meta-instagram`). The latter is a reconfigured copy of the first one (created by `just rebuild-mautrix-meta-instagram` and `bin/rebuild-mautrix-meta-instagram.sh`).
|
||||||
|
|
||||||
|
This documentation page only deals with the bridge's ability to bridge to Facebook Messenger. For bridging to Instagram, see [Setting up Instagram bridging via Mautrix Meta](configuring-playbook-bridge-mautrix-meta-instagram.md).
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
### Migrating from the old mautrix-facebook bridge
|
||||||
|
|
||||||
|
If you've been using the [mautrix-facebook](./configuring-playbook-bridge-mautrix-facebook.md) bridge, it's possible to migrate the database using [instructions from the bridge documentation](https://docs.mau.fi/bridges/go/meta/facebook-migration.html) (advanced).
|
||||||
|
|
||||||
|
Then you may wish to get rid of the Facebook bridge. To do so, send a `clean-rooms` command to the management room with the old bridge bot (`@facebookbot:example.com`). It gives you a list of portals and groups of portals you may purge. Proceed with sending commands like `clean recommended`, etc.
|
||||||
|
|
||||||
|
Then, consider disabling the old bridge in your configuration, so it won't recreate the portals when you receive new messages.
|
||||||
|
|
||||||
|
**Note**: the user ID of the new bridge bot is `@messengerbot:example.com`, not `@facebookbot:example.com`. After disabling the old bridge, its bot user will stop responding to a command.
|
||||||
|
|
||||||
|
### Enable Appservice Double Puppet (optional)
|
||||||
|
|
||||||
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) service for this playbook.
|
||||||
|
|
||||||
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_mautrix_meta_messenger_enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
Before proceeding to [re-running the playbook](./installing.md), you may wish to adjust the configuration further. See below.
|
||||||
|
|
||||||
|
### Bridge mode
|
||||||
|
|
||||||
|
As mentioned above, the [mautrix-meta](https://github.com/mautrix/meta) bridge supports multiple modes of operation.
|
||||||
|
|
||||||
|
The bridge can pull your Messenger messages via 3 different methods:
|
||||||
|
|
||||||
|
- (`facebook`) Facebook via `facebook.com`
|
||||||
|
- (`facebook-tor`) Facebook via `facebookwkhpilnemxj7asaniu7vnjjbiltxjqhye3mhbshg7kx5tfyd.onion` ([Tor](https://www.torproject.org/)) - does not currently proxy media downloads
|
||||||
|
- (default) (`messenger`) Messenger via `messenger.com` - usable even without a Facebook account
|
||||||
|
|
||||||
|
You may switch the mode via the `matrix_mautrix_meta_messenger_meta_mode` variable. The playbook defaults to the `messenger` mode, because it's most universal (every Facebook user has a Messenger account, but the opposite is not true).
|
||||||
|
|
||||||
|
Note that switching the mode (especially between `facebook*` and `messenger`) will intentionally make the bridge use another database (`matrix_mautrix_meta_facebook` or `matrix_mautrix_meta_messenger`) to isolate the 2 instances. Switching between Tor and non-Tor may be possible without dataloss, but your mileage may vary. Before switching to a new mode, you may wish to de-configure the old one (send `help` to the bridge bot and unbridge your portals, etc.).
|
||||||
|
|
||||||
|
### Bridge permissions
|
||||||
|
|
||||||
|
By default, any user on your homeserver will be able to use the bridge.
|
||||||
|
|
||||||
|
Different levels of permission can be granted to users:
|
||||||
|
|
||||||
|
- `relay` - Allowed to be relayed through the bridge, no access to commands
|
||||||
|
- `user` - Use the bridge with puppeting
|
||||||
|
- `admin` - Use and administer the bridge
|
||||||
|
|
||||||
|
The permissions are following the sequence: nothing < `relay` < `user` < `admin`.
|
||||||
|
|
||||||
|
The default permissions are set via `matrix_mautrix_meta_messenger_bridge_permissions_default` and are somewhat like this:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_mautrix_meta_messenger_bridge_permissions_default:
|
||||||
|
'*': relay
|
||||||
|
example.com: user
|
||||||
|
'{{ matrix_admin }}': admin
|
||||||
|
```
|
||||||
|
|
||||||
|
If you don't define the `matrix_admin` in your configuration (e.g. `matrix_admin: @alice:example.com`), then there's no admin by default.
|
||||||
|
|
||||||
|
You may redefine `matrix_mautrix_meta_messenger_bridge_permissions_default` any way you see fit, or add extra permissions using `matrix_mautrix_meta_messenger_bridge_permissions_custom` like this:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_mautrix_meta_messenger_bridge_permissions_custom:
|
||||||
|
'@alice:{{ matrix_domain }}': admin
|
||||||
|
```
|
||||||
|
|
||||||
|
You may wish to look at `roles/custom/matrix-bridge-mautrix-meta-messenger/templates/config.yaml.j2` to find more information on the permissions settings and other options you would like to configure.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
To use the bridge, you need to start a chat with `@messengerbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain). Note that the user ID of the bridge's bot is not `@facebookbot:example.com`.
|
||||||
|
|
||||||
|
You then need to send a `login` command and follow the bridge bot's instructions.
|
||||||
|
|
||||||
|
Given that the bot is configured in `messenger` [bridge mode](#bridge-mode) by default, you will need to log in to [messenger.com](https://messenger.com/) (not `facebook.com`!) and obtain the cookies from there as per [the bridge's authentication instructions](https://docs.mau.fi/bridges/go/meta/authentication.html).
|
||||||
|
|
||||||
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
|
#### Method 1: automatically, by enabling Appservice Double Puppet
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
|
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
|
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
||||||
|
|
||||||
|
- make sure you don't log out the session for which you obtained an access token some time in the future, as that would break the Double Puppeting feature
|
@ -1,12 +1,28 @@
|
|||||||
# Setting up Mautrix Signal (optional)
|
# Setting up Mautrix Signal bridging (optional)
|
||||||
|
|
||||||
The playbook can install and configure [mautrix-signal](https://github.com/mautrix/signal) for you.
|
The playbook can install and configure [mautrix-signal](https://github.com/mautrix/signal) for you.
|
||||||
|
|
||||||
See the project's [documentation](https://docs.mau.fi/bridges/python/signal/index.html) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://docs.mau.fi/bridges/python/signal/index.html) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
**Note/Prerequisite**: If you're running with the Postgres database server integrated by the playbook (which is the default), you don't need to do anything special and can easily proceed with installing. However, if you're [using an external Postgres server](configuring-playbook-external-postgres.md), you'd need to manually prepare a Postgres database for this bridge and adjust the variables related to that (`matrix_mautrix_signal_database_*`).
|
**Note**: This revamped version of the [mautrix-signal (legacy)](configuring-playbook-bridge-mautrix-signal.md) may increase the CPU usage of your homeserver.
|
||||||
|
|
||||||
Use the following playbook configuration:
|
## Prerequisites (optional)
|
||||||
|
|
||||||
|
### Prepare Postgres database on external Postgres server
|
||||||
|
|
||||||
|
If you're running with the Postgres database server integrated by the playbook (which is the default), you don't need to do anything special and can easily proceed with installing.
|
||||||
|
|
||||||
|
However, if you're [using an external Postgres server](configuring-playbook-external-postgres.md), you'd need to manually prepare a Postgres database for this bridge and adjust the variables related to that (`matrix_mautrix_signal_database_*`).
|
||||||
|
|
||||||
|
### Enable Appservice Double Puppet
|
||||||
|
|
||||||
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) service for this playbook.
|
||||||
|
|
||||||
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_signal_enabled: true
|
matrix_mautrix_signal_enabled: true
|
||||||
@ -14,14 +30,7 @@ matrix_mautrix_signal_enabled: true
|
|||||||
|
|
||||||
There are some additional things you may wish to configure about the bridge before you continue.
|
There are some additional things you may wish to configure about the bridge before you continue.
|
||||||
|
|
||||||
The relay bot functionality is off by default. If you would like to enable the relay bot, add the following to your `vars.yml` file:
|
|
||||||
```yaml
|
|
||||||
matrix_mautrix_signal_relaybot_enabled: true
|
|
||||||
```
|
|
||||||
If you want to activate the relay bot in a room, use `!signal set-relay`.
|
|
||||||
Use `!signal unset-relay` to deactivate.
|
|
||||||
By default, any user on your homeserver will be able to use the bridge.
|
By default, any user on your homeserver will be able to use the bridge.
|
||||||
If you enable the relay bot functionality, it will relay every user's messages in a portal room - no matter which homeserver they're from.
|
|
||||||
|
|
||||||
Different levels of permission can be granted to users:
|
Different levels of permission can be granted to users:
|
||||||
|
|
||||||
@ -32,54 +41,73 @@ Different levels of permission can be granted to users:
|
|||||||
The permissions are following the sequence: nothing < relay < user < admin.
|
The permissions are following the sequence: nothing < relay < user < admin.
|
||||||
|
|
||||||
The default permissions are set as follows:
|
The default permissions are set as follows:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
permissions:
|
permissions:
|
||||||
'*': relay
|
'*': relay
|
||||||
YOUR_DOMAIN: user
|
example.com: user
|
||||||
```
|
```
|
||||||
|
|
||||||
If you want to augment the preset permissions, you might want to set the additional permissions with the following settings in your `vars.yml` file:
|
If you want to augment the preset permissions, you might want to set the additional permissions with the following settings in your `vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_signal_configuration_extension_yaml: |
|
matrix_mautrix_signal_configuration_extension_yaml: |
|
||||||
bridge:
|
bridge:
|
||||||
permissions:
|
permissions:
|
||||||
'@YOUR_USERNAME:YOUR_DOMAIN': admin
|
'@alice:{{ matrix_domain }}': admin
|
||||||
```
|
```
|
||||||
|
|
||||||
This will add the admin permission to the specific user, while keepting the default permissions.
|
This will add the admin permission to the specific user, while keeping the default permissions.
|
||||||
|
|
||||||
In case you want to replace the default permissions settings **completely**, populate the following item within your `vars.yml` file:
|
In case you want to replace the default permissions settings **completely**, populate the following item within your `vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_signal_bridge_permissions: |
|
matrix_mautrix_signal_bridge_permissions:
|
||||||
'@ADMIN:YOUR_DOMAIN': admin
|
'@alice:{{ matrix_domain }}': admin
|
||||||
'@USER:YOUR_DOMAIN' : user
|
'@bob:{{ matrix_domain }}' : user
|
||||||
```
|
```
|
||||||
|
|
||||||
You may wish to look at `roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2` to find more information on the permissions settings and other options you would like to configure.
|
You may wish to look at `roles/custom/matrix-bridge-mautrix-signal/templates/config.yaml.j2` to find more information on the permissions settings and other options you would like to configure.
|
||||||
|
|
||||||
## Set up Double Puppeting
|
## Installing
|
||||||
|
|
||||||
If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have 2 ways of going about it.
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
### Method 1: automatically, by enabling Shared Secret Auth
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
To use the bridge, you need to start a chat with `@signalbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
|
#### Method 1: automatically, by enabling Appservice Double Puppet
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
### Method 2: manually, by asking each user to provide a working access token
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
**Note**: This method for enabling Double Puppeting can be configured only after you've already set up bridging (see [Usage](#usage)).
|
|
||||||
|
|
||||||
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to do that](obtaining-access-tokens.md).
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
||||||
|
|
||||||
- make sure you don't log out the `Mautrix-Signal` device some time in the future, as that would break the Double Puppeting feature
|
- make sure you don't log out the `Mautrix-Signal` device some time in the future, as that would break the Double Puppeting feature
|
||||||
|
|
||||||
|
|
||||||
## Usage
|
|
||||||
|
|
||||||
You then need to start a chat with `@signalbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
|
||||||
|
@ -1,7 +1,7 @@
|
|||||||
# Setting up Mautrix Slack (optional)
|
# Setting up Mautrix Slack bridging (optional)
|
||||||
|
|
||||||
**Note**: bridging to [Slack](https://slack.com/) can also happen via the [mx-puppet-slack](configuring-playbook-bridge-mx-puppet-slack.md) and [matrix-appservice-slack](configuring-playbook-bridge-appservice-slack.md) bridges supported by the playbook.
|
**Note**: bridging to [Slack](https://slack.com/) can also happen via the [mx-puppet-slack](configuring-playbook-bridge-mx-puppet-slack.md) and [matrix-appservice-slack](configuring-playbook-bridge-appservice-slack.md) bridges supported by the playbook.
|
||||||
- For using as a Bot we recommend the [Appservice Slack](configuring-playbook-bridge-appservice-slack.md), because it supports plumbing.
|
- For using as a Bot we recommend the [Appservice Slack](configuring-playbook-bridge-appservice-slack.md), because it supports plumbing. Note that it is not available for new installation unless you have already created a classic Slack application, because the creation of classic Slack applications, which this bridge makes use of, has been discontinued.
|
||||||
- For personal use with a slack account we recommend the `mautrix-slack` bridge (the one being discussed here), because it is the most fully-featured and stable of the 3 Slack bridges supported by the playbook.
|
- For personal use with a slack account we recommend the `mautrix-slack` bridge (the one being discussed here), because it is the most fully-featured and stable of the 3 Slack bridges supported by the playbook.
|
||||||
|
|
||||||
The playbook can install and configure [mautrix-slack](https://github.com/mautrix/slack) for you.
|
The playbook can install and configure [mautrix-slack](https://github.com/mautrix/slack) for you.
|
||||||
@ -10,17 +10,21 @@ See the project's [documentation](https://docs.mau.fi/bridges/go/slack/index.htm
|
|||||||
|
|
||||||
See the [features and roadmap](https://github.com/mautrix/slack/blob/main/ROADMAP.md) for more information.
|
See the [features and roadmap](https://github.com/mautrix/slack/blob/main/ROADMAP.md) for more information.
|
||||||
|
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
|
|
||||||
For using this bridge, you would need to authenticate by **providing your username and password** (legacy) or by using a **token login**. See more information in the [docs](https://docs.mau.fi/bridges/go/slack/authentication.html).
|
For using this bridge, you would need to authenticate by **providing your username and password** (legacy) or by using a **token login**. See more information in the [docs](https://docs.mau.fi/bridges/go/slack/authentication.html).
|
||||||
|
|
||||||
Note that neither of these methods are officially supported by Slack. [matrix-appservice-slack](configuring-playbook-bridge-appservice-slack.md) uses a Slack bot account which is the only officially supported method for bridging a Slack channel.
|
Note that neither of these methods are officially supported by Slack. [matrix-appservice-slack](configuring-playbook-bridge-appservice-slack.md) uses a Slack bot account which is the only officially supported method for bridging a Slack channel.
|
||||||
|
|
||||||
|
### Enable Appservice Double Puppet (optional)
|
||||||
|
|
||||||
## Installing
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) service for this playbook.
|
||||||
|
|
||||||
To enable the bridge, add this to your `vars.yml` file:
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_slack_enabled: true
|
matrix_mautrix_slack_enabled: true
|
||||||
@ -28,11 +32,6 @@ matrix_mautrix_slack_enabled: true
|
|||||||
|
|
||||||
You may optionally wish to add some [Additional configuration](#additional-configuration), or to [prepare for double-puppeting](#set-up-double-puppeting) before the initial installation.
|
You may optionally wish to add some [Additional configuration](#additional-configuration), or to [prepare for double-puppeting](#set-up-double-puppeting) before the initial installation.
|
||||||
|
|
||||||
After adjusting your `vars.yml` file, re-run the playbook and restart all services: `ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start`
|
|
||||||
|
|
||||||
To make use of the bridge, see [Usage](#usage) below.
|
|
||||||
|
|
||||||
|
|
||||||
### Additional configuration
|
### Additional configuration
|
||||||
|
|
||||||
There are some additional options you may wish to configure with the bridge.
|
There are some additional options you may wish to configure with the bridge.
|
||||||
@ -42,34 +41,49 @@ Take a look at:
|
|||||||
- `roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml` for some variables that you can customize via your `vars.yml` file
|
- `roles/custom/matrix-bridge-mautrix-slack/defaults/main.yml` for some variables that you can customize via your `vars.yml` file
|
||||||
- `roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2` for the bridge's default configuration. You can override settings (even those that don't have dedicated playbook variables) using the `matrix_mautrix_slack_configuration_extension_yaml` variable
|
- `roles/custom/matrix-bridge-mautrix-slack/templates/config.yaml.j2` for the bridge's default configuration. You can override settings (even those that don't have dedicated playbook variables) using the `matrix_mautrix_slack_configuration_extension_yaml` variable
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
### Set up Double Puppeting
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have 2 ways of going about it.
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
#### Method 1: automatically, by enabling Shared Secret Auth
|
**Notes**:
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
1. Start a chat with `@slackbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
2. If you would like to login to Slack using a token, send the `login-token` command, otherwise, send the `login-password` command. Read [here](https://docs.mau.fi/bridges/go/slack/authentication.html) on how to retrieve your token and cookie token.
|
||||||
|
3. The bot should respond with "Successfully logged into <email> for team <workspace>"
|
||||||
|
4. Now that you're logged in, you can send `help` to the bot to see the available commands.
|
||||||
|
5. Slack channels should automatically begin bridging if you authenticated using a token. Otherwise, you must wait to receive a message in the channel if you used password authentication.
|
||||||
|
|
||||||
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
|
#### Method 1: automatically, by enabling Appservice Double Puppet
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
#### Method 2: manually, by asking each user to provide a working access token
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
**Note**: This method for enabling Double Puppeting can be configured only after you've already set up bridging (see [Usage](#usage)).
|
|
||||||
|
|
||||||
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to do that](obtaining-access-tokens.md).
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
||||||
|
|
||||||
- make sure you don't log out the `Mautrix-Slack` device some time in the future, as that would break the Double Puppeting feature
|
- make sure you don't log out the `Mautrix-Slack` device some time in the future, as that would break the Double Puppeting feature
|
||||||
|
|
||||||
|
|
||||||
## Usage
|
|
||||||
|
|
||||||
1. Start a chat with `@slackbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
|
||||||
2. If you would like to login to Slack using a token, send the `login-token` command, otherwise, send the `login-password` command. Read [here](https://docs.mau.fi/bridges/go/slack/authentication.html) on how to retrieve your token and cookie token.
|
|
||||||
3. The bot should respond with "Successfully logged into <email> for team <workspace>"
|
|
||||||
4. Now that you're logged in, you can send a `help` command to the bot again, to see additional commands you have access to.
|
|
||||||
5. Slack channels should automatically begin bridging if you authenticated using a token. Otherwise, you must wait to receive a message in the channel if you used password authentication.
|
|
||||||
|
@ -1,10 +1,18 @@
|
|||||||
# Setting up Mautrix Telegram (optional)
|
# Setting up Mautrix Telegram bridging (optional)
|
||||||
|
|
||||||
The playbook can install and configure [mautrix-telegram](https://github.com/mautrix/telegram) for you.
|
The playbook can install and configure [mautrix-telegram](https://github.com/mautrix/telegram) for you.
|
||||||
|
|
||||||
See the project's [documentation](https://docs.mau.fi/bridges/python/telegram/index.html) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://docs.mau.fi/bridges/python/telegram/index.html) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
You'll need to obtain API keys from [https://my.telegram.org/apps](https://my.telegram.org/apps) and then use the following playbook configuration:
|
## Prerequisite (optional)
|
||||||
|
|
||||||
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) or [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service for this playbook.
|
||||||
|
|
||||||
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
You'll need to obtain API keys from [https://my.telegram.org/apps](https://my.telegram.org/apps) and then add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_telegram_enabled: true
|
matrix_mautrix_telegram_enabled: true
|
||||||
@ -12,34 +20,28 @@ matrix_mautrix_telegram_api_id: YOUR_TELEGRAM_APP_ID
|
|||||||
matrix_mautrix_telegram_api_hash: YOUR_TELEGRAM_API_HASH
|
matrix_mautrix_telegram_api_hash: YOUR_TELEGRAM_API_HASH
|
||||||
```
|
```
|
||||||
|
|
||||||
## Set up Double Puppeting
|
## Installing
|
||||||
|
|
||||||
If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have 2 ways of going about it.
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
### Method 1: automatically, by enabling Shared Secret Auth
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
**Notes**:
|
||||||
|
|
||||||
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
### Method 2: manually, by asking each user to provide a working access token
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
**Note**: This method for enabling Double Puppeting can be configured only after you've already set up bridging.
|
|
||||||
|
|
||||||
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
|
||||||
|
|
||||||
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to do that](obtaining-access-tokens.md).
|
|
||||||
|
|
||||||
- send `login-matrix` to the bot and follow instructions about how to send the access token to it
|
|
||||||
|
|
||||||
- make sure you don't log out the `Mautrix-Telegram` device some time in the future, as that would break the Double Puppeting feature
|
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
You then need to start a chat with `@telegrambot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
To use the bridge, you need to start a chat with `@telegrambot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
If you want to use the relay-bot feature ([relay bot documentation](https://docs.mau.fi/bridges/python/telegram/relay-bot.html)), which allows anonymous user to chat with telegram users, use the following additional playbook configuration:
|
If you want to use the relay-bot feature ([relay bot documentation](https://docs.mau.fi/bridges/python/telegram/relay-bot.html)), which allows anonymous user to chat with telegram users, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_telegram_bot_token: YOUR_TELEGRAM_BOT_TOKEN
|
matrix_mautrix_telegram_bot_token: YOUR_TELEGRAM_BOT_TOKEN
|
||||||
@ -50,17 +52,44 @@ matrix_mautrix_telegram_configuration_extension_yaml: |
|
|||||||
```
|
```
|
||||||
|
|
||||||
You might also want to give permissions to administrate the bot:
|
You might also want to give permissions to administrate the bot:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_telegram_configuration_extension_yaml: |
|
matrix_mautrix_telegram_configuration_extension_yaml: |
|
||||||
bridge:
|
bridge:
|
||||||
permissions:
|
permissions:
|
||||||
'@user:DOMAIN': admin
|
'@alice:{{ matrix_domain }}': admin
|
||||||
```
|
```
|
||||||
|
|
||||||
More details about permissions in this example:
|
More details about permissions in this example: https://github.com/mautrix/telegram/blob/master/mautrix_telegram/example-config.yaml#L410
|
||||||
https://github.com/mautrix/telegram/blob/master/mautrix_telegram/example-config.yaml#L410
|
|
||||||
|
|
||||||
If you like to exclude all groups from syncing and use the Telgeram-Bridge only for direct chats, you can add the following additional playbook configuration:
|
If you like to exclude all groups from syncing and use the Telgeram-Bridge only for direct chats, you can add the following additional playbook configuration:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_telegram_filter_mode: whitelist
|
matrix_mautrix_telegram_filter_mode: whitelist
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
|
#### Method 1: automatically, by enabling Appservice Double Puppet or Shared Secret Auth
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) or [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
|
Enabling [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
|
Enabling double puppeting by enabling the [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service works at the time of writing, but is deprecated and will stop working in the future.
|
||||||
|
|
||||||
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
|
**Note**: This method for enabling Double Puppeting can be configured only after you've already set up bridging.
|
||||||
|
|
||||||
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
|
- send `login-matrix` to the bot and follow instructions about how to send the access token to it
|
||||||
|
|
||||||
|
- make sure you don't log out the `Mautrix-Telegram` device some time in the future, as that would break the Double Puppeting feature
|
||||||
|
@ -1,35 +1,69 @@
|
|||||||
# Setting up Mautrix Twitter (optional)
|
# Setting up Mautrix Twitter bridging (optional)
|
||||||
|
|
||||||
**Note**: bridging to [Twitter](https://twitter.com/) can also happen via the [mx-puppet-twitter](configuring-playbook-bridge-mx-puppet-twitter.md) bridge supported by the playbook.
|
**Note**: bridging to [Twitter](https://twitter.com/) can also happen via the [mx-puppet-twitter](configuring-playbook-bridge-mx-puppet-twitter.md) bridge supported by the playbook.
|
||||||
|
|
||||||
The playbook can install and configure [mautrix-twitter](https://github.com/mautrix/twitter) for you.
|
The playbook can install and configure [mautrix-twitter](https://github.com/mautrix/twitter) for you.
|
||||||
|
|
||||||
See the project's [documentation](https://github.com/mautrix/twitter) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/mautrix/twitter/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
## Prerequisite (optional)
|
||||||
|
|
||||||
|
### Enable Appservice Double Puppet (optional)
|
||||||
|
|
||||||
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) service for this playbook.
|
||||||
|
|
||||||
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_twitter_enabled: true
|
matrix_mautrix_twitter_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
## Set up Double Puppeting
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have 2 ways of going about it.
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
### Method 1: automatically, by enabling Shared Secret Auth
|
**Notes**:
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
### Method 2: manually, by asking each user to provide a working access token
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
This method is currently not available for the Mautrix-Twitter bridge, but is on the [roadmap](https://github.com/mautrix/twitter/blob/master/ROADMAP.md) under Misc/Manual login with `login-matrix`
|
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
1. You then need to start a chat with `@twitterbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
1. You then need to start a chat with `@twitterbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
2. Send login-cookie to start the login. The bot should respond with instructions on how to proceed.
|
2. Send login-cookie to start the login. The bot should respond with instructions on how to proceed.
|
||||||
|
|
||||||
You can learn more here about authentication from the bridge's [official documentation on Authentication](https://docs.mau.fi/bridges/python/twitter/authentication.html).
|
You can learn more here about authentication from the bridge's [official documentation on Authentication](https://docs.mau.fi/bridges/python/twitter/authentication.html).
|
||||||
|
|
||||||
After successfully enabling bridging, you may wish to [set up Double Puppeting](#set-up-double-puppeting), if you haven't already done so.
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
|
#### Method 1: automatically, by enabling Appservice Double Puppet
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
|
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
|
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
||||||
|
|
||||||
|
- make sure you don't log out the `Mautrix-Slack` device some time in the future, as that would break the Double Puppeting feature
|
||||||
|
@ -1,69 +1,80 @@
|
|||||||
# Setting up Mautrix Whatsapp (optional)
|
# Setting up Mautrix Whatsapp bridging (optional)
|
||||||
|
|
||||||
The playbook can install and configure [mautrix-whatsapp](https://github.com/mautrix/whatsapp) for you.
|
The playbook can install and configure [mautrix-whatsapp](https://github.com/mautrix/whatsapp) for you.
|
||||||
|
|
||||||
See the project's [documentation](https://docs.mau.fi/bridges/go/whatsapp/index.html) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://docs.mau.fi/bridges/go/whatsapp/index.html) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
Use the following playbook configuration:
|
## Prerequisite (optional)
|
||||||
|
|
||||||
|
If you want to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do) for this bridge automatically, you need to have enabled [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) or [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service for this playbook.
|
||||||
|
|
||||||
|
For details about configuring Double Puppeting for this bridge, see the section below: [Set up Double Puppeting](#-set-up-double-puppeting)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_whatsapp_enabled: true
|
matrix_mautrix_whatsapp_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
Whatsapp multidevice beta is required, now it is enough if Whatsapp is connected to the Internet every 2 weeks.
|
Whatsapp multidevice beta is required, now it is enough if Whatsapp is connected to the Internet every 2 weeks.
|
||||||
|
|
||||||
The relay bot functionality is off by default. If you would like to enable the relay bot, add the following to your `vars.yml` file:
|
The relay bot functionality is off by default. If you would like to enable the relay bot, add the following to your `vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_whatsapp_bridge_relay_enabled: true
|
matrix_mautrix_whatsapp_bridge_relay_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
By default, only admins are allowed to set themselves as relay users. To allow anyone on your homeserver to set themselves as relay users add this to your `vars.yml` file:
|
By default, only admins are allowed to set themselves as relay users. To allow anyone on your homeserver to set themselves as relay users add this to your `vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_whatsapp_bridge_relay_admin_only: false
|
matrix_mautrix_whatsapp_bridge_relay_admin_only: false
|
||||||
```
|
```
|
||||||
|
|
||||||
If you want to activate the relay bot in a room, use `!wa set-relay`.
|
If you want to activate the relay bot in a room, send `!wa set-relay`. To deactivate, send `!wa unset-relay`.
|
||||||
Use `!wa unset-relay` to deactivate.
|
|
||||||
|
|
||||||
## Enable backfilling history
|
## Installing
|
||||||
This requires a server with MSC2716 support, which is currently an experimental feature in synapse.
|
|
||||||
Note that as of Synapse 1.46, there are still some bugs with the implementation, especially if using event persistence workers.
|
|
||||||
Use the following playbook configuration:
|
|
||||||
|
|
||||||
```yaml
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
matrix_synapse_configuration_extension_yaml: |
|
|
||||||
experimental_features:
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
msc2716_enabled: true
|
```sh
|
||||||
```
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
```yaml
|
|
||||||
matrix_mautrix_whatsapp_configuration_extension_yaml:
|
|
||||||
bridge:
|
|
||||||
history_sync:
|
|
||||||
backfill: true
|
|
||||||
```
|
```
|
||||||
|
|
||||||
## Set up Double Puppeting
|
**Notes**:
|
||||||
|
|
||||||
If you'd like to use [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do), you have 2 ways of going about it.
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
### Method 1: automatically, by enabling Shared Secret Auth
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook.
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
## Usage
|
||||||
|
|
||||||
### Method 2: manually, by asking each user to provide a working access token
|
To use the bridge, you need to start a chat with `@whatsappbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
**Note**: This method for enabling Double Puppeting can be configured only after you've already set up bridging (see [Usage](#usage)).
|
### 💡 Set up Double Puppeting
|
||||||
|
|
||||||
|
After successfully enabling bridging, you may wish to set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) (hint: you most likely do).
|
||||||
|
|
||||||
|
To set it up, you have 2 ways of going about it.
|
||||||
|
|
||||||
|
#### Method 1: automatically, by enabling Appservice Double Puppet or Shared Secret Auth
|
||||||
|
|
||||||
|
The bridge automatically performs Double Puppeting if [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) or [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service is configured and enabled on the server for this playbook.
|
||||||
|
|
||||||
|
Enabling [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
|
Enabling double puppeting by enabling the [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) service works at the time of writing, but is deprecated and will stop working in the future.
|
||||||
|
|
||||||
|
#### Method 2: manually, by asking each user to provide a working access token
|
||||||
|
|
||||||
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
When using this method, **each user** that wishes to enable Double Puppeting needs to follow the following steps:
|
||||||
|
|
||||||
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to do that](obtaining-access-tokens.md).
|
- retrieve a Matrix access token for yourself. Refer to the documentation on [how to obtain one](obtaining-access-tokens.md).
|
||||||
|
|
||||||
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
- send the access token to the bot. Example: `login-matrix MATRIX_ACCESS_TOKEN_HERE`
|
||||||
|
|
||||||
- make sure you don't log out the `Mautrix-Whatsapp` device some time in the future, as that would break the Double Puppeting feature
|
- make sure you don't log out the `Mautrix-Whatsapp` device some time in the future, as that would break the Double Puppeting feature
|
||||||
|
|
||||||
|
|
||||||
## Usage
|
|
||||||
|
|
||||||
You then need to start a chat with `@whatsappbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
|
||||||
|
@ -1,19 +1,12 @@
|
|||||||
# Setting up Mautrix wsproxy (optional)
|
# Setting up Mautrix wsproxy for bridging Android SMS or Apple iMessage (optional)
|
||||||
|
|
||||||
The playbook can install and configure [mautrix-wsproxy](https://github.com/mautrix/wsproxy) for you.
|
The playbook can install and configure [mautrix-wsproxy](https://github.com/mautrix/wsproxy) for you.
|
||||||
|
|
||||||
See the project's [documentation](https://github.com/mautrix/wsproxy#readme) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/mautrix/wsproxy/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
## DNS
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
You need to create a `wsproxy.DOMAIN` DNS record pointing to your Matrix server (a `CNAME` pointing to `matrix.DOMAIN`) to use wsproxy.
|
|
||||||
The hostname is configurable via a `matrix_mautrix_wsproxy_hostname` variable.
|
|
||||||
|
|
||||||
|
|
||||||
## Configuration
|
|
||||||
|
|
||||||
Use the following playbook configuration:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_wsproxy_enabled: true
|
matrix_mautrix_wsproxy_enabled: true
|
||||||
@ -27,6 +20,41 @@ matrix_mautrix_wsproxy_syncproxy_shared_secret: 'secret token from bridge'
|
|||||||
|
|
||||||
Note that the tokens must match what is compiled into the [mautrix-imessage](https://github.com/mautrix/imessage) bridge running on your Mac or Android device.
|
Note that the tokens must match what is compiled into the [mautrix-imessage](https://github.com/mautrix/imessage) bridge running on your Mac or Android device.
|
||||||
|
|
||||||
|
### Adjusting the wsproxy URL
|
||||||
|
|
||||||
|
By default, this playbook installs wsproxy on the `wsproxy.` subdomain (`wsproxy.example.com`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
||||||
|
|
||||||
|
By tweaking the `matrix_mautrix_wsproxy_hostname` variable, you can easily make the service available at a **different hostname** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Change the default hostname
|
||||||
|
matrix_mautrix_wsproxy_hostname: ws.example.com
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
Once you've decided on the domain, **you may need to adjust your DNS** records to point the wsproxy domain to the Matrix server.
|
||||||
|
|
||||||
|
By default, you will need to create a CNAME record for `wsproxy`. See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
|
@ -1,38 +1,46 @@
|
|||||||
# Setting up MX Puppet Discord (optional)
|
# Setting up MX Puppet Discord bridging (optional)
|
||||||
|
|
||||||
**Note**: bridging to [Discord](https://discordapp.com/) can also happen via the [matrix-appservice-discord](configuring-playbook-bridge-appservice-discord.md)and [mautrix-discord](configuring-playbook-bridge-mautrix-discord.md) bridges supported by the playbook.
|
**Note**: bridging to [Discord](https://discordapp.com/) can also happen via the [matrix-appservice-discord](configuring-playbook-bridge-appservice-discord.md)and [mautrix-discord](configuring-playbook-bridge-mautrix-discord.md) bridges supported by the playbook.
|
||||||
- For using as a Bot we recommend the [Appservice Discord](configuring-playbook-bridge-appservice-discord.md), because it supports plumbing.
|
- For using as a Bot we recommend the [Appservice Discord](configuring-playbook-bridge-appservice-discord.md), because it supports plumbing.
|
||||||
- For personal use with a discord account we recommend the [mautrix-discord](configuring-playbook-bridge-mautrix-discord.md) bridge, because it is the most fully-featured and stable of the 3 Discord bridges supported by the playbook.
|
- For personal use with a discord account we recommend the [mautrix-discord](configuring-playbook-bridge-mautrix-discord.md) bridge, because it is the most fully-featured and stable of the 3 Discord bridges supported by the playbook.
|
||||||
|
|
||||||
The playbook can install and configure
|
The playbook can install and configure [mx-puppet-discord](https://gitlab.com/mx-puppet/discord/mx-puppet-discord) for you.
|
||||||
[mx-puppet-discord](https://github.com/matrix-discord/mx-puppet-discord) for you.
|
|
||||||
|
|
||||||
See the project page to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://gitlab.com/mx-puppet/discord/mx-puppet-discord/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
**Note**: we actually use the [Beeper](https://www.beeper.com/)-maintained [fork of mx-puppet-discord](https://gitlab.com/beeper/mx-puppet-monorepo), because `matrix-discord/mx-puppet-discord` is a low-quality and poorly maintained project.
