Commit Graph

2681 Commits

Author SHA1 Message Date
GoliathLabs
64850531ba Updated: etherpad to 1.8.18 2022-05-20 20:30:06 +02:00
GoliathLabs
554615d727 Updated: ddclient to v3.9.1-ls89 2022-05-20 20:28:01 +02:00
GoliathLabs
2c312435c6 Reverted URL change 2022-05-20 20:25:41 +02:00
GoliathLabs
8a65e3a0db Updated: hydrogen to v0.2.29 2022-05-20 20:24:56 +02:00
GoliathLabs
e779ec45f4 Updated: hydrogen-web to v0.2.29 2022-05-20 20:24:38 +02:00
GoliathLabs
d804e97ff6 Updated: mautrix-twitter to v0.1.4 2022-05-20 20:19:58 +02:00
GoliathLabs
751a8f8a5d Updated: mautrix-googlechat to v0.3.2 2022-05-20 20:16:04 +02:00
GoliathLabs
275943c0f8 Updated: mjolnir v1.4.2 2022-05-20 20:03:59 +02:00
GoliathLabs
0c741e8d16 Set version to v1.1.5 2022-05-20 19:58:22 +02:00
Vicx
a906fad12e Fix synapse LDAP simple bind config
When using LDAP simple bind, the `bind_dn` and `bind_password`
configuration values must not be present.
2022-05-20 19:09:16 +02:00
Slavi Pantaleev
c945f38c52
Merge pull request #1818 from paulRbr/bridge-mautrix-signal-encryption
Bridge mautrix signal and mautrix whatsapp encryption
2022-05-18 14:50:26 +02:00
Slavi Pantaleev
677a2fc503 Fix compatibility with ansible=6 / ansible-core=2.13
Details here: https://docs.ansible.com/ansible/devel/porting_guides/porting_guide_6.html#id36

Basically:

```yaml
- name: Prior to 2.13
  debug:
    msg: '[1] + {{ [2] }}'

- name: 2.13 and forward
  debug:
    msg: '{{ [1] + [2] }}'
```

Interestingly, we had been using the new/safe syntax in lofs of places.

We were using the broken one in many others though. Hopefully all
instances were fixed by this patch.
2022-05-18 15:43:39 +03:00
Slavi Pantaleev
98fecf95a6
Merge pull request #1836 from etkecc/patch-11
Update Synapse v1.59.0 -> v.1.59.1
2022-05-18 14:09:59 +02:00
Slavi Pantaleev
a1e5ecf551 Upgrade hookshot (1.6.1 -> 1.7.0)
This new version should be buildable on arm64.

See: https://github.com/matrix-org/matrix-hookshot/releases/tag/1.7.0

There's still no prebuild arm64 image, so we continue relying on
self-building there.
2022-05-18 14:43:16 +03:00
Aine
de8d6f8d6c
Update Synapse v1.59.0 -> v.1.59.1 2022-05-18 11:37:34 +00:00
Paul B
e1e83353b4
bridge-whatsapp: add variable to enable end-to-bridge encryption 2022-05-18 13:14:22 +02:00
Paul B
99de38280d
bridge-signal: add variable to enable encryption 2022-05-18 13:14:20 +02:00
Slavi Pantaleev
468d492fd4
Merge pull request #1831 from etkecc/patch-9
Update Postgres (CVE-2022-1552 + last 9.x update)
2022-05-18 12:32:28 +02:00
Aine
4297af5c51
Update mautrix-whatsapp v0.3.1 -> v0.4.0 2022-05-18 10:19:43 +00:00
Toni Spets
2cce91fe1d
Upgrade Heisenbridge (1.12.0 -> 1.13.0) 2022-05-18 12:38:07 +03:00
Slavi Pantaleev
f972a80224 Upgrade Synapse (1.58.1 -> 1.59.0) 2022-05-17 13:08:17 +03:00
Slavi Pantaleev
bab1ee2233 Work around mx-puppet-discord failing with "No relay found" after reboot
Related to https://gitlab.com/mx-puppet/discord/mx-puppet-discord/-/issues/117

Looks like the bridge is too quick to start and fails to initialize
itself by connecting to Synapse. It's mostly observed after a system
reboot, because Synapse (and everything else) is slower to start.

Once mx-puppet-discord fails to initialize itself, a "No relay found"
error will be observed any time you try to relay a Matrix message to
Discord. Relaying messages in the other direction (Discord to Matrix)
also fails.

