Adding necessary vars.
This commit is contained in:
parent
d0d36eb59a
commit
c292c56ab2
@ -1,21 +1,21 @@
|
|||||||
matrix_ssl_lets_encrypt_support_email: "{{ VAULT_MATRIX_SSL_LETS_ENCRYPT_SUPPORT_EMAIL }}"
|
MATRIX_SSL_LETS_ENCRYPT_SUPPORT_EMAIL: "{{ VAULT_MATRIX_SSL_LETS_ENCRYPT_SUPPORT_EMAIL }}"
|
||||||
matrix_domain: "{{ VAULT_MATRIX_DOMAIN }}"
|
MATRIX_DOMAIN: "{{ VAULT_MATRIX_DOMAIN }}"
|
||||||
ansible_become_pass: "{{ vault_ansible_become_pass }}"
|
ANSIBLE_BECOME_PASS: "{{ vault_ansible_become_pass }}"
|
||||||
|
|
||||||
|
|
||||||
matrix_coturn_turn_static_auth_secret: "{{ VAULT_MATRIX_COTURN_TURN_STATIC_AUTH_SECRET }}"
|
MATRIX_COTURN_TURN_STATIC_AUTH_SECRET: "{{ VAULT_MATRIX_COTURN_TURN_STATIC_AUTH_SECRET }}"
|
||||||
|
|
||||||
# A secret used to protect access keys issued by the server.
|
# A secret used to protect access keys issued by the server.
|
||||||
# You can put any string here, but generating a strong one is preferred (e.g. `pwgen -s 64 1`).
|
# You can put any string here, but generating a strong one is preferred (e.g. `pwgen -s 64 1`).
|
||||||
matrix_synapse_macaroon_secret_key: "{{ VAULT_MATRIX_SYNAPSE_MACAROON_SECRET_KEY }}"
|
MATRIX_SYNAPSE_MACAROON_SECRET_KEY: "{{ VAULT_MATRIX_SYNAPSE_MACAROON_SECRET_KEY }}"
|
||||||
|
|
||||||
# added by jlj -- 11/25/19
|
# added by jlj -- 11/25/19
|
||||||
# configures the slack bridge.
|
# configures the slack bridge.
|
||||||
matrix_appservice_slack_control_room_id: "{{ VAULT_MATRIX_APPSERVICE_SLACK_CONTROL_ROOM_ID }}"
|
MATRIX_APPSERVICE_SLACK_CONTROL_ROOM_ID: "{{ VAULT_MATRIX_APPSERVICE_SLACK_CONTROL_ROOM_ID }}"
|
||||||
|
|
||||||
# added by jlj -- jitsi bullshit.
|
# added by jlj -- jitsi bullshit.
|
||||||
matrix_jitsi_jicofo_component_secret: "{{ VAULT_MATRIX_JITSI_JICOFO_COMPONENT_SECRET }}"
|
MATRIX_JITSI_JICOFO_COMPONENT_SECRET: "{{ VAULT_MATRIX_JITSI_JICOFO_COMPONENT_SECRET }}"
|
||||||
matrix_jitsi_jicofo_auth_password: "{{ VAULT_MATRIX_JITSI_JICOFO_AUTH_PASSWORD }}"
|
MATRIX_JITSI_JICOFO_AUTH_PASSWORD: "{{ VAULT_MATRIX_JITSI_JICOFO_AUTH_PASSWORD }}"
|
||||||
matrix_jitsi_jvb_auth_password: "{{ VAULT_MATRIX_JITSI_JVB_AUTH_PASSWORD }}"
|
MATRIX_JITSI_JVB_AUTH_PASSWORD: "{{ VAULT_MATRIX_JITSI_JVB_AUTH_PASSWORD }}"
|
||||||
matrix_jitsi_jibri_recorder_password: "{{ VAULT_MATRIX_JITSI_JIBRI_RECORDER_PASSWORD }}"
|
MATRIX_JITSI_JIBRI_RECORDER_PASSWORD: "{{ VAULT_MATRIX_JITSI_JIBRI_RECORDER_PASSWORD }}"
|
||||||
matrix_jitsi_jibri_xmpp_password: "{{ VAULT_MATRIX_JITSI_JIBRI_XMPP_PASSWORD }}"
|
MATRIX_JITSI_JIBRI_XMPP_PASSWORD: "{{ VAULT_MATRIX_JITSI_JIBRI_XMPP_PASSWORD }}"