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
To enable the [Discord](https://discordapp.com/) bridge just use the following
|
|
||||||
playbook configuration:
|
|
||||||
|
|
||||||
|
To enable the [Discord](https://discordapp.com/) bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mx_puppet_discord_enabled: true
|
matrix_mx_puppet_discord_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Once the bot is enabled you need to start a chat with `Discord Puppet Bridge` with
|
To use the bridge, you need to start a chat with `Discord Puppet Bridge` with the handle `@_discordpuppet_bot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
the handle `@_discordpuppet_bot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base
|
|
||||||
domain, not the `matrix.` domain).
|
|
||||||
|
|
||||||
Three authentication methods are available, Legacy Token, OAuth and xoxc token.
|
Three authentication methods are available, Legacy Token, OAuth and xoxc token. See mx-puppet-discord [documentation](https://gitlab.com/mx-puppet/discord/mx-puppet-discord) for more information about how to configure the bridge.
|
||||||
See mx-puppet-discord [documentation](https://github.com/matrix-discord/mx-puppet-discord)
|
|
||||||
for more information about how to configure the bridge.
|
|
||||||
|
|
||||||
Once logged in, send `list` to the bot user to list the available rooms.
|
Once logged in, send `list` to the bot user to list the available rooms.
|
||||||
|
|
||||||
Clicking rooms in the list will result in you receiving an invitation to the
|
Clicking rooms in the list will result in you receiving an invitation to the bridged room.
|
||||||
bridged room.
|
|
||||||
|
|
||||||
Also send `help` to the bot to see the commands available.
|
Send `help` to the bot to see the available commands.
|
||||||
|
@ -1,24 +1,37 @@
|
|||||||
# Setting up MX Puppet GroupMe (optional)
|
# Setting up MX Puppet GroupMe bridging (optional)
|
||||||
|
|
||||||
The playbook can install and configure
|
The playbook can install and configure [mx-puppet-groupme](https://gitlab.com/xangelix-pub/matrix/mx-puppet-groupme) for you.
|
||||||
[mx-puppet-groupme](https://gitlab.com/xangelix-pub/matrix/mx-puppet-groupme) for you.
|
|
||||||
|
|
||||||
See the project page to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://gitlab.com/xangelix-pub/matrix/mx-puppet-groupme/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
To enable the [GroupMe](https://groupme.com/) bridge just use the following
|
## Adjusting the playbook configuration
|
||||||
playbook configuration:
|
|
||||||
|
|
||||||
|
To enable the [GroupMe](https://groupme.com/) bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mx_puppet_groupme_enabled: true
|
matrix_mx_puppet_groupme_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Once the bot is enabled you need to start a chat with `GroupMe Puppet Bridge` with
|
To use the bridge, you need to start a chat with `GroupMe Puppet Bridge` with the handle `@_groupmepuppet_bot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
the handle `@_groupmepuppet_bot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base
|
|
||||||
domain, not the `matrix.` domain).
|
|
||||||
|
|
||||||
One authentication method is available.
|
One authentication method is available.
|
||||||
|
|
||||||
@ -30,7 +43,6 @@ link <access token>
|
|||||||
|
|
||||||
Once logged in, send `listrooms` to the bot user to list the available rooms.
|
Once logged in, send `listrooms` to the bot user to list the available rooms.
|
||||||
|
|
||||||
Clicking rooms in the list will result in you receiving an invitation to the
|
Clicking rooms in the list will result in you receiving an invitation to the bridged room.
|
||||||
bridged room.
|
|
||||||
|
|
||||||
Also send `help` to the bot to see the commands available.
|
Send `help` to the bot to see the available commands.
|
||||||
|
@ -1,24 +1,37 @@
|
|||||||
# Setting up mx-puppet-instagram (optional)
|
# Setting up MX Puppet Instagram bridging (optional)
|
||||||
|
|
||||||
The playbook can install and configure
|
The playbook can install and configure [mx-puppet-instagram](https://github.com/Sorunome/mx-puppet-instagram) for you.
|
||||||
[mx-puppet-instagram](https://github.com/Sorunome/mx-puppet-instagram) for you.
|
|
||||||
|
|
||||||
This allows you to bridge Instagram DirectMessages into Matrix.
|
This allows you to bridge Instagram DirectMessages into Matrix.
|
||||||
|
|
||||||
To enable the [Instagram](https://www.instagram.com/) bridge just use the following
|
## Adjusting the playbook configuration
|
||||||
playbook configuration:
|
|
||||||
|
|
||||||
|
To enable the [Instagram](https://www.instagram.com/) bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mx_puppet_instagram_enabled: true
|
matrix_mx_puppet_instagram_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Once the bot is enabled, you need to start a chat with `Instagram Puppet Bridge` with
|
To use the bridge, you need to start a chat with `Instagram Puppet Bridge` with the handle `@_instagrampuppet_bot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
the handle `@_instagrampuppet_bot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base
|
|
||||||
domain, not the `matrix.` domain).
|
|
||||||
|
|
||||||
Send `link <username> <password>` to the bridge bot to link your instagram account.
|
Send `link <username> <password>` to the bridge bot to link your instagram account.
|
||||||
|
|
||||||
@ -32,5 +45,4 @@ For double-puppeting, you probably want to issue these commands:
|
|||||||
|
|
||||||
If you are linking only one Instagram account, your `$puppetId` is probably 1, but use the `list` command find out.
|
If you are linking only one Instagram account, your `$puppetId` is probably 1, but use the `list` command find out.
|
||||||
|
|
||||||
The `help` command shows which commands are available, though at the time of writing, not every command is fully implemented.
|
Send `help` to the bot to see the available commands. At the time of writing, not every command is fully implemented.
|
||||||
|
|
||||||
|
@ -1,5 +1,5 @@
|
|||||||
# Setting up MX Puppet Skype (optional)
|
# Setting up MX Puppet Skype bridging (optional, removed)
|
||||||
|
|
||||||
The playbook used to be able to install and configure [mx-puppet-skype](https://github.com/Sorunome/mx-puppet-skype), but no longer includes this component, because it has been broken and unmaintaned for a long time.
|
The playbook used to be able to install and configure [mx-puppet-skype](https://github.com/Sorunome/mx-puppet-skype), but no longer includes this component, because it has been broken and unmaintained for a long time.
|
||||||
|
|
||||||
Bridging to [Skype](https://www.skype.com/) can also happen via the [go-skype-bridge](configuring-playbook-bridge-go-skype-bridge.md) bridge supported by the playbook.
|
Bridging to [Skype](https://www.skype.com/) can also happen via the [go-skype-bridge](configuring-playbook-bridge-go-skype-bridge.md) bridge supported by the playbook.
|
||||||
|
@ -1,46 +1,51 @@
|
|||||||
# Setting up MX Puppet Slack (optional)
|
# Setting up MX Puppet Slack bridging (optional)
|
||||||
|
|
||||||
**Note**: bridging to [Slack](https://slack.com) can also happen via the
|
**Note**: bridging to [Slack](https://slack.com) can also happen via the [matrix-appservice-slack](configuring-playbook-bridge-appservice-slack.md) and [mautrix-slack](configuring-playbook-bridge-mautrix-slack.md) bridges supported by the playbook. Note that `matrix-appservice-slack` is not available for new installation unless you have already created a classic Slack application, because the creation of classic Slack applications, which this bridge makes use of, has been discontinued.
|
||||||
[matrix-appservice-slack](configuring-playbook-bridge-appservice-slack.md) and [mautrix-slack](configuring-playbook-bridge-mautrix-slack.md) bridges supported by the playbook.
|
|
||||||
|
|
||||||
The playbook can install and configure [Beeper](https://www.beeper.com/)-maintained fork of
|
The playbook can install and configure [mx-puppet-slack](https://gitlab.com/mx-puppet/slack/mx-puppet-slack) for you.
|
||||||
[mx-puppet-slack](https://gitlab.com/beeper/mx-puppet-monorepo) for you.
|
|
||||||
|
|
||||||
See the project page to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://gitlab.com/mx-puppet/slack/mx-puppet-slack/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
## Setup
|
## Prerequisite
|
||||||
|
|
||||||
To enable the [Slack](https://slack.com/) bridge:
|
Follow the [OAuth credentials](https://gitlab.com/mx-puppet/slack/mx-puppet-slack#option-2-oauth) instructions to create a new Slack app, setting the redirect URL to `https://matrix.example.com/slack/oauth`.
|
||||||
|
|
||||||
1. Follow the
|
## Adjusting the playbook configuration
|
||||||
[OAuth credentials](https://github.com/Sorunome/mx-puppet-slack#option-2-oauth)
|
|
||||||
instructions to create a new Slack app, setting the redirect URL to
|
To enable the [Slack](https://slack.com/) bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
`https://matrix.YOUR_DOMAIN/slack/oauth`.
|
|
||||||
2. Update your `vars.yml` with the following:
|
```yaml
|
||||||
```yaml
|
matrix_mx_puppet_slack_enabled: true
|
||||||
matrix_mx_puppet_slack_enabled: true
|
# Client ID must be quoted so YAML does not parse it as a float.
|
||||||
# Client ID must be quoted so YAML does not parse it as a float.
|
matrix_mx_puppet_slack_oauth_client_id: "<SLACK_APP_CLIENT_ID>"
|
||||||
matrix_mx_puppet_slack_oauth_client_id: "<SLACK_APP_CLIENT_ID>"
|
matrix_mx_puppet_slack_oauth_client_secret: "<SLACK_APP_CLIENT_SECRET>"
|
||||||
matrix_mx_puppet_slack_oauth_client_secret: "<SLACK_APP_CLIENT_SECRET>"
|
```
|
||||||
```
|
|
||||||
3. Run playbooks with `setup-all` and `start` tags:
|
## Installing
|
||||||
```
|
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
```
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Once the bot is enabled you need to start a chat with `Slack Puppet Bridge` with
|
To use the bridge, you need to start a chat with `Slack Puppet Bridge` with the handle `@_slackpuppet_bot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
the handle `@_slackpuppet_bot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base
|
|
||||||
domain, not the `matrix.` domain).
|
|
||||||
|
|
||||||
Three authentication methods are available, Legacy Token, OAuth and xoxc token.
|
Three authentication methods are available, Legacy Token, OAuth and xoxc token. See mx-puppet-slack [documentation](https://gitlab.com/mx-puppet/slack/mx-puppet-slack) for more information about how to configure the bridge.
|
||||||
See mx-puppet-slack [documentation](https://github.com/Sorunome/mx-puppet-slack)
|
|
||||||
for more information about how to configure the bridge.
|
|
||||||
|
|
||||||
Once logged in, send `list` to the bot user to list the available rooms.
|
Once logged in, send `list` to the bot user to list the available rooms.
|
||||||
|
|
||||||
Clicking rooms in the list will result in you receiving an invitation to the
|
Clicking rooms in the list will result in you receiving an invitation to the bridged room.
|
||||||
bridged room.
|
|
||||||
|
|
||||||
Also send `help` to the bot to see the commands available.
|
Send `help` to the bot to see the available commands.
|
||||||
|
@ -1,32 +1,42 @@
|
|||||||
# Setting up MX Puppet Steam (optional)
|
# Setting up MX Puppet Steam bridging (optional)
|
||||||
|
|
||||||
The playbook can install and configure
|
The playbook can install and configure [mx-puppet-steam](https://github.com/icewind1991/mx-puppet-steam) for you.
|
||||||
[mx-puppet-steam](https://github.com/icewind1991/mx-puppet-steam) for you.
|
|
||||||
|
|
||||||
See the project page to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/icewind1991/mx-puppet-steam/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
To enable the [Steam](https://steampowered.com/) bridge just use the following
|
## Adjusting the playbook configuration
|
||||||
playbook configuration:
|
|
||||||
|
|
||||||
|
To enable the [Steam](https://steampowered.com/) bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mx_puppet_steam_enabled: true
|
matrix_mx_puppet_steam_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Once the bot is enabled you need to start a chat with `Steam Puppet Bridge` with
|
To use the bridge, you need to start a chat with `Steam Puppet Bridge` with the handle `@_steampuppet_bot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
the handle `@_steampuppet_bot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base
|
|
||||||
domain, not the `matrix.` domain).
|
|
||||||
|
|
||||||
Three authentication methods are available, Legacy Token, OAuth and xoxc token.
|
Three authentication methods are available, Legacy Token, OAuth and xoxc token. See mx-puppet-steam [documentation](https://github.com/icewind1991/mx-puppet-steam) for more information about how to configure the bridge.
|
||||||
See mx-puppet-steam [documentation](https://github.com/icewind1991/mx-puppet-steam)
|
|
||||||
for more information about how to configure the bridge.
|
|
||||||
|
|
||||||
Once logged in, send `list` to the bot user to list the available rooms.
|
Once logged in, send `list` to the bot user to list the available rooms.
|
||||||
|
|
||||||
Clicking rooms in the list will result in you receiving an invitation to the
|
Clicking rooms in the list will result in you receiving an invitation to the bridged room.
|
||||||
bridged room.
|
|
||||||
|
|
||||||
Also send `help` to the bot to see the commands available.
|
Send `help` to the bot to see the available commands.
|
||||||
|
@ -1,14 +1,18 @@
|
|||||||
# Setting up MX Puppet Twitter (optional)
|
# Setting up MX Puppet Twitter bridging (optional)
|
||||||
|
|
||||||
**Note**: bridging to [Twitter](https://twitter.com/) can also happen via the [mautrix-twitter](configuring-playbook-bridge-mautrix-twitter.md) bridge supported by the playbook.
|
**Note**: bridging to [Twitter](https://twitter.com/) can also happen via the [mautrix-twitter](configuring-playbook-bridge-mautrix-twitter.md) bridge supported by the playbook.
|
||||||
|
|
||||||
The playbook can install and configure
|
The playbook can install and configure [mx-puppet-twitter](https://github.com/Sorunome/mx-puppet-twitter) for you.
|
||||||
[mx-puppet-twitter](https://github.com/Sorunome/mx-puppet-twitter) for you.
|
|
||||||
|
|
||||||
See the project page to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/Sorunome/mx-puppet-twitter/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
To enable the [Twitter](https://twitter.com) bridge, make an app on [developer.twitter.com](https://developer.twitter.com/en/apps)
|
## Prerequisite
|
||||||
and fill out the following playbook configuration.
|
|
||||||
|
Make an app on [developer.twitter.com](https://developer.twitter.com/en/apps).
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the [Twitter](https://twitter.com) bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mx_puppet_twitter_enabled: true
|
matrix_mx_puppet_twitter_enabled: true
|
||||||
@ -19,18 +23,31 @@ matrix_mx_puppet_twitter_access_token_secret: ''
|
|||||||
matrix_mx_puppet_twitter_environment: ''
|
matrix_mx_puppet_twitter_environment: ''
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Once the bot is enabled you need to start a chat with `Twitter Puppet Bridge` with
|
To use the bridge, you need to start a chat with `Twitter Puppet Bridge` with the handle `@_twitterpuppet_bot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
the handle `@_twitterpuppet_bot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base
|
|
||||||
domain, not the `matrix.` domain).
|
|
||||||
|
|
||||||
To log in, use `link` and click the link.
|
To log in, use `link` and click the link.
|
||||||
|
|
||||||
Once logged in, send `list` to the bot user to list the available rooms.
|
Once logged in, send `list` to the bot user to list the available rooms.
|
||||||
|
|
||||||
Clicking rooms in the list will result in you receiving an invitation to the
|
Clicking rooms in the list will result in you receiving an invitation to the bridged room.
|
||||||
bridged room.
|
|
||||||
|
|
||||||
Also send `help` to the bot to see the commands available.
|
Send `help` to the bot to see the available commands.
|
||||||
|
86
docs/configuring-playbook-bridge-postmoogle.md
Normal file
86
docs/configuring-playbook-bridge-postmoogle.md
Normal file
@ -0,0 +1,86 @@
|
|||||||
|
# Setting up Postmoogle email bridging (optional)
|
||||||
|
|
||||||
|
**Note**: email bridging can also happen via the [email2matrix](configuring-playbook-email2matrix.md) bridge supported by the playbook.
|
||||||
|
|
||||||
|
The playbook can install and configure [Postmoogle](https://github.com/etkecc/postmoogle) for you.
|
||||||
|
|
||||||
|
Postmoogle is a bridge you can use to have its bot user forward emails to Matrix rooms. It runs an SMTP email server and allows you to assign mailbox addresses to the rooms.
|
||||||
|
|
||||||
|
See the project's [documentation](https://github.com/etkecc/postmoogle/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
Open the following ports on your server to be able to receive incoming emails:
|
||||||
|
|
||||||
|
- `25/tcp`: SMTP
|
||||||
|
- `587/tcp`: Submission (TLS-encrypted SMTP)
|
||||||
|
|
||||||
|
If you don't open these ports, you will still be able to send emails, but not receive any.
|
||||||
|
|
||||||
|
These port numbers are configurable via the `matrix_postmoogle_smtp_host_bind_port` and `matrix_postmoogle_submission_host_bind_port` variables, but other email servers will try to deliver on these default (standard) ports, so changing them is of little use.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
Add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_postmoogle_enabled: true
|
||||||
|
|
||||||
|
# Uncomment and adjust this part if you'd like to use a username different than the default
|
||||||
|
# matrix_postmoogle_login: postmoogle
|
||||||
|
|
||||||
|
# Generate a strong password for the bot. You can create one with a command like `pwgen -s 64 1`.
|
||||||
|
matrix_postmoogle_password: PASSWORD_FOR_THE_BOT
|
||||||
|
|
||||||
|
# Uncomment to add one or more admins to this bridge:
|
||||||
|
#
|
||||||
|
# matrix_postmoogle_admins:
|
||||||
|
# - '@yourAdminAccount:{{ matrix_domain }}'
|
||||||
|
#
|
||||||
|
# .. unless you've made yourself an admin of all bots/bridges like this:
|
||||||
|
#
|
||||||
|
# matrix_admin: '@yourAdminAccount:{{ matrix_domain }}'
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
You will also need to add several DNS records so that Postmoogle can send emails. See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create a user account of the bridge's bot.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
- If you change the bridge's bot password (`matrix_postmoogle_password` in your `vars.yml` file) subsequently, the bot user's credentials on the homeserver won't be updated automatically. If you'd like to change the bot user's password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `matrix_postmoogle_password` to let the bot know its new password.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
To use the bridge, invite the `@postmoogle:example.com` bot user into a room you want to use as a mailbox.
|
||||||
|
|
||||||
|
Then send `!pm mailbox NAME` to expose this Matrix room as an inbox with the email address `NAME@matrix.example.com`. Emails sent to that email address will be forwarded to the room.
|
||||||
|
|
||||||
|
Send `!pm help` to the bot in the room to see the available commands.
|
||||||
|
|
||||||
|
You can also refer to the upstream [documentation](https://github.com/etkecc/postmoogle).
|
||||||
|
|
||||||
|
### Debug/Logs
|
||||||
|
|
||||||
|
As with all other services, you can find their logs in [systemd-journald](https://www.freedesktop.org/software/systemd/man/systemd-journald.service.html) by running something like `journalctl -fu matrix-postmoogle`
|
||||||
|
|
||||||
|
The default logging level for this bridge is `INFO`, but you can increase it to `DEBUG` with the following additional configuration:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_postmoogle_loglevel: 'DEBUG'
|
||||||
|
```
|
36
docs/configuring-playbook-bridge-wechat.md
Normal file
36
docs/configuring-playbook-bridge-wechat.md
Normal file
@ -0,0 +1,36 @@
|
|||||||
|
# Setting up WeChat bridging (optional)
|
||||||
|
|
||||||
|
The playbook can install and configure the [matrix-wechat](https://github.com/duo/matrix-wechat) bridge for you (for bridging to the [WeChat](https://www.wechat.com/) network).
|
||||||
|
|
||||||
|
See the project's [documentation](https://github.com/duo/matrix-wechat/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_wechat_enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
## Usage
|
||||||
|
|
||||||
|
Once the bridge is installed, start a chat with `@wechatbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
|
Send `help` to the bot to see the available commands.
|
@ -1,65 +1,126 @@
|
|||||||
# Setting up Cactus Comments (optional)
|
# Setting up Cactus Comments (optional)
|
||||||
|
|
||||||
The playbook can install and configure [Cactus Comments](https://cactus.chat) for you.
|
The playbook can install and configure the [Cactus Comments](https://cactus.chat) system for you.
|
||||||
|
|
||||||
Cactus Comments is a **federated comment system** built on Matrix. The role allows you to self-host the system.
|
Cactus Comments is a **federated comment system** built on Matrix. It respects your privacy, and puts you in control.
|
||||||
It respects your privacy, and puts you in control.
|
|
||||||
|
|
||||||
See the project's [documentation](https://cactus.chat/docs/getting-started/introduction/) to learn what it
|
See the project's [documentation](https://cactus.chat/docs/getting-started/introduction/) to learn what it does and why it might be useful to you.
|
||||||
does and why it might be useful to you.
|
|
||||||
|
|
||||||
|
The playbook contains 2 roles for configuring different pieces of the Cactus Comments system:
|
||||||
|
|
||||||
|
- `matrix-cactus-comments` - the backend appservice integrating with the Matrix homeserver
|
||||||
|
|
||||||
|
- `matrix-cactus-comments-client` - a static website server serving the [cactus-client](https://cactus.chat/docs/client/introduction/) static assets (`cactus.js` and `styles.css`)
|
||||||
|
|
||||||
|
You can enable whichever component you need (typically both).
|
||||||
|
|
||||||
## Configuration
|
## Configuration
|
||||||
|
|
||||||
Add the following block to your `vars.yaml` and make sure to exchange the tokens to randomly generated values.
|
To enable Cactus Comments, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
#################
|
#################
|
||||||
## Cactus Chat ##
|
## Cactus Comments ##
|
||||||
#################
|
#################
|
||||||
|
|
||||||
|
# This enables the backend (appservice)
|
||||||
matrix_cactus_comments_enabled: true
|
matrix_cactus_comments_enabled: true
|
||||||
|
|
||||||
# To allow guest comments without users needing to log in, you need to have guest registration enabled.
|
# To allow guest comments without users needing to log in, you need to have guest registration enabled.
|
||||||
# To do this you need to uncomment one of the following lines (depending if you are using synapse or dentrite as a homeserver)
|
# To do this you need to uncomment one of the following lines (depending if you are using Synapse or Dendrite as a homeserver)
|
||||||
# If you don't know which one you use: The default is synapse ;)
|
# If you don't know which one you use: The default is Synapse ;)
|
||||||
# matrix_synapse_allow_guest_access: true
|
# matrix_synapse_allow_guest_access: true
|
||||||
# matrix_dentrite_allow_guest_access: true
|
# matrix_dendrite_allow_guest_access: true
|
||||||
|
|
||||||
|
# This enables client assets static files serving on `https://matrix.example.com/cactus-comments`.
|
||||||
|
# When the backend (appservice) is enabled, this is also enabled automatically,
|
||||||
|
# but we explicitly enable it here.
|
||||||
|
matrix_cactus_comments_client_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Adjusting the Cactus Comments' client URL
|
||||||
|
|
||||||
|
By default, this playbook installs Cactus Comments' client on the `matrix.` subdomain, at the `/cactus-comments` path (https://matrix.example.com/cactus-comments). This makes it easy to install it, because it **doesn't require additional DNS records to be set up**. If that's okay, you can skip this section.
|
||||||
|
|
||||||
|
By tweaking the `matrix_cactus_comments_client_hostname` and `matrix_cactus_comments_client_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Change the default hostname and path prefix to host the client assets at a different location
|
||||||
|
# These variables are used only if (`matrix_cactus_comments_client_enabled: true`)
|
||||||
|
matrix_cactus_comments_client_hostname: cactus.example.com
|
||||||
|
matrix_cactus_comments_client_path_prefix: /
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
If you've changed the default hostname, **you may need to adjust your DNS** records to point the Cactus Comments' client domain to the Matrix server.
|
||||||
|
|
||||||
|
See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to use the default hostname, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
## Installing
|
## Installing
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command again:
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
```
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
```
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
Upon starting Cactus Comments, a `bot.cactusbot` user account is created automatically.
|
Upon starting Cactus Comments, a `bot.cactusbot` user account is created automatically.
|
||||||
|
|
||||||
To get started, send a `help` message to the `@bot.cactusbot:your-homeserver.com` bot to confirm it's working.
|
To get started, send `help` to the `@bot.cactusbot:example.com` bot to confirm it's working.
|
||||||
Then, register a site by typing: `register <sitename>`. You will then be invited into a moderation room.
|
|
||||||
Now you are good to go and can include the comment section on your website!
|
|
||||||
|
|
||||||
**Careful:** To really make use of self-hosting you need change a few things in comparison to the official docs!
|
Then, register a site by sending `register <YourSiteName>` (where `<YourSiteName>` is a unique identifier you choose. It does not have to match your domain). You will then be invited into a moderation room.
|
||||||
|
|
||||||
Insert the following snippet into you page and make sure to replace `example.com` with your base domain!
|
Now you are good to go and can embed the comment section on your website!
|
||||||
|
|
||||||
|
## Embed Cactus Comments
|
||||||
|
|
||||||
|
The official [documentation](https://cactus.chat/docs/getting-started/quick-start/) provides a useful guide to embed Cactus Comments on your website.
|
||||||
|
|
||||||
|
After including the JavaScript and CSS asset files, insert a `<div>` where you'd like to display the comment section:
|
||||||
|
|
||||||
|
````html
|
||||||
|
<div id="comment-section"></div>
|
||||||
|
````
|
||||||
|
|
||||||
|
Then, you need to initialize the comment section. Make sure to replace `example.com` with your base domain and `<YourSiteName>` with the one that has been registered above:
|
||||||
|
|
||||||
```html
|
```html
|
||||||
<script type="text/javascript" src="https://matrix.example.com/cactus-comments/cactus.js"></script>
|
|
||||||
<link rel="stylesheet" href="https://matrix.example.com/cactus-comments/style.css" type="text/css">
|
|
||||||
<div id="comment-section"></div>
|
|
||||||
<script>
|
<script>
|
||||||
initComments({
|
initComments({
|
||||||
node: document.getElementById("comment-section"),
|
node: document.getElementById("comment-section"),
|
||||||
defaultHomeserverUrl: "https://matrix.example.com:8448",
|
defaultHomeserverUrl: "https://matrix.example.com:8448",
|
||||||
serverName: "example.com",
|
serverName: "example.com",
|
||||||
siteName: "YourSiteName",
|
siteName: "<YourSiteName>",
|
||||||
commentSectionId: "1"
|
commentSectionId: "1"
|
||||||
})
|
})
|
||||||
</script>
|
</script>
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Adjust the domain name for self-hosting
|
||||||
|
|
||||||
|
To have the assets served from your homeserver (not from `cactus.chat`), you need to adjust the domain name on the official documentation.
|
||||||
|
|
||||||
|
Make sure to replace `example.com` with your base domain before you include the following lines, instead of the one provided by the official documentation:
|
||||||
|
|
||||||
|
```html
|
||||||
|
<script type="text/javascript" src="https://matrix.example.com/cactus-comments/cactus.js"></script>
|
||||||
|
<link rel="stylesheet" href="https://matrix.example.com/cactus-comments/style.css" type="text/css">
|
||||||
|
```
|
||||||
|
|
||||||
|
**Note**: if the `matrix_cactus_comments_client_hostname` and `matrix_cactus_comments_client_path_prefix` variables are tweaked, you would need to adjust the URLs of the assets accordingly.
|
||||||
|
@ -1,21 +1,53 @@
|
|||||||
# Configuring Cinny (optional)
|
# Setting up Cinny (optional)
|
||||||
|
|
||||||
This playbook can install the [cinny](https://github.com/ajbura/cinny) Matrix web client for you.
|
This playbook can install the [Cinny](https://github.com/ajbura/cinny) Matrix web client for you.
|
||||||
cinny is a web client focusing primarily on simple, elegant and secure interface.
|
|
||||||
cinny can be installed alongside or instead of Element.
|
|
||||||
|
|
||||||
If you'd like cinny to be installed, add the following to your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`):
|
Cinny is a web client focusing primarily on simple, elegant and secure interface. It can be installed alongside or instead of [Element Web](./configuring-playbook-client-element-web.md).
|
||||||
|
|
||||||
|
💡 **Note**: the latest version of Cinny is also available on the web, hosted by 3rd parties. If you trust giving your credentials to the following 3rd party Single Page Applications, you can consider using it from there and avoiding the (small) overhead of self-hosting:
|
||||||
|
|
||||||
|
- [app.cinny.in](https://app.cinny.in), hosted by the [Cinny](https://cinny.in/) developers
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable Cinny, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_client_cinny_enabled: true
|
matrix_client_cinny_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
You will also need to add a DNS record so that cinny can be accessed.
|
### Adjusting the Cinny URL
|
||||||
By default cinny will use https://cinny.DOMAIN so you will need to create an CNAME record
|
|
||||||
for `cinny`. See [Configuring DNS](configuring-dns.md).
|
|
||||||
|
|
||||||
If you would like to use a different domain, add the following to your configuration file (changing it to use your preferred domain):
|
By default, this playbook installs Cinny on the `cinny.` subdomain (`cinny.example.com`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
||||||
|
|
||||||
|
By tweaking the `matrix_client_cinny_hostname` variable, you can easily make the service available at a **different hostname** than the default one.
|
||||||
|
|
||||||
|
While a `matrix_client_cinny_path_prefix` variable exists for tweaking the path-prefix, it's [not supported anymore](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/3701), because Cinny requires an application rebuild (with a tweaked build config) to be functional under a custom path.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_server_fqn_cinny: "app.{{ matrix_domain }}"
|
# Switch to a different domain (`app.example.com`) than the default one (`cinny.example.com`)
|
||||||
|
matrix_client_cinny_hostname: "app.{{ matrix_domain }}"
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
Once you've decided on the domain, **you may need to adjust your DNS** records to point the Cinny domain to the Matrix server.
|
||||||
|
|
||||||
|
By default, you will need to create a CNAME record for `cinny`. See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've adjusted `matrix_client_cinny_hostname`, you will need to adjust your DNS configuration accordingly.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook and [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
80
docs/configuring-playbook-client-element-web.md
Normal file
80
docs/configuring-playbook-client-element-web.md
Normal file
@ -0,0 +1,80 @@
|
|||||||
|
# Configuring Element Web (optional)
|
||||||
|
|
||||||
|
By default, this playbook installs the [Element Web](https://github.com/element-hq/element-web) Matrix client for you. If that's okay, you can skip this document.
|
||||||
|
|
||||||
|
💡 **Note**: the latest version of Element Web is also available on the web, hosted by 3rd parties. If you trust giving your credentials to the following 3rd party Single Page Applications, you can consider using it from there and avoiding the (small) overhead of self-hosting (by [disabling Element Web](#disabling-element-web)):
|
||||||
|
|
||||||
|
- [app.element.io](https://app.element.io/), hosted by [Element](https://element.io/)
|
||||||
|
- [app.etke.cc](https://app.etke.cc/), hosted by [etke.cc](https://etke.cc/)
|
||||||
|
|
||||||
|
## Disabling Element Web
|
||||||
|
|
||||||
|
If you'd like for the playbook to not install Element Web (or to uninstall it if it was previously installed), add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_client_element_enabled: false
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
The playbook provides some customization variables you could use to change Element Web's settings.
|
||||||
|
|
||||||
|
Their defaults are defined in [`roles/custom/matrix-client-element/defaults/main.yml`](../roles/custom/matrix-client-element/defaults/main.yml) and they ultimately end up in the generated `/matrix/element/config.json` file (on the server). This file is generated from the [`roles/custom/matrix-client-element/templates/config.json.j2`](../roles/custom/matrix-client-element/templates/config.json.j2) template.
|
||||||
|
|
||||||
|
**If there's an existing variable** which controls a setting you wish to change, you can simply define that variable in your configuration file (`inventory/host_vars/matrix.example.com/vars.yml`) and [re-run the playbook](installing.md) to apply the changes.
|
||||||
|
|
||||||
|
Alternatively, **if there is no pre-defined variable** for an Element Web setting you wish to change:
|
||||||
|
|
||||||
|
- you can either **request a variable to be created** (or you can submit such a contribution yourself). Keep in mind that it's **probably not a good idea** to create variables for each one of Element Web's various settings that rarely get used.
|
||||||
|
|
||||||
|
- or, you can **extend and override the default configuration** ([`config.json.j2`](../roles/custom/matrix-client-element/templates/config.json.j2)) by making use of the `matrix_client_element_configuration_extension_json_` variable. You can find information about this in [`roles/custom/matrix-client-element/defaults/main.yml`](../roles/custom/matrix-client-element/defaults/main.yml).
|
||||||
|
|
||||||
|
- or, if extending the configuration is still not powerful enough for your needs, you can **override the configuration completely** using `matrix_client_element_configuration_default` (or `matrix_client_element_configuration`). You can find information about this in [`roles/custom/matrix-client-element/defaults/main.yml`](../roles/custom/matrix-client-element/defaults/main.yml).
|
||||||
|
|
||||||
|
### Themes
|
||||||
|
|
||||||
|
To change the look of Element Web, you can define your own themes manually by using the `matrix_client_element_setting_defaults_custom_themes` setting.
|
||||||
|
|
||||||
|
Or better yet, you can automatically pull it all themes provided by the [aaronraimist/element-themes](https://github.com/aaronraimist/element-themes) project by simply flipping a flag (`matrix_client_element_themes_enabled: true`).
|
||||||
|
|
||||||
|
If you make your own theme, we encourage you to submit it to the **aaronraimist/element-themes** project, so that the whole community could easily enjoy it.
|
||||||
|
|
||||||
|
Note that for a custom theme to work well, all Element Web instances that you use must have the same theme installed.
|
||||||
|
|
||||||
|
### Adjusting the Element Web URL
|
||||||
|
|
||||||
|
By default, this playbook installs Element Web on the `element.` subdomain (`element.example.com`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
||||||
|
|
||||||
|
By tweaking the `matrix_client_element_hostname` and `matrix_client_element_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Switch to the domain used for Matrix services (`matrix.example.com`),
|
||||||
|
# so we won't need to add additional DNS records for Element Web.
|
||||||
|
matrix_client_element_hostname: "{{ matrix_server_fqn_matrix }}"
|
||||||
|
|
||||||
|
# Expose under the /element subpath
|
||||||
|
matrix_client_element_path_prefix: /element
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
Once you've decided on the domain and path, **you may need to adjust your DNS** records to point the Element Web domain to the Matrix server.
|
||||||
|
|
||||||
|
By default, you will need to create a CNAME record for `element`. See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to reuse the `matrix.` domain, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
@ -1,41 +0,0 @@
|
|||||||
# Configuring Element (optional)
|
|
||||||
|
|
||||||
By default, this playbook installs the [Element](https://github.com/vector-im/element-web) Matrix client web application.
|
|
||||||
If that's okay, you can skip this document.
|
|
||||||
|
|
||||||
|
|
||||||
## Disabling Element
|
|
||||||
|
|
||||||
If you'd like for the playbook to not install Element (or to uninstall it if it was previously installed), you can disable it in your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`):
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
matrix_client_element_enabled: false
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
## Configuring Element settings
|
|
||||||
|
|
||||||
The playbook provides some customization variables you could use to change Element's settings.
|
|
||||||
|
|
||||||
Their defaults are defined in [`roles/custom/matrix-client-element/defaults/main.yml`](../roles/custom/matrix-client-element/defaults/main.yml) and they ultimately end up in the generated `/matrix/element/config.json` file (on the server). This file is generated from the [`roles/custom/matrix-client-element/templates/config.json.j2`](../roles/custom/matrix-client-element/templates/config.json.j2) template.
|
|
||||||
|
|
||||||
**If there's an existing variable** which controls a setting you wish to change, you can simply define that variable in your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`) and [re-run the playbook](installing.md) to apply the changes.
|
|
||||||
|
|
||||||
Alternatively, **if there is no pre-defined variable** for an Element setting you wish to change:
|
|
||||||
|
|
||||||
- you can either **request a variable to be created** (or you can submit such a contribution yourself). Keep in mind that it's **probably not a good idea** to create variables for each one of Element's various settings that rarely get used.
|
|
||||||
|
|
||||||
- or, you can **extend and override the default configuration** ([`config.json.j2`](../roles/custom/matrix-client-element/templates/config.json.j2)) by making use of the `matrix_client_element_configuration_extension_json_` variable. You can find information about this in [`roles/custom/matrix-client-element/defaults/main.yml`](../roles/custom/matrix-client-element/defaults/main.yml).
|
|
||||||
|
|
||||||
- or, if extending the configuration is still not powerful enough for your needs, you can **override the configuration completely** using `matrix_client_element_configuration_default` (or `matrix_client_element_configuration`). You can find information about this in [`roles/custom/matrix-client-element/defaults/main.yml`](../roles/custom/matrix-client-element/defaults/main.yml).
|
|
||||||
|
|
||||||
|
|
||||||
## Themes
|
|
||||||
|
|
||||||
To change the look of Element, you can define your own themes manually by using the `matrix_client_element_setting_defaults_custom_themes` setting.
|
|
||||||
|
|
||||||
Or better yet, you can automatically pull it all themes provided by the [aaronraimist/element-themes](https://github.com/aaronraimist/element-themes) project by simply flipping a flag (`matrix_client_element_themes_enabled: true`).
|
|
||||||
|
|
||||||
If you make your own theme, we encourage you to submit it to the **aaronraimist/element-themes** project, so that the whole community could easily enjoy it.
|
|
||||||
|
|
||||||
Note that for a custom theme to work well, all Element instances that you use must have the same theme installed.
|
|
@ -1,21 +1,51 @@
|
|||||||
# Configuring Hydrogen (optional)
|
# Setting up Hydrogen (optional)
|
||||||
|
|
||||||
This playbook can install the [Hydrogen](https://github.com/vector-im/hydrogen-web) Matrix web client for you.
|
This playbook can install the [Hydrogen](https://github.com/element-hq/hydrogen-web) Matrix web client for you.
|
||||||
Hydrogen is a lightweight web client that supports mobile and legacy web browsers.
|
|
||||||
Hydrogen can be installed alongside or instead of Element.
|
|
||||||
|
|
||||||
If you'd like Hydrogen to be installed, add the following to your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`):
|
Hydrogen is a lightweight web client that supports mobile and legacy web browsers. It can be installed alongside or instead of Element Web.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable Hydrogen, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_client_hydrogen_enabled: true
|
matrix_client_hydrogen_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
You will also need to add a DNS record so that Hydrogen can be accessed.
|
### Adjusting the Hydrogen URL
|
||||||
By default Hydrogen will use https://hydrogen.DOMAIN so you will need to create an CNAME record
|
|
||||||
for `hydrogen`. See [Configuring DNS](configuring-dns.md).
|
|
||||||
|
|
||||||
If you would like to use a different domain, add the following to your configuration file (changing it to use your preferred domain):
|
By default, this playbook installs Hydrogen on the `hydrogen.` subdomain (`hydrogen.example.com`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
||||||
|
|
||||||
|
By tweaking the `matrix_client_hydrogen_hostname` and `matrix_client_hydrogen_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_server_fqn_hydrogen: "helium.{{ matrix_domain }}"
|
# Switch to the domain used for Matrix services (`matrix.example.com`),
|
||||||
|
# so we won't need to add additional DNS records for Hydrogen.
|
||||||
|
matrix_client_hydrogen_hostname: "{{ matrix_server_fqn_matrix }}"
|
||||||
|
|
||||||
|
# Expose under the /hydrogen subpath
|
||||||
|
matrix_client_hydrogen_path_prefix: /hydrogen
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
Once you've decided on the domain and path, **you may need to adjust your DNS** records to point the Hydrogen domain to the Matrix server.
|
||||||
|
|
||||||
|
By default, you will need to create a CNAME record for `hydrogen`. See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to reuse the `matrix.` domain, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
79
docs/configuring-playbook-client-schildichat-web.md
Normal file
79
docs/configuring-playbook-client-schildichat-web.md
Normal file
@ -0,0 +1,79 @@
|
|||||||
|
# Setting up SchildiChat Web (optional)
|
||||||
|
|
||||||
|
This playbook can install the [SchildiChat Web](https://github.com/SchildiChat/schildichat-desktop) Matrix client for you.
|
||||||
|
|
||||||
|
SchildiChat Web is a feature-rich messenger for Matrix based on Element Web with some extras and tweaks. It can be installed alongside or instead of Element Web.
|
||||||
|
|
||||||
|
💡 **Note**: the latest version of SchildiChat Web is also available on the web, hosted by 3rd parties. If you trust giving your credentials to the following 3rd party Single Page Application, you can consider using it from there:
|
||||||
|
|
||||||
|
- [app.schildi.chat](https://app.schildi.chat/), hosted by the [SchildiChat](https://schildi.chat/) developers
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable SchildiChat Web, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_client_schildichat_enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
The playbook provides some customization variables you could use to change SchildiChat Web's settings.
|
||||||
|
|
||||||
|
Their defaults are defined in [`roles/custom/matrix-client-schildichat/defaults/main.yml`](../roles/custom/matrix-client-schildichat/defaults/main.yml) and they ultimately end up in the generated `/matrix/schildichat/config.json` file (on the server). This file is generated from the [`roles/custom/matrix-client-schildichat/templates/config.json.j2`](../roles/custom/matrix-client-schildichat/templates/config.json.j2) template.
|
||||||
|
|
||||||
|
**If there's an existing variable** which controls a setting you wish to change, you can simply define that variable in your configuration file (`inventory/host_vars/matrix.example.com/vars.yml`) and [re-run the playbook](installing.md) to apply the changes.
|
||||||
|
|
||||||
|
Alternatively, **if there is no pre-defined variable** for a SchildiChat Web setting you wish to change:
|
||||||
|
|
||||||
|
- you can either **request a variable to be created** (or you can submit such a contribution yourself). Keep in mind that it's **probably not a good idea** to create variables for each one of SchildiChat Web's various settings that rarely get used.