With this workaround (longer delay on mx-puppet-discord startup), I
observe mx-puppet-discord working well, even after a full reboot.
Of course, a proper fix is preferable, instead of delaying by a magic
number of seconds.
2022-05-17 11:34:00 +03:00
Aine
4109dc3bcd
Update Postgres (CVE-2022-1552 + last 9.x update)
CVE: https://security-tracker.debian.org/tracker/CVE-2022-1552
Source: https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
Postgres 9.6 upgrade (**not a CVE fix, 9.x still vulnerable**): https://www.postgresql.org/docs/release/9.6.24/
2022-05-16 19:56:54 +00:00
Slavi Pantaleev
f21269f441
Upgrade mx-puppet-slack (v0.1.1 -> v0.1.2)
Related to https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1829
2022-05-16 21:40:31 +03:00
Slavi Pantaleev
99931af532
Merge pull request #1825 from dsonck92/change-to-upstream
Change back to working original mx-puppet-slack
2022-05-16 07:39:00 +02:00
Aaron Raimist
2a9b52a1c2
Update Element self build repo URL
It forwards to the correct place but might as well just update it to the current URL.
2022-05-16 04:29:29 +00:00
Aine
c58c7dc643
Update Cinny v2.0.2 -> v2.0.3 2022-05-15 05:45:07 +00:00
Daniel Sonck
894669eca2 Change back to working original mx-puppet-slack
Now that v0.1.1 is out, which depends on the functional matrix-slack-parser
it works again.
2022-05-14 21:09:54 +02:00
Aine
dca593cf7a
Update Cinny v2.0.1 -> v2.0.2 2022-05-14 11:33:19 +00:00
Aine
8ec1f4bee0
Update Cinny v2.0.0 -> v2.0.1 2022-05-13 16:20:04 +00:00
Didier 'OdyX' Raboud
eda75e6492
Bump Slack Appservice to 1.11.0 2022-05-11 10:47:00 +02:00
Aine
d09934c79c
matrix-bot-buscarron - set defaults 2022-05-10 18:44:20 +03:00
Aine
9997ca4dbd
Merge branch 'spantaleev:master' into master 2022-05-10 15:39:34 +00:00
Aine
8c505e8a2c
matrix-bot-buscarron v1.1.0 2022-05-10 18:38:57 +03:00
Aine
02d4a841c4
Update Element 1.10.11 -> 1.10.12 2022-05-10 14:31:41 +00:00
Aine
62cb801878
Update cinny v1.8.2 -> v2.0.0 2022-05-10 13:57:12 +00:00
Slavi Pantaleev
9fc60d8c86 Revert "Change back to original mx-puppet-slack"
This reverts commit fcfd00bcb4.

Related to https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1808

Reverts https://github.com/spantaleev/matrix-docker-ansible-deploy/pull/1809

Fixes https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1810
2022-05-10 16:20:44 +03:00
Daniel Sonck
fcfd00bcb4 Change back to original mx-puppet-slack
Closes: #1808
2022-05-09 23:38:01 +02:00
Slavi Pantaleev
25302ed142
Merge pull request #1802 from dsonck92/change-to-upstream
Change back to original mx-puppet-discord
2022-05-08 07:35:11 +02:00
Slavi Pantaleev
e62123ac13
Merge pull request #1804 from HarHarLinks/feeds
Add hookshot feeds config support
2022-05-08 07:10:40 +02:00
HarHarLinks
7390646cd5 add hookshot feeds support 2022-05-07 18:42:15 +02:00
Kim Brose
84ea5f6ecc
Upgrade Hookshot (1.5.0 -> 1.6.1) 2022-05-07 14:34:33 +02:00
Daniel Sonck
3f45805fd2 Change back to original mx-puppet-discord
Closes: #1801
2022-05-07 12:40:17 +02:00
Slavi Pantaleev
83b7fcee45 Do not proxy some endpoints to the generic Synapse worker
These endpoints should not be proxied to a generic Synapse worker
without other preparation (setting up stream writers, sending traffic
to a specific stream writer, etc.).

Disabling them for now. In the future, we'd like to fix up our awk
script to disable them automatically.

This is a fix up for 058fedff91
2022-05-07 09:39:19 +02:00
Slavi Pantaleev
058fedff91 Fix "endpoint seems conditional" determination in workers-doc-to-yaml.awk"
This prevented us from keeping our workers reverse-proxying definitions
updated since Synapse v1.54.0.