|
||||||
|
50
inventory/host_vars/matrix.awful.club/vars.yml
Normal file
50
inventory/host_vars/matrix.awful.club/vars.yml
Normal file
@ -0,0 +1,50 @@
|
|||||||
|
# This is something which is provided to Let's Encrypt
|
||||||
|
# when retrieving the SSL certificates for `<your-domain>`.
|
||||||
|
#
|
||||||
|
# In case SSL renewal fails at some point, you'll also get
|
||||||
|
# an email notification there.
|
||||||
|
#
|
||||||
|
# If you decide to use another method for managing SSL certifites (different than the default Let's Encrypt),
|
||||||
|
# you won't be required to define this variable
|
||||||
|
# (see `docs/configuring-playbook-ssl-certificates.md`).
|
||||||
|
#
|
||||||
|
# Example value: someone@example.com
|
||||||
|
matrix_ssl_lets_encrypt_support_email: "{{ MATRIX_SSL_LETS_ENCRYPT_SUPPORT_EMAIL }}"
|
||||||
|
#host_specific_matrix_ssl_lets_encrypt_support_email: admin@awful.club
|
||||||
|
|
||||||
|
# This is your bare domain name (`<your-domain`).
|
||||||
|
#
|
||||||
|
# Note: the server specified here is not touched.
|
||||||
|
#
|
||||||
|
# This playbook only installs to `matrix.<your-domain>`,
|
||||||
|
# but it nevertheless requires to know the bare domain name
|
||||||
|
# (for configuration purposes).
|
||||||
|
#
|
||||||
|
# Example value: example.com
|
||||||
|
matrix_domain: "{{ MATRIX_DOMAIN }}"
|
||||||
|
|
||||||
|
# A shared secret (between Synapse and Coturn) used for authentication.
|
||||||
|
# You can put any string here, but generating a strong one is preferred (e.g. `pwgen -s 64 1`).
|
||||||
|
matrix_coturn_turn_static_auth_secret: "{{ MATRIX_COTURN_TURN_STATIC_AUTH_SECRET }}"
|
||||||
|
|
||||||
|
# A secret used to protect access keys issued by the server.
|
||||||
|
# You can put any string here, but generating a strong one is preferred (e.g. `pwgen -s 64 1`).
|
||||||
|
matrix_synapse_macaroon_secret_key: "{{ MATRIX_SYNAPSE_MACAROON_SECRET_KEY }}"
|
||||||
|
|
||||||
|
# added by jlj -- 11/25/19
|
||||||
|
# configures the slack bridge.
|
||||||
|
matrix_appservice_slack_enabled: true
|
||||||
|
matrix_appservice_slack_control_room_id: "{{ MATRIX_APPSERVICE_SLACK_CONTROL_ROOM_ID }}"
|
||||||
|
|
||||||
|
matrix_jitsi_enabled: true
|
||||||
|
|
||||||
|
# Run `bash inventory/scripts/jitsi-generate-passwords.sh` to generate these passwords,
|
||||||
|
# or define your own strong passwords manually.
|
||||||
|
matrix_jitsi_jicofo_component_secret: "{{ MATRIX_JITSI_JICOFO_COMPONENT_SECRET }}"
|
||||||
|
matrix_jitsi_jicofo_auth_password: "{{ MATRIX_JITSI_JICOFO_AUTH_PASSWORD }}"
|
||||||
|
matrix_jitsi_jvb_auth_password: "{{ MATRIX_JITSI_JVB_AUTH_PASSWORD }}"
|
||||||
|
matrix_jitsi_jibri_recorder_password: "{{ MATRIX_JITSI_JIBRI_RECORDER_PASSWORD }}"
|
||||||
|
matrix_jitsi_jibri_xmpp_password: "{{ MATRIX_JITSI_JIBRI_XMPP_PASSWORD }}"
|
||||||
|
|
||||||
|
# added by jlj -- this has to be defined here too, dumb.
|
||||||
|
ansible_become_pass: "{{ ANSIBLE_BECOME_PASS }}"
|
Loading…
Reference in New Issue
Block a user