|
||||||
|
|
||||||
|
- or, you can **extend and override the default configuration** ([`config.json.j2`](../roles/custom/matrix-client-schildichat/templates/config.json.j2)) by making use of the `matrix_client_schildichat_configuration_extension_json_` variable. You can find information about this in [`roles/custom/matrix-client-schildichat/defaults/main.yml`](../roles/custom/matrix-client-schildichat/defaults/main.yml).
|
||||||
|
|
||||||
|
- or, if extending the configuration is still not powerful enough for your needs, you can **override the configuration completely** using `matrix_client_schildichat_configuration_default` (or `matrix_client_schildichat_configuration`). You can find information about this in [`roles/custom/matrix-client-schildichat/defaults/main.yml`](../roles/custom/matrix-client-schildichat/defaults/main.yml).
|
||||||
|
|
||||||
|
### Themes
|
||||||
|
|
||||||
|
To change the look of SchildiChat Web, you can define your own themes manually by using the `matrix_client_schildichat_setting_defaults_custom_themes` setting.
|
||||||
|
|
||||||
|
Or better yet, you can automatically pull it all themes provided by the [aaronraimist/element-themes](https://github.com/aaronraimist/element-themes) project by simply flipping a flag (`matrix_client_schildichat_themes_enabled: true`).
|
||||||
|
|
||||||
|
If you make your own theme, we encourage you to submit it to the **aaronraimist/element-themes** project, so that the whole community could easily enjoy it.
|
||||||
|
|
||||||
|
Note that for a custom theme to work well, all SchildiChat Web instances that you use must have the same theme installed.
|
||||||
|
|
||||||
|
### Adjusting the SchildiChat Web URL
|
||||||
|
|
||||||
|
By default, this playbook installs SchildiChat Web on the `schildichat.` subdomain (`schildichat.example.com`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
||||||
|
|
||||||
|
By tweaking the `matrix_client_schildichat_hostname` and `matrix_client_schildichat_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Switch to the domain used for Matrix services (`matrix.example.com`),
|
||||||
|
# so we won't need to add additional DNS records for SchildiChat Web.
|
||||||
|
matrix_client_schildichat_hostname: "{{ matrix_server_fqn_matrix }}"
|
||||||
|
|
||||||
|
# Expose under the /schildichat subpath
|
||||||
|
matrix_client_schildichat_path_prefix: /schildichat
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
Once you've decided on the domain and path, **you may need to adjust your DNS** records to point the SchildiChat Web domain to the Matrix server.
|
||||||
|
|
||||||
|
By default, you will need to create a CNAME record for `schildichat`. See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to reuse the `matrix.` domain, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
@ -1,42 +0,0 @@
|
|||||||
# Configuring SchildiChat (optional)
|
|
||||||
|
|
||||||
By default, this playbook does not install the [SchildiChat](https://github.com/SchildiChat/schildichat-desktop) Matrix client web application.
|
|
||||||
|
|
||||||
**WARNING**: SchildiChat is based on Element-web, but its releases are lagging behind. As an example (from 2023-08-31), SchildiChat is 10 releases behind (it being based on element-web `v1.11.30`, while element-web is now on `v1.11.40`). Element-web frequently suffers from security issues, so running something based on an ancient Element-web release is **dangerous**. Use SchildiChat at your own risk!
|
|
||||||
|
|
||||||
|
|
||||||
## Enabling SchildiChat
|
|
||||||
|
|
||||||
If you'd like for the playbook to install SchildiChat, you can enable it in your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`):
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
matrix_client_schildichat_enabled: true
|
|
||||||
```
|
|
||||||
|
|
||||||
|
|
||||||
## Configuring SchildiChat settings
|
|
||||||
|
|
||||||
The playbook provides some customization variables you could use to change schildichat's settings.
|
|
||||||
|
|
||||||
Their defaults are defined in [`roles/custom/matrix-client-schildichat/defaults/main.yml`](../roles/custom/matrix-client-schildichat/defaults/main.yml) and they ultimately end up in the generated `/matrix/schildichat/config.json` file (on the server). This file is generated from the [`roles/custom/matrix-client-schildichat/templates/config.json.j2`](../roles/custom/matrix-client-schildichat/templates/config.json.j2) template.
|
|
||||||
|
|
||||||
**If there's an existing variable** which controls a setting you wish to change, you can simply define that variable in your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`) and [re-run the playbook](installing.md) to apply the changes.
|
|
||||||
|
|
||||||
Alternatively, **if there is no pre-defined variable** for an schildichat setting you wish to change:
|
|
||||||
|
|
||||||
- you can either **request a variable to be created** (or you can submit such a contribution yourself). Keep in mind that it's **probably not a good idea** to create variables for each one of schildichat's various settings that rarely get used.
|
|
||||||
|
|
||||||
- or, you can **extend and override the default configuration** ([`config.json.j2`](../roles/custom/matrix-client-schildichat/templates/config.json.j2)) by making use of the `matrix_client_schildichat_configuration_extension_json_` variable. You can find information about this in [`roles/custom/matrix-client-schildichat/defaults/main.yml`](../roles/custom/matrix-client-schildichat/defaults/main.yml).
|
|
||||||
|
|
||||||
- or, if extending the configuration is still not powerful enough for your needs, you can **override the configuration completely** using `matrix_client_schildichat_configuration_default` (or `matrix_client_schildichat_configuration`). You can find information about this in [`roles/custom/matrix-client-schildichat/defaults/main.yml`](../roles/custom/matrix-client-schildichat/defaults/main.yml).
|
|
||||||
|
|
||||||
|
|
||||||
## Themes
|
|
||||||
|
|
||||||
To change the look of schildichat, you can define your own themes manually by using the `matrix_client_schildichat_setting_defaults_custom_themes` setting.
|
|
||||||
|
|
||||||
Or better yet, you can automatically pull it all themes provided by the [aaronraimist/element-themes](https://github.com/aaronraimist/element-themes) project by simply flipping a flag (`matrix_client_schildichat_themes_enabled: true`).
|
|
||||||
|
|
||||||
If you make your own theme, we encourage you to submit it to the **aaronraimist/element-themes** project, so that the whole community could easily enjoy it.
|
|
||||||
|
|
||||||
Note that for a custom theme to work well, all schildichat instances that you use must have the same theme installed.
|
|
@ -1,42 +1,41 @@
|
|||||||
# Configuring Conduit (optional)
|
# Configuring Conduit (optional)
|
||||||
|
|
||||||
By default, this playbook configures the [Synapse](https://github.com/matrix-org/synapse) Matrix server, but you can also use [Conduit](https://conduit.rs).
|
By default, this playbook configures the [Synapse](https://github.com/element-hq/synapse) Matrix server, but you can also use [Conduit](https://conduit.rs).
|
||||||
|
|
||||||
**NOTES**:
|
**Notes**:
|
||||||
|
|
||||||
- **You can't switch an existing Matrix server's implementation** (e.g. Synapse -> Conduit). Proceed below only if you're OK with losing data or you're dealing with a server on a new domain name, which hasn't participated in the Matrix federation yet.
|
- **You can't switch an existing Matrix server's implementation** (e.g. Synapse -> Conduit). Proceed below only if you're OK with losing data or you're dealing with a server on a new domain name, which hasn't participated in the Matrix federation yet.
|
||||||
|
|
||||||
- **homeserver implementations other than Synapse may not be fully functional**. The playbook may also not assist you in an optimal way (like it does with Synapse). Make yourself familiar with the downsides before proceeding
|
- **homeserver implementations other than Synapse may not be fully functional**. The playbook may also not assist you in an optimal way (like it does with Synapse). Make yourself familiar with the downsides before proceeding
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
## Installation
|
To use Conduit, you **generally** need to add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
To use Conduit, you **generally** need the following additional `vars.yml` configuration:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_homeserver_implementation: conduit
|
matrix_homeserver_implementation: conduit
|
||||||
```
|
```
|
||||||
|
|
||||||
However, since Conduit is difficult (see [famedly/conduit#276](https://gitlab.com/famedly/conduit/-/issues/276) and [famedly/conduit#354](https://gitlab.com/famedly/conduit/-/merge_requests/354)) when it comes to creating the first user account and does not support [registering users](registering-users.md) (via the command line or via the playbook) like Synapse and Dendrite do, we recommend the following flow:
|
## Creating the first user account
|
||||||
|
|
||||||
|
Since it is difficult to create the first user account on Conduit (see [famedly/conduit#276](https://gitlab.com/famedly/conduit/-/issues/276) and [famedly/conduit#354](https://gitlab.com/famedly/conduit/-/merge_requests/354)) and it does not support [registering users](registering-users.md) (via the command line or via the playbook) like Synapse and Dendrite do, we recommend the following procedure:
|
||||||
|
|
||||||
1. Add `matrix_conduit_allow_registration: true` to your `vars.yml` the first time around, temporarily
|
1. Add `matrix_conduit_allow_registration: true` to your `vars.yml` the first time around, temporarily
|
||||||
2. Run the playbook (`ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start` - see [Installing](installing.md))
|
2. Run the playbook (`ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start` - see [Installing](installing.md))
|
||||||
3. Create your first user via Element or any other client which supports creating users
|
3. Create your first user via Element Web or any other client which supports creating users
|
||||||
4. Get rid of `matrix_conduit_allow_registration: true` from your `vars.yml`
|
4. Get rid of `matrix_conduit_allow_registration: true` from your `vars.yml`
|
||||||
5. Run the playbook again (`ansible-playbook -i inventory/hosts setup.yml --tags=setup-conduit,start` would be enough this time)
|
5. Run the playbook again (`ansible-playbook -i inventory/hosts setup.yml --tags=setup-conduit,start` would be enough this time)
|
||||||
6. You can now use your server safely. Additional users can be created by messaging the internal Conduit bot
|
6. You can now use your server safely. Additional users can be created by messaging the internal Conduit bot
|
||||||
|
|
||||||
|
|
||||||
## Configuring bridges / appservices
|
## Configuring bridges / appservices
|
||||||
|
|
||||||
Automatic appservice setup is currently unsupported when using conduit. After setting up the service as usual you may notice that it is unable to start.
|
Automatic appservice setup is currently unsupported when using Conduit. After setting up the service as usual you may notice that it is unable to start.
|
||||||
|
|
||||||
You will have to manually register appservices using the the [register-appservice](https://gitlab.com/famedly/conduit/-/blob/next/APPSERVICES.md) command.
|
You will have to manually register appservices using the the [register-appservice](https://gitlab.com/famedly/conduit/-/blob/next/APPSERVICES.md) command.
|
||||||
|
|
||||||
Find the `registration.yaml` in the `/matrix` directory, for example `/matrix/mautrix-signal/bridge/registration.yaml`, then pass the content to conduit:
|
Find the `registration.yaml` in the `/matrix` directory, for example `/matrix/mautrix-signal/bridge/registration.yaml`, then pass the content to Conduit:
|
||||||
|
|
||||||
|
@conduit:example.com: register-appservice
|
||||||
@conduit:your.server.name: register-appservice
|
|
||||||
```
|
```
|
||||||
as_token: <token>
|
as_token: <token>
|
||||||
de.sorunome.msc2409.push_ephemeral: true
|
de.sorunome.msc2409.push_ephemeral: true
|
||||||
@ -55,4 +54,3 @@ Find the `registration.yaml` in the `/matrix` directory, for example `/matrix/ma
|
|||||||
sender_localpart: _bot_signalbot
|
sender_localpart: _bot_signalbot
|
||||||
url: http://matrix-mautrix-signal:29328
|
url: http://matrix-mautrix-signal:29328
|
||||||
```
|
```
|
||||||
|
|
||||||
|
@ -1,16 +1,26 @@
|
|||||||
# Configuring Dendrite (optional)
|
# Configuring Dendrite (optional)
|
||||||
|
|
||||||
By default, this playbook configures the [Synapse](https://github.com/matrix-org/synapse) Matrix server, but you can also use [Dendrite](https://github.com/matrix-org/dendrite).
|
By default, this playbook configures the [Synapse](https://github.com/element-hq/synapse) Matrix server, but you can also use [Dendrite](https://github.com/matrix-org/dendrite).
|
||||||
|
|
||||||
**NOTES**:
|
**Notes**:
|
||||||
|
|
||||||
- **You can't switch an existing Matrix server's implementation** (e.g. Synapse -> Dendrite). Proceed below only if you're OK with losing data or you're dealing with a server on a new domain name, which hasn't participated in the Matrix federation yet.
|
- **You can't switch an existing Matrix server's implementation** (e.g. Synapse -> Dendrite). Proceed below only if you're OK with losing data or you're dealing with a server on a new domain name, which hasn't participated in the Matrix federation yet.
|
||||||
|
|
||||||
- **homeserver implementations other than Synapse may not be fully functional**. The playbook may also not assist you in an optimal way (like it does with Synapse). Make yourself familiar with the downsides before proceeding
|
- **homeserver implementations other than Synapse may not be fully functional**. The playbook may also not assist you in an optimal way (like it does with Synapse). Make yourself familiar with the downsides before proceeding
|
||||||
|
|
||||||
The playbook provided settings for Dendrite are defined in [`roles/custom/matrix-dendrite/defaults/main.yml`](../roles/custom/matrix-dendrite/defaults/main.yml) and they ultimately end up in the generated `/matrix/dendrite/config/dendrite.yaml` file (on the server). This file is generated from the [`roles/custom/matrix-dendrite/templates/dendrite/dendrite.yaml.j2`](../roles/custom/matrix-dendrite/templates/dendrite/dendrite.yaml.j2) template.
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
**If there's an existing variable** which controls a setting you wish to change, you can simply define that variable in your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`) and [re-run the playbook](installing.md) to apply the changes.
|
To use Dendrite, you **generally** need to add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_homeserver_implementation: dendrite
|
||||||
|
```
|
||||||
|
|
||||||
|
The playbook provides lots of customization variables you could use to change Dendrite's settings.
|
||||||
|
|
||||||
|
Their defaults are defined in [`roles/custom/matrix-dendrite/defaults/main.yml`](../roles/custom/matrix-dendrite/defaults/main.yml) and they ultimately end up in the generated `/matrix/dendrite/config/dendrite.yaml` file (on the server). This file is generated from the [`roles/custom/matrix-dendrite/templates/dendrite/dendrite.yaml.j2`](../roles/custom/matrix-dendrite/templates/dendrite/dendrite.yaml.j2) template.
|
||||||
|
|
||||||
|
**If there's an existing variable** which controls a setting you wish to change, you can simply define that variable in your configuration file (`inventory/host_vars/matrix.example.com/vars.yml`) and [re-run the playbook](installing.md) to apply the changes.
|
||||||
|
|
||||||
Alternatively, **if there is no pre-defined variable** for a Dendrite setting you wish to change:
|
Alternatively, **if there is no pre-defined variable** for a Dendrite setting you wish to change:
|
||||||
|
|
||||||
@ -20,13 +30,15 @@ Alternatively, **if there is no pre-defined variable** for a Dendrite setting yo
|
|||||||
|
|
||||||
- or, if extending the configuration is still not powerful enough for your needs, you can **override the configuration completely** using `matrix_dendrite_configuration` (or `matrix_dendrite_configuration_yaml`). You can find information about this in [`roles/custom/matrix-dendrite/defaults/main.yml`](../roles/custom/matrix-dendrite/defaults/main.yml).
|
- or, if extending the configuration is still not powerful enough for your needs, you can **override the configuration completely** using `matrix_dendrite_configuration` (or `matrix_dendrite_configuration_yaml`). You can find information about this in [`roles/custom/matrix-dendrite/defaults/main.yml`](../roles/custom/matrix-dendrite/defaults/main.yml).
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
## Installation
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
To use Dendrite, you **generally** need the following additional `vars.yml` configuration:
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
|
||||||
```yaml
|
|
||||||
matrix_homeserver_implementation: dendrite
|
|
||||||
```
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
@ -1,66 +1,40 @@
|
|||||||
# Setting up Dimension (optional)
|
# Setting up Dimension integration manager (optional, unmaintained)
|
||||||
|
|
||||||
**[Dimension](https://dimension.t2bot.io) can only be installed after Matrix services are installed and running.**
|
**[Dimension](https://dimension.t2bot.io) can only be installed after Matrix services are installed and running.** If you're just installing Matrix services for the first time, please continue with the [Configuration](configuring-playbook.md) / [Installation](installing.md) flow and come back here later.
|
||||||
If you're just installing Matrix services for the first time, please continue with the [Configuration](configuring-playbook.md) / [Installation](installing.md) flow and come back here later.
|
|
||||||
|
|
||||||
**Note**: Dimension is **[officially unmaintained](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/2806#issuecomment-1673559299)**. We recommend not bothering with installing it.
|
**Note**: Dimension is **[officially unmaintained](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/2806#issuecomment-1673559299)**. We recommend not bothering with installing it.
|
||||||
|
|
||||||
**Note**: This playbook now supports running [Dimension](https://dimension.t2bot.io) in both a federated and [unfederated](https://github.com/turt2live/matrix-dimension/blob/master/docs/unfederated.md) environments. This is handled automatically based on the value of `matrix_synapse_federation_enabled`. Enabling Dimension, means that the `openid` API endpoints will be exposed on the Matrix Federation port (usually `8448`), even if [federation](configuring-playbook-federation.md) is disabled. It's something to be aware of, especially in terms of firewall whitelisting (make sure port `8448` is accessible).
|
**Note**: This playbook now supports running [Dimension](https://dimension.t2bot.io) in both a federated and [unfederated](https://github.com/turt2live/matrix-dimension/blob/master/docs/unfederated.md) environments. This is handled automatically based on the value of `matrix_homeserver_federation_enabled`. Enabling Dimension, means that the `openid` API endpoints will be exposed on the Matrix Federation port (usually `8448`), even if [federation](configuring-playbook-federation.md) is disabled. It's something to be aware of, especially in terms of firewall whitelisting (make sure port `8448` is accessible).
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
## Decide on a domain and path
|
To enable Dimension, add this to your configuration file (`inventory/host_vars/matrix.example.com/vars.yml`):
|
||||||
|
|
||||||
By default, Dimension is configured to use its own dedicated domain (`dimension.DOMAIN`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
|
||||||
|
|
||||||
You can override the domain and path like this:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
# Switch to another hostname compared to the default (`dimension.{{ matrix_domain }}`)
|
|
||||||
matrix_dimension_hostname: "integrations.{{ matrix_domain }}"
|
|
||||||
|
|
||||||
```
|
|
||||||
|
|
||||||
While there is a `matrix_dimension_path_prefix` variable for changing the path where Dimension is served, overriding it is not possible right now due to [this Dimension issue](https://github.com/turt2live/matrix-dimension/issues/510). You must serve Dimension at a dedicated subdomain until this issue is solved.
|
|
||||||
|
|
||||||
|
|
||||||
## Adjusting DNS records
|
|
||||||
|
|
||||||
Once you've decided on the domain and path, **you may need to adjust your DNS** records to point the Dimension domain to the Matrix server.
|
|
||||||
|
|
||||||
|
|
||||||
## Enable
|
|
||||||
|
|
||||||
To enable Dimension, add this to your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`):
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_dimension_enabled: true
|
matrix_dimension_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Define admin users
|
||||||
|
|
||||||
## Define admin users
|
These users can modify the integrations this Dimension supports. Add this to your configuration file (`inventory/host_vars/matrix.example.com/vars.yml`):
|
||||||
|
|
||||||
These users can modify the integrations this Dimension supports.
|
|
||||||
Add this to your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`):
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_dimension_admins:
|
matrix_dimension_admins:
|
||||||
- "@user1:{{ matrix_domain }}"
|
- "@alice:{{ matrix_domain }}"
|
||||||
- "@user2:{{ matrix_domain }}"
|
- "@bob:{{ matrix_domain }}"
|
||||||
```
|
```
|
||||||
|
|
||||||
The admin interface is accessible within Element by accessing it in any room and clicking the cog wheel/settings icon in the top right. Currently, Dimension can be opened in Element by the "Add widgets, bridges, & bots" link in the room information.
|
The admin interface is accessible within Element Web by accessing it in any room and clicking the cog wheel/settings icon in the top right. Currently, Dimension can be opened in Element Web by the "Add widgets, bridges, & bots" link in the room information.
|
||||||
|
|
||||||
## Access token
|
### Obtain an access token
|
||||||
|
|
||||||
We recommend that you create a dedicated Matrix user for Dimension (`dimension` is a good username).
|
We recommend that you create a dedicated Matrix user for Dimension (`dimension` is a good username). Follow our [Registering users](registering-users.md) guide to learn how to register **a regular (non-admin) user**.
|
||||||
Follow our [Registering users](registering-users.md) guide to learn how to register **a regular (non-admin) user**.
|
|
||||||
|
|
||||||
You are required to specify an access token (belonging to this new user) for Dimension to work.
|
You are required to specify an access token (belonging to this new user) for Dimension to work. Refer to the documentation on [how to obtain an access token](obtaining-access-tokens.md).
|
||||||
To get an access token for the Dimension user, you can follow the documentation on [how to do obtain an access token](obtaining-access-tokens.md).
|
|
||||||
|
|
||||||
**Access tokens are sensitive information. Do not include them in any bug reports, messages, or logs. Do not share the access token with anyone.**
|
⚠️ **Warning**: Access tokens are sensitive information. Do not include them in any bug reports, messages, or logs. Do not share the access token with anyone.
|
||||||
|
|
||||||
Add access token to your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`):
|
Add access token to your configuration file (`inventory/host_vars/matrix.example.com/vars.yml`):
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_dimension_access_token: "YOUR ACCESS TOKEN HERE"
|
matrix_dimension_access_token: "YOUR ACCESS TOKEN HERE"
|
||||||
@ -68,28 +42,56 @@ matrix_dimension_access_token: "YOUR ACCESS TOKEN HERE"
|
|||||||
|
|
||||||
For more information on how to acquire an access token, visit [https://t2bot.io/docs/access_tokens](https://t2bot.io/docs/access_tokens).
|
For more information on how to acquire an access token, visit [https://t2bot.io/docs/access_tokens](https://t2bot.io/docs/access_tokens).
|
||||||
|
|
||||||
|
### Adjusting the Dimension URL
|
||||||
|
|
||||||
## Installation
|
By default, this playbook installs Dimension on the `dimension.` subdomain (`dimension.example.com`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
||||||
|
|
||||||
After these variables have been set and you have potentially [adjusted your DNS records](#adjusting-dns-records), please run the following command to re-run setup and to restart Dimension:
|
By tweaking the `matrix_dimension_hostname` and `matrix_dimension_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Switch to the domain used for Matrix services (`matrix.example.com`),
|
||||||
|
# so we won't need to add additional DNS records for Dimension.
|
||||||
|
matrix_dimension_hostname: "{{ matrix_server_fqn_matrix }}"
|
||||||
|
|
||||||
|
# Expose under the /dimension subpath
|
||||||
|
# matrix_dimension_path_prefix: /dimension
|
||||||
```
|
```
|
||||||
|
|
||||||
|
**Note**: While there is a `matrix_dimension_path_prefix` variable for changing the path where Dimension is served, overriding it is not possible due to [this Dimension issue](https://github.com/turt2live/matrix-dimension/issues/510). You must serve Dimension at a dedicated subdomain.
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
Once you've decided on the domain and path, **you may need to adjust your DNS** records to point the Dimension domain to the Matrix server.
|
||||||
|
|
||||||
|
By default, you will need to create a CNAME record for `dimension`. See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
```
|
```
|
||||||
|
|
||||||
After Dimension has been installed you may need to log out and log back in for it to pick up the new integrations manager. Then you can access integrations in Element by opening a room, clicking the Room info button (`i`) button in the top right corner of the screen, and then clicking Add widgets, bridges & bots.
|
**Notes**:
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
|
||||||
|
- After Dimension has been installed you may need to log out and log back in for it to pick up the new integration manager. Then you can access integrations in Element Web by opening a room, clicking the Room info button (`i`) button in the top right corner of the screen, and then clicking Add widgets, bridges & bots.
|
||||||
|
|
||||||
## Jitsi domain
|
## Jitsi domain
|
||||||
|
|
||||||
By default Dimension will use [jitsi.riot.im](https://jitsi.riot.im/) as the `conferenceDomain` of [Jitsi](https://jitsi.org/) audio/video conference widgets. For users running [a self-hosted Jitsi instance](./configuring-playbook-jitsi.md), you will likely want the widget to use your own Jitsi instance. Currently there is no way to configure this via the playbook, see [this issue](https://github.com/turt2live/matrix-dimension/issues/345) for details.
|
By default Dimension will use [jitsi.riot.im](https://jitsi.riot.im/) as the `conferenceDomain` of [Jitsi](https://jitsi.org/) audio/video conference widgets. For users running [a self-hosted Jitsi instance](./configuring-playbook-jitsi.md), you will likely want the widget to use your own Jitsi instance. Currently there is no way to configure this via the playbook, see [this issue](https://github.com/turt2live/matrix-dimension/issues/345) for details.
|
||||||
|
|
||||||
In the interim until the above limitation is resolved, an admin user needs to configure the domain via the admin ui once dimension is running. In Element, go to *Manage Integrations* → *Settings* → *Widgets* → *Jitsi Conference Settings* and set *Jitsi Domain* and *Jitsi Script URL* appropriately.
|
In the interim until the above limitation is resolved, an admin user needs to configure the domain via the admin ui once dimension is running. In Element Web, go to *Manage Integrations* → *Settings* → *Widgets* → *Jitsi Conference Settings* and set *Jitsi Domain* and *Jitsi Script URL* appropriately.
|
||||||
|
|
||||||
|
|
||||||
## Additional features
|
## Additional features
|
||||||
|
|
||||||
To use a more custom configuration, you can define a `matrix_dimension_configuration_extension_yaml` string variable and put your configuration in it.
|
To use a more custom configuration, you can define a `matrix_dimension_configuration_extension_yaml` string variable and put your configuration in it. To learn more about how to do this, refer to the information about `matrix_dimension_configuration_extension_yaml` in the [default variables file](../roles/custom/matrix-dimension/defaults/main.yml) of the Dimension component.
|
||||||
To learn more about how to do this, refer to the information about `matrix_dimension_configuration_extension_yaml` in the [default variables file](../roles/custom/matrix-dimension/defaults/main.yml) of the Dimension component.
|
|
||||||
|
|
||||||
You can find all configuration options on [GitHub page of Dimension project](https://github.com/turt2live/matrix-dimension/blob/master/config/default.yaml).
|
You can find all configuration options on [GitHub page of Dimension project](https://github.com/turt2live/matrix-dimension/blob/master/config/default.yaml).
|
||||||
|
@ -1,24 +1,40 @@
|
|||||||
# Dynamic DNS
|
# Setting up Dynamic DNS (optional)
|
||||||
|
|
||||||
## Setup
|
The playbook can configure Dynamic DNS with [ddclient](https://github.com/ddclient/ddclient) for you. It is a Perl client used to update dynamic DNS entries for accounts on Dynamic DNS Network Service Provider.
|
||||||
|
|
||||||
Most cloud providers / ISPs will charge you extra for a static IP address. If you're
|
Most cloud providers / ISPs will charge you extra for a static IP address. If you're not hosting a highly reliable homeserver you can workaround this via dynamic DNS.
|
||||||
not hosting a highly reliable homeserver you can workaround this via dynamic DNS. To
|
|
||||||
set this up, you'll need to get the username/password from your DNS provider. For
|
## Prerequisite
|
||||||
google domains, this process is described [here](https://support.google.com/domains/answer/6147083).
|
|
||||||
After you've gotten the proper credentials you can add the following config to your `inventory/host_vars/matrix.DOMAIN/vars.yml`:
|
You'll need to get a username and password from your DNS provider. Please consult with the provider about how to retrieve them.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable dynamic DNS, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_dynamic_dns_enabled: true
|
matrix_dynamic_dns_enabled: true
|
||||||
|
|
||||||
matrix_dynamic_dns_domain_configurations:
|
matrix_dynamic_dns_domain_configurations:
|
||||||
- provider: domains.google.com
|
- provider: example.net
|
||||||
protocol: dyndn2
|
protocol: dyndn2
|
||||||
username: XXXXXXXXXXXXXXXX
|
username: YOUR_USERNAME_HERE
|
||||||
password: XXXXXXXXXXXXXXXX
|
password: YOUR_PASSWORD_HERE
|
||||||
domain: "{{ matrix_domain }}"
|
domain: "{{ matrix_domain }}"
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
|
||||||
## Additional Reading
|
## Additional Reading
|
||||||
|
|
||||||
|
@ -2,54 +2,52 @@
|
|||||||
|
|
||||||
By default, this playbook sets up an [Exim](https://www.exim.org/) email server through which all Matrix services send emails.
|
By default, this playbook sets up an [Exim](https://www.exim.org/) email server through which all Matrix services send emails.
|
||||||
|
|
||||||
The email server would attempt to deliver emails directly to their final destination.
|
The email server would attempt to deliver emails directly to their final destination. This may or may not work, depending on your domain configuration (SPF settings, etc.)
|
||||||
This may or may not work, depending on your domain configuration (SPF settings, etc.)
|
|
||||||
|
|
||||||
By default, emails are sent from `matrix@<your-domain-name>` (as specified by the `matrix_mailer_sender_address` playbook variable).
|
By default, emails are sent from `matrix@matrix.example.com`, as specified by the `exim_relay_sender_address` playbook variable.
|
||||||
|
|
||||||
**Note**: If you are using a Google Cloud instance, [port 25 is always blocked](https://cloud.google.com/compute/docs/tutorials/sending-mail/), so you need to relay email through another SMTP server as described below.
|
⚠️ **Warning**: On some cloud providers (Google Cloud, etc.), [port 25 is always blocked](https://cloud.google.com/compute/docs/tutorials/sending-mail/), so sending email directly from your server is not possible. You will need to [relay email through another SMTP server](#relaying-email-through-another-smtp-server).
|
||||||
|
|
||||||
|
💡 To improve deliverability, we recommend [relaying email through another SMTP server](#relaying-email-through-another-smtp-server) anyway.
|
||||||
|
|
||||||
## Firewall settings
|
## Firewall settings
|
||||||
|
|
||||||
No matter whether you send email directly (the default) or you relay email through another host (see how below), you'll probably need to allow outgoing traffic for TCP ports 25/587 (depending on configuration).
|
No matter whether you send email directly (the default) or you relay email through another host (see how below), you'll probably need to allow outgoing traffic for TCP ports 25/587 (depending on configuration).
|
||||||
|
|
||||||
|
|
||||||
## Relaying email through another SMTP server
|
## Relaying email through another SMTP server
|
||||||
|
|
||||||
If you'd like to relay email through another SMTP server, feel free to redefine a few playbook variables.
|
If you'd like to relay email through another SMTP server, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file (adapt to your needs):
|
||||||
Example:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mailer_sender_address: "another.sender@example.com"
|
exim_relay_sender_address: "another.sender@example.com"
|
||||||
matrix_mailer_relay_use: true
|
exim_relay_relay_use: true
|
||||||
matrix_mailer_relay_host_name: "mail.example.com"
|
exim_relay_relay_host_name: "mail.example.com"
|
||||||
matrix_mailer_relay_host_port: 587
|
exim_relay_relay_host_port: 587
|
||||||
matrix_mailer_relay_auth: true
|
exim_relay_relay_auth: true
|
||||||
matrix_mailer_relay_auth_username: "another.sender@example.com"
|
exim_relay_relay_auth_username: "another.sender@example.com"
|
||||||
matrix_mailer_relay_auth_password: "some-password"
|
exim_relay_relay_auth_password: "some-password"
|
||||||
```
|
```
|
||||||
|
|
||||||
**Note**: only the secure submission protocol (using `STARTTLS`, usually on port `587`) is supported. **SMTPS** (encrypted SMTP, usually on port `465`) **is not supported**.
|
**Note**: only the secure submission protocol (using `STARTTLS`, usually on port `587`) is supported. **SMTPS** (encrypted SMTP, usually on port `465`) **is not supported**.
|
||||||
|
|
||||||
|
|
||||||
### Configuations for sending emails using Sendgrid
|
### Configuations for sending emails using Sendgrid
|
||||||
An easy and free SMTP service to set up is [Sendgrid](https://sendgrid.com/), the free tier allows for up to 100 emails per day to be sent. In the settings below you can provide any email for `matrix_mailer_sender_address`.
|
|
||||||
|
|
||||||
The only other thing you need to change is the `matrix_mailer_relay_auth_password`, which you can generate at https://app.sendgrid.com/settings/api_keys. The API key password looks something like `SG.955oW1mLSfwds7i9Yd6IA5Q.q8GTaB8q9kGDzasegdG6u95fQ-6zkdwrPP8bOeuI`.
|
An easy and free SMTP service to set up is [Sendgrid](https://sendgrid.com/), the free tier allows for up to 100 emails per day to be sent. In the settings below you can provide any email for `exim_relay_sender_address`.
|
||||||
|
|
||||||
Note that the `matrix_mailer_relay_auth_username` is literally the string `apikey`, it's always the same for Sendgrid.
|
The only other thing you need to change is the `exim_relay_relay_auth_password`, which you can generate at https://app.sendgrid.com/settings/api_keys. The API key password looks something like `SG.955oW1mLSfwds7i9Yd6IA5Q.q8GTaB8q9kGDzasegdG6u95fQ-6zkdwrPP8bOeuI`.
|
||||||
|
|
||||||
|
Note that the `exim_relay_relay_auth_username` is literally the string `apikey`, it's always the same for Sendgrid.
