mirror of
https://github.com/spantaleev/matrix-docker-ansible-deploy.git
synced 2024-12-29 12:27:14 +01:00
7aab3a4f83
Signed-off-by: Suguru Hirahara <acioustick@noreply.codeberg.org>
148 lines
9.2 KiB
YAML
148 lines
9.2 KiB
YAML
---
|
|
# Conduit is a simple, fast and reliable chat server powered by Matrix
|
|
# Project source code URL: https://gitlab.com/famedly/conduit
|
|
# See: https://conduit.rs
|
|
|
|
matrix_conduit_enabled: true
|
|
|
|
matrix_conduit_hostname: ''
|
|
|
|
matrix_conduit_docker_image: "{{ matrix_conduit_docker_image_name_prefix }}matrixconduit/matrix-conduit:{{ matrix_conduit_docker_image_tag }}"
|
|
matrix_conduit_docker_image_name_prefix: "docker.io/"
|
|
# renovate: datasource=docker depName=matrixconduit/matrix-conduit
|
|
matrix_conduit_docker_image_tag: "v0.9.0"
|
|
matrix_conduit_docker_image_force_pull: "{{ matrix_conduit_docker_image.endswith(':latest') }}"
|
|
|
|
matrix_conduit_base_path: "{{ matrix_base_data_path }}/conduit"
|
|
matrix_conduit_config_path: "{{ matrix_conduit_base_path }}/config"
|
|
matrix_conduit_data_path: "{{ matrix_conduit_base_path }}/data"
|
|
|
|
matrix_conduit_port_number: 6167
|
|
|
|
matrix_conduit_tmp_directory_size_mb: 500
|
|
|
|
# List of systemd services that matrix-conduit.service depends on
|
|
matrix_conduit_systemd_required_services_list: "{{ matrix_conduit_systemd_required_services_list_default + matrix_conduit_systemd_required_services_list_auto + matrix_conduit_systemd_required_services_list_custom }}"
|
|
matrix_conduit_systemd_required_services_list_default: "{{ [devture_systemd_docker_base_docker_service_name] if devture_systemd_docker_base_docker_service_name else [] }}"
|
|
matrix_conduit_systemd_required_services_list_auto: []
|
|
matrix_conduit_systemd_required_services_list_custom: []
|
|
|
|
# List of systemd services that matrix-conduit.service wants
|
|
matrix_conduit_systemd_wanted_services_list: []
|
|
|
|
# Controls how long to sleep for after starting the matrix-synapse container.
|
|
#
|
|
# Delaying, so that the homeserver can manage to fully start and various services
|
|
# that depend on it (`matrix_conduit_systemd_required_services_list` and `matrix_conduit_systemd_wanted_services_list`)
|
|
# may only start after the homeserver is up and running.
|
|
#
|
|
# This can be set to 0 to remove the delay.
|
|
matrix_conduit_systemd_service_post_start_delay_seconds: 3
|
|
|
|
# The base container network. It will be auto-created by this role if it doesn't exist already.
|
|
matrix_conduit_container_network: ""
|
|
|
|
# A list of additional container networks that the container would be connected to.
|
|
# The role does not create these networks, so make sure they already exist.
|
|
# Use this to expose this container to another reverse proxy, which runs in a different container network.
|
|
matrix_conduit_container_additional_networks: "{{ matrix_conduit_container_additional_networks_auto + matrix_conduit_container_additional_networks_custom }}"
|
|
matrix_conduit_container_additional_networks_auto: []
|
|
matrix_conduit_container_additional_networks_custom: []
|
|
|
|
# matrix_conduit_container_labels_traefik_enabled controls whether labels to assist a Traefik reverse-proxy will be attached to the container.
|
|
# See `../templates/labels.j2` for details.
|
|
#
|
|
# To inject your own other container labels, see `matrix_conduit_container_labels_additional_labels`.
|
|
matrix_conduit_container_labels_traefik_enabled: true
|
|
matrix_conduit_container_labels_traefik_docker_network: "{{ matrix_conduit_container_network }}"
|
|
matrix_conduit_container_labels_traefik_entrypoints: web-secure
|
|
matrix_conduit_container_labels_traefik_tls_certResolver: default # noqa var-naming
|
|
|
|
# Controls whether labels will be added for handling the root (/) path on a public Traefik entrypoint.
|
|
matrix_conduit_container_labels_public_client_root_enabled: true
|
|
matrix_conduit_container_labels_public_client_root_traefik_hostname: "{{ matrix_conduit_hostname }}"
|
|
matrix_conduit_container_labels_public_client_root_traefik_rule: "Host(`{{ matrix_conduit_container_labels_public_client_root_traefik_hostname }}`) && Path(`/`)"
|
|
matrix_conduit_container_labels_public_client_root_traefik_priority: 0
|
|
matrix_conduit_container_labels_public_client_root_traefik_entrypoints: "{{ matrix_conduit_container_labels_traefik_entrypoints }}"
|
|
matrix_conduit_container_labels_public_client_root_traefik_tls: "{{ matrix_conduit_container_labels_public_client_root_traefik_entrypoints != 'web' }}"
|
|
matrix_conduit_container_labels_public_client_root_traefik_tls_certResolver: "{{ matrix_conduit_container_labels_traefik_tls_certResolver }}" # noqa var-naming
|
|
matrix_conduit_container_labels_public_client_root_redirection_enabled: false
|
|
matrix_conduit_container_labels_public_client_root_redirection_url: ""