The last `workers.md` file we could parse is at commit
02632b3504ad4512c5f5a4f859b3fe326b19c788.
Parsing regressed at commit c56bfb08bc071368db23f3b1c593724eb4f205f0,
because the introduction message for `synapse.app.generic_worker` said
"If":

> If a worker is set up to handle a..

.. which made the AWK script think that definitions below were
conditional (which they're not in this case).

This patch fixes up the regex for determining if a line is conditional
or not, so that it doesn't trip up. Hopefully, it doesn't miss something
important.
2022-05-06 09:08:45 +02:00
Slavi Pantaleev
549e4418b9 Upgrade Synapse (1.58.0 -> 1.58.1) 2022-05-06 08:56:06 +02:00
Slavi Pantaleev
1439be2743 Upgrade matrix-appservice-irc (0.33 -> 0.34)
Related to https://matrix.org/blog/2022/05/04/0-34-0-security-release-for-matrix-appservice-irc-high-severity
2022-05-04 11:10:00 +03:00
Slavi Pantaleev
03674e1a36 Upgrade Synapse (1.57.1 -> 1.58.0) 2022-05-03 14:32:32 +03:00
Slavi Pantaleev
7adc167412 Fail if trying to use Jitsi on an architecture other than amd64
Related to https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1797
2022-05-03 08:10:18 +03:00
Brandon Kraft
7776c2e0bb
Upgrade to Grafana 8.5.1
https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-5-1/
https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-5-0/
https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-4-7/
https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-4-6/
https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-4-5/
https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-4-4/
https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-4-3/
https://grafana.com/docs/grafana/latest/release-notes/release-notes-8-4-2/
2022-05-02 12:37:56 -05:00
Aine
1ee118bd49
matrix-change-user-admin-status: do not allocate tty 2022-04-26 17:48:28 +00:00
Aine
4f1f3555f2
Update element 1.10.10 -> 1.10.11 2022-04-26 16:10:36 +00:00
Slavi Pantaleev
e41fcf2746 Fix file name (vars.yaml -> vars.yml) to prevent confusion 2022-04-26 15:44:07 +03:00
Slavi Pantaleev
49da9c76ac
Merge pull request #1782 from etkecc/matrix-bot-buscarron
add matrix-bot-buscarron
2022-04-25 09:44:35 +03:00
Slavi Pantaleev
8014979ddb
Merge pull request #1780 from Shaps/nginx-proxy-configure-httpasswd
Make synapse htpasswd file path configurable
2022-04-25 09:43:29 +03:00
Slavi Pantaleev
4a0b839768
Automatically do the right thing with regards to Synapse Metrics htpasswd
.. regardless of whether matrix-nginx-proxy runs in a container or not
2022-04-25 09:42:36 +03:00
Aine
c92af9fe89
matrix-bot-buscarron: feedback 2022-04-25 09:40:49 +03:00
Sekki21956
2d21a70b3e Update path to signald Dockerfile 2022-04-25 02:05:13 +02:00
Aine
b720b15de6
buscarron v1.0.0 2022-04-24 09:50:23 +03:00
Aine
290754371a
add matrix-bot-buscarron 2022-04-23 16:19:24 +03:00
Andrea Tartaglia
68424e68e5 feat: make synapse htpasswd file path configurable
When setting `matrix_nginx_proxy_enabled: false` and enabling authentication on the metrics endpoint, the htpasswd file is hardcoded to the nginx-proxy container dir, this changes the hardcoded value to a variable so the path can be updated
2022-04-23 11:13:36 +01:00
Matthew Cengia
fa108b8ae4 Bump signald to 0.18.1
According to https://signald.org/articles/install/docker/#migrating-from-versions-before-0180,
This release only chowns files if the container is running as root. See also this upstream commit:
3bb7e8d2c1
2022-04-22 22:16:37 +10:00
Toni Spets
9e0d969ba4
Upgrade Heisenbridge (1.10.1 -> 1.12.0) 2022-04-22 13:56:34 +03:00
Slavi Pantaleev
69f684255c Fix Signald git repository to unbreak self-building
The maunium fork of Signald is no longer up-to-date (does not publish
0.18.0.. at least not yet) and all the necessary changes are now upstream.