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mailer_sender_address: "arbitrary@email.com"
|
exim_relay_sender_address: "arbitrary@email.com"
|
||||||
matrix_mailer_relay_use: true
|
exim_relay_relay_use: true
|
||||||
matrix_mailer_relay_host_name: "smtp.sendgrid.net"
|
exim_relay_relay_host_name: "smtp.sendgrid.net"
|
||||||
matrix_mailer_relay_host_port: 587
|
exim_relay_relay_host_port: 587
|
||||||
matrix_mailer_relay_auth: true
|
exim_relay_relay_auth: true
|
||||||
matrix_mailer_relay_auth_username: "apikey"
|
exim_relay_relay_auth_username: "apikey"
|
||||||
matrix_mailer_relay_auth_password: "<your api key password>"
|
exim_relay_relay_auth_password: "<your api key password>"
|
||||||
```
|
```
|
||||||
|
|
||||||
## Troubleshooting
|
## Troubleshooting
|
||||||
|
|
||||||
If you're having trouble with email not being delivered, it may be useful to inspect the mailer logs: `journalctl -f -u matrix-mailer`.
|
If you're having trouble with email not being delivered, it may be useful to inspect the mailer logs: `journalctl -f -u matrix-exim-relay`.
|
||||||
|
@ -1,76 +1,102 @@
|
|||||||
# Setting up Email2Matrix (optional)
|
# Setting up Email2Matrix (optional)
|
||||||
|
|
||||||
**Note**: email bridging can also happen via the [Postmoogle](configuring-playbook-bot-postmoogle.md) bot supported by the playbook.
|
**Note**: email bridging can also happen via the [Postmoogle](configuring-playbook-bridge-postmoogle.md) bridge supported by the playbook. Postmoogle is much more powerful and easier to use, so we recommend that you use it, instead of Email2Matrix.
|
||||||
Postmoogle is much more powerful and easier to use, so we recommend that you use it, instead of Email2Matrix.
|
|
||||||
|
|
||||||
The playbook can install and configure [email2matrix](https://github.com/devture/email2matrix) for you.
|
The playbook can install and configure [email2matrix](https://github.com/devture/email2matrix) for you.
|
||||||
|
|
||||||
See the project's [documentation](https://github.com/devture/email2matrix/blob/master/docs/README.md) to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/devture/email2matrix/blob/master/docs/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
|
||||||
## Preparation
|
## Preparation
|
||||||
|
|
||||||
### DNS configuration
|
### DNS configuration
|
||||||
|
|
||||||
It's not strictly necessary, but you may increase the chances that incoming emails reach your server by adding an `MX` record for `matrix.DOMAIN`, as described in the [Configuring DNS](configuring-dns.md) documentation page.
|
It's not strictly necessary, but you may increase the chances that incoming emails reach your server by adding an `MX` record for `matrix.example.com`, as described in the [Configuring DNS](configuring-dns.md) documentation page.
|
||||||
|
|
||||||
### Port availability
|
### Port availability
|
||||||
|
|
||||||
Ensure that port 25 is available on your Matrix server and open in your firewall.
|
Ensure that port 25 is available on your Matrix server and open in your firewall.
|
||||||
|
|
||||||
If you have `postfix` or some other email server software installed, you may need to manually remove it first (unless you need it, of course).
|
If you have `postfix` or some other email server software installed, you may need to manually remove it first (unless you need it, of course).
|
||||||
|
|
||||||
If you really need to run an email server on the Matrix machine for other purposes, it may be possible to run Email2Matrix on another port (with a configuration like `matrix_email2matrix_smtp_host_bind_port: "127.0.0.01:2525"`) and have your other email server relay messages there.
|
If you really need to run an email server on the Matrix machine for other purposes, it may be possible to run Email2Matrix on another port (with a configuration like `matrix_email2matrix_smtp_host_bind_port: "127.0.0.01:2525"`) and have your other email server relay messages there.
|
||||||
|
|
||||||
For details about using Email2Matrix alongside [Postfix](http://www.postfix.org/), see [here](https://github.com/devture/email2matrix/blob/master/docs/setup_with_postfix.md).
|
For details about using Email2Matrix alongside [Postfix](http://www.postfix.org/), see [here](https://github.com/devture/email2matrix/blob/master/docs/setup_with_postfix.md).
|
||||||
|
|
||||||
### Creating a user
|
### Creating a user
|
||||||
|
|
||||||
Before enabling Email2Matrix, you'd most likely wish to create a dedicated user (or more) that would be sending messages on the Matrix side.
|
Before enabling Email2Matrix, you'd most likely wish to create a dedicated user (or more) that would be sending messages on the Matrix side. Take note of the user's ID as it needs to be specified as `MatrixUserId` on your `inventory/host_vars/matrix.example.com/vars.yml` file later.
|
||||||
Refer to [Registering users](registering-users.md) for ways to do that. A regular (non-admin) user works best.
|
|
||||||
|
Refer to [Registering users](registering-users.md) for ways to create a user. A regular (non-admin) user works best.
|
||||||
|
|
||||||
### Creating a shared room
|
### Creating a shared room
|
||||||
|
|
||||||
After creating a sender user, you should create one or more Matrix rooms that you share with that user.
|
After creating the sender user, you should create one or more Matrix rooms that you share with that user. It doesn't matter who creates and owns the rooms and who joins later (you or the sender user).
|
||||||
It doesn't matter who creates and owns the rooms and who joins later (you or the sender user).
|
|
||||||
|
|
||||||
What matters is that both you and the sender user are part of the same room and that the sender user has enough privileges in the room to be able to send messages there.
|
What matters is that both you and the sender user are part of the same room and that the sender user has enough privileges in the room to be able to send messages there.
|
||||||
|
|
||||||
Inviting additional people to the room is okay too.
|
Inviting additional people to the room is okay too.
|
||||||
|
|
||||||
Take note of each room's room id (different clients show the room id in a different place).
|
Take note of each room's room ID (different clients show the room ID in a different place). You'll need the room ID when [configuring the playbook](#adjusting-the-playbook-configuration) below.
|
||||||
You'll need the room id when doing [Configuration](#configuration) below.
|
|
||||||
|
|
||||||
|
### Obtain an access token for the sender user
|
||||||
### Obtaining an access token for the sender user
|
|
||||||
|
|
||||||
In order for the sender user created above to be able to send messages to the room, we'll need to obtain an access token for it. Refer to the documentation on [how to obtain an access token](obtaining-access-tokens.md).
|
In order for the sender user created above to be able to send messages to the room, we'll need to obtain an access token for it. Refer to the documentation on [how to obtain an access token](obtaining-access-tokens.md).
|
||||||
|
|
||||||
## Configuration
|
⚠️ **Warning**: Access tokens are sensitive information. Do not include them in any bug reports, messages, or logs. Do not share the access token with anyone.
|
||||||
|
|
||||||
After doing the preparation steps above, adjust your `inventory/host_vars/matrix.DOMAIN/vars.yml` configuration like this:
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
After doing the preparation steps above, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file (adapt to your needs):
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_email2matrix_enabled: true
|
matrix_email2matrix_enabled: true
|
||||||
|
|
||||||
matrix_email2matrix_matrix_mappings:
|
matrix_email2matrix_matrix_mappings:
|
||||||
- MailboxName: "my-mailbox"
|
- MailboxName: "mailbox1"
|
||||||
MatrixRoomId: "!someRoom:DOMAIN"
|
MatrixRoomId: "!qporfwt:{{ matrix_domain }}"
|
||||||
MatrixHomeserverUrl: "https://matrix.DOMAIN"
|
MatrixHomeserverUrl: "{{ matrix_homeserver_url }}"
|
||||||
MatrixUserId: "@email2matrix:DOMAIN"
|
MatrixUserId: "@email2matrix1:{{ matrix_domain }}"
|
||||||
MatrixAccessToken: "ACCESS_TOKEN_GOES_HERE"
|
MatrixAccessToken: "MATRIX_ACCESS_TOKEN_HERE"
|
||||||
IgnoreSubject: false
|
IgnoreSubject: false
|
||||||
IgnoreBody: false
|
IgnoreBody: false
|
||||||
SkipMarkdown: false
|
SkipMarkdown: false
|
||||||
|
|
||||||
- MailboxName: "my-mailbox2"
|
- MailboxName: "mailbox2"
|
||||||
MatrixRoomId: "!anotherRoom:DOMAIN"
|
MatrixRoomId: "!aaabaa:{{ matrix_domain }}"
|
||||||
MatrixHomeserverUrl: "https://matrix.DOMAIN"
|
MatrixHomeserverUrl: "{{ matrix_homeserver_url }}"
|
||||||
MatrixUserId: "@email2matrix:DOMAIN"
|
MatrixUserId: "@email2matrix2:{{ matrix_domain }}"
|
||||||
MatrixAccessToken: "ACCESS_TOKEN_GOES_HERE"
|
MatrixAccessToken: "MATRIX_ACCESS_TOKEN_HERE"
|
||||||
IgnoreSubject: true
|
IgnoreSubject: true
|
||||||
IgnoreBody: false
|
IgnoreBody: false
|
||||||
SkipMarkdown: true
|
SkipMarkdown: true
|
||||||
```
|
```
|
||||||
|
|
||||||
You can also set `MatrixHomeserverUrl` to `http://matrix-synapse-reverse-proxy-companion:8008`, instead of the public `https://matrix.DOMAIN`.
|
where:
|
||||||
However, that's more likely to break in the future if you switch to another server implementation than Synapse.
|
|
||||||
|
|
||||||
Re-run the playbook (`--tags=setup-email2matrix,start`) and try sending an email to `my-mailbox@matrix.DOMAIN`.
|
* MailboxName - local-part of the email address, through which emails are bridged to the room whose ID is defined with MatrixRoomId
|
||||||
|
* MatrixRoomId - internal ID of the room, to which received emails are sent as Matrix message
|
||||||
|
* MatrixHomeserverUrl - URL of your Matrix homeserver, through which to send Matrix messages. You can also set `MatrixHomeserverUrl` to the container URL where your homeserver's Client-Server API lives by using the `{{ matrix_addons_homeserver_client_api_url }}` variable
|
||||||
|
* MatrixUserId - the full ID of the sender user which sends bridged messages to the room. On this configuration it is `@email2matrix1:example.com` and `@email2matrix2:example.com` (where `example.com` is your base domain, not the `matrix.` domain)
|
||||||
|
* MatrixAccessToken - sender user's access token
|
||||||
|
* IgnoreSubject - if set to "true", the subject is not bridged to Matrix
|
||||||
|
* IgnoreBody - if set to "true", the message body is not bridged to Matrix
|
||||||
|
* SkipMarkdown - if set to "true", emails are bridged as plain text Matrix message instead of Markdown (actually HTML)
|
||||||
|
|
||||||
|
Refer to the official documentation [here](https://github.com/devture/email2matrix/blob/master/docs/configuration.md).
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-service email2matrix` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-service email2matrix` is useful for maintaining your setup quickly when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note `just setup-all` runs the `ensure-matrix-users-created` tag too.
|
||||||
|
|
||||||
|
- After installation, you may wish to send a test email to the email address assigned to `mailbox1` (default: `mailbox1@matrix.example.com`) to make sure that Email2Matrix works as expected.
|
||||||
|
@ -1,18 +1,31 @@
|
|||||||
# Setting up Etherpad (optional)
|
# Setting up Etherpad (optional)
|
||||||
|
|
||||||
[Etherpad](https://etherpad.org) is an open source collaborative text editor that can be embedded in a Matrix chat room using the [Dimension integrations manager](https://dimension.t2bot.io) or used as standalone web app.
|
[Etherpad](https://etherpad.org) is an open source collaborative text editor that can be embedded in a Matrix chat room using the [Dimension integration manager](https://dimension.t2bot.io) or used as standalone web app.
|
||||||
|
|
||||||
When enabled together with the Jitsi audio/video conferencing system (see [our docs on Jitsi](configuring-playbook-jitsi.md)), it will be made available as an option during the conferences.
|
When enabled together with the Jitsi audio/video conferencing system (see [our docs on Jitsi](configuring-playbook-jitsi.md)), it will be made available as an option during the conferences.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
## Decide on a domain and path
|
To enable Etherpad, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
By default, Etherpad is configured to use its own dedicated domain (`etherpad.DOMAIN`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
|
||||||
|
|
||||||
You can override the domain and path like this:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
# Switch to the domain used for Matrix services (`matrix.DOMAIN`),
|
etherpad_enabled: true
|
||||||
|
|
||||||
|
# Uncomment and adjust this part if you'd like to enable the admin web UI
|
||||||
|
# etherpad_admin_username: YOUR_USERNAME_HERE
|
||||||
|
# etherpad_admin_password: YOUR_PASSWORD_HERE
|
||||||
|
```
|
||||||
|
|
||||||
|
### Adjusting the Etherpad URL
|
||||||
|
|
||||||
|
By default, this playbook installs Etherpad on the `etherpad.` subdomain (`etherpad.example.com`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
||||||
|
|
||||||
|
By tweaking the `etherpad_hostname` and `etherpad_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Switch to the domain used for Matrix services (`matrix.example.com`),
|
||||||
# so we won't need to add additional DNS records for Etherpad.
|
# so we won't need to add additional DNS records for Etherpad.
|
||||||
etherpad_hostname: "{{ matrix_server_fqn_matrix }}"
|
etherpad_hostname: "{{ matrix_server_fqn_matrix }}"
|
||||||
|
|
||||||
@ -20,74 +33,65 @@ etherpad_hostname: "{{ matrix_server_fqn_matrix }}"
|
|||||||
etherpad_path_prefix: /etherpad
|
etherpad_path_prefix: /etherpad
|
||||||
```
|
```
|
||||||
|
|
||||||
**NOTE**: When using the old `matrix-nginx-proxy` reverse-proxy instead of Traefik, you have only 2 choices:
|
|
||||||
|
|
||||||
- serving Etherpad at its own dedicated domain:
|
|
||||||
- you need to set the domain using the `matrix_server_fqn_etherpad` variable (not `etherpad_hostname`)
|
|
||||||
- you must use `etherpad_path_prefix: /`
|
|
||||||
- serving Etherpad at the [Dimension](configuring-playbook-dimension.md) integration manager's domain (`matrix_server_fqn_dimension`)
|
|
||||||
- you need to have Dimension enabled
|
|
||||||
- you need to add `etherpad_path_prefix: /etherpad` or another prefix (different than `/`)
|
|
||||||
- you need to add `etherpad_nginx_proxy_dimension_integration_enabled: true` to enable this integration
|
|
||||||
|
|
||||||
|
|
||||||
## Adjusting DNS records
|
## Adjusting DNS records
|
||||||
|
|
||||||
Once you've decided on the domain and path, **you may need to adjust your DNS** records to point the Etherpad domain to the Matrix server.
|
Once you've decided on the domain and path, **you may need to adjust your DNS** records to point the Etherpad domain to the Matrix server.
|
||||||
|
|
||||||
If you've decided to reuse the `matrix.` domain, you won't need to do any extra DNS configuration.
|
By default, you will need to create a CNAME record for `etherpad`. See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to reuse the `matrix.` domain, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
## Installing
|
## Installing
|
||||||
|
|
||||||
[Etherpad](https://etherpad.org) installation is disabled by default. You can enable it in your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`):
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
```yaml
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
etherpad_enabled: true
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
# Uncomment below to enable the admin web UI
|
|
||||||
# etherpad_admin_username: admin
|
|
||||||
# etherpad_admin_password: some-password
|
|
||||||
```
|
```
|
||||||
|
|
||||||
Then, [run the installation process](installing.md) again (e.g. `just install-all`).
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the Etherpad admin user (`etherpad_admin_username`).
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
|
- If you change the Etherpad admin user's password (`etherpad_admin_password` in your `vars.yml` file) subsequently, the admin user's credentials on the homeserver won't be updated automatically. If you'd like to change the admin user's password, use a tool like [synapse-admin](configuring-playbook-synapse-admin.md) to change it, and then update `etherpad_admin_password` to let the admin user know its new password.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
The Etherpad UI should be available at `https://etherpad.<your-domain>`, while the admin UI (if enabled) should then be available at `https://etherpad.<your-domain>/admin`.
|
The Etherpad UI should be available at `https://etherpad.example.com`, while the admin UI (if enabled) should then be available at `https://etherpad.example.com/admin`.
|
||||||
|
|
||||||
If you've [decided on another hostname or path-prefix](#decide-on-a-domain-and-path) (e.g. `https://matrix.DOMAIN/etherpad`), adjust these URLs accordingly before usage.
|
|
||||||
|
|
||||||
|
If you've [decided on another hostname or path-prefix](#adjusting-the-etherpad-url) (e.g. `https://matrix.example.com/etherpad`), adjust these URLs accordingly before usage.
|
||||||
|
|
||||||
### Managing / Deleting old pads
|
### Managing / Deleting old pads
|
||||||
|
|
||||||
If you want to manage and remove old unused pads from Etherpad, you will first need to able Admin access as described above.
|
If you want to manage and remove old unused pads from Etherpad, you will first need to able Admin access as described above.
|
||||||
|
|
||||||
Then from the plugin manager page (`https://etherpad.<your-domain>/admin/plugins`, install the `adminpads2` plugin. Once installed, you should have a "Manage pads" section in the Admin web-UI.
|
Then from the plugin manager page (`https://etherpad.example.com/admin/plugins`, install the `adminpads2` plugin. Once installed, you should have a "Manage pads" section in the Admin web-UI.
|
||||||
|
|
||||||
|
### How to use Etherpad widgets without an integration manager (like Dimension)
|
||||||
|
|
||||||
### How to use Etherpad widgets without an Integration Manager (like Dimension)
|
This is how it works in Element Web, it might work quite similar with other clients:
|
||||||
|
|
||||||
This is how it works in Element, it might work quite similar with other clients:
|
|
||||||
|
|
||||||
To integrate a standalone etherpad in a room, create your pad by visiting `https://etherpad.DOMAIN`. When the pad opens, copy the URL and send a command like this to the room: `/addwidget URL`. You will then find your integrated Etherpad within the right sidebar in the `Widgets` section.
|
|
||||||
|
|
||||||
|
To integrate a standalone Etherpad in a room, create your pad by visiting `https://etherpad.example.com`. When the pad opens, copy the URL and send a command like this to the room: `/addwidget URL`. You will then find your integrated Etherpad within the right sidebar in the `Widgets` section.
|
||||||
|
|
||||||
### Set Dimension default to the self-hosted Etherpad (optional)
|
### Set Dimension default to the self-hosted Etherpad (optional)
|
||||||
|
|
||||||
If you decided to install [Dimension integration manager](configuring-playbook-dimension.md) alongside Etherpad, the Dimension administrator users can configure the default URL template.
|
If you decided to install [Dimension integration manager](configuring-playbook-dimension.md) alongside Etherpad, the Dimension administrator users can configure the default URL template.
|
||||||
The Dimension configuration menu can be accessed with the sprocket icon as you begin to add a widget to a room in Element. There you will find the Etherpad Widget Configuration action beneath the _Widgets_ tab.
|
|
||||||
|
|
||||||
|
The Dimension configuration menu can be accessed with the sprocket icon as you begin to add a widget to a room in Element Web. There you will find the Etherpad Widget Configuration action beneath the _Widgets_ tab.
|
||||||
|
|
||||||
#### Removing the integrated Etherpad chat
|
#### Removing the integrated Etherpad chat
|
||||||
|
|
||||||
If you wish to disable the Etherpad chat button, you can do it by appending `?showChat=false` to the end of the pad URL, or the template.
|
If you wish to disable the Etherpad chat button, you can do it by appending `?showChat=false` to the end of the pad URL, or the template.
|
||||||
|
|
||||||
Example: `https://etherpad.<your-domain>/p/$roomId_$padName?showChat=false`
|
Example: `https://etherpad.example.com/p/$roomId_$padName?showChat=false`
|
||||||
|
|
||||||
|
|
||||||
## Known issues
|
## Known issues
|
||||||
|
|
||||||
If your Etherpad widget fails to load, this might be due to Dimension generating a Pad name so long, the Etherpad app rejects it.
|
If your Etherpad widget fails to load, this might be due to Dimension generating a Pad name so long, the Etherpad app rejects it.
|
||||||
|
|
||||||
`$roomId_$padName` can end up being longer than 50 characters. You can avoid having this problem by altering the template so it only contains the three word random identifier `$padName`.
|
`$roomId_$padName` can end up being longer than 50 characters. You can avoid having this problem by altering the template so it only contains the three word random identifier `$padName`.
|
||||||
|
@ -1,16 +1,13 @@
|
|||||||
# Using an external PostgreSQL server (optional)
|
# Using an external PostgreSQL server (optional)
|
||||||
|
|
||||||
By default, this playbook would set up a PostgreSQL database server on your machine, running in a Docker container.
|
By default, this playbook would set up a PostgreSQL database server on your machine, running in a Docker container. If that's okay, you can skip this document.
|
||||||
If that's alright, you can skip this.
|
|
||||||
|
|
||||||
If you'd like to use an external PostgreSQL server that you manage, you can edit your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`).
|
**Note**: using **an external Postgres server is currently [not very seamless](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1682#issuecomment-1061461683) when it comes to enabling various other playbook services** - you will need to create a new database/credentials for each service and to point each service to its corresponding database using custom `vars.yml` configuration. **For the best experience with the playbook, stick to using the integrated Postgres server**.
|
||||||
|
|
||||||
**NOTE**: using **an external Postgres server is currently [not very seamless](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1682#issuecomment-1061461683) when it comes to enabling various other playbook services** - you will need to create a new database/credentials for each service and to point each service to its corresponding database using custom `vars.yml` configuration. **For the best experience with the playbook, stick to using the integrated Postgres server**.
|
If you'd like to use an external Postgres server that you manage, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file (adapt to your needs):
|
||||||
|
|
||||||
If you'd like to use an external Postgres server, use a custom `vars.yml` configuration like this:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
devture_postgres_enabled: false
|
postgres_enabled: false
|
||||||
|
|
||||||
# Rewire Synapse to use your external Postgres server
|
# Rewire Synapse to use your external Postgres server
|
||||||
matrix_synapse_database_host: "your-postgres-server-hostname"
|
matrix_synapse_database_host: "your-postgres-server-hostname"
|
||||||
@ -20,11 +17,10 @@ matrix_synapse_database_database: "your-postgres-server-database-name"
|
|||||||
|
|
||||||
# Rewire any other service (each `matrix-*` role) you may wish to use to use your external Postgres server.
|
# Rewire any other service (each `matrix-*` role) you may wish to use to use your external Postgres server.
|
||||||
# Each service expects to have its own dedicated database on the Postgres server
|
# Each service expects to have its own dedicated database on the Postgres server
|
||||||
# and uses its own variable names (see `roles/custom/matrix-*/defaults/main.yml) for configuring Postgres connectivity.
|
# and uses its own variable names (see `roles/custom/matrix-*/defaults/main.yml`) for configuring Postgres connectivity.
|
||||||
```
|
```
|
||||||
|
|
||||||
The database (as specified in `matrix_synapse_database_database`) must exist and be accessible with the given credentials.
|
The database (as specified in `matrix_synapse_database_database`) must exist and be accessible with the given credentials. It must be empty or contain a valid Synapse database. If empty, Synapse would populate it the first time it runs.
|
||||||
It must be empty or contain a valid Synapse database. If empty, Synapse would populate it the first time it runs.
|
|
||||||
|
|
||||||
**Note**: the external server that you specify in `matrix_synapse_database_host` must be accessible from within the `matrix-synapse` Docker container (and possibly other containers too). This means that it either needs to be a publicly accessible hostname or that it's a hostname on the same Docker network where all containers installed by this playbook run (a network called `matrix` by default). Using a local PostgreSQL instance on the host (running on the same machine, but not in a container) is not possible.
|
**Note**: the external server that you specify in `matrix_synapse_database_host` must be accessible from within the `matrix-synapse` Docker container (and possibly other containers too). This means that it either needs to be a publicly accessible hostname or that it's a hostname on the same Docker network where all containers installed by this playbook run (a network called `matrix` by default). Using a local PostgreSQL instance on the host (running on the same machine, but not in a container) is not possible.
|
||||||
|
|
||||||
|
@ -1,39 +1,37 @@
|
|||||||
# Controlling Matrix federation (optional)
|
# Controlling Matrix federation (optional)
|
||||||
|
|
||||||
By default, your server federates with the whole Matrix network.
|
By default, your server federates with the whole Matrix network. That is, people on your server can communicate with people on any other Matrix server.
|
||||||
That is, people on your server can communicate with people on any other Matrix server.
|
|
||||||
|
|
||||||
|
**Note**: in the sample `vars.yml` ([`examples/vars.yml`](../examples/vars.yml)), we recommend to use a short user ID like `@alice:example.com` instead of `@alice:matrix.example.com` and set up [server delegation](howto-server-delegation.md) / redirection. Without a proper configuration, your server will effectively not be part of the Matrix network. If you find your server is not federated, make sure to [check whether services work](maintenance-checking-services.md) and your server is properly delegated.
|
||||||
|
|
||||||
## Federating only with select servers
|
## Federating only with select servers
|
||||||
|
|
||||||
To make your server only federate with servers of your choosing, add this to your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`):
|
To make your server only federate with servers of your choosing, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file (adapt to your needs):
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_synapse_federation_domain_whitelist:
|
matrix_synapse_federation_domain_whitelist:
|
||||||
- example.com
|
- example.com
|
||||||
- another.com
|
- example.net
|
||||||
```
|
```
|
||||||
|
|
||||||
If you wish to disable federation, you can do that with an empty list (`[]`), or better yet by completely disabling federation (see below).
|
If you wish to disable federation, you can do that with an empty list (`[]`), or better yet by completely disabling federation (see below).
|
||||||
|
|
||||||
|
|
||||||
## Exposing the room directory over federation
|
## Exposing the room directory over federation
|
||||||
|
|
||||||
By default, your server's public rooms directory is not exposed to other servers via federation.
|
By default, your server's public rooms directory is not exposed to other servers via federation.
|
||||||
|
|
||||||
If you wish to expose it, add this to your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`):
|
If you wish to expose it, add this to your configuration file (`inventory/host_vars/matrix.example.com/vars.yml`):
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_synapse_allow_public_rooms_over_federation: true
|
matrix_synapse_allow_public_rooms_over_federation: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
## Disabling federation
|
## Disabling federation
|
||||||
|
|
||||||
To completely disable federation, isolating your server from the rest of the Matrix network, add this to your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`):
|
To completely disable federation, isolating your server from the rest of the Matrix network, add this to your configuration file (`inventory/host_vars/matrix.example.com/vars.yml`):
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_synapse_federation_enabled: false
|
matrix_homeserver_federation_enabled: false
|
||||||
```
|
```
|
||||||
|
|
||||||
With that, your server's users will only be able to talk among themselves, but not to anyone who is on another server.
|
With that, your server's users will only be able to talk among themselves, but not to anyone who is on another server.
|
||||||
@ -41,12 +39,11 @@ With that, your server's users will only be able to talk among themselves, but n
|
|||||||
**Disabling federation does not necessarily disable the federation port** (`8448`). Services like [Dimension](configuring-playbook-dimension.md) and [ma1sd](configuring-playbook-ma1sd.md) normally rely on `openid` APIs exposed on that port. Even if you disable federation and only if necessary, we may still be exposing the federation port and serving the `openid` APIs there. To override this and completely disable Synapse's federation port use:
|
**Disabling federation does not necessarily disable the federation port** (`8448`). Services like [Dimension](configuring-playbook-dimension.md) and [ma1sd](configuring-playbook-ma1sd.md) normally rely on `openid` APIs exposed on that port. Even if you disable federation and only if necessary, we may still be exposing the federation port and serving the `openid` APIs there. To override this and completely disable Synapse's federation port use:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
|
matrix_homeserver_federation_enabled: false
|
||||||
|
|
||||||
# This stops the federation port on the Synapse side (normally `matrix-synapse:8048` on the container network).
|
# This stops the federation port on the Synapse side (normally `matrix-synapse:8048` on the container network).
|
||||||
matrix_synapse_federation_port_enabled: false
|
matrix_synapse_federation_port_enabled: false
|
||||||
|
|
||||||
# This removes the `8448` virtual host from the matrix-nginx-proxy reverse-proxy server.
|
|
||||||
matrix_nginx_proxy_proxy_matrix_federation_api_enabled: false
|
|
||||||
|
|
||||||
# This stops the federation port on the synapse-reverse-proxy-companion side (normally `matrix-synapse-reverse-proxy-companion:8048` on the container network).
|
# This stops the federation port on the synapse-reverse-proxy-companion side (normally `matrix-synapse-reverse-proxy-companion:8048` on the container network).
|
||||||
matrix_synapse_reverse_proxy_companion_federation_api_enabled: false
|
matrix_synapse_reverse_proxy_companion_federation_api_enabled: false
|
||||||
```
|
```
|
||||||
@ -55,9 +52,9 @@ matrix_synapse_reverse_proxy_companion_federation_api_enabled: false
|
|||||||
|
|
||||||
Why? This change could be useful for people running small Synapse instances on small severs/VPSes to avoid being impacted by a simple DOS/DDOS when bandwidth, RAM, an CPU resources are limited and if your hosting provider does not provide a DOS/DDOS protection.
|
Why? This change could be useful for people running small Synapse instances on small severs/VPSes to avoid being impacted by a simple DOS/DDOS when bandwidth, RAM, an CPU resources are limited and if your hosting provider does not provide a DOS/DDOS protection.
|
||||||
|
|
||||||
The following changes in the configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`) will allow this and make it possible to proxy the federation through a CDN such as CloudFlare or any other:
|
The following changes in the configuration file (`inventory/host_vars/matrix.example.com/vars.yml`) will allow this and make it possible to proxy the federation through a CDN such as CloudFlare or any other:
|
||||||
|
|
||||||
```
|
```yaml
|
||||||
matrix_synapse_http_listener_resource_names: ["client","federation"]
|
matrix_synapse_http_listener_resource_names: ["client","federation"]
|
||||||
# Any port can be used but in this case we use 443
|
# Any port can be used but in this case we use 443
|
||||||
matrix_federation_public_port: 443
|
matrix_federation_public_port: 443
|
||||||
|
@ -1,55 +1,62 @@
|
|||||||
# Jitsi
|
# Setting up the Jitsi video-conferencing platform (optional)
|
||||||
|
|
||||||
The playbook can install the [Jitsi](https://jitsi.org/) video-conferencing platform and integrate it with [Element](configuring-playbook-client-element.md).
|
The playbook can install the [Jitsi](https://jitsi.org/) video-conferencing platform and integrate it with Element clients ([Element Web](configuring-playbook-client-element-web.md)/Desktop, Android and iOS).
|
||||||
|
|
||||||
Jitsi installation is **not enabled by default**, because it's not a core component of Matrix services.
|
Jitsi installation is **not enabled by default**, because it's not a core component of Matrix services.
|
||||||
|
|
||||||
The setup done by the playbook is very similar to [docker-jitsi-meet](https://github.com/jitsi/docker-jitsi-meet). You can refer to the documentation there for many of the options here.
|
The setup done by the playbook is very similar to [docker-jitsi-meet](https://github.com/jitsi/docker-jitsi-meet). You can refer to the documentation there for many of the options here.
|
||||||
|
|
||||||
|
|
||||||
## Prerequisites
|
## Prerequisites
|
||||||
|
|
||||||
Before installing Jitsi, make sure you've created the `jitsi.DOMAIN` DNS record (unless you've changed `jitsi_hostname`, as described below). See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
You may need to open the following ports to your server:
|
||||||
|
|
||||||
You may also need to open the following ports to your server:
|
|
||||||
|
|
||||||
- `4443/tcp` - RTP media fallback over TCP
|
- `4443/tcp` - RTP media fallback over TCP
|
||||||
- `10000/udp` - RTP media over UDP. Depending on your firewall/NAT setup, incoming RTP packets on port `10000` may have the external IP of your firewall as destination address, due to the usage of STUN in JVB (see [`jitsi_jvb_stun_servers`](https://github.com/mother-of-all-self-hosting/ansible-role-jitsi/blob/main/defaults/main.yml)).
|
- `10000/udp` - RTP media over UDP. Depending on your firewall/NAT setup, incoming RTP packets on port `10000` may have the external IP of your firewall as destination address, due to the usage of STUN in JVB (see [`jitsi_jvb_stun_servers`](https://github.com/mother-of-all-self-hosting/ansible-role-jitsi/blob/main/defaults/main.yml)).
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
## Installation
|
To enable Jitsi, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
Add this to your `inventory/host_vars/matrix.DOMAIN/vars.yml` configuration:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
jitsi_enabled: true
|
jitsi_enabled: true
|
||||||
|
|
||||||
# Uncomment and adjust if you need to use another hostname
|
|
||||||
# jitsi_hostname: "jitsi.{{ matrix_domain }}"
|
|
||||||
|
|
||||||
# Uncomment and possible adjust if you'd like to host under a subpath
|
|
||||||
# jitsi_path_prefix: /jitsi
|
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Adjusting the Jitsi URL
|
||||||
|
|
||||||
|
By default, this playbook installs Jitsi on the `jitsi.` subdomain (`jitsi.example.com`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
||||||
|
|
||||||
|
By tweaking the `jitsi_hostname` variable, you can easily make the service available at a **different hostname** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Change the default hostname
|
||||||
|
jitsi_hostname: call.example.com
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
Once you've decided on the domain and path, **you may need to adjust your DNS** records to point the Jitsi domain to the Matrix server.
|
||||||
|
|
||||||
|
By default, you will need to create a CNAME record for `jitsi`. See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
## (Optional) Configure Jitsi authentication and guests mode
|
## (Optional) Configure Jitsi authentication and guests mode
|
||||||
|
|
||||||
By default the Jitsi Meet instance does not require any kind of login and is open to use for anyone without registration.
|
By default the Jitsi Meet instance does not require any kind of login and is open to use for anyone without registration.
|
||||||
|
|
||||||
If you're fine with such an open Jitsi instance, please skip to [Apply changes](#apply-changes).
|
If you're fine with such an open Jitsi instance, please skip to [Installing](#installing).
|
||||||
|
|
||||||
If you would like to control who is allowed to open meetings on your new Jitsi instance, then please follow the following steps to enable Jitsi's authentication and optionally guests mode.
|
If you would like to control who is allowed to open meetings on your new Jitsi instance, then please follow the following steps to enable Jitsi's authentication and optionally guests mode.
|
||||||
|
|
||||||
Currently, there are three supported authentication modes: 'internal' (default), 'matrix' and 'ldap'.
|
Currently, there are three supported authentication modes: 'internal' (default), 'matrix' and 'ldap'.
|
||||||
|
|
||||||
**Note:** Authentication is not tested via the playbook's self-checks.
|
**Note**: Authentication is not tested via the playbook's self-checks. We therefore recommend that you manually verify if authentication is required by jitsi. For this, try to manually create a conference on jitsi.example.com in your browser.
|
||||||
We therefore recommend that you manually verify if authentication is required by jitsi.
|
|
||||||
For this, try to manually create a conference on jitsi.DOMAIN in your browser.
|
|
||||||
|
|
||||||
### Authenticate using Jitsi accounts (Auth-Type 'internal')
|
### Authenticate using Jitsi accounts (Auth-Type 'internal')
|
||||||
The default authentication mechanism is 'internal' auth, which requires jitsi-accounts to be setup and is the recommended setup, as it also works in federated rooms.
|
|
||||||
With authentication enabled, all meeting rooms have to be opened by a registered user, after which guests are free to join.
|
|
||||||
If a registered host is not yet present, guests are put on hold in individual waiting rooms.
|
|
||||||
|
|
||||||
Add these lines to your `inventory/host_vars/matrix.DOMAIN/vars.yml` configuration:
|
The default authentication mechanism is 'internal' auth, which requires jitsi-accounts to be setup and is the recommended setup, as it also works in federated rooms. With authentication enabled, all meeting rooms have to be opened by a registered user, after which guests are free to join. If a registered host is not yet present, guests are put on hold in individual waiting rooms.
|
||||||
|
|
||||||
|
Add these lines to your `inventory/host_vars/matrix.example.com/vars.yml` configuration:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
jitsi_enable_auth: true
|
jitsi_enable_auth: true
|
||||||
@ -61,7 +68,7 @@ jitsi_prosody_auth_internal_accounts:
|
|||||||
password: "another-password"
|
password: "another-password"
|
||||||
```
|
```
|
||||||
|
|
||||||
**Caution:** Accounts added here and subsequently removed will not be automatically removed from the Prosody server until user account cleaning is integrated into the playbook.
|
**Caution**: Accounts added here and subsequently removed will not be automatically removed from the Prosody server until user account cleaning is integrated into the playbook.
|
||||||
|
|
||||||
**If you get an error** like this: "Error: Account creation/modification not supported.", it's likely that you had previously installed Jitsi without auth/guest support. In such a case, you should look into [Rebuilding your Jitsi installation](#rebuilding-your-jitsi-installation).
|
**If you get an error** like this: "Error: Account creation/modification not supported.", it's likely that you had previously installed Jitsi without auth/guest support. In such a case, you should look into [Rebuilding your Jitsi installation](#rebuilding-your-jitsi-installation).
|
||||||
|
|
||||||
@ -69,8 +76,7 @@ jitsi_prosody_auth_internal_accounts:
|
|||||||
|
|
||||||
**Attention: Probably breaks Jitsi in federated rooms and does not allow sharing conference links with guests.**
|
**Attention: Probably breaks Jitsi in federated rooms and does not allow sharing conference links with guests.**
|
||||||
|
|
||||||
Using this authentication type require a [Matrix User Verification Service](https://github.com/matrix-org/matrix-user-verification-service).
|
Using this authentication type require a [Matrix User Verification Service](https://github.com/matrix-org/matrix-user-verification-service). By default, this playbook creates and configures a user-verification-service to run locally, see [configuring-user-verification-service](configuring-playbook-user-verification-service.md).
|
||||||
By default, this playbook creates and configures a user-verification-service to run locally, see [configuring-user-verification-service](configuring-playbook-user-verification-service.md).
|
|
||||||
|
|
||||||
To enable set this configuration at host level:
|
To enable set this configuration at host level:
|
||||||
|
|
||||||
@ -89,8 +95,8 @@ An example LDAP configuration could be:
|
|||||||
```yaml
|
```yaml
|
||||||
jitsi_enable_auth: true
|
jitsi_enable_auth: true
|
||||||
jitsi_auth_type: ldap
|
jitsi_auth_type: ldap
|
||||||
jitsi_ldap_url: "ldap://ldap.DOMAIN"
|
jitsi_ldap_url: "ldap://ldap.example.com"
|
||||||
jitsi_ldap_base: "OU=People,DC=DOMAIN"
|
jitsi_ldap_base: "OU=People,DC=example.com"
|
||||||
#jitsi_ldap_binddn: ""
|
#jitsi_ldap_binddn: ""
|
||||||
#jitsi_ldap_bindpw: ""
|
#jitsi_ldap_bindpw: ""
|
||||||
jitsi_ldap_filter: "uid=%u"
|
jitsi_ldap_filter: "uid=%u"
|
||||||
@ -106,7 +112,6 @@ jitsi_ldap_start_tls: false
|
|||||||
|
|
||||||
For more information refer to the [docker-jitsi-meet](https://github.com/jitsi/docker-jitsi-meet#authentication-using-ldap) and the [saslauthd `LDAP_SASLAUTHD`](https://github.com/winlibs/cyrus-sasl/blob/master/saslauthd/LDAP_SASLAUTHD) documentation.
|
For more information refer to the [docker-jitsi-meet](https://github.com/jitsi/docker-jitsi-meet#authentication-using-ldap) and the [saslauthd `LDAP_SASLAUTHD`](https://github.com/winlibs/cyrus-sasl/blob/master/saslauthd/LDAP_SASLAUTHD) documentation.
|
||||||
|
|
||||||
|
|
||||||
## (Optional) Making your Jitsi server work on a LAN
|
## (Optional) Making your Jitsi server work on a LAN
|
||||||
|
|
||||||
By default the Jitsi Meet instance does not work with a client in LAN (Local Area Network), even if others are connected from WAN. There are no video and audio. In the case of WAN to WAN everything is ok.
|
By default the Jitsi Meet instance does not work with a client in LAN (Local Area Network), even if others are connected from WAN. There are no video and audio. In the case of WAN to WAN everything is ok.
|
||||||
@ -115,7 +120,7 @@ The reason is the Jitsi VideoBridge git to LAN client the IP address of the dock
|
|||||||
|
|
||||||
Here is how to do it in the playbook.
|
Here is how to do it in the playbook.
|
||||||
|
|
||||||
Add these two lines to your `inventory/host_vars/matrix.DOMAIN/vars.yml` configuration:
|
Add these two lines to your `inventory/host_vars/matrix.example.com/vars.yml` configuration:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
jitsi_jvb_container_extra_arguments:
|
jitsi_jvb_container_extra_arguments:
|
||||||
@ -124,7 +129,7 @@ jitsi_jvb_container_extra_arguments:
|
|||||||
|
|
||||||
## (Optional) Fine tune Jitsi
|
## (Optional) Fine tune Jitsi
|
||||||
|
|
||||||
Sample **additional** `inventory/host_vars/matrix.DOMAIN/vars.yml` configuration to save up resources (explained below):
|
Sample **additional** `inventory/host_vars/matrix.example.com/vars.yml` configuration to save up resources (explained below):
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
jitsi_web_custom_config_extension: |
|
jitsi_web_custom_config_extension: |
|
||||||
@ -139,14 +144,11 @@ jitsi_web_config_resolution_width_ideal_and_max: 480
|
|||||||
jitsi_web_config_resolution_height_ideal_and_max: 240
|
jitsi_web_config_resolution_height_ideal_and_max: 240
|
||||||
```
|
```
|
||||||
|
|
||||||
You may want to **suspend unused video layers** until they are requested again, to save up resources on both server and clients.
|
You may want to **suspend unused video layers** until they are requested again, to save up resources on both server and clients. Read more on this feature [here](https://jitsi.org/blog/new-off-stage-layer-suppression-feature/)
|
||||||
Read more on this feature [here](https://jitsi.org/blog/new-off-stage-layer-suppression-feature/)
|
|
||||||
|
|
||||||
You may wish to **disable audio levels** to avoid excessive refresh of the client-side page and decrease the CPU consumption involved.
|
You may wish to **disable audio levels** to avoid excessive refresh of the client-side page and decrease the CPU consumption involved.
|
||||||
|
|
||||||
You may want to **limit the number of video feeds forwarded to each client**, to save up resources on both server and clients. As clients’ bandwidth and CPU may not bear the load, use this setting to avoid lag and crashes.
|
You may want to **limit the number of video feeds forwarded to each client**, to save up resources on both server and clients. As clients’ bandwidth and CPU may not bear the load, use this setting to avoid lag and crashes. This feature is found by default in other webconference applications such as Office 365 Teams (limit is set to 4). Read how it works [here](https://github.com/jitsi/jitsi-videobridge/blob/master/doc/last-n.md) and performance evaluation on this [study](https://jitsi.org/wp-content/uploads/2016/12/nossdav2015lastn.pdf).
|
||||||
This feature is found by default in other webconference applications such as Office 365 Teams (limit is set to 4).
|
|
||||||
Read how it works [here](https://github.com/jitsi/jitsi-videobridge/blob/master/doc/last-n.md) and performance evaluation on this [study](https://jitsi.org/wp-content/uploads/2016/12/nossdav2015lastn.pdf).
|
|
||||||
|
|
||||||
You may want to **limit the maximum video resolution**, to save up resources on both server and clients.
|
You may want to **limit the maximum video resolution**, to save up resources on both server and clients.
|
||||||
|
|
||||||
@ -164,30 +166,28 @@ jitsi_prosody_max_participants: 4 # example value
|
|||||||
|
|
||||||
By default, a single JVB ([Jitsi VideoBridge](https://github.com/jitsi/jitsi-videobridge)) is deployed on the same host as the Matrix server. To allow more video-conferences to happen at the same time, you may need to provision additional JVB services on other hosts.
