2018-08-17 06:02:12 +00:00
|
|
|
---
|
|
|
|
|
|
|
|
# This will throw a Permission Denied error if already mounted using fuse
|
|
|
|
- name: Check Matrix Synapse media store path
|
2019-01-07 22:35:35 +00:00
|
|
|
stat:
|
|
|
|
path: "{{ matrix_synapse_media_store_path }}"
|
2018-08-17 06:02:12 +00:00
|
|
|
register: local_path_media_store_stat
|
|
|
|
ignore_errors: yes
|
|
|
|
|
|
|
|
# This is separate and conditional, to ensure we don't execute it
|
|
|
|
# if the path already exists or we failed to check, because it's mounted using fuse.
|
|
|
|
- name: Ensure Matrix media store path exists
|
|
|
|
file:
|
|
|
|
path: "{{ matrix_synapse_media_store_path }}"
|
|
|
|
state: directory
|
|
|
|
mode: 0750
|
|
|
|
owner: "{{ matrix_user_username }}"
|
|
|
|
group: "{{ matrix_user_username }}"
|
|
|
|
when: "not local_path_media_store_stat.failed and not local_path_media_store_stat.stat.exists"
|
|
|
|
|
|
|
|
- name: Ensure Matrix Docker image is pulled
|
|
|
|
docker_image:
|
2018-11-01 06:46:47 +00:00
|
|
|
name: "{{ matrix_synapse_docker_image }}"
|
2018-08-17 06:02:12 +00:00
|
|
|
|
|
|
|
- name: Check if a Matrix Synapse configuration exists
|
|
|
|
stat:
|
|
|
|
path: "{{ matrix_synapse_config_dir_path }}/homeserver.yaml"
|
|
|
|
register: matrix_synapse_config_stat
|
|
|
|
|
|
|
|
# We do this mostly so that the keys would get generated.
|
|
|
|
# We'll replace the rest of the configuration with our own templates below.
|
|
|
|
- name: Generate initial Matrix config
|
|
|
|
docker_container:
|
|
|
|
name: matrix-config
|
2018-11-01 06:46:47 +00:00
|
|
|
image: "{{ matrix_synapse_docker_image }}"
|
2018-08-17 06:02:12 +00:00
|
|
|
detach: no
|
|
|
|
cleanup: yes
|
|
|
|
command: generate
|
|
|
|
env:
|
|
|
|
SYNAPSE_CONFIG_PATH: "/data/homeserver.yaml"
|
|
|
|
SYNAPSE_SERVER_NAME: "{{ hostname_matrix }}"
|
|
|
|
SYNAPSE_REPORT_STATS: "no"
|
|
|
|
user: "{{ matrix_user_uid }}:{{ matrix_user_gid }}"
|
2019-01-28 09:43:32 +00:00
|
|
|
cap_drop: ['all']
|
2018-08-17 06:02:12 +00:00
|
|
|
volumes:
|
|
|
|
- "{{ matrix_synapse_config_dir_path }}:/data"
|
|
|
|
when: "not matrix_synapse_config_stat.stat.exists"
|
|
|
|
|
|
|
|
- name: Ensure Matrix homeserver config installed
|
|
|
|
template:
|
|
|
|
src: "{{ matrix_synapse_template_synapse_homeserver }}"
|
|
|
|
dest: "{{ matrix_synapse_config_dir_path }}/homeserver.yaml"
|
|
|
|
mode: 0644
|
|
|
|
|
|
|
|
- name: Ensure Matrix log config installed
|
|
|
|
template:
|
|
|
|
src: "{{ matrix_synapse_template_synapse_log }}"
|
|
|
|
dest: "{{ matrix_synapse_config_dir_path }}/{{ hostname_matrix }}.log.config"