Related to https://github.com/spantaleev/matrix-docker-ansible-deploy/pull/1775
2022-04-21 15:54:29 +03:00
Slavi Pantaleev
0b5e4aa784 Use non-root image for Signald
Related to https://github.com/spantaleev/matrix-docker-ansible-deploy/pull/1775

Related to https://signald.org/articles/install/docker/#migrating-from-versions-before-0180

> Prior to 0.18.0 the signald container image used the root user, which is not recommended for security reasons. This was fixed in the 0.18.0 release which will start as root, fix permissions on the volume, then drop to the non-root user and start signald. Future images will start as the non-root user, so if you’re upgrading make sure to run 0.18.0 at least once.
> A special tag, 0.18.0-non-root, will be published. it starts as the non-root user and does not fix permissions on the volume.
2022-04-21 15:53:05 +03:00
Slavi Pantaleev
79f89479e0
Merge pull request #1775 from GoliathLabs/mautrix-signal
Updated: mautrix-signal to v0.3.0 & signald to 0.18.0
2022-04-21 15:11:38 +03:00
GoliathLabs
de3fc61129 Updated: mautrix-signal v0.3.0 & signald 0.18.0 2022-04-21 13:53:01 +02:00
Erick Wibben
12198a147b
Update matrix-bot-matrix-registration-bot.service.j2 2022-04-21 06:49:07 -05:00
Julian-Samuel Gebühr
90a142439a
Add matrix-registration-bot (#1771)
* Add matrix-registration-bot

This adds an install and uninstall task plus helpers. The bot is disabled by default.
This commit does not include documentation, yet. In short, the bot can be enabled by adding
matrix_bot_matrix_registration_bot_enabled: true
matrix_bot_matrix_registration_bot_matrix_user_password: "verysecret"
matrix_bot_matrix_registration_bot_matrix_admin_token: "supersecret"
to the host_vars

* Change bot username to bot.matrix-registration-bot following convention

* Address smaller remarks, fix local docker build

* Switch to an env file

* Add environment variables extension for additional config

* Add documentation for the matrix-registration-bot

* Add screenshot on how to obtain admin access token

* Use bot as admin to only have one access token (bot and admin api)

* Use cleaner setting of matrix_synapse_registration_requires_token

* Use config file for cleaner more secure usage

* Delete unneeded env

* Rename vars to make usage clear

* Fix typos/wording and add notice about logging out

* Convert configuration to use |to_json

* Reorder role includes

Nothing should be after `matrix-common-after`.

`matrix-bot-matrix-registration-bot` can probably be anywhere, but it makes sense to put it next to the other `matrix-bot-*` roles.

* Minor group_vars/matrix_servers touchups

Co-authored-by: Slavi Pantaleev <slavi@devture.com>
2022-04-21 11:07:47 +03:00
borisrunakov
acaebfbf67
optional media cache with range requests support (#1759) 2022-04-21 10:31:26 +03:00
Slavi Pantaleev
b2105f35ec
Add comments around rtm
Comments taken from https://github.com/matrix-org/matrix-appservice-slack/blob/develop/config/config.sample.yaml

We should probably reconcile our configuration with that one and include comments for other fields as well.
2022-04-21 09:58:30 +03:00
Didier 'OdyX' Raboud
018da4fb25
Slack appservice: Enable RTM by default
It is very confusing to debug why messages only go from Matrix to Slack
but not from Slack to Matrix. RTM should be enabled by default, as
that's the recommended way to make this work.
2022-04-20 19:06:19 +02:00
Slavi Pantaleev
d04767a9d6 Upgrade Synapse (1.57.0 -> 1.57.1) 2022-04-20 18:46:10 +03:00
Aine
502ea21fba
add retires to all get_url actions 2022-04-19 22:01:14 +03:00
Aine
80c9551ef9
matrix-backup-borg - cleanup the .service from the systemd list 2022-04-19 19:42:13 +03:00
Aine
949228eaf8
update synapse 1.56.0 -> 1.57.0 2022-04-19 14:41:31 +03:00
Aine
15ce32a30c
update honoroit 0.9.6 -> 0.9.7 2022-04-18 19:37:14 +03:00
Adriel Sand
949fdd0135
matrix-backup-borg: add ability to backup to unencrypted repositories (#1754)
* matrix-backup-borg: added option for unencrypted repo access

* matrix-backup-borg: fixed requiring password for unencrypted repos; changed variable name

* matrix-backup-borg: add unknown_unencrypted_repo_access_is_ok to config.yaml.j2