|
By default, a single JVB ([Jitsi VideoBridge](https://github.com/jitsi/jitsi-videobridge)) is deployed on the same host as the Matrix server. To allow more video-conferences to happen at the same time, you may need to provision additional JVB services on other hosts.
|
||||||
|
|
||||||
There is an ansible playbook that can be run with the following tag:
|
There is an ansible playbook that can be run with the following tag: `ansible-playbook -i inventory/hosts --limit jitsi_jvb_servers jitsi_jvb.yml --tags=common,setup-additional-jitsi-jvb,start`
|
||||||
`ansible-playbook -i inventory/hosts --limit jitsi_jvb_servers jitsi_jvb.yml --tags=common,setup-additional-jitsi-jvb,start`
|
|
||||||
|
|
||||||
For this role to work you will need an additional section in the ansible hosts file with the details of the JVB hosts, for example:
|
For this role to work you will need an additional section in the ansible hosts file with the details of the JVB hosts, for example:
|
||||||
```
|
|
||||||
|
```INI
|
||||||
[jitsi_jvb_servers]
|
[jitsi_jvb_servers]
|
||||||
<your jvb hosts> ansible_host=<ip address of the jvb host>
|
<your jvb hosts> ansible_host=<ip address of the jvb host>
|
||||||
```
|
```
|
||||||
|
|
||||||
Each JVB will require a server id to be set so that it can be uniquely identified and this allows Jitsi to keep track of which conferences are on which JVB.
|
Each JVB will require a server ID to be set so that it can be uniquely identified and this allows Jitsi to keep track of which conferences are on which JVB. The server ID is set with the variable `jitsi_jvb_server_id` which ends up as the JVB_WS_SERVER_ID environment variables in the JVB docker container. This variable can be set via the host file, a parameter to the ansible command or in the `vars.yaml` for the host which will have the additional JVB. For example:
|
||||||
The server id is set with the variable `jitsi_jvb_server_id` which ends up as the JVB_WS_SERVER_ID environment variables in the JVB docker container.
|
|
||||||
This variable can be set via the host file, a parameter to the ansible command or in the `vars.yaml` for the host which will have the additional JVB. For example:
|
|
||||||
|
|
||||||
``` yaml
|
```yaml
|
||||||
jitsi_jvb_server_id: 'jvb-2'
|
jitsi_jvb_server_id: 'jvb-2'
|
||||||
```
|
```
|
||||||
|
|
||||||
``` INI
|
```INI
|
||||||
[jitsi_jvb_servers]
|
[jitsi_jvb_servers]
|
||||||
jvb-2.example.com ansible_host=192.168.0.2 jitsi_jvb_server_id=jvb-2
|
jvb-2.example.com ansible_host=192.168.0.2 jitsi_jvb_server_id=jvb-2
|
||||||
jvb-3.example.com ansible_host=192.168.0.3 jitsi_jvb_server_id=jvb-2
|
jvb-3.example.com ansible_host=192.168.0.3 jitsi_jvb_server_id=jvb-2
|
||||||
```
|
```
|
||||||
|
|
||||||
Note that the server id `jvb-1` is reserved for the JVB instance running on the Matrix host and therefore should not be used as the id of an additional jvb host.
|
Note that the server ID `jvb-1` is reserved for the JVB instance running on the Matrix host and therefore should not be used as the ID of an additional jvb host.
|
||||||
|
|
||||||
The additional JVB will also need to expose the colibri web socket port and this can be done with the following variable:
|
The additional JVB will also need to expose the colibri web socket port and this can be done with the following variable:
|
||||||
|
|
||||||
@ -195,22 +195,19 @@ The additional JVB will also need to expose the colibri web socket port and this
|
|||||||
jitsi_jvb_container_colibri_ws_host_bind_port: 9090
|
jitsi_jvb_container_colibri_ws_host_bind_port: 9090
|
||||||
```
|
```
|
||||||
|
|
||||||
The JVB will also need to know where the prosody xmpp server is located, similar to the server id this can be set in the vars for the JVB by using the variable
|
The JVB will also need to know where the prosody xmpp server is located, similar to the server ID this can be set in the vars for the JVB by using the variable `jitsi_xmpp_server`. The Jitsi prosody container is deployed on the Matrix server by default so the value can be set to the Matrix domain. For example:
|
||||||
`jitsi_xmpp_server`. The Jitsi prosody container is deployed on the matrix server by default so the value can be set to the matrix domain. For example:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
jitsi_xmpp_server: "{{ matrix_domain }}"
|
jitsi_xmpp_server: "{{ matrix_domain }}"
|
||||||
```
|
```
|
||||||
|
|
||||||
However, it can also be set the ip address of the matrix server. This can be useful if you wish to use a private ip. For example:
|
However, it can also be set the ip address of the Matrix server. This can be useful if you wish to use a private ip. For example:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
jitsi_xmpp_server: "192.168.0.1"
|
jitsi_xmpp_server: "192.168.0.1"
|
||||||
```
|
```
|
||||||
|
|
||||||
For the JVB to be able to contact the XMPP server, the latter must expose the XMPP port (5222). By default, the Matrix server does not expose the
|
For the JVB to be able to contact the XMPP server, the latter must expose the XMPP port (5222). By default, the Matrix server does not expose the port; only the XMPP container exposes it internally inside the host, which means that the first JVB (which runs on the Matrix server) can reach it but the additional JVB cannot. The port is exposed by setting `jitsi_prosody_container_jvb_host_bind_port` like this:
|
||||||
port; only the XMPP container exposes it internally inside the host, which means that the first JVB (which runs on the Matrix server) can reach it but
|
|
||||||
the additional JVB cannot. The port is exposed by setting `jitsi_prosody_container_jvb_host_bind_port` like this:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
jitsi_prosody_container_jvb_host_bind_port: 5222
|
jitsi_prosody_container_jvb_host_bind_port: 5222
|
||||||
@ -218,8 +215,7 @@ jitsi_prosody_container_jvb_host_bind_port: 5222
|
|||||||
|
|
||||||
(The default is empty; if it's set then docker forwards the port.)
|
(The default is empty; if it's set then docker forwards the port.)
|
||||||
|
|
||||||
Applied together this will allow you to provision extra JVB instances which will register themselves with the prosody service and be available for jicofo
|
Applied together this will allow you to provision extra JVB instances which will register themselves with the prosody service and be available for jicofo to route conferences too.
|
||||||
to route conferences too.
|
|
||||||
|
|
||||||
To make Traefik reverse-proxy to these additional JVBs (living on other hosts), **you would need to add the following Traefik configuration extension**:
|
To make Traefik reverse-proxy to these additional JVBs (living on other hosts), **you would need to add the following Traefik configuration extension**:
|
||||||
|
|
||||||
@ -227,20 +223,20 @@ To make Traefik reverse-proxy to these additional JVBs (living on other hosts),
|
|||||||
# Traefik proxying for additional JVBs. These can't be configured using Docker
|
# Traefik proxying for additional JVBs. These can't be configured using Docker
|
||||||
# labels, like the first JVB is, because they run on different hosts, so we add
|
# labels, like the first JVB is, because they run on different hosts, so we add
|
||||||
# the necessary configuration to the file provider.
|
# the necessary configuration to the file provider.
|
||||||
devture_traefik_provider_configuration_extension_yaml: |
|
traefik_provider_configuration_extension_yaml: |
|
||||||
http:
|
http:
|
||||||
routers:
|
routers:
|
||||||
{% for host in groups['jitsi_jvb_servers'] %}
|
{% for host in groups['jitsi_jvb_servers'] %}
|
||||||
|
|
||||||
additional-{{ hostvars[host]['jitsi_jvb_server_id'] }}-router:
|
additional-{{ hostvars[host]['jitsi_jvb_server_id'] }}-router:
|
||||||
entryPoints:
|
entryPoints:
|
||||||
- "{{ devture_traefik_entrypoint_primary }}"
|
- "{{ traefik_entrypoint_primary }}"
|
||||||
rule: "Host(`{{ jitsi_hostname }}`) && PathPrefix(`/colibri-ws/{{ hostvars[host]['jitsi_jvb_server_id'] }}/`)"
|
rule: "Host(`{{ jitsi_hostname }}`) && PathPrefix(`/colibri-ws/{{ hostvars[host]['jitsi_jvb_server_id'] }}/`)"
|
||||||
service: additional-{{ hostvars[host]['jitsi_jvb_server_id'] }}-service
|
service: additional-{{ hostvars[host]['jitsi_jvb_server_id'] }}-service
|
||||||
{% if devture_traefik_entrypoint_primary != 'web' %}
|
{% if traefik_entrypoint_primary != 'web' %}
|
||||||
|
|
||||||
tls:
|
tls:
|
||||||
certResolver: "{{ devture_traefik_certResolver_primary }}"
|
certResolver: "{{ traefik_certResolver_primary }}"
|
||||||
|
|
||||||
{% endif %}
|
{% endif %}
|
||||||
|
|
||||||
@ -259,8 +255,7 @@ devture_traefik_provider_configuration_extension_yaml: |
|
|||||||
|
|
||||||
## (Optional) Enable Gravatar
|
## (Optional) Enable Gravatar
|
||||||
|
|
||||||
In the default Jisti Meet configuration, gravatar.com is enabled as an avatar service. This results in third party request leaking data to gravatar.
|
In the default Jisti Meet configuration, gravatar.com is enabled as an avatar service. This results in third party request leaking data to gravatar. Since Element clients already send the url of configured Matrix avatars to Jitsi, we disabled gravatar.
|
||||||
Since element already sends the url of configured Matrix avatars to Jitsi, we disabled gravatar.
|
|
||||||
|
|
||||||
To enable Gravatar set:
|
To enable Gravatar set:
|
||||||
|
|
||||||
@ -268,26 +263,32 @@ To enable Gravatar set:
|
|||||||
jitsi_disable_gravatar: false
|
jitsi_disable_gravatar: false
|
||||||
```
|
```
|
||||||
|
|
||||||
**Beware:** This leaks information to a third party, namely the Gravatar-Service (unless configured otherwise: gravatar.com).
|
**Beware**: This leaks information to a third party, namely the Gravatar-Service (unless configured otherwise: gravatar.com). Besides metadata, this includes the Matrix user_id and possibly the room identifier (via `referrer` header).
|
||||||
Besides metadata, this includes the matrix user_id and possibly the room identifier (via `referrer` header).
|
|
||||||
|
|
||||||
## Apply changes
|
## Installing
|
||||||
|
|
||||||
Then re-run the playbook: `ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start`
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
You can use the self-hosted Jitsi server in multiple ways:
|
You can use the self-hosted Jitsi server in multiple ways:
|
||||||
|
|
||||||
- **by adding a widget to a room via Element** (the one configured by the playbook at `https://element.DOMAIN`). Just start a voice or a video call in a room containing more than 2 members and that would create a Jitsi widget which utilizes your self-hosted Jitsi server.
|
- **by adding a widget to a room via Element Web** (the one configured by the playbook at `https://element.example.com`). Just start a voice or a video call in a room containing more than 2 members and that would create a Jitsi widget which utilizes your self-hosted Jitsi server.
|
||||||
|
|
||||||
- **by adding a widget to a room via the Dimension Integration Manager**. You'll have to point the widget to your own Jitsi server manually. See our [Dimension](./configuring-playbook-dimension.md) documentation page for more details. Naturally, Dimension would need to be installed first (the playbook doesn't install it by default).
|
- **by adding a widget to a room via the Dimension integration manager**. You'll have to point the widget to your own Jitsi server manually. See our [Dimension integration manager](./configuring-playbook-dimension.md) documentation page for more details. Naturally, Dimension would need to be installed first (the playbook doesn't install it by default).
|
||||||
|
|
||||||
- **directly (without any Matrix integration)**. Just go to `https://jitsi.DOMAIN`
|
- **directly (without any Matrix integration)**. Just go to `https://jitsi.example.com`
|
||||||
|
|
||||||
**Note**: Element apps on mobile devices currently [don't support joining meetings on a self-hosted Jitsi server](https://github.com/vector-im/riot-web/blob/601816862f7d84ac47547891bd53effa73d32957/docs/jitsi.md#mobile-app-support).
|
|
||||||
|
|
||||||
|
**Note**: Element apps on mobile devices currently [don't support joining meetings on a self-hosted Jitsi server](https://github.com/element-hq/riot-web/blob/601816862f7d84ac47547891bd53effa73d32957/docs/jitsi.md#mobile-app-support).
|
||||||
|
|
||||||
## Troubleshooting
|
## Troubleshooting
|
||||||
|
|
||||||
|
@ -2,15 +2,15 @@
|
|||||||
|
|
||||||
The playbook can install and configure the [matrix-synapse-ldap3](https://github.com/matrix-org/matrix-synapse-ldap3) LDAP Auth password provider for you.
|
The playbook can install and configure the [matrix-synapse-ldap3](https://github.com/matrix-org/matrix-synapse-ldap3) LDAP Auth password provider for you.
|
||||||
|
|
||||||
See that project's documentation to learn what it does and why it might be useful to you.
|
See the project's [documentation](https://github.com/matrix-org/matrix-synapse-ldap3/blob/main/README.rst) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
If you decide that you'd like to let this playbook install it for you, you need some configuration like this:
|
If you decide that you'd like to let this playbook install it for you, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file (adapt to your needs):
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_synapse_ext_password_provider_ldap_enabled: true
|
matrix_synapse_ext_password_provider_ldap_enabled: true
|
||||||
matrix_synapse_ext_password_provider_ldap_uri:
|
matrix_synapse_ext_password_provider_ldap_uri:
|
||||||
- "ldap://ldap-01.mydomain.tld:389"
|
- "ldap://ldap-01.example.com:389"
|
||||||
- "ldap://ldap-02.mydomain.tld:389"
|
- "ldap://ldap-02.example.com:389"
|
||||||
matrix_synapse_ext_password_provider_ldap_start_tls: true
|
matrix_synapse_ext_password_provider_ldap_start_tls: true
|
||||||
matrix_synapse_ext_password_provider_ldap_base: "ou=users,dc=example,dc=com"
|
matrix_synapse_ext_password_provider_ldap_base: "ou=users,dc=example,dc=com"
|
||||||
matrix_synapse_ext_password_provider_ldap_attributes_uid: "uid"
|
matrix_synapse_ext_password_provider_ldap_attributes_uid: "uid"
|
||||||
@ -21,7 +21,6 @@ matrix_synapse_ext_password_provider_ldap_bind_password: ""
|
|||||||
matrix_synapse_ext_password_provider_ldap_filter: ""
|
matrix_synapse_ext_password_provider_ldap_filter: ""
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
## Authenticating only using a password provider
|
## Authenticating only using a password provider
|
||||||
|
|
||||||
If you wish for users to **authenticate only against configured password providers** (like this one), **without consulting Synapse's local database**, feel free to disable it:
|
If you wish for users to **authenticate only against configured password providers** (like this one), **without consulting Synapse's local database**, feel free to disable it:
|
||||||
@ -30,12 +29,10 @@ If you wish for users to **authenticate only against configured password provide
|
|||||||
matrix_synapse_password_config_localdb_enabled: false
|
matrix_synapse_password_config_localdb_enabled: false
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
## Using ma1sd Identity Server for authentication
|
## Using ma1sd Identity Server for authentication
|
||||||
|
|
||||||
If you wish to use the ma1sd Identity Server for LDAP authentication instead of [matrix-synapse-ldap3](https://github.com/matrix-org/matrix-synapse-ldap3) consult [Adjusting ma1sd Identity Server configuration](configuring-playbook-ma1sd.md#authentication).
|
If you wish to use the ma1sd Identity Server for LDAP authentication instead of [matrix-synapse-ldap3](https://github.com/matrix-org/matrix-synapse-ldap3) consult [Adjusting ma1sd Identity Server configuration](configuring-playbook-ma1sd.md#authentication).
|
||||||
|
|
||||||
|
|
||||||
## Handling user registration
|
## Handling user registration
|
||||||
|
|
||||||
If you wish for users to also be able to make new registrations against LDAP, you may **also** wish to [set up the ldap-registration-proxy](configuring-playbook-matrix-ldap-registration-proxy.md).
|
If you wish for users to also be able to make new registrations against LDAP, you may **also** wish to [set up the ldap-registration-proxy](configuring-playbook-matrix-ldap-registration-proxy.md).
|
||||||
|
@ -1,61 +1,81 @@
|
|||||||
# Adjusting ma1sd Identity Server configuration (optional)
|
# Setting up ma1sd Identity Server (optional)
|
||||||
|
|
||||||
The playbook can configure the [ma1sd](https://github.com/ma1uta/ma1sd) Identity Server for you.
|
**⚠️Note**: ma1sd itself has also been unmaintained for years (the latest commit and release being from 2021). The role of identity servers in the Matrix specification also has an uncertain future. **We recommend not bothering with installing it unless it's the only way you can do what you need to do**. For example, certain things like LDAP integration can also be implemented via [the LDAP provider module for Synapse](./configuring-playbook-ldap-auth.md).
|
||||||
|
|
||||||
ma1sd, being an Identity Server, is not strictly needed. It is only used for 3PIDs (3rd party identifiers like E-mail and phone numbers) and some [enhanced features](https://github.com/ma1uta/ma1sd/#features).
|
The playbook can configure the [ma1sd](https://github.com/ma1uta/ma1sd) Identity Server for you. It is a fork of [mxisd](https://github.com/kamax-io/mxisd) which was pronounced end of life 2019-06-21.
|
||||||
|
|
||||||
This server is private by default, potentially at the expense of user discoverability.
|
ma1sd is used for 3PIDs (3rd party identifiers like E-mail and phone numbers) and some [enhanced features](https://github.com/ma1uta/ma1sd/#features). It is private by default, potentially at the expense of user discoverability.
|
||||||
|
|
||||||
*ma1sd is a fork of [mxisd](https://github.com/kamax-io/mxisd) which was pronounced end of life 2019-06-21.*
|
See the project's [documentation](https://github.com/ma1uta/ma1sd/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
**Note**: enabling ma1sd, means that the `openid` API endpoints will be exposed on the Matrix Federation port (usually `8448`), even if [federation](configuring-playbook-federation.md) is disabled. It's something to be aware of, especially in terms of firewall whitelisting (make sure port `8448` is accessible).
|
**Note**: enabling ma1sd, means that the `openid` API endpoints will be exposed on the Matrix Federation port (usually `8448`), even if [federation](configuring-playbook-federation.md) is disabled. It's something to be aware of, especially in terms of firewall whitelisting (make sure port `8448` is accessible).
|
||||||
|
|
||||||
To enable ma1sd, use the following additional configuration in your `vars.yml` file:
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
To make the ma1sd Identity Server enable its federation features, set up a SRV record that looks like this:
|
||||||
|
|
||||||
|
- Name: `_matrix-identity._tcp` (use this text as-is)
|
||||||
|
- Content: `10 0 443 matrix.example.com` (replace `example.com` with your own)
|
||||||
|
|
||||||
|
See [ma1sd's documentation](https://github.com/ma1uta/ma1sd/wiki/mxisd-and-your-privacy#choices-are-never-easy) for information on the privacy implications of setting up this SRV record.
|
||||||
|
|
||||||
|
**Note**: This `_matrix-identity._tcp` SRV record for the identity server is different from the `_matrix._tcp` that can be used for Synapse delegation. See [howto-server-delegation.md](howto-server-delegation.md) for more information about delegation.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable ma1sd, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_ma1sd_enabled: true
|
matrix_ma1sd_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Matrix.org lookup forwarding
|
||||||
## Matrix.org lookup forwarding
|
|
||||||
|
|
||||||
To ensure maximum discovery, you can make your identity server also forward lookups to the central matrix.org Identity server (at the cost of potentially leaking all your contacts information).
|
To ensure maximum discovery, you can make your identity server also forward lookups to the central matrix.org Identity server (at the cost of potentially leaking all your contacts information).
|
||||||
|
|
||||||
Enabling this is discouraged and you'd better [learn more](https://github.com/ma1uta/ma1sd/blob/master/docs/features/identity.md#lookups) before proceeding.
|
Enabling this is discouraged and you'd better [learn more](https://github.com/ma1uta/ma1sd/blob/master/docs/features/identity.md#lookups) before proceeding.
|
||||||
|
|
||||||
Enabling matrix.org forwarding can happen with the following configuration:
|
To enable matrix.org forwarding, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_ma1sd_matrixorg_forwarding_enabled: true
|
matrix_ma1sd_matrixorg_forwarding_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Additional features
|
||||||
|
|
||||||
## Customizing email templates
|
What this playbook configures for your is some bare minimum Identity Server functionality, so that you won't need to rely on external 3rd party services.
|
||||||
|
|
||||||
If you'd like to change the default email templates used by ma1sd, take a look at the `matrix_ma1sd_threepid_medium_email_custom_` variables
|
A few variables can be toggled in this playbook to alter the ma1sd configuration that gets generated.
|
||||||
(in the `roles/custom/matrix-ma1sd/defaults/main.yml` file.
|
|
||||||
|
|
||||||
|
Still, ma1sd can do much more. You can refer to the [ma1sd website](https://github.com/ma1uta/ma1sd) for more details and configuration options.
|
||||||
|
|
||||||
## ma1sd-controlled Registration
|
To use a more custom configuration, you can define a `matrix_ma1sd_configuration_extension_yaml` string variable and put your configuration in it. To learn more about how to do this, refer to the information about `matrix_ma1sd_configuration_extension_yaml` in the [default variables file](../roles/custom/matrix-ma1sd/defaults/main.yml) of the ma1sd component.
|
||||||
|
|
||||||
|
#### Customizing email templates
|
||||||
|
|
||||||
|
If you'd like to change the default email templates used by ma1sd, take a look at the `matrix_ma1sd_threepid_medium_email_custom_` variables (in the `roles/custom/matrix-ma1sd/defaults/main.yml` file.
|
||||||
|
|
||||||
|
#### ma1sd-controlled Registration
|
||||||
|
|
||||||
To use the [Registration](https://github.com/ma1uta/ma1sd/blob/master/docs/features/registration.md) feature of ma1sd, you can make use of the following variables:
|
To use the [Registration](https://github.com/ma1uta/ma1sd/blob/master/docs/features/registration.md) feature of ma1sd, you can make use of the following variables:
|
||||||
|
|
||||||
- `matrix_synapse_enable_registration` - to enable user-initiated registration in Synapse
|
- `matrix_synapse_enable_registration` - to enable user-initiated registration in Synapse
|
||||||
|
|
||||||
- `matrix_synapse_enable_registration_captcha` - to validate registering users using reCAPTCHA, as described in the [enabling reCAPTCHA](configuring_captcha.md) documentation.
|
- `matrix_synapse_enable_registration_captcha` - to validate registering users using reCAPTCHA, as described in the [enabling reCAPTCHA](configuring-captcha.md) documentation.
|
||||||
|
|
||||||
- `matrix_synapse_registrations_require_3pid` - to control the types of 3pid (`'email'`, `'msisdn'`) required by the Synapse server for registering
|
- `matrix_synapse_registrations_require_3pid` - a list of 3pid types (among `'email'`, `'msisdn'`) required by the Synapse server for registering
|
||||||
|
|
||||||
- variables prefixed with `matrix_nginx_proxy_proxy_matrix_3pid_registration_` (e.g. `matrix_nginx_proxy_proxy_matrix_3pid_registration_enabled`) - to configure the integrated nginx webserver to send registration requests to ma1sd (instead of Synapse), so it can apply its additional functionality
|
- variables prefixed with `matrix_ma1sd_container_labels_` (e.g. `matrix_ma1sd_container_labels_matrix_client_3pid_registration_enabled`) - to configure the Traefik reverse-proxy to capture and send registration requests to ma1sd (instead of Synapse), so it can apply its additional functionality
|
||||||
|
|
||||||
- `matrix_ma1sd_configuration_extension_yaml` - to configure ma1sd as required. See the [Registration feature's docs](https://github.com/ma1uta/ma1sd/blob/master/docs/features/registration.md) for inspiration. Also see the [Additional features](#additional-features) section below to learn more about how to use `matrix_ma1sd_configuration_extension_yaml`.
|
- `matrix_ma1sd_configuration_extension_yaml` - to configure ma1sd as required. See the [Registration feature's docs](https://github.com/ma1uta/ma1sd/blob/master/docs/features/registration.md) for inspiration. Also see the [Additional features](#additional-features) section below to learn more about how to use `matrix_ma1sd_configuration_extension_yaml`.
|
||||||
|
|
||||||
**Note**: For this to work, either the homeserver needs to [federate](configuring-playbook-federation.md) or the `openid` APIs need to exposed on the federation port. When federation is disabled and ma1sd is enabled, we automatically expose the `openid` APIs (only!) on the federation port. Make sure the federation port (usually `https://matrix.DOMAIN:8448`) is whitelisted in your firewall (even if you don't actually use/need federation).
|
**Note**: For this to work, either the homeserver needs to [federate](configuring-playbook-federation.md) or the `openid` APIs need to exposed on the federation port. When federation is disabled and ma1sd is enabled, we automatically expose the `openid` APIs (only!) on the federation port. Make sure the federation port (usually `https://matrix.example.com:8448`) is whitelisted in your firewall (even if you don't actually use/need federation).
|
||||||
|
|
||||||
|
#### Authentication
|
||||||
|
|
||||||
## Authentication
|
[Authentication](https://github.com/ma1uta/ma1sd/blob/master/docs/features/authentication.md) provides the possibility to use your own [Identity Stores](https://github.com/ma1uta/ma1sd/blob/master/docs/stores/README.md) (for example LDAP) to authenticate users on your Homeserver.
|
||||||
|
|
||||||
[Authentication](https://github.com/ma1uta/ma1sd/blob/master/docs/features/authentication.md) provides the possibility to use your own [Identity Stores](https://github.com/ma1uta/ma1sd/blob/master/docs/stores/README.md) (for example LDAP) to authenticate users on your Homeserver. The following configuration can be used to authenticate against an LDAP server:
|
To enable authentication against an LDAP server, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_synapse_ext_password_provider_rest_auth_enabled: true
|
matrix_synapse_ext_password_provider_rest_auth_enabled: true
|
||||||
@ -75,20 +95,7 @@ matrix_ma1sd_configuration_extension_yaml: |
|
|||||||
bindPassword: TheUserPassword
|
bindPassword: TheUserPassword
|
||||||
```
|
```
|
||||||
|
|
||||||
## Additional features
|
#### Example: SMS verification
|
||||||
|
|
||||||
What this playbook configures for your is some bare minimum Identity Server functionality, so that you won't need to rely on external 3rd party services.
|
|
||||||
|
|
||||||
A few variables can be toggled in this playbook to alter the ma1sd configuration that gets generated.
|
|
||||||
|
|
||||||
Still, ma1sd can do much more.
|
|
||||||
You can refer to the [ma1sd website](https://github.com/ma1uta/ma1sd) for more details and configuration options.
|
|
||||||
|
|
||||||
To use a more custom configuration, you can define a `matrix_ma1sd_configuration_extension_yaml` string variable
|
|
||||||
and put your configuration in it.
|
|
||||||
To learn more about how to do this, refer to the information about `matrix_ma1sd_configuration_extension_yaml` in the [default variables file](../roles/custom/matrix-ma1sd/defaults/main.yml) of the ma1sd component.
|
|
||||||
|
|
||||||
## Example: SMS verification
|
|
||||||
|
|
||||||
If your use case requires mobile verification, it is quite simple to integrate ma1sd with [Twilio](https://www.twilio.com/), an online telephony services gateway. Their prices are reasonable for low-volume projects and integration can be done with the following configuration:
|
If your use case requires mobile verification, it is quite simple to integrate ma1sd with [Twilio](https://www.twilio.com/), an online telephony services gateway. Their prices are reasonable for low-volume projects and integration can be done with the following configuration:
|
||||||
|
|
||||||
@ -104,7 +111,7 @@ matrix_ma1sd_configuration_extension_yaml: |
|
|||||||
number: '+<msisdn-number>'
|
number: '+<msisdn-number>'
|
||||||
```
|
```
|
||||||
|
|
||||||
## Example: Open Registration for every Domain
|
#### Example: Open Registration for every Domain
|
||||||
|
|
||||||
If you want to open registration for any domain, you have to setup the allowed domains with ma1sd's `blacklist` and `whitelist`. The default behavior when neither the `blacklist`, nor the `whitelist` match, is to allow registration. Beware: you can't block toplevel domains (aka `.xy`) because the internal architecture of ma1sd doesn't allow that.
|
If you want to open registration for any domain, you have to setup the allowed domains with ma1sd's `blacklist` and `whitelist`. The default behavior when neither the `blacklist`, nor the `whitelist` match, is to allow registration. Beware: you can't block toplevel domains (aka `.xy`) because the internal architecture of ma1sd doesn't allow that.
|
||||||
|
|
||||||
@ -120,13 +127,26 @@ matrix_ma1sd_configuration_extension_yaml: |
|
|||||||
whitelist: ~
|
whitelist: ~
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
|
||||||
## Troubleshooting
|
## Troubleshooting
|
||||||
|
|
||||||
If email address validation emails sent by ma1sd are not reaching you, you should look into [Adjusting email-sending settings](configuring-playbook-email.md).
|
If email address validation emails sent by ma1sd are not reaching you, you should look into [Adjusting email-sending settings](configuring-playbook-email.md).
|
||||||
|
|
||||||
If you'd like additional logging information, temporarily enable verbose logging for ma1sd.
|
If you'd like additional logging information, temporarily enable verbose logging for ma1sd.
|
||||||
|
|
||||||
Example configuration (`inventory/host_vars/matrix.DOMAIN/vars.yml`):
|
To enable it, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_ma1sd_verbose_logging: true
|
matrix_ma1sd_verbose_logging: true
|
||||||
|
457
docs/configuring-playbook-matrix-authentication-service.md
Normal file
457
docs/configuring-playbook-matrix-authentication-service.md
Normal file
@ -0,0 +1,457 @@
|
|||||||
|
# Setting up Matrix Authentication Service (optional)
|
||||||
|
|
||||||
|
This playbook can install and configure [Matrix Authentication Service](https://github.com/element-hq/matrix-authentication-service/) (MAS) - a service operating alongside your existing [Synapse](./configuring-playbook-synapse.md) homeserver and providing [better authentication, session management and permissions in Matrix](https://matrix.org/blog/2023/09/better-auth/).
|
||||||
|
|
||||||
|
Matrix Authentication Service is an implementation of [MSC3861: Next-generation auth for Matrix, based on OAuth 2.0/OIDC](https://github.com/matrix-org/matrix-spec-proposals/pull/3861) and still work in progress, tracked at the [areweoidcyet.com](https://areweoidcyet.com/) website.
|
||||||
|
|
||||||
|
**Before going through with starting to use Matrix Authentication Service**, make sure to read:
|
||||||
|
|
||||||
|
- the [Reasons to use Matrix Authentication Service](#reasons-to-use-matrix-authentication-service) section below
|
||||||
|
- the [Expectations](#expectations) section below
|
||||||
|
- the [FAQ section on areweoidcyet.com](https://areweoidcyet.com/#faqs)
|
||||||
|
|
||||||
|
**If you've already been using Synapse** and have user accounts in its database, you can [migrate to Matrix Authentication Service](#migrating-an-existing-synapse-homeserver-to-matrix-authentication-service).
|
||||||
|
|
||||||
|
## Reasons to use Matrix Authentication Service
|
||||||
|
|
||||||
|
You may be wondering whether you should make the switch to Matrix Authentication Service (MAS) or keep using your existing authentication flow via Synapse (password-based or [OIDC](./configuring-playbook-synapse.md#synapse--openid-connect-for-single-sign-on)-enabled).
|
||||||
|
|
||||||
|
Matrix Authentication Service is **still an experimental service** and **not a default** for this Ansible playbook.
|
||||||
|
|
||||||
|
The [Expectations](#expectations) section contains a list of what works and what doesn't (**some services don't work with MAS yet**), as well as the **relative irreversability** of the migration process.
|
||||||
|
|
||||||
|
Below, we'll try to **highlight some potential reasons for switching** to Matrix Authentication Service:
|
||||||
|
|
||||||
|
- To use SSO in [Element X](https://element.io/blog/element-x-ignition/). The old [Synapse OIDC](./configuring-playbook-synapse.md#synapse--openid-connect-for-single-sign-on) login flow is only supported in old Element clients and will not be supported in Element X. Element X will only support the new SSO-based login flow provided by MAS, so if you want to use SSO with Element X, you will need to switch to MAS.
|
||||||
|
|
||||||
|
- To help drive adoption of the "Next-generation auth for Matrix" by switching to what's ultimately coming anyway
|
||||||
|
|
||||||
|
- To help discover (and potentially fix) MAS integration issues with this Ansible playbook
|
||||||
|
|
||||||
|
- To help discover (and potentially fix) MAS integration issues with various other Matrix components (bridges, bots, clients, etc.)
|
||||||
|
|
||||||
|
- To reap some of the security benefits that Matrix Authentication Service offers, as outlined in the [Better authentication, session management and permissions in Matrix](https://matrix.org/blog/2023/09/better-auth/) article.
|
||||||
|
|
||||||
|
## Prerequisites
|
||||||
|
|
||||||
|
- ⚠️ the [Synapse](configuring-playbook-synapse.md) homeserver implementation (which is the default for this playbook). Other homeserver implementations ([Dendrite](./configuring-playbook-dendrite.md), [Conduit](./configuring-playbook-conduit.md), etc.) do not support integrating wtih Matrix Authentication Service yet.
|
||||||
|
|
||||||
|
- ⚠️ **email sending** configured (see [Adjusting email-sending settings](./configuring-playbook-email.md)), because **Matrix Authentication Service [still insists](https://github.com/element-hq/matrix-authentication-service/issues/1505) on having a verified email address for each user** going through the new SSO-based login flow. It's also possible to [work around email deliverability issues](#working-around-email-deliverability-issues) if your email configuration is not working.
|
||||||
|
|
||||||
|
- ❌ **disabling all password providers** for Synapse (things like [shared-secret-auth](./configuring-playbook-shared-secret-auth.md), [rest-auth](./configuring-playbook-rest-auth.md), [LDAP auth](./configuring-playbook-ldap-auth.md), etc.) More details about this are available in the [Expectations](#expectations) section below.
|
||||||
|
|
||||||
|
## Expectations
|
||||||
|
|
||||||
|
This section details what you can expect when switching to the Matrix Authentication Service (MAS).
|
||||||
|
|
||||||
|
- ❌ **Synapse password providers will need to be disabled**. You can no longer use [shared-secret-auth](./configuring-playbook-shared-secret-auth.md), [rest-auth](./configuring-playbook-rest-auth.md), [LDAP auth](./configuring-playbook-ldap-auth.md), etc. When the authentication flow is handled by MAS (not by Synapse anymore), it doesn't make sense to extend the Synapse authentication flow with additional modules. Many bridges used to rely on shared-secret-auth for doing double-puppeting (impersonating other users), but most (at least the mautrix bridges) nowadays use [Appservice Double Puppet](./configuring-playbook-appservice-double-puppet.md) as a better alternative. Older/maintained bridges may still rely on shared-secret-auth, as do other services like [matrix-corporal](./configuring-playbook-matrix-corporal.md).
|
||||||
|
|
||||||
|
- ❌ Certain **tools like [synapse-admin](./configuring-playbook-synapse-admin.md) do not have full compatibility with MAS yet**. synapse-admin already supports [login with access token](https://github.com/etkecc/synapse-admin/pull/58), browsing users (which Synapse will internally fetch from MAS) and updating user avatars. However, editing users (passwords, etc.) now needs to happen directly against MAS using the [MAS Admin API](https://element-hq.github.io/matrix-authentication-service/api/index.html), which synapse-admin cannot interact with yet.
|
||||||
|
|
||||||
|
- ❌ **Some services experience issues when authenticating via MAS**:
|
||||||
|
|
||||||
|
- [Postmoogle](./configuring-playbook-bridge-postmoogle.md) works the first time around, but it consistently fails after restarting:
|
||||||
|
|
||||||
|
> cannot initialize matrix bot error="olm account is marked as shared, keys seem to have disappeared from the server"
|
||||||
|
|
||||||
|
- [matrix-reminder-bot](./configuring-playbook-bot-matrix-reminder-bot.md) fails to start (see [element-hq/matrix-authentication-service#3439](https://github.com/element-hq/matrix-authentication-service/issues/3439))
|
||||||
|
- Other services may be similarly affected. This list is not exhaustive.
|
||||||
|
|
||||||
|
- ❌ **Encrypted appservices** do not work yet (related to [MSC4190](https://github.com/matrix-org/matrix-spec-proposals/pull/4190) and [PR 17705 for Synapse](https://github.com/element-hq/synapse/pull/17705)), so all bridges/bots that rely on encryption will fail to start (see [this issue](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/3658) for Hookshot). You can use these bridges/bots only if you **keep end-to-bridge encryption disabled** (which is the default setting).
|
||||||
|
|
||||||
|
- ⚠️ **You will need to have email sending configured** (see [Adjusting email-sending settings](./configuring-playbook-email.md)), because **Matrix Authentication Service [still insists](https://github.com/element-hq/matrix-authentication-service/issues/1505) on having a verified email address for each user** going through the new SSO-based login flow. It's also possible to [work around email deliverability issues](#working-around-email-deliverability-issues) if your email configuration is not working.
|
||||||
|
|
||||||
|
- ⚠️ [Migrating an existing Synapse homeserver to Matrix Authentication Service](#migrating-an-existing-synapse-homeserver-to-matrix-authentication-service) is **possible**, but requires **some playbook-assisted manual work**. Migration is **reversible with no or minor issues if done quickly enough**, but as users start logging in (creating new login sessions) via the new MAS setup, disabling MAS and reverting back to the Synapse user database will cause these new sessions to break.
|
||||||
|
|
||||||
|
- ⚠️ [Migrating an existing Synapse homeserver to Matrix Authentication Service](#migrating-an-existing-synapse-homeserver-to-matrix-authentication-service) does not currently seem to preserve the "admin" flag for users (as found in the Synapse database). All users are imported as non-admin - see [element-hq/matrix-authentication-service#3440](https://github.com/element-hq/matrix-authentication-service/issues/3440). You may need update the Matrix Authentication Service's database manually and adjust the `can_request_admin` column in the `users` table to `true` for users that need to be administrators (e.g. `UPDATE users SET can_request_admin = true WHERE username = 'someone';`)
|
||||||
|
|
||||||
|
- ⚠️ Delegating user authentication to MAS causes **your Synapse server to be completely dependant on one more service** for its operations. MAS is quick & lightweight and should be stable enough already, but this is something to keep in mind when making the switch.