|
|
|
|
mode: 0644
|
|
|
|
|
2019-02-05 09:07:08 +00:00
|
|
|
#
|
|
|
|
# To make Synapse 0.99 happy, we need to generate a valid (self-signed is OK) certificate file that we provide to it.
|
|
|
|
# It won't be used for anything important, but it needs to be there.
|
|
|
|
# See https://github.com/matrix-org/synapse/issues/4554
|
|
|
|
#
|
|
|
|
# Previously, Synapse would generate such certificate files and actually use them.
|
|
|
|
# So existing installations already have them.
|
|
|
|
#
|
|
|
|
|
|
|
|
- name: Check if Synapse certificate exists
|
|
|
|
stat:
|
|
|
|
path: "{{ matrix_synapse_config_dir_path }}/{{ hostname_matrix }}.tls.crt"
|
|
|
|
register: matrix_synapse_certificate_stat
|
|
|
|
|
|
|
|
- name: Ensure OpenSSL installed (RedHat)
|
|
|
|
yum:
|
|
|
|
name:
|
|
|
|
- openssl
|
|
|
|
state: present
|
|
|
|
update_cache: no
|
|
|
|
when: "not matrix_synapse_certificate_stat.stat.exists and ansible_os_family == 'RedHat'"
|
|
|
|
|
|
|
|
- name: Ensure OpenSSL installed (Debian)
|
|
|
|
apt:
|
|
|
|
name:
|
|
|
|
- openssl
|
|
|
|
state: present
|
|
|
|
update_cache: no
|
|
|
|
when: "not matrix_synapse_certificate_stat.stat.exists and ansible_os_family == 'Debian'"
|
|
|
|
|
|
|
|
# The proper way to do this is by using a sequence of
|
|
|
|
# `openssl_privatekey`, `openssl_csr` and `openssl_certificate`.
|
|
|
|
#
|
|
|
|
# Unfortunately, `openssl_csr` and `openssl_certificate` require `PyOpenSSL>=0.15` to work,
|
|
|
|
# which is not available on CentOS 7 (at least).
|
|
|
|
#
|
|
|
|
# We'll do it in a more manual way.
|
|
|
|
- name: Generate SSL certificate
|
|
|
|
command: |
|
|
|
|
openssl req -x509 \
|
|
|
|
-sha256 \
|
|
|
|
-newkey rsa:4096 \
|
|
|
|
-nodes \
|
|
|
|
-subj "/CN={{ hostname_matrix }}" \
|
|
|
|
-keyout {{ matrix_synapse_config_dir_path }}/{{ hostname_matrix }}.tls.key \
|
|
|
|
-out {{ matrix_synapse_config_dir_path }}/{{ hostname_matrix }}.tls.crt \
|
|
|
|
-days 3650
|
|
|
|
become: true
|
|
|
|
become_user: "{{ matrix_user_username }}"
|
|
|
|
when: "not matrix_synapse_certificate_stat.stat.exists"
|
|
|
|
|
|
|
|
#
|
|
|
|
# End of tasks related to making Synapse 0.99 happy.
|
|
|
|
#
|
|
|
|
|
2018-08-17 06:02:12 +00:00
|
|
|
- name: Ensure matrix-synapse.service installed
|
|
|
|
template:
|
2019-01-12 15:53:00 +00:00
|
|
|
src: "{{ role_path }}/templates/synapse/systemd/matrix-synapse.service.j2"
|
2018-08-17 06:02:12 +00:00
|
|
|
dest: "/etc/systemd/system/matrix-synapse.service"
|
|
|
|
mode: 0644
|
|
|
|
|
|
|
|
- name: Ensure matrix-synapse-register-user script created
|
|
|
|
template:
|
2019-01-12 15:53:00 +00:00
|
|
|
src: "{{ role_path }}/templates/synapse/usr-local-bin/matrix-synapse-register-user.j2"
|
2018-08-17 06:02:12 +00:00
|
|
|
dest: "/usr/local/bin/matrix-synapse-register-user"
|
|
|
|
mode: 0750
|
|
|
|
|
|
|
|
- name: Allow access to Matrix ports in firewalld
|
|
|
|
firewalld:
|
|
|
|
port: "{{ item }}"
|
|
|
|
state: enabled
|
|
|
|
immediate: yes
|
|
|
|
permanent: yes
|
|
|
|
with_items:
|
|
|
|
- '8448/tcp' # Matrix federation
|
|
|
|
when: ansible_os_family == 'RedHat'
|