|
|
|
|
# Controls whether labels will be added that expose the Client-Server API on a public Traefik entrypoint.
|
|
matrix_conduit_container_labels_public_client_api_enabled: true
|
|
matrix_conduit_container_labels_public_client_api_traefik_hostname: "{{ matrix_conduit_hostname }}"
|
|
matrix_conduit_container_labels_public_client_api_traefik_path_prefix: /_matrix
|
|
matrix_conduit_container_labels_public_client_api_traefik_rule: "Host(`{{ matrix_conduit_container_labels_public_client_api_traefik_hostname }}`) && PathPrefix(`{{ matrix_conduit_container_labels_public_client_api_traefik_path_prefix }}`)"
|
|
matrix_conduit_container_labels_public_client_api_traefik_priority: 0
|
|
matrix_conduit_container_labels_public_client_api_traefik_entrypoints: "{{ matrix_conduit_container_labels_traefik_entrypoints }}"
|
|
matrix_conduit_container_labels_public_client_api_traefik_tls: "{{ matrix_conduit_container_labels_public_client_api_traefik_entrypoints != 'web' }}"
|
|
matrix_conduit_container_labels_public_client_api_traefik_tls_certResolver: "{{ matrix_conduit_container_labels_traefik_tls_certResolver }}" # noqa var-naming
|
|
|
|
# Controls whether labels will be added that expose the Client-Server API on the internal Traefik entrypoint.
|
|
# This is similar to `matrix_conduit_container_labels_public_client_api_enabled`, but the entrypoint and intent is different.
|
|
matrix_conduit_container_labels_internal_client_api_enabled: false
|
|
matrix_conduit_container_labels_internal_client_api_traefik_path_prefix: "{{ matrix_conduit_container_labels_public_client_api_traefik_path_prefix }}"
|
|
matrix_conduit_container_labels_internal_client_api_traefik_rule: "PathPrefix(`{{ matrix_conduit_container_labels_internal_client_api_traefik_path_prefix }}`)"
|
|
matrix_conduit_container_labels_internal_client_api_traefik_priority: "{{ matrix_conduit_container_labels_public_client_api_traefik_priority }}"
|
|
matrix_conduit_container_labels_internal_client_api_traefik_entrypoints: ""
|
|
|
|
# Controls whether labels will be added that expose the Server-Server API (Federation API) on a public Traefik entrypoint.
|
|
matrix_conduit_container_labels_public_federation_api_enabled: "{{ matrix_conduit_allow_federation }}"
|
|
matrix_conduit_container_labels_public_federation_api_traefik_hostname: "{{ matrix_conduit_hostname }}"
|
|
matrix_conduit_container_labels_public_federation_api_traefik_path_prefix: /_matrix
|
|
matrix_conduit_container_labels_public_federation_api_traefik_rule: "Host(`{{ matrix_conduit_container_labels_public_federation_api_traefik_hostname }}`) && PathPrefix(`{{ matrix_conduit_container_labels_public_federation_api_traefik_path_prefix }}`)"
|
|
matrix_conduit_container_labels_public_federation_api_traefik_priority: 0
|
|
matrix_conduit_container_labels_public_federation_api_traefik_entrypoints: ''
|
|
# TLS is force-enabled here, because the spec (https://spec.matrix.org/v1.9/server-server-api/#tls) says that the federation API must use HTTPS.
|
|
matrix_conduit_container_labels_public_federation_api_traefik_tls: true
|
|
matrix_conduit_container_labels_public_federation_api_traefik_tls_certResolver: "{{ matrix_conduit_container_labels_traefik_tls_certResolver }}" # noqa var-naming
|
|
|
|
# matrix_conduit_container_labels_additional_labels contains a multiline string with additional labels to add to the container label file.
|
|
# See `../templates/labels.j2` for details.
|
|
#
|
|
# Example:
|
|
# matrix_conduit_container_labels_additional_labels: |
|
|
# my.label=1
|
|
# another.label="here"
|
|
matrix_conduit_container_labels_additional_labels: ''
|
|
|
|
# Extra arguments for the Docker container
|
|
matrix_conduit_container_extra_arguments: []
|
|
|
|
# Specifies which template files to use when configuring Conduit.
|
|
# If you'd like to have your own different configuration, feel free to copy and paste
|
|
# the original files into your inventory (e.g. in `inventory/host_vars/matrix.example.com/`)
|
|
# and then change the specific host's `vars.yaml` file like this:
|
|
# matrix_conduit_template_conduit_config: "{{ playbook_dir }}/inventory/host_vars/matrix.example.com/conduit.toml.j2"
|
|
matrix_conduit_template_conduit_config: "{{ role_path }}/templates/conduit.toml.j2"
|
|
|
|
# Max size for uploads, in bytes
|
|
matrix_conduit_max_request_size: 20_000_000
|
|
|
|
# Maximum number of open files for Conduit's embedded RocksDB database
|
|
# See https://github.com/facebook/rocksdb/wiki/RocksDB-Tuning-Guide#tuning-other-options
|
|
# By default, Conduit uses a relatively low value of 20.
|
|
matrix_conduit_rocksdb_max_open_files: 64
|
|
|
|
# Enables registration. If set to false, no users can register on this server.
|
|
matrix_conduit_allow_registration: false
|
|
|
|
matrix_conduit_allow_federation: true
|
|
|
|
# Enable the display name lightning bolt on registration.
|
|
matrix_conduit_enable_lightning_bolt: true
|
|
|
|
matrix_conduit_trusted_servers:
|
|
- "matrix.org"
|
|
|
|
# How many requests Conduit sends to other servers at the same time
|
|
matrix_conduit_max_concurrent_requests: 100
|
|
|
|
# TURN integration.
|
|
# See: https://gitlab.com/famedly/conduit/-/blob/next/TURN.md
|
|
matrix_conduit_turn_uris: []
|
|
matrix_conduit_turn_secret: ''
|
|
matrix_conduit_turn_username: ''
|
|
matrix_conduit_turn_password: ''
|