|
||||||
|
|
||||||
|
- ⚠️ If you've got [OIDC configured in Synapse](./configuring-playbook-synapse.md#synapse--openid-connect-for-single-sign-on), you will need to migrate your OIDC configuration to MAS by adding an [Upstream OAuth2 configuration](#upstream-oauth2-configuration).
|
||||||
|
|
||||||
|
- ⚠️ A [compatibility layer](https://element-hq.github.io/matrix-authentication-service/setup/homeserver.html#set-up-the-compatibility-layer) is installed - all `/_matrix/client/*/login` (etc.) requests will be routed to MAS instead of going to the homeserver. This is done both publicly (e.g. `https://matrix.example.com/_matrix/client/*/login`) and on the internal Traefik entrypoint (e.g. `https://matrix-traefik:8008/_matrix/client/*/login`) which helps addon services reach the homeserver's Client-Server API. You typically don't need to do anything to make this work, but it's good to be aware of it, especially if you have a [custom webserver setup](./configuring-playbook-own-webserver.md).
|
||||||
|
|
||||||
|
- ✅ Your **existing login sessions will continue to work** (you won't get logged out). Migration will require a bit of manual work and minutes of downtime, but it's not too bad.
|
||||||
|
|
||||||
|
- ✅ Various clients ([Cinny](./configuring-playbook-client-cinny.md), [Element Web](./configuring-playbook-client-element-web.md), Element X, FluffyChat) will be able to use the **new SSO-based login flow** provided by Matrix Authentication Service
|
||||||
|
|
||||||
|
- ✅ The **old login flow** (called `m.login.password`) **will still continue to work**, so clients (old Element Web, etc.) and bridges/bots that don't support the new OIDC-based login flow will still work. Going through the old login flow does not require users to have a verified email address, as [is the case](https://github.com/element-hq/matrix-authentication-service/issues/1505) for the new SSO-based login flow.
|
||||||
|
|
||||||
|
- ✅ [Registering users](./registering-users.md) via **the playbook's `register-user` tag remains unchanged**. The playbook automatically does the right thing regardless of homeserver implementation (Synapse, Dendrite, etc.) and whether MAS is enabled or not. When MAS is enabled, the playbook will forward user-registration requests to MAS. Registering users via the command-line is no longer done via the `/matrix/synapse/bin/register` script, but via `/matrix/matrix-authentication-service/bin/register-user`.
|
||||||
|
|
||||||
|
- ✅ Users that are prepared by the playbook (for bots, bridges, etc.) will continue to be registered automatically as expected. The playbook automatically does the right thing regardless of homeserver implementation (Synapse, Dendrite, etc.) and whether MAS is enabled or not. When MAS is enabled, the playbook will forward user-registration requests to MAS.
|
||||||
|
|
||||||
|
## Installation flows
|
||||||
|
|
||||||
|
### New homeserver
|
||||||
|
|
||||||
|
For new homeservers (which don't have any users in their Synapse database yet), follow the [Adjusting the playbook configuration](#adjusting-the-playbook-configuration) instructions and then proceed with [Installing](#installing).
|
||||||
|
|
||||||
|
### Existing homeserver
|
||||||
|
|
||||||
|
Other homeserver implementations ([Dendrite](./configuring-playbook-dendrite.md), [Conduit](./configuring-playbook-conduit.md), etc.) do not support integrating wtih Matrix Authentication Service yet.
|
||||||
|
|
||||||
|
For existing Synapse homeservers:
|
||||||
|
|
||||||
|
- when following the [Adjusting the playbook configuration](#adjusting-the-playbook-configuration) instructions, make sure to **disable the integration between Synapse and MAS** by **uncommenting** the `matrix_authentication_service_migration_in_progress: true` line as described in the [Marking an existing homeserver for migration](#marking-an-existing-homeserver-for-migration) section below.
|
||||||
|
|
||||||
|
- then follow the [Migrating an existing Synapse homeserver to Matrix Authentication Service](#migrating-an-existing-synapse-homeserver-to-matrix-authentication-service) instructions to perform the installation and migration
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable Matrix Authentication Service, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_authentication_service_enabled: true
|
||||||
|
|
||||||
|
# Generate this encryption secret with: `openssl rand -hex 32`
|
||||||
|
matrix_authentication_service_config_secrets_encryption: ''
|
||||||
|
|
||||||
|
# When migrating an existing homeserver to Matrix Authentication Service, uncomment the line below.
|
||||||
|
# Learn more about the migration process in the "Marking an existing homeserver for migration" section below.
|
||||||
|
# For brand-new installations which start directly on MAS, this line can be removed.
|
||||||
|
# matrix_authentication_service_migration_in_progress: true
|
||||||
|
```
|
||||||
|
|
||||||
|
In the sub-sections that follow, we'll cover some additional configuration options that you may wish to adjust.
|
||||||
|
|
||||||
|
There are many other configuration options available. Consult the [`defaults/main.yml` file](../roles/custom/matrix-authentication-service/defaults/main.yml) in the [matrix-authentication-service role](../roles/custom/matrix-authentication-service/) to discover them.
|
||||||
|
|
||||||
|
### Adjusting the Matrix Authentication Service URL
|
||||||
|
|
||||||
|
By default, this playbook installs the Matrix Authentication Service on the `matrix.` subdomain, at the `/auth` path (https://matrix.example.com/auth). This makes it easy to install it, because it **doesn't require additional DNS records to be set up**. If that's okay, you can skip this section.
|
||||||
|
|
||||||
|
By tweaking the `matrix_authentication_service_hostname` and `matrix_authentication_service_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Change the default hostname and path prefix
|
||||||
|
matrix_authentication_service_hostname: auth.example.com
|
||||||
|
matrix_authentication_service_path_prefix: /
|
||||||
|
```
|
||||||
|
|
||||||
|
### Marking an existing homeserver for migration
|
||||||
|
|
||||||
|
The [configuration above](#adjusting-the-playbook-configuration) instructs existing users wishing to migrate to add `matrix_authentication_service_migration_in_progress: true` to their configuration.
|
||||||
|
|
||||||
|
This is done temporarily. The migration steps are described in more detail in the [Migrating an existing Synapse homeserver to Matrix Authentication Service](#migrating-an-existing-synapse-homeserver-to-matrix-authentication-service) section below.
|
||||||
|
|
||||||
|
### Upstream OAuth2 configuration
|
||||||
|
|
||||||
|
To make Matrix Authentication Service delegate to an existing upstream OAuth 2.0/OIDC provider, you can use its [`upstream_oauth2.providers` setting](https://element-hq.github.io/matrix-authentication-service/reference/configuration.html#upstream_oauth2providers).
|
||||||
|
|
||||||
|
The playbook exposes a `matrix_authentication_service_config_upstream_oauth2_providers` variable for controlling this setting.
|
||||||
|
|
||||||
|
<details>
|
||||||
|
<summary>Click to expand the example configuration:</summary>
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_authentication_service_config_upstream_oauth2_providers:
|
||||||
|
- # A unique identifier for the provider
|
||||||
|
# Must be a valid ULID
|
||||||
|
id: 01HFVBY12TMNTYTBV8W921M5FA
|
||||||
|
# The issuer URL, which will be used to discover the provider's configuration.
|
||||||
|
# If discovery is enabled, this *must* exactly match the `issuer` field
|
||||||
|
# advertised in `<issuer>/.well-known/openid-configuration`.
|
||||||
|
issuer: https://example.com/
|
||||||
|
# A human-readable name for the provider,
|
||||||
|
# which will be displayed on the login page
|
||||||
|
#human_name: Example
|
||||||
|
# A brand identifier for the provider, which will be used to display a logo
|
||||||
|
# on the login page. Values supported by the default template are:
|
||||||
|
# - `apple`
|
||||||
|
# - `google`
|
||||||
|
# - `facebook`
|
||||||
|
# - `github`
|
||||||
|
# - `gitlab`
|
||||||
|
# - `twitter`
|
||||||
|
#brand_name: google
|
||||||
|
# The client ID to use to authenticate to the provider
|
||||||
|
client_id: mas-fb3f0c09c4c23de4
|
||||||
|
# The client secret to use to authenticate to the provider
|
||||||
|
# This is only used by the `client_secret_post`, `client_secret_basic`
|
||||||
|
# and `client_secret_jwk` authentication methods
|
||||||
|
#client_secret: f4f6bb68a0269264877e9cb23b1856ab
|
||||||
|
# Which authentication method to use to authenticate to the provider
|
||||||
|
# Supported methods are:
|
||||||
|
# - `none`
|
||||||
|
# - `client_secret_basic`
|
||||||
|
# - `client_secret_post`
|
||||||
|
# - `client_secret_jwt`
|
||||||
|
# - `private_key_jwt` (using the keys defined in the `secrets.keys` section)
|
||||||
|
token_endpoint_auth_method: client_secret_post
|
||||||
|
# Which signing algorithm to use to sign the authentication request when using
|
||||||
|
# the `private_key_jwt` or the `client_secret_jwt` authentication methods
|
||||||
|
#token_endpoint_auth_signing_alg: RS256
|
||||||
|
# The scopes to request from the provider
|
||||||
|
# In most cases, it should always include `openid` scope
|
||||||
|
scope: "openid email profile"
|
||||||
|
# How the provider configuration and endpoints should be discovered
|
||||||
|
# Possible values are:
|
||||||
|
# - `oidc`: discover the provider through OIDC discovery,
|
||||||
|
# with strict metadata validation (default)
|
||||||
|
# - `insecure`: discover through OIDC discovery, but skip metadata validation
|
||||||
|
# - `disabled`: don't discover the provider and use the endpoints below
|
||||||
|
#discovery_mode: oidc
|
||||||
|
# Whether PKCE should be used during the authorization code flow.
|
||||||
|
# Possible values are:
|
||||||
|
# - `auto`: use PKCE if the provider supports it (default)
|
||||||
|
# Determined through discovery, and disabled if discovery is disabled
|
||||||
|
# - `always`: always use PKCE (with the S256 method)
|
||||||
|
# - `never`: never use PKCE
|
||||||
|
#pkce_method: auto
|
||||||
|
# The provider authorization endpoint
|
||||||
|
# This takes precedence over the discovery mechanism
|
||||||
|
#authorization_endpoint: https://example.com/oauth2/authorize
|
||||||
|
# The provider token endpoint
|
||||||
|
# This takes precedence over the discovery mechanism
|
||||||
|
#token_endpoint: https://example.com/oauth2/token
|
||||||
|
# The provider JWKS URI
|
||||||
|
# This takes precedence over the discovery mechanism
|
||||||
|
#jwks_uri: https://example.com/oauth2/keys
|
||||||
|
# How user attributes should be mapped
|
||||||
|
#
|
||||||
|
# Most of those attributes have two main properties:
|
||||||
|
# - `action`: what to do with the attribute. Possible values are:
|
||||||
|
# - `ignore`: ignore the attribute
|
||||||
|
# - `suggest`: suggest the attribute to the user, but let them opt out
|
||||||
|
# - `force`: always import the attribute, and don't fail if it's missing
|
||||||
|
# - `require`: always import the attribute, and fail if it's missing
|
||||||
|
# - `template`: a Jinja2 template used to generate the value. In this template,
|
||||||
|
# the `user` variable is available, which contains the user's attributes
|
||||||
|
# retrieved from the `id_token` given by the upstream provider.
|
||||||
|
#
|
||||||
|
# Each attribute has a default template which follows the well-known OIDC claims.
|
||||||
|
#
|
||||||
|
claims_imports:
|
||||||
|
# The subject is an internal identifier used to link the
|
||||||
|
# user's provider identity to local accounts.
|
||||||
|
# By default it uses the `sub` claim as per the OIDC spec,
|
||||||
|
# which should fit most use cases.
|
||||||
|
subject:
|
||||||
|
#template: "{% raw %}{{ user.sub }}{% endraw %}"
|
||||||
|
# The localpart is the local part of the user's Matrix ID.
|
||||||
|
# For example, on the `example.com` server, if the localpart is `alice`,
|
||||||
|
# the user's Matrix ID will be `@alice:example.com`.
|
||||||
|
localpart:
|
||||||
|
#action: force
|
||||||
|
#template: "{% raw %}{{ user.preferred_username }}{% endraw %}"
|
||||||
|
# The display name is the user's display name.
|
||||||
|
displayname:
|
||||||
|
#action: suggest
|
||||||
|
#template: "{% raw %}{{ user.name }}{% endraw %}"
|
||||||
|
# An email address to import.
|
||||||
|
email:
|
||||||
|
#action: suggest
|
||||||
|
#template: "{% raw %}{{ user.email }}{% endraw %}"
|
||||||
|
# Whether the email address must be marked as verified.
|
||||||
|
# Possible values are:
|
||||||
|
# - `import`: mark the email address as verified if the upstream provider
|
||||||
|
# has marked it as verified, using the `email_verified` claim.
|
||||||
|
# This is the default.
|
||||||
|
# - `always`: mark the email address as verified
|
||||||
|
# - `never`: mark the email address as not verified
|
||||||
|
#set_email_verification: import
|
||||||
|
```
|
||||||
|
</details>
|
||||||
|
|
||||||
|
💡 Refer to the [`upstream_oauth2.providers` setting](https://element-hq.github.io/matrix-authentication-service/reference/configuration.html#upstream_oauth2providers) for the most up-to-date schema and example for providers. The value shown above here may be out of date.
|
||||||
|
|
||||||
|
⚠️ The syntax for existing [OIDC providers configured in Synapse](./configuring-playbook-synapse.md#synapse--openid-connect-for-single-sign-on) is slightly different, so you will need to adjust your configuration when switching from Synapse OIDC to MAS upstream OAuth2.
|
||||||
|
|
||||||
|
⚠️ When [migrating an existing homeserver](#migrating-an-existing-synapse-homeserver-to-matrix-authentication-service) which contains OIDC-sourced users, you will need to:
|
||||||
|
|
||||||
|
- [Configure upstream OIDC provider mapping for syn2mas](#configuring-upstream-oidc-provider-mapping-for-syn2mas)
|
||||||
|
- go through the [migrating an existing homeserver](#migrating-an-existing-synapse-homeserver-to-matrix-authentication-service) process
|
||||||
|
- remove all Synapse OIDC-related configuration (`matrix_synapse_oidc_*`) to prevent it being in conflict with the MAS OIDC configuration
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
If you've changed the default hostname, **you may need to adjust your DNS** records to point the Matrix Authentication Service domain to the Matrix server.
|
||||||
|
|
||||||
|
See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to use the default hostname, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
Now that you've [adjusted the playbook configuration](#adjusting-the-playbook-configuration) and [your DNS records](#adjusting-dns-records), you can run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
|
||||||
|
- If you're in the process of migrating an existing Synapse homeserver to MAS, you should now follow the rest of the steps in the [Migrating an existing Synapse homeserver to Matrix Authentication Service](#migrating-an-existing-synapse-homeserver-to-matrix-authentication-service) guide.
|
||||||
|
|
||||||
|
💡 After installation, you should [verify that Matrix Authentication Service is installed correctly](#verify-that-matrix-authentication-service-is-installed-correctly).
|
||||||
|
|
||||||
|
## Migrating an existing Synapse homeserver to Matrix Authentication Service
|
||||||
|
|
||||||
|
Our migration guide is loosely based on the upstream [Migrating an existing homeserver](https://element-hq.github.io/matrix-authentication-service/setup/migration.html) guide.
|
||||||
|
|
||||||
|
Migration is done via a tool called `syn2mas`, which the playbook could run for you (in a container).
|
||||||
|
|
||||||
|
The installation + migration steps are like this:
|
||||||
|
|
||||||
|
1. [Adjust your configuration](#adjusting-the-playbook-configuration) to **disable the integration between the homeserver and MAS**. This is done by **uncommenting** the `matrix_authentication_service_migration_in_progress: true` line.
|
||||||
|
|
||||||
|
2. Perform the initial [installation](#installing). At this point:
|
||||||
|
|
||||||
|
- Matrix Authentication Service will be installed. Its database will be empty, so it cannot validate existing access tokens or authentication users yet.
|
||||||
|
|
||||||
|
- The homeserver will still continue to use its local database for validating existing access tokens.
|
||||||
|
|
||||||
|
- Various [compatibility layer URLs](https://element-hq.github.io/matrix-authentication-service/setup/homeserver.html#set-up-the-compatibility-layer) are not yet installed. New login sessions will still be forwarded to the homeserver, which is capable of completing them.
|
||||||
|
|
||||||
|
- The `matrix-user-creator` role would be suppressed, so that it doesn't automatically attempt to create users (for bots, etc.) in the MAS database. These user accounts likely already exist in Synapse's user database and could be migrated over (via syn2mas, as per the steps below), so creating them in the MAS database would have been unnecessary and potentially problematic (conflicts during the syn2mas migration).
|
||||||
|
|
||||||
|
3. Consider taking a full [backup of your Postgres database](./maintenance-postgres.md#backing-up-postgresql). This is done just in case. The **syn2mas migration tool does not delete any data**, so it should be possible to revert to your previous setup by merely disabling MAS and re-running the playbook (no need to restore a Postgres backup). However, do note that as users start logging in (creating new login sessions) via the new MAS setup, disabling MAS and reverting back to the Synapse user database will cause these new sessions to break.
|
||||||
|
|
||||||
|
4. [Migrate your data from Synapse to Matrix Authentication Service using syn2mas](#migrate-your-data-from-synapse-to-matrix-authentication-service-using-syn2mas)
|
||||||
|
|
||||||
|
5. [Adjust your configuration](#adjusting-the-playbook-configuration) again, to:
|
||||||
|
|
||||||
|
- remove the `matrix_authentication_service_migration_in_progress: false` line
|
||||||
|
|
||||||
|
- if you had been using [OIDC providers configured in Synapse](./configuring-playbook-synapse.md#synapse--openid-connect-for-single-sign-on), remove all Synapse OIDC-related configuration (`matrix_synapse_oidc_*`) to prevent it being in conflict with the MAS OIDC configuration
|
||||||
|
|
||||||
|
5. Perform the [installation](#installing) again. At this point:
|
||||||
|
|
||||||
|
- The homeserver will start delegating authentication to MAS.
|
||||||
|
|
||||||
|
- The compatibility layer URLs will be installed. New login sessions will be completed by MAS.
|
||||||
|
|
||||||
|
6. [Verify that Matrix Authentication Service is installed correctly](#verify-that-matrix-authentication-service-is-installed-correctly)
|
||||||
|
|
||||||
|
### Migrate your data from Synapse to Matrix Authentication Service using syn2mas
|
||||||
|
|
||||||
|
We **don't** ask you to [run the `syn2mas` migration advisor command](https://element-hq.github.io/matrix-authentication-service/setup/migration.html#run-the-migration-advisor), because it only gives you the green light if your Synapse configuration (`homeserver.yaml`) is configured in a way that's compatible with MAS (delegating authentication to MAS; disabling Synapse's password config; etc.). Until we migrate your data with the `syn2mas` tool, we intentionally avoid doing these changes to allow existing user sessions to work.
|
||||||
|
|
||||||
|
You can invoke the `syn2mas` tool via the playbook by running the playbook's `matrix-authentication-service-syn2mas` tag. We recommend first doing a [dry-run](#performing-a-syn2mas-dry-run) and then a [real migration](#performing-a-real-syn2mas-migration).
|
||||||
|
|
||||||
|
#### Configuring syn2mas
|
||||||
|
|
||||||
|
If you're using [OIDC with Synapse](./configuring-playbook-synapse.md#synapse--openid-connect-for-single-sign-on), you will need to [Configuring upstream OIDC provider mapping for syn2mas](#configuring-upstream-oidc-provider-mapping-for-syn2mas).
|
||||||
|
|
||||||
|
If you only have local (non-OIDC) users in your Synapse database, you can likely run `syn2mas` as-is (without doing additional configuration changes).
|
||||||
|
|
||||||
|
When you're done with potentially configuring `syn2mas`, proceed to doing a [dry-run](#performing-a-syn2mas-dry-run) and then a [real migration](#performing-a-real-syn2mas-migration).
|
||||||
|
|
||||||
|
##### Configuring upstream OIDC provider mapping for syn2mas
|
||||||
|
|
||||||
|
If you have existing OIDC users in your Synapse user database (which will be the case if when using [OIDC with Synapse](./configuring-playbook-synapse.md#synapse--openid-connect-for-single-sign-on)), you may need to pass an additional `--upstreamProviderMapping` argument to the `syn2mas` tool to tell it which provider (on the Synapse side) maps to which other provider on the MAS side.
|
||||||
|
|
||||||
|
If you don't do this, `syn2mas` would report errors like this one:
|
||||||
|
|
||||||
|
> [FATAL] migrate - [Failed to import external id 4264b0f0-4f11-4ddd-aedb-b500e4d07c25 with oidc-keycloak for user @alice:example.com: Error: Unknown upstream provider oidc-keycloak]
|
||||||
|
|
||||||
|
Below is an example situation and a guide for how to solve it.
|
||||||
|
|
||||||
|
If in `matrix_synapse_oidc_providers` your provider `idp_id` is (was) named `keycloak`, in the Synapse database users would be associated with the `oidc-keycloak` provider (note the `oidc-` prefix that was added automatically by Synapse to your `idp_id` value).
|
||||||
|
|
||||||
|
The same OIDC provider may have an `id` of `01HFVBY12TMNTYTBV8W921M5FA` on the MAS side, as defined in `matrix_authentication_service_config_upstream_oauth2_providers` (see the [Upstream OAuth2 configuration](#upstream-oauth2-configuration) section above).
|
||||||
|
|
||||||
|
To tell `syn2mas` how the Synapse-configured OIDC provider maps to the new MAS-configured OIDC provider, add this additional configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Adjust the mapping below to match your provider IDs on the Synapse side and the MAS side.
|
||||||
|
# Don't forget that Synapse automatically adds an `oidc-` prefix to provider ids defined in its configuration.
|
||||||
|
matrix_authentication_service_syn2mas_process_extra_arguments:
|
||||||
|
- "--upstreamProviderMapping oidc-keycloak:01HFVBY12TMNTYTBV8W921M5FA"
|
||||||
|
```
|
||||||
|
|
||||||
|
#### Performing a syn2mas dry-run
|
||||||
|
|
||||||
|
Having [configured syn2mas](#configuring-syn2mas), we recommend doing a [dry-run](https://en.wikipedia.org/wiki/Dry_run_(testing)) first to verify that everything will work out as expected.
|
||||||
|
|
||||||
|
A dry-run would not cause downtime, because it avoids stopping Synapse.
|
||||||
|
|
||||||
|
To perform a dry-run, run:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
just run-tags matrix-authentication-service-syn2mas -e matrix_authentication_service_syn2mas_dry_run=true
|
||||||
|
```
|
||||||
|
|
||||||
|
Observe the command output (especially the last line of the the syn2mas output). If you are confident that the migration will work out as expected, you can proceed with a [real migration](#performing-a-real-syn2mas-migration).
|
||||||
|
|
||||||
|
#### Performing a real syn2mas migration
|
||||||
|
|
||||||
|
Before performing a real migration make sure:
|
||||||
|
|
||||||
|
- you've familiarized yourself with the [expectations](#expectations)
|
||||||
|
|
||||||
|
- you've performed a Postgres backup, just in case
|
||||||
|
|
||||||
|
- you're aware of the irreversibility of the migration process without disruption after users have created new login sessions via the new MAS setup
|
||||||
|
|
||||||
|
- you've [configured syn2mas](#configuring-syn2mas), especially if you've used [OIDC with Synapse](./configuring-playbook-synapse.md#synapse--openid-connect-for-single-sign-on)
|
||||||
|
|
||||||
|
- you've performed a [syn2mas dry-run](#performing-a-syn2mas-dry-run) and don't see any issues in its output
|
||||||
|
|
||||||
|
To perform a real migration, run the `matrix-authentication-service-syn2mas` tag **without** the `matrix_authentication_service_syn2mas_dry_run` variable:
|
||||||
|
|
||||||
|
```sh
|
||||||
|
just run-tags matrix-authentication-service-syn2mas
|
||||||
|
```
|
||||||
|
|
||||||
|
Having performed a `syn2mas` migration once, trying to do it again will report errors for users that were already migrated (e.g. "Error: Unknown upstream provider oauth-delegated").
|
||||||
|
|
||||||
|
## Verify that Matrix Authentication Service is installed correctly
|
||||||
|
|
||||||
|
After [installation](#installing), run the `doctor` subcommand of the [`mas-cli` command-line tool](https://element-hq.github.io/matrix-authentication-service/reference/cli/index.html) to verify that MAS is installed correctly.
|
||||||
|
|
||||||
|
You can do it:
|
||||||
|
|
||||||
|
- either via the Ansible playbook's `matrix-authentication-service-mas-cli-doctor` tag: `just run-tags matrix-authentication-service-mas-cli-doctor`
|
||||||
|
|
||||||
|
- or by running the `mas-cli` script on the server (which invokes the `mas-cli` tool inside a container): `/matrix/matrix-authentication-service/bin/mas-cli doctor`
|
||||||
|
|
||||||
|
If successful, you should see some output that looks like this:
|
||||||
|
|
||||||
|
```
|
||||||
|
💡 Running diagnostics, make sure that both MAS and Synapse are running, and that MAS is using the same configuration files as this tool.
|
||||||
|
✅ Matrix client well-known at "https://example.com/.well-known/matrix/client" is valid
|
||||||
|
✅ Homeserver is reachable at "http://matrix-synapse:8008/_matrix/client/versions"
|
||||||
|
✅ Homeserver at "http://matrix-synapse:8008/_matrix/client/v3/account/whoami" is reachable, and it correctly rejected an invalid token.
|
||||||
|
✅ The Synapse admin API is reachable at "http://matrix-synapse:8008/_synapse/admin/v1/server_version".
|
||||||
|
✅ The Synapse admin API is reachable with authentication at "http://matrix-synapse:8008/_synapse/admin/v1/background_updates/status".
|
||||||
|
✅ The legacy login API at "https://matrix.example.com/_matrix/client/v3/login" is reachable and is handled by MAS.
|
||||||
|
```
|
||||||
|
|
||||||
|
## Management
|
||||||
|
|
||||||
|
You can use the [`mas-cli` command-line tool](https://element-hq.github.io/matrix-authentication-service/reference/cli/index.html) (exposed via the `/matrix/matrix-authentication-service/bin/mas-cli` script) to perform administrative tasks against MAS.
|
||||||
|
|
||||||
|
This documentation page already mentions:
|
||||||
|
|
||||||
|
- the `mas-cli doctor` sub-command in the [Verify that Matrix Authentication Service is installed correctly](#verify-that-matrix-authentication-service-is-installed-correctly) section, which you can run via the CLI and via the Ansible playbook's `matrix-authentication-service-mas-cli-doctor` tag
|
||||||
|
|
||||||
|
- the `mas-cli manage register-user` sub-command in the [Registering users](./registering-users.md) documentation
|
||||||
|
|
||||||
|
There are other sub-commands available. Run `/matrix/matrix-authentication-service/bin/mas-cli` to get an overview.
|
||||||
|
|
||||||
|
## User registration
|
||||||
|
|
||||||
|
After Matrix Authentication Service is [installed](#installing), users need to be managed there (unless you're managing them in an [upstream OAuth2 provider](#upstream-oauth2-configuration)).
|
||||||
|
|
||||||
|
You can register users new users as described in the [Registering users](./registering-users.md) documentation (via `mas-cli manage register-user` or the Ansible playbook's `register-user` tag).
|
||||||
|
|
||||||
|
## Working around email deliverability issues
|
||||||
|
|
||||||
|
Because Matrix Authentication Service [still insists](https://github.com/element-hq/matrix-authentication-service/issues/1505) on having a verified email address for each user, you may need to work around email deliverability issues if [your email-sending configuration](./configuring-playbook-email.md) is not working.
|
||||||
|
|
||||||
|
Matrix Authentication Service attempts to verify email addresses by sending a verification email to the address specified by the user whenever they log in to an account without a verified email address.
|
||||||
|
|
||||||
|
If email delivery is not working, **you can retrieve the email configuration code from the Matrix Authentication Service's logs** (`journalctl -fu matrix-authentication-service`).
|
||||||
|
|
||||||
|
Alternatively, you can use the [`mas-cli` management tool](#management) to manually verify email addresses for users. Example: `/matrix/matrix-authentication-service/bin/mas-cli manage verify-email some.username email@example.com`
|
@ -1,24 +1,24 @@
|
|||||||
# Setting up Matrix Corporal (optional, advanced)
|
# Setting up Matrix Corporal (optional, advanced)
|
||||||
|
|
||||||
-------------------------------------
|
<hr/>
|
||||||
|
|
||||||
**WARNING**: This is an advanced feature! It requires prior experience with Matrix and a specific need for using [Matrix Corporal](https://github.com/devture/matrix-corporal). If you're unsure whether you have such a need, you most likely don't.
|
**WARNING**: This is an advanced feature! It requires prior experience with Matrix and a specific need for using [Matrix Corporal](https://github.com/devture/matrix-corporal). If you're unsure whether you have such a need, you most likely don't.
|
||||||
|
|
||||||
-------------------------------------
|
<hr/>
|
||||||
|
|
||||||
The playbook can install and configure [matrix-corporal](https://github.com/devture/matrix-corporal) for you.
|
The playbook can install and configure [matrix-corporal](https://github.com/devture/matrix-corporal) for you.
|
||||||
|
|
||||||
In short, it's a sort of automation and firewalling service, which is helpful if you're instaling Matrix services in a controlled corporate environment.
|
In short, it's a sort of automation and firewalling service, which is helpful if you're instaling Matrix services in a controlled corporate environment.
|
||||||
See that project's documentation to learn what it does and why it might be useful to you.
|
|
||||||
|
See the project's [documentation](https://github.com/devture/matrix-corporal/blob/main/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
If you decide that you'd like to let this playbook install it for you, you'd need to also:
|
If you decide that you'd like to let this playbook install it for you, you'd need to also:
|
||||||
- (required) [set up the Shared Secret Auth password provider module](configuring-playbook-shared-secret-auth.md)
|
- (required) [set up the Shared Secret Auth password provider module](configuring-playbook-shared-secret-auth.md)
|
||||||
- (optional, but encouraged) [set up the REST authentication password provider module](configuring-playbook-rest-auth.md)
|
- (optional, but encouraged) [set up the REST authentication password provider module](configuring-playbook-rest-auth.md)
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
## Playbook configuration
|
Add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file (adapt to your needs):
|
||||||
|
|
||||||
You would then need some configuration like this:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
# The Shared Secret Auth password provider module is required for Corporal to work.
|
# The Shared Secret Auth password provider module is required for Corporal to work.
|
||||||
@ -52,7 +52,7 @@ matrix_corporal_policy_provider_config: |
|
|||||||
matrix_corporal_http_api_enabled: true
|
matrix_corporal_http_api_enabled: true
|
||||||
matrix_corporal_http_api_auth_token: "AUTH_TOKEN_HERE"
|
matrix_corporal_http_api_auth_token: "AUTH_TOKEN_HERE"
|
||||||
|
|
||||||
# If you need to change matrix-corporal's user id from the default (matrix-corporal).
|
# If you need to change matrix-corporal's user ID from the default (matrix-corporal).
|
||||||
# In any case, you need to make sure this Matrix user is created on your server.
|
# In any case, you need to make sure this Matrix user is created on your server.
|
||||||
matrix_corporal_corporal_user_id_local_part: "matrix-corporal"
|
matrix_corporal_corporal_user_id_local_part: "matrix-corporal"
|
||||||
|
|
||||||
@ -71,9 +71,9 @@ matrix_synapse_rc_login:
|
|||||||
burst_count: 3
|
burst_count: 3
|
||||||
```
|
```
|
||||||
|
|
||||||
Matrix Corporal operates with a specific Matrix user on your server.
|
Matrix Corporal operates with a specific Matrix user on your server. By default, it's `matrix-corporal` (controllable by the `matrix_corporal_reconciliation_user_id_local_part` setting, see above).
|
||||||
By default, it's `matrix-corporal` (controllable by the `matrix_corporal_reconciliation_user_id_local_part` setting, see above).
|
|
||||||
No matter what Matrix user id you configure to run it with, make sure that:
|
No matter what Matrix user ID you configure to run it with, make sure that:
|
||||||
|
|
||||||
- the Matrix Corporal user is created by [registering it](registering-users.md) **with administrator privileges**. Use a password you remember, as you'll need to log in from time to time to create or join rooms
|
- the Matrix Corporal user is created by [registering it](registering-users.md) **with administrator privileges**. Use a password you remember, as you'll need to log in from time to time to create or join rooms
|
||||||
|
|
||||||
@ -115,8 +115,18 @@ aux_file_definitions:
|
|||||||
|
|
||||||
To learn more about what the policy configuration, see the matrix-corporal documentation on [policy](https://github.com/devture/matrix-corporal/blob/master/docs/policy.md).
|
To learn more about what the policy configuration, see the matrix-corporal documentation on [policy](https://github.com/devture/matrix-corporal/blob/master/docs/policy.md).
|
||||||
|
|
||||||
Each time you update the policy in your `vars.yml` file, you'd need to re-run the playbook and restart matrix-corporal (`--tags=setup-all,start` or `--tags=setup-aux-files,setup-corporal,start`).