* matrix-backup-borg: cleanup comments

* matrix-backup-borg: add documentation regarding unencrypted repos

* matrix-backup-borg: add readability and ease of use to code

* matrix-backup-borg: fix wording in defaults/main.yml comment

* matrix-backup-borg: add quotes to docs

* Indicate the variable to use

Co-authored-by: Slavi Pantaleev <slavi@devture.com>
2022-04-18 14:48:37 +03:00
Olivér Falvai
4be425c267
Upgrade Telegrame bridge to 0.11.3 2022-04-18 13:10:39 +02:00
Lunar
471806e7bd
Increase default async time for rust-synapse-compress-state
Increase the async timeout value defaults, as larger Matrix servers need more time to complete.
2022-04-17 20:27:04 -05:00
Arthur Brugière
3fbbd5a52c
Update mautrix-whatsapp 0.3.0 -> 0.3.1 2022-04-17 14:07:50 +07:00
Slavi Pantaleev
83ffb9d910
Merge pull request #1755 from etkecc/backup-borg-postgres
matrix-backup-borg: integrate postgres backups, add extended borgmatic configuration
2022-04-16 09:30:03 +03:00
Aine
c520a758ec
fix linter 2022-04-15 19:43:45 +03:00
Aine
a9d0cbc560
feedback 2022-04-15 19:38:10 +03:00
joecool1029
5611cab71a
Update element 1.10.9 -> 1.10.10 2022-04-14 13:38:38 -04:00
Aine
d5f4c17146
matrix-backup-borg: integrate postgres backups, add extended borgmatic configuration 2022-04-14 18:06:54 +03:00
Kim Brose
7e062328ff
Upgrade Hookshot (1.4.0 -> 1.5.0) 2022-04-14 15:01:40 +02:00
Slavi Pantaleev
2df993977a Ensure git cloning when self-building is done with the matrix user, not root
Fixes https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1749
2022-04-14 08:52:37 +03:00
Aine
b9bf20c761
Update honoroit 0.9.5 -> 0.9.6
This update brings stable threads support
2022-04-12 15:52:49 +00:00
Christos Karamolegkos
9c606d1fcb
Update jitsi to version 7001
Tested, works without any configuration changes.
2022-04-12 17:00:07 +03:00
Aine
ac1bd49494
Update coturn 4.5.2-r8 -> 4.5.2-r11 2022-04-12 11:16:36 +00:00
Aine
10c6c24c16
Update element 1.10.8 -> 1.10.9 2022-04-12 11:15:11 +00:00
Yan Minagawa
f6cb59116b This adds a variable for requiring MSC3231 token for registration 2022-04-12 14:31:49 +07:00
HarHarLinks
a9e6538ef8 Upgrade Hookshot (1.3.0 -> 1.4.0)
https://github.com/matrix-org/matrix-hookshot/releases/tag/1.4.0
2022-04-11 18:55:02 +02:00
HarHarLinks
ceb2f54970 Make hookshot hardcoded public URLs dynamic 2022-04-11 16:45:33 +02:00
Slavi Pantaleev
f4ba995d9b Fix validation and prevent empty "external-ip=" lines in Coturn config
We no longer validate that there's an IP address defined.
Seems like Coturn can start without one as well, so there's no need to
require it.

If people populate `matrix_coturn_turn_external_ip_addresses` directly
to specify multiple addresses, they can leave
`matrix_coturn_turn_external_ip_address` empty.

We use the "select not equal to empty string" thing in the for loop
to avoid `matrix_coturn_turn_external_ip_address` leading to
`matrix_coturn_turn_external_ip_addresses: ['']` leading to
`external-ip=` in the Coturn configuration.

Related to https://github.com/spantaleev/matrix-docker-ansible-deploy/pull/1741
2022-04-11 15:38:35 +03:00
Hefty Zauk
03d2dcc996
Move into coturn defaults 2022-04-11 11:20:09 +00:00
heftyzauk
268b079374
Revert Coturn Address Change, add new Addresses var (#2) 2022-04-11 11:50:41 +01:00
heftyzauk
da31eecdb7
Merge branch 'spantaleev:master' into master 2022-04-11 11:42:49 +01:00
Slavi Pantaleev
0364c6c634 Suppress old container cleanup (kill/rm) failures
People often report and ask about these "failures".
More-so previously, when the `docker kill/rm` output was collected,
but it still happens now when people do `systemctl status
matrix-something` and notice that it says "FAILURE".

Suppressing to avoid further time being wasted on saying "this is
expected".
2022-04-11 09:05:33 +03:00