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just run-tags setup-aux-files,setup-corporal,start` or `just setup-all`
|
||||||
|
|
||||||
|
`just run-tags setup-aux-files,setup-corporal,start` is useful for maintaining your setup quickly when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note `just setup-all` runs the `ensure-matrix-users-created` tag too.
|
||||||
|
|
||||||
## Matrix Corporal files
|
## Matrix Corporal files
|
||||||
|
|
||||||
|
@ -4,12 +4,11 @@ The playbook can install and configure [matrix-ldap-registration-proxy](https://
|
|||||||
|
|
||||||
This proxy handles Matrix registration requests and forwards them to LDAP.
|
This proxy handles Matrix registration requests and forwards them to LDAP.
|
||||||
|
|
||||||
**Please note:** This does support the full Matrix specification for registrations. It only provide a very coarse
|
**Note**: This does support the full Matrix specification for registrations. It only provide a very coarse implementation of a basic password registration.
|
||||||
implementation of a basic password registration.
|
|
||||||
|
|
||||||
## Quickstart
|
## Quickstart
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file:
|
Add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_ldap_registration_proxy_enabled: true
|
matrix_ldap_registration_proxy_enabled: true
|
||||||
@ -20,8 +19,7 @@ matrix_ldap_registration_proxy_ldap_user: <USER>
|
|||||||
matrix_ldap_registration_proxy_ldap_password: <password>
|
matrix_ldap_registration_proxy_ldap_password: <password>
|
||||||
```
|
```
|
||||||
|
|
||||||
If you already use the [synapse external password provider via LDAP](configuring-playbook-ldap-auth.md) (that is, you have `matrix_synapse_ext_password_provider_ldap_enabled: true` and other options in your configuration)
|
If you already use the [synapse external password provider via LDAP](configuring-playbook-ldap-auth.md) (that is, you have `matrix_synapse_ext_password_provider_ldap_enabled: true` and other options in your configuration) you can use the following values as configuration:
|
||||||
you can use the following values as configuration:
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
# Use the LDAP values specified for the synapse role to setup LDAP proxy
|
# Use the LDAP values specified for the synapse role to setup LDAP proxy
|
||||||
@ -29,5 +27,20 @@ matrix_ldap_registration_proxy_ldap_uri: "{{ matrix_synapse_ext_password_provide
|
|||||||
matrix_ldap_registration_proxy_ldap_base_dn: "{{ matrix_synapse_ext_password_provider_ldap_base }}"
|
matrix_ldap_registration_proxy_ldap_base_dn: "{{ matrix_synapse_ext_password_provider_ldap_base }}"
|
||||||
matrix_ldap_registration_proxy_ldap_user: "{{ matrix_synapse_ext_password_provider_ldap_bind_dn }}"
|
matrix_ldap_registration_proxy_ldap_user: "{{ matrix_synapse_ext_password_provider_ldap_bind_dn }}"
|
||||||
matrix_ldap_registration_proxy_ldap_password: "{{ matrix_synapse_ext_password_provider_ldap_bind_password }}"
|
matrix_ldap_registration_proxy_ldap_password: "{{ matrix_synapse_ext_password_provider_ldap_bind_password }}"
|
||||||
|
|
||||||
|
matrix_ldap_registration_proxy_systemd_wanted_services_list_custom:
|
||||||
|
- matrix-synapse.service
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
@ -1,4 +1,4 @@
|
|||||||
# Setting up matrix-media-repo (optional)
|
# Storing Matrix media files using matrix-media-repo (optional)
|
||||||
|
|
||||||
[matrix-media-repo](https://docs.t2bot.io/matrix-media-repo/) (often abbreviated "MMR") is a highly customizable multi-domain media repository for Matrix. Intended for medium to large environments consisting of several homeservers, this media repo de-duplicates media (including remote media) while being fully compliant with the specification.
|
[matrix-media-repo](https://docs.t2bot.io/matrix-media-repo/) (often abbreviated "MMR") is a highly customizable multi-domain media repository for Matrix. Intended for medium to large environments consisting of several homeservers, this media repo de-duplicates media (including remote media) while being fully compliant with the specification.
|
||||||
|
|
||||||
@ -14,7 +14,7 @@ For a simpler alternative (which allows you to offload your media repository sto
|
|||||||
|
|
||||||
## Quickstart
|
## Quickstart
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file and [re-run the installation process](./installing.md) for the playbook:
|
Add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file and [re-run the installation process](./installing.md) for the playbook:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_media_repo_enabled: true
|
matrix_media_repo_enabled: true
|
||||||
@ -23,13 +23,14 @@ matrix_media_repo_enabled: true
|
|||||||
# matrix_media_repo_metrics_enabled: true
|
# matrix_media_repo_metrics_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
The repo is pre-configured for integrating with the Postgres database, NGINX proxy and [Prometheus/Grafana](configuring-playbook-prometheus-grafana.md) (if metrics enabled) from this playbook for all the available homeserver roles. When the media repo is enabled, other media store roles should be disabled (if using Synapse with other media store roles).
|
The repo is pre-configured for integrating with the Postgres database, Traefik proxy and [Prometheus/Grafana](configuring-playbook-prometheus-grafana.md) (if metrics enabled) from this playbook for all the available homeserver roles. When the media repo is enabled, other media store roles should be disabled (if using Synapse with other media store roles).
|
||||||
|
|
||||||
By default, the media-repo will use the local filesystem for data storage. Additional options include `s3` and `IPFS` (experimental). Access token caching is also enabled by default since the logout endpoints are proxied through the media repo.
|
By default, the media-repo will use the local filesystem for data storage. You can alternatively use a `s3` cloud backend as well. Access token caching is also enabled by default since the logout endpoints are proxied through the media repo.
|
||||||
|
|
||||||
## Configuring the media-repo
|
## Configuring the media-repo
|
||||||
|
|
||||||
Additional common configuration options:
|
Additional common configuration options:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
|
|
||||||
# The postgres database pooling options
|
# The postgres database pooling options
|
||||||
@ -43,74 +44,72 @@ matrix_media_repo_database_max_connections: 25
|
|||||||
matrix_media_repo_database_max_idle_connections: 5
|
matrix_media_repo_database_max_idle_connections: 5
|
||||||
|
|
||||||
# These users have full access to the administrative functions of the media repository.
|
# These users have full access to the administrative functions of the media repository.
|
||||||
# See https://github.com/turt2live/matrix-media-repo/blob/release-v1.2.8/docs/admin.md for
|
# See docs/admin.md for information on what these people can do. They must belong to one of the
|
||||||
# information on what these people can do. They must belong to one of the configured
|
# configured homeservers above.
|
||||||
# homeservers above.
|
# matrix_media_repo_admins: [
|
||||||
matrix_media_repo_admins:
|
# "@alice:example.org"
|
||||||
admins: []
|
# ]
|
||||||
# admins:
|
|
||||||
# - "@your_username:example.org"
|
|
||||||
|
|
||||||
# Datastores are places where media should be persisted. This isn't dedicated for just uploads:
|
matrix_media_repo_admins: []
|
||||||
# thumbnails and other misc data is also stored in these places. The media repo, when looking
|
|
||||||
# for a datastore to use, will always use the smallest datastore first.
|
|
||||||
matrix_media_repo_datastores:
|
|
||||||
datastores:
|
|
||||||
- type: file
|
|
||||||
enabled: true # Enable this to set up data storage.
|
|
||||||
# Datastores can be split into many areas when handling uploads. Media is still de-duplicated
|
|
||||||
# across all datastores (local content which duplicates remote content will re-use the remote
|
|
||||||
# content's location). This option is useful if your datastore is becoming very large, or if
|
|
||||||
# you want faster storage for a particular kind of media.
|
|
||||||
#
|
|
||||||
# The kinds available are:
|
|
||||||
# thumbnails - Used to store thumbnails of media (local and remote).
|
|
||||||
# remote_media - Original copies of remote media (servers not configured by this repo).
|
|
||||||
# local_media - Original uploads for local media.
|
|
||||||
# archives - Archives of content (GDPR and similar requests).
|
|
||||||
forKinds: ["thumbnails", "remote_media", "local_media", "archives"]
|
|
||||||
opts:
|
|
||||||
path: /data/media
|
|
||||||
|
|
||||||
- type: s3
|
# Datastores can be split into many areas when handling uploads. Media is still de-duplicated
|
||||||
enabled: false # Enable this to set up s3 uploads
|
# across all datastores (local content which duplicates remote content will re-use the remote
|
||||||
forKinds: ["thumbnails", "remote_media", "local_media", "archives"]
|
# content's location). This option is useful if your datastore is becoming very large, or if
|
||||||
opts:
|
# you want faster storage for a particular kind of media.
|
||||||
# The s3 uploader needs a temporary location to buffer files to reduce memory usage on
|
#
|
||||||
# small file uploads. If the file size is unknown, the file is written to this location
|
# To disable this datastore, making it readonly, specify `forKinds: []`.
|
||||||
# before being uploaded to s3 (then the file is deleted). If you aren't concerned about
|
#
|
||||||
# memory usage, set this to an empty string.
|
# The kinds available are:
|
||||||
tempPath: "/tmp/mediarepo_s3_upload"
|
# thumbnails - Used to store thumbnails of media (local and remote).
|
||||||
endpoint: sfo2.digitaloceanspaces.com
|
# remote_media - Original copies of remote media (servers not configured by this repo).
|
||||||
accessKeyId: ""
|
# local_media - Original uploads for local media.
|
||||||
accessSecret: ""
|
# archives - Archives of content (GDPR and similar requests).
|
||||||
ssl: true
|
matrix_media_repo_datastore_file_for_kinds: ["thumbnails", "remote_media", "local_media", "archives"]
|
||||||
bucketName: "your-media-bucket"
|
matrix_media_repo_datastore_s3_for_kinds: []
|
||||||
# An optional region for where this S3 endpoint is located. Typically not needed, though
|
|
||||||
# some providers will need this (like Scaleway). Uncomment to use.
|
|
||||||
#region: "sfo2"
|
|
||||||
# An optional storage class for tuning how the media is stored at s3.
|
|
||||||
# See https://aws.amazon.com/s3/storage-classes/ for details; uncomment to use.
|
|
||||||
#storageClass: STANDARD
|
|
||||||
|
|
||||||
# The media repo does support an IPFS datastore, but only if the IPFS feature is enabled. If
|
# The s3 uploader needs a temporary location to buffer files to reduce memory usage on
|
||||||
# the feature is not enabled, this will not work. Note that IPFS support is experimental at
|
# small file uploads. If the file size is unknown, the file is written to this location
|
||||||
# the moment and not recommended for general use.
|
# before being uploaded to s3 (then the file is deleted). If you aren't concerned about
|
||||||
#
|
# memory usage, set this to an empty string.
|
||||||
# NOTE: Everything you upload to IPFS will be publicly accessible, even when the media repo
|
matrix_media_repo_datastore_s3_opts_temp_path: ""
|
||||||
# puts authentication on the download endpoints. Only use this option for cases where you
|
matrix_media_repo_datastore_s3_opts_endpoint: "sfo2.digitaloceanspaces.com"
|
||||||
# expect your media to be publicly accessible.
|
matrix_media_repo_datastore_s3_opts_access_key_id: ""
|
||||||
- type: ipfs
|
matrix_media_repo_datastore_s3_opts_access_secret: ""
|
||||||
enabled: false # Enable this to use IPFS support
|
matrix_media_repo_datastore_s3_opts_ssl: true
|
||||||
forKinds: ["local_media"]
|
matrix_media_repo_datastore_s3_opts_bucket_name: "your-media-bucket"
|
||||||
# The IPFS datastore currently has no options. It will use the daemon or HTTP API configured
|
|
||||||
# in the IPFS section of your main config.
|
# An optional region for where this S3 endpoint is located. Typically not needed, though
|
||||||
opts: {}
|
# some providers will need this (like Scaleway). Uncomment to use.
|
||||||
|
# matrix_media_repo_datastore_s3_opts_region: "sfo2"
|
||||||
|
|
||||||
|
# An optional storage class for tuning how the media is stored at s3.
|
||||||
|
# See https://aws.amazon.com/s3/storage-classes/ for details; uncomment to use.
|
||||||
|
# matrix_media_repo_datastore_s3_opts_storage_class: "STANDARD"
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
Full list of configuration options with documentation can be found in [`roles/custom/matrix-media-repo/defaults/main.yml`](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/master/roles/custom/matrix-media-repo/defaults/main.yml)
|
Full list of configuration options with documentation can be found in [`roles/custom/matrix-media-repo/defaults/main.yml`](https://github.com/spantaleev/matrix-docker-ansible-deploy/blob/master/roles/custom/matrix-media-repo/defaults/main.yml)
|
||||||
|
|
||||||
|
## Signing Keys
|
||||||
|
|
||||||
|
Authenticated media endpoints ([MSC3916](https://github.com/matrix-org/matrix-spec-proposals/pull/3916)) requires MMR to have a configured signing key to authorize outbound federation requests. Additionally, the signing key must be merged with your homeserver's signing key file.
|
||||||
|
|
||||||
|
The playbook default is to generate a MMR signing key when invoking the setup role and merge it with your homeserver if you are using Synapse or Dendrite. This can be disabled if desired by setting the option in your inventory:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_media_repo_generate_signing_key: false
|
||||||
|
```
|
||||||
|
|
||||||
|
If you wish to manually generate the signing key and merge it with your homeserver's signing key file, see https://docs.t2bot.io/matrix-media-repo/v1.3.5/installation/signing-key/ for more details.
|
||||||
|
|
||||||
|
**Note that if you uninstall MMR from the playbook, it will not remove the old MMR signing key from your homeserver's signing key file. You will have to remove it manually.**
|
||||||
|
|
||||||
|
### Key backup and revoking
|
||||||
|
|
||||||
|
Since your homeserver signing key file is modified by the playbook, a backup will be created in `HOMESERVER_DIR/config/example.com.signing.key.backup`. If you need to remove/revoke old keys, you can restore from this backup or remove the MMR key ID from your `example.com.signing.key` file.
|
||||||
|
|
||||||
|
Additionally, its recommended after revoking a signing key to update your homeserver config file (`old_signing_keys` field for Synapse and `old_private_keys` for Dendrite). See your homeserver config file for further documentation on how to populate the field.
|
||||||
|
|
||||||
## Importing data from an existing media store
|
## Importing data from an existing media store
|
||||||
|
|
||||||
If you want to add this repo to an existing homeserver managed by the playbook, you will need to import existing media into MMR's database or you will lose access to older media while it is active. MMR versions up to `v1.3.3` only support importing from Synapse, but newer versions (at time of writing: only `latest`) also support importing from Dendrite.
|
If you want to add this repo to an existing homeserver managed by the playbook, you will need to import existing media into MMR's database or you will lose access to older media while it is active. MMR versions up to `v1.3.3` only support importing from Synapse, but newer versions (at time of writing: only `latest`) also support importing from Dendrite.
|
||||||
@ -125,7 +124,7 @@ To import the Synapse media store, you're supposed to invoke the `import_synapse
|
|||||||
|
|
||||||
This guide here is adapted from the [upstream documentation about the import_synapse script](https://github.com/turt2live/matrix-media-repo#importing-media-from-synapse).
|
This guide here is adapted from the [upstream documentation about the import_synapse script](https://github.com/turt2live/matrix-media-repo#importing-media-from-synapse).
|
||||||
|
|
||||||
Run the following command on the server (after replacing `devture_postgres_connection_password` in it with the value found in your `vars.yml` file):
|
Run the following command on the server (after replacing `postgres_connection_password` in it with the value found in your `vars.yml` file):
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
docker exec -it matrix-media-repo \
|
docker exec -it matrix-media-repo \
|
||||||
@ -134,7 +133,7 @@ docker exec -it matrix-media-repo \
|
|||||||
-dbHost matrix-postgres \
|
-dbHost matrix-postgres \
|
||||||
-dbPort 5432 \
|
-dbPort 5432 \
|
||||||
-dbUsername matrix \
|
-dbUsername matrix \
|
||||||
-dbPassword devture_postgres_connection_password
|
-dbPassword postgres_connection_password
|
||||||
```
|
```
|
||||||
|
|
||||||
Enter `1` for the Machine ID when prompted (you are not doing any horizontal scaling) unless you know what you're doing.
|
Enter `1` for the Machine ID when prompted (you are not doing any horizontal scaling) unless you know what you're doing.
|
||||||
@ -147,7 +146,7 @@ If you're using the [Dendrite](configuring-playbook-dendrite.md) homeserver inst
|
|||||||
|
|
||||||
To import the Dendrite media store, you're supposed to invoke the `import_dendrite` tool which is part of the matrix-media-repo container image. Your Dendrite database is called `dendrite_mediaapi` by default, unless you've changed it by modifying `matrix_dendrite_media_api_database`.
|
To import the Dendrite media store, you're supposed to invoke the `import_dendrite` tool which is part of the matrix-media-repo container image. Your Dendrite database is called `dendrite_mediaapi` by default, unless you've changed it by modifying `matrix_dendrite_media_api_database`.
|
||||||
|
|
||||||
Run the following command on the server (after replacing `devture_postgres_connection_password` in it with the value found in your `vars.yml` file):
|
Run the following command on the server (after replacing `postgres_connection_password` in it with the value found in your `vars.yml` file):
|
||||||
|
|
||||||
```sh
|
```sh
|
||||||
docker exec -it matrix-media-repo \
|
docker exec -it matrix-media-repo \
|
||||||
@ -156,7 +155,7 @@ docker exec -it matrix-media-repo \
|
|||||||
-dbHost matrix-postgres \
|
-dbHost matrix-postgres \
|
||||||
-dbPort 5432 \
|
-dbPort 5432 \
|
||||||
-dbUsername matrix \
|
-dbUsername matrix \
|
||||||
-dbPassword devture_postgres_connection_password
|
-dbPassword postgres_connection_password
|
||||||
```
|
```
|
||||||
|
|
||||||
Enter `1` for the Machine ID when prompted (you are not doing any horizontal scaling) unless you know what you're doing.
|
Enter `1` for the Machine ID when prompted (you are not doing any horizontal scaling) unless you know what you're doing.
|
||||||
|
@ -6,7 +6,7 @@ The playbook can install and configure [matrix-registration](https://github.com/
|
|||||||
|
|
||||||
**WARNING**: this is not related to [matrix-registration-bot](configuring-playbook-bot-matrix-registration-bot.md)
|
**WARNING**: this is not related to [matrix-registration-bot](configuring-playbook-bot-matrix-registration-bot.md)
|
||||||
|
|
||||||
> matrix-registration is a simple python application to have a token based matrix registration.
|
> matrix-registration is a simple python application to have a token based Matrix registration.
|
||||||
|
|
||||||
Use matrix-registration to **create unique registration links**, which people can use to register on your Matrix server. It allows you to **keep your server's registration closed (private)**, but still allow certain people (these having a special link) to register a user account.
|
Use matrix-registration to **create unique registration links**, which people can use to register on your Matrix server. It allows you to **keep your server's registration closed (private)**, but still allow certain people (these having a special link) to register a user account.
|
||||||
|
|
||||||
@ -14,57 +14,83 @@ Use matrix-registration to **create unique registration links**, which people ca
|
|||||||
|
|
||||||
- **an API for creating registration tokens** (unique registration links). This API can be used via `curl` or via the playbook (see [Usage](#usage) below)
|
- **an API for creating registration tokens** (unique registration links). This API can be used via `curl` or via the playbook (see [Usage](#usage) below)
|
||||||
|
|
||||||
- **a user registration page**, where people can use these registration tokens. By default, exposed at `https://matrix.DOMAIN/matrix-registration`
|
- **a user registration page**, where people can use these registration tokens. By default, exposed at `https://matrix.example.com/matrix-registration`
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
## Installing
|
To enable matrix-registration, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
Adjust your playbook configuration (your `inventory/host_vars/matrix.DOMAIN/vars.yml` file):
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_registration_enabled: true
|
matrix_registration_enabled: true
|
||||||
|
|
||||||
# Generate a strong secret using: `pwgen -s 64 1`.
|
# Generate a strong secret here. You can create one with a command like `pwgen -s 64 1`.
|
||||||
matrix_registration_admin_secret: "ENTER_SOME_SECRET_HERE"
|
matrix_registration_admin_secret: "ENTER_SOME_SECRET_HERE"
|
||||||
```
|
```
|
||||||
|
|
||||||
Then, run the [installation](installing.md) command again:
|
### Adjusting the matrix-registration URL
|
||||||
|
|
||||||
|
By default, this playbook installs the matrix-registration on the `matrix.` subdomain, at the `/matrix-registration` path (https://matrix.example.com/matrix-registration). This makes it easy to install it, because it **doesn't require additional DNS records to be set up**. If that's okay, you can skip this section.
|
||||||
|
|
||||||
|
By tweaking the `matrix_registration_hostname` and `matrix_registration_path_prefix` variables, you can easily make the service available at a **different hostname and/or path** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Change the default hostname and path prefix
|
||||||
|
matrix_registration_hostname: registration.example.com
|
||||||
|
matrix_registration_path_prefix: /
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
If you've changed the default hostname, **you may need to adjust your DNS** records to point the matrix-registration domain to the Matrix server.
|
||||||
|
|
||||||
|
See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
|
If you've decided to use the default hostname, you won't need to do any extra DNS configuration.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
```
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
**matrix-registration** gets exposed at `https://matrix.DOMAIN/matrix-registration`
|
**matrix-registration** gets exposed at `https://matrix.example.com/matrix-registration`
|
||||||
|
|
||||||
It provides various [APIs](https://github.com/ZerataX/matrix-registration/wiki/api) - for creating registration tokens, listing tokens, disabling tokens, etc. To make use of all of its capabilities, consider using `curl`.
|
It provides various [APIs](https://github.com/ZerataX/matrix-registration/wiki/api) - for creating registration tokens, listing tokens, disabling tokens, etc. To make use of all of its capabilities, consider using `curl`.
|
||||||
|
|
||||||
We make the most common APIs easy to use via the playbook (see below).
|
We make the most common APIs easy to use via the playbook (see below).
|
||||||
|
|
||||||
|
|
||||||
### Creating registration tokens
|
### Creating registration tokens
|
||||||
|
|
||||||
To **create a new user registration token (link)**, use this command:
|
To **create a new user registration token (link)**, use this command:
|
||||||
|
|
||||||
```bash
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml \
|
ansible-playbook -i inventory/hosts setup.yml \
|
||||||
--tags=generate-matrix-registration-token \
|
--tags=generate-matrix-registration-token \
|
||||||
--extra-vars="one_time=yes ex_date=2021-12-31"
|
--extra-vars="one_time=yes ex_date=2021-12-31"
|
||||||
```
|
```
|
||||||
|
|
||||||
The above command creates and returns a **one-time use** token, which **expires** on the 31st of December 2021.
|
The above command creates and returns a **one-time use** token, which **expires** on the 31st of December 2021. Adjust the `one_time` and `ex_date` variables as you see fit.
|
||||||
Adjust the `one_time` and `ex_date` variables as you see fit.
|
|
||||||
|
|
||||||
Share the unique registration link (generated by the command above) with users to let them register on your Matrix server.
|
Share the unique registration link (generated by the command above) with users to let them register on your Matrix server.
|
||||||
|
|
||||||
|
|
||||||
### Listing registration tokens
|
### Listing registration tokens
|
||||||
|
|
||||||
To **list the existing user registration tokens**, use this command:
|
To **list the existing user registration tokens**, use this command:
|
||||||
|
|
||||||
```bash
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml \
|
ansible-playbook -i inventory/hosts setup.yml \
|
||||||
--tags=list-matrix-registration-tokens
|
--tags=list-matrix-registration-tokens
|
||||||
```
|
```
|
||||||
|
|
||||||
|
The shortcut command with `just` program is also available: `just run-tags list-matrix-registration-tokens`
|
||||||
|
@ -1,60 +1,56 @@
|
|||||||
# Setting up a Generic Mautrix Bridge (optional)
|
# Setting up a Generic Mautrix Bridge (optional)
|
||||||
|
|
||||||
The playbook can install and configure various [mautrix](https://github.com/mautrix) bridges (twitter, facebook, instagram, signal, hangouts, googlechat, etc.), as well as many other (non-mautrix) bridges.
|
The playbook can install and configure various [mautrix](https://github.com/mautrix) bridges (twitter, facebook, instagram, signal, hangouts, googlechat, etc.), as well as many other (non-mautrix) bridges. This is a common guide for configuring mautrix bridges.
|
||||||
This is a common guide for configuring mautrix bridges.
|
|
||||||
|
|
||||||
You can see each bridge's features at in the `ROADMAP.md` file in its corresponding [mautrix](https://github.com/mautrix) repository.
|
You can see each bridge's features at in the `ROADMAP.md` file in its corresponding [mautrix](https://github.com/mautrix) repository.
|
||||||
|
|
||||||
To enable a bridge add:
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
To enable the bridge, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
# Replace SERVICENAME with one of: twitter, facebook, instagram, ..
|
# Replace SERVICENAME with one of: twitter, facebook, instagram, ..
|
||||||
matrix_mautrix_SERVICENAME_enabled: true
|
matrix_mautrix_SERVICENAME_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
to your `vars.yml`
|
|
||||||
|
|
||||||
There are some additional things you may wish to configure about the bridge before you continue. Each bridge may have additional requirements besides `_enabled: true`. For example, the mautrix-telegram bridge (our documentation page about it is [here](configuring-playbook-bridge-mautrix-telegram.md)) requires the `matrix_mautrix_telegram_api_id` and `matrix_mautrix_telegram_api_hash` variables to be defined. Refer to each bridge's individual documentation page for details about enabling bridges.
|
There are some additional things you may wish to configure about the bridge before you continue. Each bridge may have additional requirements besides `_enabled: true`. For example, the mautrix-telegram bridge (our documentation page about it is [here](configuring-playbook-bridge-mautrix-telegram.md)) requires the `matrix_mautrix_telegram_api_id` and `matrix_mautrix_telegram_api_hash` variables to be defined. Refer to each bridge's individual documentation page for details about enabling bridges.
|
||||||
|
|
||||||
You can add
|
To **configure a user as an administrator for all bridges**, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_admin: "@YOUR_USERNAME:{{ matrix_domain }}"
|
matrix_admin: "@alice:{{ matrix_domain }}"
|
||||||
```
|
```
|
||||||
to `vars.yml` to **configure a user as an administrator for all bridges**.
|
|
||||||
**Alternatively** (more verbose, but allows multiple admins to be configured), you can do the same on a per-bridge basis with:
|
**Alternatively** (more verbose, but allows multiple admins to be configured), you can do the same on a per-bridge basis with:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_SERVICENAME_configuration_extension_yaml: |
|
matrix_mautrix_SERVICENAME_configuration_extension_yaml: |
|
||||||
bridge:
|
bridge:
|
||||||
permissions:
|
permissions:
|
||||||
'@YOUR_USERNAME:{{ matrix_domain }}': admin
|
'@alice:{{ matrix_domain }}': admin
|
||||||
```
|
```
|
||||||
|
|
||||||
## encryption
|
## encryption
|
||||||
|
|
||||||
Encryption support is off by default. If you would like to enable encryption, add the following to your `vars.yml` file:
|
Encryption support is off by default. If you would like to enable encryption, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
**for all bridges with encryption support**:
|
**for all bridges with encryption support**:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_bridges_encryption_enabled: true
|
matrix_bridges_encryption_enabled: true
|
||||||
|
matrix_bridges_encryption_default: true
|
||||||
```
|
```
|
||||||
|
|
||||||
**Alternatively**, for a specific bridge:
|
**Alternatively**, for a specific bridge:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mautrix_SERVICENAME_configuration_extension_yaml: |
|
matrix_mautrix_SERVICENAME_bridge_encryption_enabled: true
|
||||||
bridge:
|
matrix_mautrix_SERVICENAME_bridge_encryption_default: true
|
||||||
encryption:
|
|
||||||
allow: true
|
|
||||||
default: true
|
|
||||||
```
|
```
|
||||||
|
|
||||||
## relay mode
|
## relay mode
|
||||||
|
|
||||||
Relay mode is off by default. If you would like to enable relay mode, add the following to your `vars.yml` file:
|
Relay mode is off by default. If you would like to enable relay mode, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
**for all bridges with relay mode support**:
|
**for all bridges with relay mode support**:
|
||||||
|
|
||||||
@ -77,7 +73,7 @@ You can only have one `matrix_mautrix_SERVICENAME_configuration_extension_yaml`
|
|||||||
matrix_mautrix_SERVICENAME_configuration_extension_yaml: |
|
matrix_mautrix_SERVICENAME_configuration_extension_yaml: |
|
||||||
bridge:
|
bridge:
|
||||||
permissions:
|
permissions:
|
||||||
'@YOUR_USERNAME:{{ matrix_domain }}': admin
|
'@alice:{{ matrix_domain }}': admin
|
||||||
encryption:
|
encryption:
|
||||||
allow: true
|
allow: true
|
||||||
default: true
|
default: true
|
||||||
@ -95,22 +91,33 @@ Can be used to set the username for the bridge.
|
|||||||
|
|
||||||
You may wish to look at `roles/custom/matrix-bridge-mautrix-SERVICENAME/templates/config.yaml.j2` and `roles/custom/matrix-bridge-mautrix-SERVICENAME/defaults/main.yml` to find other things you would like to configure.
|
You may wish to look at `roles/custom/matrix-bridge-mautrix-SERVICENAME/templates/config.yaml.j2` and `roles/custom/matrix-bridge-mautrix-SERVICENAME/defaults/main.yml` to find other things you would like to configure.
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,ensure-matrix-users-created,start
|
||||||
|
```
|
||||||
|
|
||||||
|
**Notes**:
|
||||||
|
|
||||||
|
- The `ensure-matrix-users-created` playbook tag makes the playbook automatically create the bot's user account.
|
||||||
|
|
||||||
|
- The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed.
|
||||||
|
|
||||||
## Set up Double Puppeting
|
## Set up Double Puppeting
|
||||||
|
|
||||||
To set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html)
|
To set up [Double Puppeting](https://docs.mau.fi/bridges/general/double-puppeting.html) enable the [Appservice Double Puppet](configuring-playbook-appservice-double-puppet.md) service for this playbook.
|
||||||
|
|
||||||
please do so automatically, by enabling Shared Secret Auth
|
The bridge automatically performs Double Puppeting if [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) is configured and enabled on the server for this playbook by adding
|
||||||
|
|
||||||
The bridge will automatically perform Double Puppeting if you enable [Shared Secret Auth](configuring-playbook-shared-secret-auth.md) for this playbook by adding
|
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_synapse_ext_password_provider_shared_secret_auth_enabled: true
|
matrix_appservice_double_puppet_enabled: true
|
||||||
matrix_synapse_ext_password_provider_shared_secret_auth_shared_secret: YOUR_SHARED_SECRET_GOES_HERE
|
|
||||||
```
|
```
|
||||||
|
|
||||||
You should generate a strong shared secret with a command like this: pwgen -s 64 1
|
|
||||||
|
|
||||||
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
This is the recommended way of setting up Double Puppeting, as it's easier to accomplish, works for all your users automatically, and has less of a chance of breaking in the future.
|
||||||
|
|
||||||
## Controlling the logging level
|
## Controlling the logging level
|
||||||
@ -119,22 +126,20 @@ This is the recommended way of setting up Double Puppeting, as it's easier to ac
|
|||||||
matrix_mautrix_SERVICENAME_logging_level: WARN
|
matrix_mautrix_SERVICENAME_logging_level: WARN
|
||||||
```
|
```
|
||||||
|
|
||||||
to `vars.yml` to control the logging level, where you may replace WARN with one of the following to control the verbosity of the logs generated: TRACE, DEBUG, INFO, WARN, ERROR, or FATAL.
|
to `vars.yml` to control the logging level, where you may replace WARN with one of the following to control the verbosity of the logs generated: TRACE, DEBUG, INFO, WARN, ERROR, or FATAL.
|
||||||
|
|
||||||
If you have issues with a service, and are requesting support, the higher levels of logging will generally be more helpful.
|
If you have issues with a service, and are requesting support, the higher levels of logging will generally be more helpful.
|
||||||
|
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
You then need to start a chat with `@SERVICENAMEbot:YOUR_DOMAIN` (where `YOUR_DOMAIN` is your base domain, not the `matrix.` domain).
|
To use the bridge, you need to start a chat with `@SERVICENAMEbot:example.com` (where `example.com` is your base domain, not the `matrix.` domain).
|
||||||
|
|
||||||
Send `login ` to the bridge bot to get started You can learn more here about authentication from the bridge's official documentation on Authentication https://docs.mau.fi/bridges/python/SERVICENAME/authentication.html .
|
Send `login` to the bridge bot to get started. You can learn more here about authentication from the bridge's official documentation on Authentication: https://docs.mau.fi/bridges/python/SERVICENAME/authentication.html
|
||||||
|
|
||||||
If you run into trouble, check the [Troubleshooting](#troubleshooting) section below.
|
If you run into trouble, check the [Troubleshooting](#troubleshooting) section below.
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
## Troubleshooting
|
## Troubleshooting
|
||||||
|
|
||||||
For troubleshooting information with a specific bridge, please see the playbook documentation about it (some other document in in `docs/`) and the upstream ([mautrix](https://github.com/mautrix)) bridge documentation for that specific bridge.
|
For troubleshooting information with a specific bridge, please see the playbook documentation about it (some other document in in `docs/`) and the upstream ([mautrix](https://github.com/mautrix)) bridge documentation for that specific bridge.
|
||||||
|
|
||||||
Reporting bridge bugs should happen upstream, in the corresponding mautrix repository, not to us.
|
Reporting bridge bugs should happen upstream, in the corresponding mautrix repository, not to us.
|
||||||
|
@ -1,83 +1,3 @@
|
|||||||
# Configure Nginx (optional, advanced)
|
# Configure Nginx (optional, advanced)
|
||||||
|
|
||||||
**Note**: the playbook is [in the process of moving to Traefik](../CHANGELOG.md#reverse-proxy-configuration-changes-and-initial-traefik-support). Traefik is already the default reverse-proxy for new installations and existing users are also strongly encouraged to switch to Traefik. As such, this **nginx documentation below may be incomplete or misleading**.
|
Since 2024-01, this playbook no longer uses nginx as its reverse-proxy.
|
||||||
|
|
||||||
|
|
||||||
## Using Nginx status
|
|
||||||
|
|
||||||
This will serve a statuspage to the hosting machine only. Useful for monitoring software like [longview](https://www.linode.com/docs/platform/longview/longview-app-for-nginx/)
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
matrix_nginx_proxy_proxy_matrix_nginx_status_enabled: true
|
|
||||||
```
|
|
||||||
|
|
||||||
This will serve the status page under the following addresses:
|
|
||||||
- `http://matrix.DOMAIN/nginx_status` (using HTTP)
|
|
||||||
- `https://matrix.DOMAIN/nginx_status` (using HTTPS)
|
|
||||||
|
|
||||||
By default, if ```matrix_nginx_proxy_nginx_status_enabled``` is enabled, access to the status page would be allowed from the local IP address of the server. If you wish to allow access from other IP addresses, you can provide them as a list:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
matrix_nginx_proxy_proxy_matrix_nginx_status_allowed_addresses:
|
|
||||||
- 8.8.8.8
|
|
||||||
- 1.1.1.1
|
|
||||||
```
|
|
||||||
|
|
||||||
## Adjusting SSL in your server
|
|
||||||
|
|
||||||
You can adjust how the SSL is served by the nginx server using the `matrix_nginx_proxy_ssl_preset` variable. We support a few presets, based on the Mozilla Server Side TLS
|
|
||||||
Recommended configurations. These presets influence the TLS Protocol, the SSL Cipher Suites and the `ssl_prefer_server_ciphers` variable of nginx.
|
|
||||||
Possible values are:
|
|
||||||
|
|
||||||
- `"modern"` - For Modern clients that support TLS 1.3, with no need for backwards compatibility
|
|
||||||
- `"intermediate"` (**default**) - Recommended configuration for a general-purpose server
|
|
||||||
- `"old"` - Services accessed by very old clients or libraries, such as Internet Explorer 8 (Windows XP), Java 6, or OpenSSL 0.9.8
|
|
||||||
|
|
||||||
**Be really carefull when setting it to `"modern"`**. This could break comunication with other Matrix servers, limiting your federation posibilities.
|
|
||||||
|
|
||||||
Besides changing the preset (`matrix_nginx_proxy_ssl_preset`), you can also directly override these 3 variables:
|
|
||||||
|
|
||||||
- `matrix_nginx_proxy_ssl_protocols`: for specifying the supported TLS protocols.
|
|
||||||
- `matrix_nginx_proxy_ssl_prefer_server_ciphers`: for specifying if the server or the client choice when negotiating the cipher. It can set to `on` or `off`.
|
|
||||||
- `matrix_nginx_proxy_ssl_ciphers`: for specifying the SSL Cipher suites used by nginx.
|
|
||||||
|
|
||||||
For more information about these variables, check the `roles/custom/matrix-nginx-proxy/defaults/main.yml` file.
|
|
||||||
|
|
||||||
## Synapse + OpenID Connect for Single-Sign-On
|
|
||||||
|
|
||||||
If you want to use OpenID Connect as an SSO provider (as per the [Synapse OpenID docs](https://github.com/matrix-org/synapse/blob/develop/docs/openid.md)), you need to use the following configuration (in your `vars.yml` file) to instruct nginx to forward `/_synapse/oidc` to Synapse:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
matrix_nginx_proxy_proxy_matrix_client_api_forwarded_location_synapse_oidc_api_enabled: true
|
|
||||||
```
|
|
||||||
|
|
||||||
## Disable Nginx access logs
|
|
||||||
|
|
||||||
This will disable the access logging for nginx.
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
matrix_nginx_proxy_access_log_enabled: false
|
|
||||||
```
|
|
||||||
|
|
||||||
## Additional configuration
|
|
||||||
|
|
||||||
This playbook also allows for additional configuration to be applied to the nginx server.
|
|
||||||
|
|
||||||
If you want this playbook to obtain and renew certificates for other domains, then you can set the `matrix_ssl_additional_domains_to_obtain_certificates_for` variable (as mentioned in the [Obtaining SSL certificates for additional domains](configuring-playbook-ssl-certificates.md#obtaining-ssl-certificates-for-additional-domains) documentation as well). Make sure that you have set the DNS configuration for the domains you want to include to point at your server.
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
matrix_ssl_additional_domains_to_obtain_certificates_for:
|
|
||||||
- domain.one.example
|
|
||||||
- domain.two.example
|
|
||||||
```
|
|
||||||
|
|
||||||
You can include additional nginx configuration by setting the `matrix_nginx_proxy_proxy_http_additional_server_configuration_blocks` variable.
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
matrix_nginx_proxy_proxy_http_additional_server_configuration_blocks:
|
|
||||||
- |
|
|
||||||
# These lines will be included in the nginx configuration.
|
|
||||||
# This is at the top level of the file, so you will need to define all of the `server { ... }` blocks.
|
|
||||||
- |
|
|
||||||
# For advanced use, have a look at the template files in `roles/custom/matrix-nginx-proxy/templates/nginx/conf.d`
|
|
||||||
```
|
|
||||||
|
@ -1,26 +1,21 @@
|
|||||||
# Setting up ntfy (optional)
|
# Setting up the ntfy push notifications server (optional)
|
||||||
|
|
||||||
The playbook can install and configure the [ntfy](https://ntfy.sh/) push notifications server for you.
|
The playbook can install and configure the [ntfy](https://ntfy.sh/) push notifications server for you.
|
||||||
|
|
||||||
Using the [UnifiedPush](https://unifiedpush.org) standard, ntfy enables self-hosted (Google-free) push notifications from Matrix (and other) servers to UnifiedPush-compatible matrix compatible client apps running on Android and other devices.
|
Using the [UnifiedPush](https://unifiedpush.org) standard, ntfy enables self-hosted (Google-free) push notifications from Matrix (and other) servers to UnifiedPush-compatible Matrix compatible client apps running on Android and other devices.
|
||||||
|
|
||||||
This role is intended to support UnifiedPush notifications for use with the Matrix and Matrix-related services that this playbook installs. This role is not intended to support all of ntfy's other features.
|
This role is intended to support UnifiedPush notifications for use with the Matrix and Matrix-related services that this playbook installs. This role is not intended to support all of ntfy's other features.
|
||||||
|
|
||||||
**Note**: In contrast to push notifications using Google's FCM or Apple's APNs, the use of UnifiedPush allows each end-user to choose the push notification server that they prefer. As a consequence, deploying this ntfy server does not by itself ensure any particular user or device or client app will use it.
|
**Note**: In contrast to push notifications using Google's FCM or Apple's APNs, the use of UnifiedPush allows each end-user to choose the push notification server that they prefer. As a consequence, deploying this ntfy server does not by itself ensure any particular user or device or client app will use it.
|
||||||
|
|
||||||
|
|
||||||
## Adjusting the playbook configuration
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file (adapt to your needs):
|
To enable ntfy, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
# Enabling it is the only required setting
|
# Enabling it is the only required setting
|
||||||
ntfy_enabled: true
|
ntfy_enabled: true
|
||||||
|
|
||||||
# This is the default hostname.
|
|
||||||
# Uncomment the line below and change it, if you'd like.
|
|
||||||
# matrix_server_fqn_ntfy: "ntfy.{{ matrix_domain }}"
|
|
||||||
|
|
||||||
# Uncomment to enable the ntfy web app (disabled by default)
|
# Uncomment to enable the ntfy web app (disabled by default)
|
||||||
# ntfy_web_root: app # defaults to "disable"
|
# ntfy_web_root: app # defaults to "disable"
|
||||||
|
|
||||||
@ -29,44 +24,64 @@ ntfy_enabled: true
|
|||||||
# log_level: DEBUG
|
# log_level: DEBUG
|
||||||
```
|
```
|
||||||
|
|
||||||
For a more complete list of variables that you could override, see the [`defaults/main.yml` file](https://gitlab.com/etke.cc/roles/ntfy/-/blob/main/defaults/main.yml) of the ntfy Ansible role.
|
For a more complete list of variables that you could override, see the [`defaults/main.yml` file](https://github.com/mother-of-all-self-hosting/ansible-role-ntfy/blob/main/defaults/main.yml) of the ntfy Ansible role.
|
||||||
|
|
||||||
For a complete list of ntfy config options that you could put in `ntfy_configuration_extension_yaml`, see the [ntfy config documentation](https://ntfy.sh/docs/config/#config-options).
|
For a complete list of ntfy config options that you could put in `ntfy_configuration_extension_yaml`, see the [ntfy config documentation](https://ntfy.sh/docs/config/#config-options).
|
||||||
|
|
||||||
|
### Adjusting the ntfy URL
|
||||||
|
|
||||||
|
By default, this playbook installs ntfy on the `ntfy.` subdomain (`ntfy.example.com`) and requires you to [adjust your DNS records](#adjusting-dns-records).
|
||||||
|
|
||||||
|
By tweaking the `ntfy_hostname` variable, you can easily make the service available at a **different hostname** than the default one.
|
||||||
|
|
||||||
|
Example additional configuration for your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Change the default hostname
|
||||||
|
ntfy_hostname: push.example.com
|
||||||
|
```
|
||||||
|
|
||||||
|
## Adjusting DNS records
|
||||||
|
|
||||||
|
Once you've decided on the domain, **you may need to adjust your DNS** records to point the ntfy domain to the Matrix server.
|
||||||
|
|
||||||
|
By default, you will need to create a CNAME record for `ntfy`. See [Configuring DNS](configuring-dns.md) for details about DNS changes.
|
||||||
|
|
||||||
## Installing
|
## Installing
|
||||||
|
|
||||||
Don't forget to add `ntfy.<your-domain>` to DNS as described in [Configuring DNS](configuring-dns.md) before running the playbook.
|
After configuring the playbook and potentially [adjusting your DNS records](#adjusting-dns-records), run the playbook with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command again:
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
```
|
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
```
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
To make use of your ntfy installation, on Android for example, you need two things:
|
To make use of your ntfy installation, on Android for example, you need two things:
|
||||||
|
|
||||||
* the `ntfy` app
|
* the `ntfy` app
|
||||||
* a UnifiedPush-compatible matrix app
|
* a UnifiedPush-compatible Matrix app
|
||||||
|
|
||||||
You need to install the `ntfy` app on each device on which you want to receive push notifications through your ntfy server. The `ntfy` app will provide UnifiedPush notifications to any number of UnifiedPush-compatible messaging apps installed on the same device.
|
You need to install the `ntfy` app on each device on which you want to receive push notifications through your ntfy server. The `ntfy` app will provide UnifiedPush notifications to any number of UnifiedPush-compatible messaging apps installed on the same device.
|
||||||
|
|
||||||
### Setting up the `ntfy` Android app
|
### Setting up the `ntfy` Android app
|
||||||
|
|
||||||
1. Install the [ntfy Android app](https://ntfy.sh/docs/subscribe/phone/) from F-droid or Google Play.
|
1. Install the [ntfy Android app](https://ntfy.sh/docs/subscribe/phone/) from F-droid or Google Play.
|
||||||
2. In its Settings -> `General: Default server`, enter your ntfy server URL, such as `https://ntfy.DOMAIN`.
|
2. In its Settings -> `General: Default server`, enter your ntfy server URL, such as `https://ntfy.example.com`.
|
||||||
3. In its Settings -> `Advanced: Connection protocol`, choose `WebSockets`.
|
3. In its Settings -> `Advanced: Connection protocol`, choose `WebSockets`.
|
||||||
|
|
||||||
That is all you need to do in the ntfy app. It has many other features, but for our purposes you can ignore them. In particular you do not need to follow any instructions about subscribing to a notification topic as UnifiedPush will do that automatically.
|
That is all you need to do in the ntfy app. It has many other features, but for our purposes you can ignore them. In particular you do not need to follow any instructions about subscribing to a notification topic as UnifiedPush will do that automatically.
|
||||||
|
|
||||||
### Setting up a UnifiedPush-compatible matrix app
|
### Setting up a UnifiedPush-compatible Matrix app
|
||||||
|
|
||||||
Install any UnifiedPush-enabled matrix app on that same device. The matrix app will learn from the `ntfy` app that you have configured UnifiedPush on this device, and then it will tell your matrix server to use it.
|
Install any UnifiedPush-enabled Matrix app on that same device. The Matrix app will learn from the `ntfy` app that you have configured UnifiedPush on this device, and then it will tell your Matrix server to use it.
|
||||||
|
|
||||||
Steps needed for specific matrix apps:
|
Steps needed for specific Matrix apps:
|
||||||
|
|
||||||
* FluffyChat-android:
|
* FluffyChat-android:
|
||||||
- Should auto-detect and use it. No manual settings.
|
- Should auto-detect and use it. No manual settings.
|
||||||
@ -80,9 +95,9 @@ Steps needed for specific matrix apps:
|
|||||||
1. choose `Settings` -> `Notifications` -> `Notification method` -> `ntfy`
|
1. choose `Settings` -> `Notifications` -> `Notification method` -> `ntfy`
|
||||||
2. verify `Settings` -> `Troubleshoot` -> `Troubleshoot notification settings`
|
2. verify `Settings` -> `Troubleshoot` -> `Troubleshoot notification settings`
|
||||||
|
|
||||||
If the matrix app asks, "Choose a distributor: FCM Fallback or ntfy", then choose "ntfy".
|
If the Matrix app asks, "Choose a distributor: FCM Fallback or ntfy", then choose "ntfy".
|
||||||
|
|
||||||
If the matrix app doesn't seem to pick it up, try restarting it and try the Troubleshooting section below.
|
If the Matrix app doesn't seem to pick it up, try restarting it and try the Troubleshooting section below.
|
||||||
|
|
||||||
### Web App
|
### Web App
|
||||||
|
|
||||||
@ -90,17 +105,16 @@ ntfy also has a web app to subscribe to and push to topics from the browser. Thi
|
|||||||
|
|
||||||
The web app is disabled in this playbook by default as the expectation is that most users won't use it. You can either use the [official hosted one](https://ntfy.sh/app) (it supports using other public reachable ntfy instances) or host it yourself by setting `ntfy_web_root: "app"` and re-running Ansible.
|
The web app is disabled in this playbook by default as the expectation is that most users won't use it. You can either use the [official hosted one](https://ntfy.sh/app) (it supports using other public reachable ntfy instances) or host it yourself by setting `ntfy_web_root: "app"` and re-running Ansible.
|
||||||
|
|
||||||
|
|
||||||
## Troubleshooting
|
## Troubleshooting
|
||||||
|
|
||||||
First check that the matrix client app you are using supports UnifiedPush. There may well be different variants of the app.
|
First check that the Matrix client app you are using supports UnifiedPush. There may well be different variants of the app.
|
||||||
|
|
||||||
Set the ntfy server's log level to 'DEBUG', as shown in the example settings above, and watch the server's logs with `sudo journalctl -fu matrix-ntfy`.
|
Set the ntfy server's log level to 'DEBUG', as shown in the example settings above, and watch the server's logs with `sudo journalctl -fu matrix-ntfy`.
|
||||||
|
|
||||||
To check if UnifiedPush is correctly configured on the client device, look at "Settings -> Notifications -> Notification Targets" in Element-Android or SchildiChat, or "Settings -> Notifications -> Devices" in FluffyChat. There should be one entry for each matrix client app that has enabled push notifications, and when that client is using UnifiedPush you should see a URL that begins with your ntfy server's URL.
|
To check if UnifiedPush is correctly configured on the client device, look at "Settings -> Notifications -> Notification Targets" in Element Android or SchildiChat Android, or "Settings -> Notifications -> Devices" in FluffyChat. There should be one entry for each Matrix client app that has enabled push notifications, and when that client is using UnifiedPush you should see a URL that begins with your ntfy server's URL.
|
||||||
|
|
||||||
In the "Notification Targets" screen in Element-Android or SchildiChat, two relevant URLs are shown, "push\_key" and "Url", and both should begin with your ntfy server's URL. If "push\_key" shows your server but "Url" shows an external server such as `up.schildi.chat` then push notifications will still work but are being routed through that external server before they reach your ntfy server. To rectify that, in SchildiChat (at least around version 1.4.20.sc55) you must enable the `Force custom push gateway` setting as described in the "Usage" section above.
|
In the "Notification Targets" screen in Element Android or SchildiChat Android, two relevant URLs are shown, "push\_key" and "Url", and both should begin with your ntfy server's URL. If "push\_key" shows your server but "Url" shows an external server such as `up.schildi.chat` then push notifications will still work but are being routed through that external server before they reach your ntfy server. To rectify that, in SchildiChat (at least around version 1.4.20.sc55) you must enable the `Force custom push gateway` setting as described in the "Usage" section above.
|
||||||
|
|
||||||
If it is not working, useful tools are "Settings -> Notifications -> Re-register push distributor" and "Settings -> Notifications -> Troubleshoot Notifications" in SchildiChat (possibly also Element-Android). In particular the "Endpoint/FCM" step of that troubleshooter should display your ntfy server's URL that it has discovered from the ntfy client app.
|
If it is not working, useful tools are "Settings -> Notifications -> Re-register push distributor" and "Settings -> Notifications -> Troubleshoot Notifications" in SchildiChat Android (possibly also Element Android). In particular the "Endpoint/FCM" step of that troubleshooter should display your ntfy server's URL that it has discovered from the ntfy client app.
|
||||||
|
|
||||||
The simple [UnifiedPush troubleshooting](https://unifiedpush.org/users/troubleshooting/) app [UP-Example](https://f-droid.org/en/packages/org.unifiedpush.example/) can be used to manually test UnifiedPush registration and operation on an Android device.
|
The simple [UnifiedPush troubleshooting](https://unifiedpush.org/users/troubleshooting/) app [UP-Example](https://f-droid.org/en/packages/org.unifiedpush.example/) can be used to manually test UnifiedPush registration and operation on an Android device.
|
||||||
|
@ -1,51 +1,69 @@
|
|||||||
# Using your own webserver, instead of this playbook's Traefik reverse-proxy (optional, advanced)
|
# Using your own webserver, instead of this playbook's Traefik reverse-proxy (optional, advanced)
|
||||||
|
|
||||||
**Note**: the playbook is [in the process of moving to Traefik](../CHANGELOG.md#reverse-proxy-configuration-changes-and-initial-traefik-support). The **documentation below may be incomplete or misleading**.
|
By default, this playbook installs its own [Traefik](https://traefik.io/) reverse-proxy server (in a Docker container) which listens on ports 80 and 443. If that's okay, you can skip this document.
|
||||||
|
|
||||||
By default, this playbook installs its own nginx webserver (called `matrix-nginx-proxy`, in a Docker container) which listens on ports 80 and 443.
|
|
||||||
If that's alright, you can skip this.
|
|
||||||
|
|
||||||
Soon, this default will change and the playbook will install its own [Traefik](https://traefik.io/) reverse-proxy instead.
|
|
||||||
|
|
||||||
## Traefik
|
## Traefik
|
||||||
|
|
||||||
[Traefik](https://traefik.io/) will be the default reverse-proxy for the playbook in the near future.
|
[Traefik](https://traefik.io/) is the default reverse-proxy for the playbook since [2023-02-26](../CHANGELOG.md/#2023-02-26) and serves **2 purposes**:
|
||||||
|
|
||||||
|
- serving public traffic and providing SSL-termination with certificates obtained from [Let's Encrypt](https://letsencrypt.org/). See [Adjusting SSL certificate retrieval](./configuring-playbook-ssl-certificates.md).
|
||||||
|
|
||||||
|
- assists internal communication between addon services (briges, bots, etc.) and the homeserver via an internal entrypoint (`matrix-internal-matrix-client-api`).
|
||||||
|
|
||||||
There are 2 ways to use Traefik with this playbook, as described below.
|
There are 2 ways to use Traefik with this playbook, as described below.
|
||||||
|
|
||||||
### Traefik managed by the playbook
|
### Traefik managed by the playbook
|
||||||
|
|
||||||
To switch to Traefik now, use configuration like this:
|
To have the playbook install and use Traefik, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_playbook_reverse_proxy_type: playbook-managed-traefik
|
matrix_playbook_reverse_proxy_type: playbook-managed-traefik
|
||||||
|
|
||||||
devture_traefik_config_certificatesResolvers_acme_email: YOUR_EMAIL_ADDRESS
|
traefik_config_certificatesResolvers_acme_email: YOUR_EMAIL_ADDRESS
|
||||||
```
|
```
|
||||||
|
|
||||||
This will install Traefik in the place of `matrix-nginx-proxy`. Traefik will manage SSL certificates for all services seamlessly.
|
Traefik will manage SSL certificates for all services seamlessly.
|
||||||
|
|
||||||
**Note**: during the transition period, `matrix-nginx-proxy` will still be installed in local-only mode. Do not be alarmed to see `matrix-nginx-proxy` running even when you've chosen Traefik as your reverse-proxy. In the future, we'll be able to run without nginx, but we're not there yet.
|
|
||||||
|
|
||||||
### Traefik managed by you
|
### Traefik managed by you
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_playbook_reverse_proxy_type: other-traefik-container
|
matrix_playbook_reverse_proxy_type: other-traefik-container
|
||||||
|
|
||||||
matrix_playbook_reverse_proxyable_services_additional_network: your-traefik-network
|
# Uncomment and adjust this part if your Traefik container is on another network
|
||||||
|
# matrix_playbook_reverse_proxy_container_network: traefik
|
||||||
|
|
||||||
devture_traefik_certs_dumper_ssl_dir_path: "/path/to/your/traefiks/acme.json/directory"
|
# Adjust to point to your Traefik container
|
||||||
|
matrix_playbook_reverse_proxy_hostname: name-of-your-traefik-container
|
||||||
|
|
||||||
|
traefik_certs_dumper_ssl_dir_path: "/path/to/your/traefiks/acme.json/directory"
|
||||||
|
|
||||||
|
# Uncomment and adjust the variable below if the name of your federation entrypoint is different
|
||||||
|
# than the default value (matrix-federation).
|
||||||
|
# matrix_federation_traefik_entrypoint_name: matrix-federation
|
||||||
|
|
||||||
|
# Uncomment and adjust the variables below if you'd like to enable HTTP-compression.
|
||||||
|
#
|
||||||
|
# For this to work, you will need to define a compress middleware (https://doc.traefik.io/traefik/middlewares/http/compress/) for your Traefik instance
|
||||||
|
# using a file (https://doc.traefik.io/traefik/providers/file/) or Docker (https://doc.traefik.io/traefik/providers/docker/) configuration provider.
|
||||||
|
#
|
||||||
|
# matrix_playbook_reverse_proxy_traefik_middleware_compression_enabled: true
|
||||||
|
# matrix_playbook_reverse_proxy_traefik_middleware_compression_name: my-compression-middleware@file
|
||||||
```
|
```
|
||||||
|
|
||||||
In this mode all roles will still have Traefik labels attached. You will, however, need to configure your Traefik instance and its entrypoints.
|
In this mode all roles will still have Traefik labels attached. You will, however, need to configure your Traefik instance and its entrypoints.
|
||||||
|
|
||||||
By default, the playbook congiures services use a `web-secure` (443) and `matrix-federation` (8448) entrypoints, as well as a `default` certificate resolver.
|
By default, the playbook configured a `default` certificate resolver and multiple entrypoints.
|
||||||
|
|
||||||
You need to configure 3 entrypoints for your Traefik server: `web` (TCP port `80`), `web-secure` (TCP port `443`) and `matrix-federation` (TCP port `8448`).
|
You need to configure 4 entrypoints for your Traefik server:
|
||||||
|
|
||||||
|
- `web` (TCP port `80`) - used for redirecting to HTTPS (`web-secure`)
|
||||||
|
- `web-secure` (TCP port `443`) - used for exposing the Matrix Client-Server API and all other services
|
||||||
|
- `matrix-federation` (TCP port `8448`) - used for exposing the Matrix Federation API
|
||||||
|
- `matrix-internal-matrix-client-api` (TCP port `8008`) - used internally for addon services (bridges, bots) to communicate with the homserver
|
||||||
|
|
||||||
Below is some configuration for running Traefik yourself, although we recommend using [Traefik managed by the playbook](#traefik-managed-by-the-playbook).
|
Below is some configuration for running Traefik yourself, although we recommend using [Traefik managed by the playbook](#traefik-managed-by-the-playbook).
|
||||||
|
|
||||||
Note that this configuration on its own does **not** redirect traffic on port 80 (plain HTTP) to port 443 for HTTPS, which may cause some issues, since the built-in Nginx proxy usually does this. If you are not already doing this in Traefik, it can be added to Traefik in a [file provider](https://docs.traefik.io/v2.0/providers/file/) as follows:
|
Note that this configuration on its own does **not** redirect traffic on port 80 (plain HTTP) to port 443 for HTTPS. If you are not already doing this in Traefik, it can be added to Traefik in a [file provider](https://docs.traefik.io/v2.0/providers/file/) as follows:
|
||||||
|
|
||||||
```toml
|
```toml
|
||||||
[http]
|
[http]
|
||||||
@ -73,7 +91,7 @@ version: "3.3"
|
|||||||
services:
|
services:
|
||||||
|
|
||||||
traefik:
|
traefik:
|
||||||
image: "docker.io/traefik:v2.9.6"
|
image: "docker.io/traefik:v3.2.0"
|
||||||
restart: always
|
restart: always
|
||||||
container_name: "traefik"
|
container_name: "traefik"
|
||||||
networks:
|
networks:
|
||||||
@ -84,7 +102,8 @@ services:
|
|||||||
- "--providers.docker.network=traefik"
|
- "--providers.docker.network=traefik"
|
||||||
- "--providers.docker.exposedbydefault=false"
|
- "--providers.docker.exposedbydefault=false"
|
||||||
- "--entrypoints.web-secure.address=:443"
|
- "--entrypoints.web-secure.address=:443"
|
||||||
- "--entrypoints.federation.address=:8448"
|
- "--entrypoints.matrix-federation.address=:8448"
|
||||||
|
- "--entrypoints.matrix-internal-matrix-client-api.address=:8008"
|
||||||
- "--certificatesresolvers.default.acme.tlschallenge=true"
|
- "--certificatesresolvers.default.acme.tlschallenge=true"
|
||||||
- "--certificatesresolvers.default.acme.email=YOUR EMAIL"
|
- "--certificatesresolvers.default.acme.email=YOUR EMAIL"
|
||||||
- "--certificatesresolvers.default.acme.storage=/letsencrypt/acme.json"
|
- "--certificatesresolvers.default.acme.storage=/letsencrypt/acme.json"
|
||||||
@ -102,16 +121,15 @@ networks:
|
|||||||
|
|
||||||
## Another webserver
|
## Another webserver
|
||||||
|
|
||||||
If you don't wish to use Traefik or `matrix-nginx-proxy`, you can also use your own webserver.
|
If you don't wish to use Traefik, you can also use your own webserver.
|
||||||
|
|
||||||
Doing this is possible, but requires manual work.
|
Doing this is possible, but requires manual work.
|
||||||
|
|
||||||
There are 2 ways to go about it:
|
There are 2 ways to go about it:
|
||||||
|
|
||||||
- (recommended) [Fronting the integrated reverse-proxy webserver with another reverse-proxy](#fronting-the-integrated-reverse-proxy-webserver-with-another-reverse-proxy) - using a playbook-managed reverse-proxy (either `matrix-nginx-proxy` or Traefik), disabling SSL termination for it, exposing this reverse-proxy on a few local ports (e.g. `127.0.0.1:81`, etc.) and forwarding traffic from your own webserver to those few ports
|
- (recommended) [Fronting the integrated reverse-proxy webserver with another reverse-proxy](#fronting-the-integrated-reverse-proxy-webserver-with-another-reverse-proxy) - using the playbook-managed reverse-proxy (Traefik), but disabling SSL termination for it, exposing this reverse-proxy on a few local ports (e.g. `127.0.0.1:81`, etc.) and forwarding traffic from your own webserver to those few ports
|
||||||
|
|
||||||
- (difficult) [Using no reverse-proxy on the Matrix side at all](#using-no-reverse-proxy-on-the-matrix-side-at-all) disabling all playbook-managed reverse-proxies (no `matrix-nginx-proxy`, no Traefik)
|
|
||||||
|
|
||||||
|
- (difficult) [Using no reverse-proxy on the Matrix side at all](#using-no-reverse-proxy-on-the-matrix-side-at-all) disabling the playbook-managed reverse-proxy (Traefik), exposing services one by one using `_host_bind_port` variables and forwarding traffic from your own webserver to those ports
|
||||||
|
|
||||||
### Fronting the integrated reverse-proxy webserver with another reverse-proxy
|
### Fronting the integrated reverse-proxy webserver with another reverse-proxy
|
||||||
|
|
||||||
@ -119,9 +137,9 @@ This method is about leaving the integrated reverse-proxy webserver be, but maki
|
|||||||
|
|
||||||
If you wish to use another webserver, the integrated reverse-proxy webserver usually gets in the way because it attempts to fetch SSL certificates and binds to ports 80, 443 and 8448 (if Matrix Federation is enabled).
|
If you wish to use another webserver, the integrated reverse-proxy webserver usually gets in the way because it attempts to fetch SSL certificates and binds to ports 80, 443 and 8448 (if Matrix Federation is enabled).
|
||||||
|
|
||||||
You can disable such behavior and make the integrated reverse-proxy webserver only serve traffic locally (or over a local network).
|
You can disable such behavior and make the integrated reverse-proxy webserver only serve traffic locally on the host itself (or over a local network).
|
||||||
|
|
||||||
This is the recommended way for using another reverse-proxy, because the integrated one would act as a black box and wire all Matrix services correctly. You would only need to reverse-proxy a few individual domains and ports over to it.
|
This is the recommended way for using another reverse-proxy, because the integrated one would act as a black box and wire all Matrix services correctly. You would then only need to reverse-proxy a few individual domains and ports over to it.
|
||||||
|
|
||||||
To front Traefik with another reverse-proxy, you would need some configuration like this:
|
To front Traefik with another reverse-proxy, you would need some configuration like this:
|
||||||
|
|
||||||
@ -131,96 +149,62 @@ matrix_playbook_reverse_proxy_type: playbook-managed-traefik
|
|||||||
# Ensure that public urls use https
|
# Ensure that public urls use https
|
||||||
matrix_playbook_ssl_enabled: true
|
matrix_playbook_ssl_enabled: true
|
||||||
|
|
||||||
# Disable the web-secure (port 443) endpoint, which also disables SSL certificate retrieval
|
# Disable the web-secure (port 443) endpoint, which also disables SSL certificate retrieval.
|
||||||
devture_traefik_config_entrypoint_web_secure_enabled: false
|
# This has the side-effect of also automatically disabling TLS for the matrix-federation entrypoint
|
||||||
|
# (by toggling `matrix_federation_traefik_entrypoint_tls`).
|
||||||
|
traefik_config_entrypoint_web_secure_enabled: false
|
||||||
|
|
||||||
# If your reverse-proxy runs on another machine, consider using `0.0.0.0:81`, just `81` or `SOME_IP_ADDRESS_OF_THIS_MACHINE:81`
|
# If your reverse-proxy runs on another machine, consider using `0.0.0.0:81`, just `81` or `SOME_IP_ADDRESS_OF_THIS_MACHINE:81`
|
||||||
devture_traefik_container_web_host_bind_port: '127.0.0.1:81'
|
traefik_container_web_host_bind_port: '127.0.0.1:81'
|
||||||
|
|
||||||
# We bind to `127.0.0.1` by default (see above), so trusting `X-Forwarded-*` headers from
|
# We bind to `127.0.0.1` by default (see above), so trusting `X-Forwarded-*` headers from
|
||||||
# a reverse-proxy running on the local machine is safe enough.
|
# a reverse-proxy running on the local machine is safe enough.
|
||||||
devture_traefik_config_entrypoint_web_forwardedHeaders_insecure: true
|
# If you're publishing the port (`traefik_container_web_host_bind_port` above) to a public network interface:
|
||||||
|
# - remove the `traefik_config_entrypoint_web_forwardedHeaders_insecure` variable definition below
|
||||||
|
# - uncomment and adjust the `traefik_config_entrypoint_web_forwardedHeaders_trustedIPs` line below
|
||||||
|
traefik_config_entrypoint_web_forwardedHeaders_insecure: true
|
||||||
|
# traefik_config_entrypoint_web_forwardedHeaders_trustedIPs: ['IP-ADDRESS-OF-YOUR-REVERSE-PROXY']
|
||||||
|
|
||||||
# Or, if you're publishing the port (`devture_traefik_container_web_host_bind_port` above) to a public network interfaces:
|
# Expose the federation entrypoint on a custom port (other than port 8448, which is normally used publicly).
|
||||||
# - remove the `devture_traefik_config_entrypoint_web_forwardedHeaders_insecure` variable definition above
|
#
|
||||||
# - uncomment and adjust the line below
|
# We bind to `127.0.0.1` by default (see above), so trusting `X-Forwarded-*` headers from
|
||||||
# devture_traefik_config_entrypoint_web_forwardedHeaders_trustedIPs: ['IP-ADDRESS-OF-YOUR-REVERSE-PROXY']
|
# a reverse-proxy running on the local machine is safe enough.
|
||||||
|
#
|
||||||
|
# If your reverse-proxy runs on another machine, consider:
|
||||||
|
# - using `0.0.0.0:8449`, just `8449` or `SOME_IP_ADDRESS_OF_THIS_MACHINE:8449` below
|
||||||
|
# - adjusting `matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config_custom` (below) - removing `insecure: true` and enabling/configuring `trustedIPs`
|
||||||
|
matrix_playbook_public_matrix_federation_api_traefik_entrypoint_host_bind_port: '127.0.0.1:8449'
|
||||||
|
|
||||||
# Likewise (to `devture_traefik_container_web_host_bind_port` above),
|
# Disable HTTP/3 for the federation entrypoint.
|
||||||
# if your reverse-proxy runs on another machine, consider changing the `host_bind_port` setting below.
|
# If you'd like HTTP/3, consider configuring it for your other reverse-proxy.
|
||||||
devture_traefik_additional_entrypoints_auto:
|
#
|
||||||
- name: matrix-federation
|
# Disabling this also sets `matrix_playbook_public_matrix_federation_api_traefik_entrypoint_host_bind_port_udp` to an empty value.
|
||||||
port: 8449
|
# If you'd like to keep HTTP/3 enabled here (for whatever reason), you may wish to explicitly
|
||||||
host_bind_port: '127.0.0.1:8449'
|
# set `matrix_playbook_public_matrix_federation_api_traefik_entrypoint_host_bind_port_udp` to something like '127.0.0.1:8449'.
|
||||||
config: {}
|
matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config_http3_enabled: false
|
||||||
# If your reverse-proxy runs on another machine, remove the config above and use this config instead:
|
|
||||||
# config:
|
# Depending on the value of `matrix_playbook_public_matrix_federation_api_traefik_entrypoint_host_bind_port` above,
|
||||||
# forwardedHeaders:
|
# this may need to be reconfigured. See the comments above.
|
||||||
# insecure: true
|
matrix_playbook_public_matrix_federation_api_traefik_entrypoint_config_custom:
|
||||||
# # trustedIPs: ['IP-ADDRESS-OF-YOUR-REVERSE-PROXY']
|
forwardedHeaders:
|
||||||
|
insecure: true
|
||||||
|
# trustedIPs: ['IP-ADDRESS-OF-YOUR-REVERSE-PROXY']
|
||||||
```
|
```
|
||||||
|
|
||||||
For an example where the playbook's Traefik reverse-proxy is fronted by another reverse-proxy running on the same server, see [Nginx reverse-proxy fronting the playbook's Traefik](../examples/nginx/README.md) or [Caddy reverse-proxy fronting the playbook's Traefik](../examples/caddy2/README.md).
|
Such a configuration would expose all services on a local port `81` and Matrix Federation on a local port `8449`. Your reverse-proxy configuration needs to send traffic to these ports. [`examples/reverse-proxies`](../examples/reverse-proxies/) contains examples for various webservers such as Apache2, Caddy, HAproxy, nginx and Nginx Proxy Manager.
|
||||||
|
|
||||||
|
It's important that these webservers proxy-pass requests to the correct `ip:port` and also set the `Host` HTTP header appropriately. If you don't pass the `Host` header correctly, Traefik will return a `404 - not found` error.
|
||||||
|
|
||||||
|
To put it another way:
|
||||||
|
- `curl http://127.0.0.1:81` will result in a `404 - not found` error
|
||||||
|
- but `curl -H 'Host: matrix.example.com' http://127.0.0.1:81` should work.
|
||||||
|
|
||||||
### Using no reverse-proxy on the Matrix side at all
|
### Using no reverse-proxy on the Matrix side at all
|
||||||
|
|
||||||
Instead of [Fronting the integrated reverse-proxy webserver with another reverse-proxy](#fronting-the-integrated-reverse-proxy-webserver-with-another-reverse-proxy), you can also go another way -- completely disabling the playbook-managed reverse-proxy. You would then need to reverse-proxy from your own webserver directly to Matrix services.
|
Instead of [Fronting the integrated reverse-proxy webserver with another reverse-proxy](#fronting-the-integrated-reverse-proxy-webserver-with-another-reverse-proxy), you can also go another way -- completely disabling the playbook-managed Traefik reverse-proxy. You would then need to reverse-proxy from your own webserver directly to each individual Matrix service.
|
||||||
|
|
||||||
This is more difficult, as you would need to handle the configuration for each service manually. Enabling additional services would come with extra manual work you need to do.
|
This is more difficult, as you would need to handle the configuration for each service manually. Enabling additional services would come with extra manual work you need to do.
|
||||||
|
|
||||||
If your webserver is on the same machine, sure your web server user (something like `http`, `apache`, `www-data`, `nginx`) is part of the `matrix` group. You should run something like this: `usermod -a -G matrix nginx`. This allows your webserver user to access files owned by the `matrix` group. When using an external nginx webserver, this allows it to read configuration files from `/matrix/nginx-proxy/conf.d`. When using another server, it would make other files, such as `/matrix/static-files/.well-known`, accessible to it.
|
Also, the Traefik reverse-proxy, besides fronting everything is also serving a 2nd purpose of allowing addons services to communicate with the Matrix homeserver thanks to its `matrix-internal-matrix-client-api` entrypoint (read more about it above). Disabling Traefik completely means the playbook would wire services to directly talk to the homeserver. This can work for basic setups, but not for more complex setups involving [matrix-media-repo](./configuring-playbook-matrix-media-repo.md), [matrix-corporal](./configuring-playbook-matrix-corporal.md) or other such services that need to "steal routes" from the homeserver.
|
||||||
|
|
||||||
#### Using your own nginx reverse-proxy running on the same machine
|
If your webserver is on the same machine, ensure your web server user (something like `http`, `apache`, `www-data`, `nginx`) is part of the `matrix` group. You should run something like this: `usermod -a -G matrix nginx`. This allows your webserver user to access files owned by the `matrix` group, so that it can serve static files from `/matrix/static-files`.
|
||||||
|
|
||||||
**WARNING**: this type of setup is not maintained and will be removed in the future. We recommend that you go for [Fronting the integrated reverse-proxy webserver with another reverse-proxy](#fronting-the-integrated-reverse-proxy-webserver-with-another-reverse-proxy) instead.
|
|
||||||
|
|
||||||
If you'll be using `nginx` running on the same machine (not in a container), you can make the playbook help you generate configuration for `nginx` with this configuration:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
matrix_playbook_reverse_proxy_type: other-nginx-non-container
|
|
||||||
|
|
||||||
# If you want https configured in /matrix/nginx-proxy/conf.d/
|
|
||||||
matrix_nginx_proxy_https_enabled: true
|
|
||||||
|
|
||||||
# If you will manage SSL certificates yourself, uncomment the line below
|
|
||||||
# matrix_ssl_retrieval_method: none
|
|
||||||
|
|
||||||
# If you're using an old nginx version, consider using a custom protocol list
|
|
||||||
# (removing `TLSv1.3` that is enabled by default) to suit your nginx version.
|
|
||||||
# matrix_nginx_proxy_ssl_protocols: "TLSv1.2"
|
|
||||||
```
|
|
||||||
|
|
||||||
You can most likely directly use the config files installed by this playbook at: `/matrix/nginx-proxy/conf.d`. Just include them in your own `nginx.conf` like this: `include /matrix/nginx-proxy/conf.d/*.conf;`
|
|
||||||
|
|
||||||
#### Using your own reverse-proxy running on the same machine or elsewhere
|
|
||||||
|
|
||||||
**WARNING**: this is difficult to set up, likely not very well supported and will be removed in the future. We recommend that you go for [Fronting the integrated reverse-proxy webserver with another reverse-proxy](#fronting-the-integrated-reverse-proxy-webserver-with-another-reverse-proxy) instead.
|
|
||||||
|
|
||||||
To reverse-proxy manually for each service, use configuration like this:
|
|
||||||
|
|
||||||
```yaml
|
|
||||||
# If your reverse-proxy runs on the same machine:
|
|
||||||
matrix_playbook_reverse_proxy_type: other-on-same-host
|
|
||||||
|
|
||||||
# Or, if it runs on another machine:
|
|
||||||
# matrix_playbook_reverse_proxy_type: other-on-another-host
|
|
||||||
|
|
||||||
# Or, optionally customize the network interface prefix (note the trailing `:` character).
|
|
||||||
# For other-on-same-host, the interface defaults to `127.0.0.1:`.
|
|
||||||
# For other-on-another-host, the interface defaults to `0.0.0.0:`.
|
|
||||||
# matrix_playbook_service_host_bind_interface_prefix: '192.168.30.4:'
|
|
||||||
```
|
|
||||||
|
|
||||||
With this configuration, each service will be exposed on a custom port. Example:
|
|
||||||
|
|
||||||
- Synapse will be exposed on port `8008`
|
|
||||||
- [Grafana](configuring-playbook-prometheus-grafana.md) will be exposed on port `3000`
|
|
||||||
- [synapse-admin](configuring-playbook-synapse-admin.md) will be exposed on port `8766`
|
|
||||||
|
|
||||||
You can capture traffic for these services and forward it to their port.
|
|
||||||
Some of these services are configured with certain default expecations with regard to hostname, path, etc., so it's not completely arbitrary where you can host them (unless you change the defaults).
|
|
||||||
|
|
||||||
For each new playbook service that you enable, you'll need special handling.
|
|
||||||
|
|
||||||
The [`examples/`](../examples/) directory contains examples for various servers: Caddy, Apache, HAproxy, Nginx, etc.
|
|
||||||
|
30
docs/configuring-playbook-pantalaimon.md
Normal file
30
docs/configuring-playbook-pantalaimon.md
Normal file
@ -0,0 +1,30 @@
|
|||||||
|
# Setting up Pantalaimon (E2EE aware proxy daemon) (optional)
|
||||||
|
|
||||||
|
The playbook can install and configure the [pantalaimon](https://github.com/matrix-org/pantalaimon) E2EE aware proxy daemon for you.
|
||||||
|
|
||||||
|
See the project's [documentation](https://github.com/matrix-org/pantalaimon/blob/master/README.md) to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
This role exposes Pantalaimon's API only within the container network, so bots and clients installed on the same machine can use it. In particular the [Draupnir](configuring-playbook-bot-draupnir.md) and [Mjolnir](configuring-playbook-bot-mjolnir.md) roles (and possibly others) can use it.
|
||||||
|
|
||||||
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
|
Add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file (adapt to your needs):
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_pantalaimon_enabled: true
|
||||||
|
```
|
||||||
|
|
||||||
|
The default configuration should suffice. For advanced configuration, you can override the variables documented in the role's [defaults](../roles/custom/matrix-pantalaimon/defaults/main.yml).
|
||||||
|
|
||||||
|
## Installing
|
||||||
|
|
||||||
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
@ -1,36 +1,38 @@
|
|||||||
# Setting up postgres backup (optional)
|
# Setting up postgres backup (optional)
|
||||||
|
|
||||||
The playbook can install and configure [docker-postgres-backup-local](https://github.com/prodrigestivill/docker-postgres-backup-local) for you via the [com.devture.ansible.role.postgres_backup](https://github.com/devture/com.devture.ansible.role.postgres_backup) Ansible role.
|
The playbook can install and configure [docker-postgres-backup-local](https://github.com/prodrigestivill/docker-postgres-backup-local) for you via the [ansible-role-postgres-backup](https://github.com/mother-of-all-self-hosting/ansible-role-postgres-backup) Ansible role.
|
||||||
|
|
||||||
For a more complete backup solution (one that includes not only Postgres, but also other configuration/data files), you may wish to look into [borg backup](configuring-playbook-backup-borg.md) instead.
|
|
||||||
|
|
||||||
|
For a more complete backup solution (one that includes not only Postgres, but also other configuration/data files), you may wish to look into [BorgBackup](configuring-playbook-backup-borg.md) instead.
|
||||||
|
|
||||||
## Adjusting the playbook configuration
|
## Adjusting the playbook configuration
|
||||||
|
|
||||||
Minimal working configuration (`inventory/host_vars/matrix.DOMAIN/vars.yml`) to enable Postgres backup:
|
To enable Postgres backup, add the following configuration to your `inventory/host_vars/matrix.example.com/vars.yml` file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
devture_postgres_backup_enabled: true
|
postgres_backup_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
Refer to the table below for additional configuration variables and their default values.
|
Refer to the table below for additional configuration variables and their default values.
|
||||||
|
|
||||||
|
|
||||||
| Name | Default value | Description |
|
| Name | Default value | Description |
|
||||||
| :-------------------------------- | :--------------------------- | :--------------------------------------------------------------- |
|
| :-------------------------------- | :--------------------------- | :--------------------------------------------------------------- |
|
||||||
|`devture_postgres_backup_enabled`|`false`|Set to true to use [docker-postgres-backup-local](https://github.com/prodrigestivill/docker-postgres-backup-local) to create automatic database backups|
|
|`postgres_backup_enabled`|`false`|Set to true to use [docker-postgres-backup-local](https://github.com/prodrigestivill/docker-postgres-backup-local) to create automatic database backups|
|
||||||
|`devture_postgres_backup_schedule`| `'@daily'` |Cron-schedule specifying the interval between postgres backups.|
|
|`postgres_backup_schedule`| `'@daily'` |Cron-schedule specifying the interval between postgres backups.|
|
||||||
|`devture_postgres_backup_keep_days`|`7`|Number of daily backups to keep|
|
|`postgres_backup_keep_days`|`7`|Number of daily backups to keep|
|
||||||
|`devture_postgres_backup_keep_weeks`|`4`|Number of weekly backups to keep|
|
|`postgres_backup_keep_weeks`|`4`|Number of weekly backups to keep|
|
||||||
|`devture_postgres_backup_keep_months`|`12`|Number of monthly backups to keep|
|
|`postgres_backup_keep_months`|`12`|Number of monthly backups to keep|
|
||||||
|`devture_postgres_backup_base_path` | `"{{ matrix_base_data_path }}/postgres-backup"` | Base path for postgres-backup. Also see `devture_postgres_backup_data_path` |
|
|`postgres_backup_base_path` | `"{{ matrix_base_data_path }}/postgres-backup"` | Base path for postgres-backup. Also see `postgres_backup_data_path` |
|
||||||
|`devture_postgres_backup_data_path` | `"{{ devture_postgres_backup_base_path }}/data"` | Storage path for postgres-backup database backups |
|
|`postgres_backup_data_path` | `"{{ postgres_backup_base_path }}/data"` | Storage path for postgres-backup database backups |
|
||||||
|
|
||||||
|
|
||||||
## Installing
|
## Installing
|
||||||
|
|
||||||
After configuring the playbook, run the [installation](installing.md) command again:
|
After configuring the playbook, run it with [playbook tags](playbook-tags.md) as below:
|
||||||
|
|
||||||
```
|
<!-- NOTE: let this conservative command run (instead of install-all) to make it clear that failure of the command means something is clearly broken. -->
|
||||||
|
```sh
|
||||||
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
ansible-playbook -i inventory/hosts setup.yml --tags=setup-all,start
|
||||||
```
|
```
|
||||||
|
|
||||||
|
The shortcut commands with the [`just` program](just.md) are also available: `just install-all` or `just setup-all`
|
||||||
|
|
||||||
|
`just install-all` is useful for maintaining your setup quickly ([2x-5x faster](../CHANGELOG.md#2x-5x-performance-improvements-in-playbook-runtime) than `just setup-all`) when its components remain unchanged. If you adjust your `vars.yml` to remove other components, you'd need to run `just setup-all`, or these components will still remain installed. Note these shortcuts run the `ensure-matrix-users-created` tag too.
|
||||||
|
Some files were not shown because too many files have changed in this diff Show More
Reference in New Issue
Block a user