mirror of
https://github.com/spantaleev/matrix-docker-ansible-deploy.git
synced 2024-11-14 10:04:46 +08:00
Merge pull request #2038 from TheOneWithTheBraid/braid/matrix-ldap-registration-proxy
Draft: feat: include matrix_ldap_registration_proxy
This commit is contained in:
commit
b67ba669e8
@ -45,6 +45,8 @@ Using this playbook, you can get the following services configured on your serve
|
|||||||
|
|
||||||
- (optional, advanced) the [matrix-synapse-ldap3](https://github.com/matrix-org/matrix-synapse-ldap3) LDAP Auth password provider module
|
- (optional, advanced) the [matrix-synapse-ldap3](https://github.com/matrix-org/matrix-synapse-ldap3) LDAP Auth password provider module
|
||||||
|
|
||||||
|
- (optional, advanced) the [matrix-ldap-registration-proxy](https://gitlab.com/activism.international/matrix_ldap_registration_proxy) a proxy that handles Matrix registration requests and forwards them to LDAP.
|
||||||
|
|
||||||
- (optional, advanced) the [synapse-simple-antispam](https://github.com/t2bot/synapse-simple-antispam) spam checker module
|
- (optional, advanced) the [synapse-simple-antispam](https://github.com/t2bot/synapse-simple-antispam) spam checker module
|
||||||
|
|
||||||
- (optional, advanced) the [Matrix Corporal](https://github.com/devture/matrix-corporal) reconciliator and gateway for a managed Matrix server
|
- (optional, advanced) the [Matrix Corporal](https://github.com/devture/matrix-corporal) reconciliator and gateway for a managed Matrix server
|
||||||
|
33
docs/configuring-playbook-matrix-ldap-registration-proxy.md
Normal file
33
docs/configuring-playbook-matrix-ldap-registration-proxy.md
Normal file
@ -0,0 +1,33 @@
|
|||||||
|
# Setting up matrix-ldap-registration-proxy (optional)
|
||||||
|
|
||||||
|
The playbook can install and configure [matrix-ldap-registration-proxy](https://gitlab.com/activism.international/matrix_ldap_registration_proxy) for you.
|
||||||
|
|
||||||
|
This proxy handles Matrix registration requests and forwards them to LDAP.
|
||||||
|
|
||||||
|
**Please note:** This does support the full Matrix specification for registrations. It only provide a very coarse
|
||||||
|
implementation of a basic password registration.
|
||||||
|
|
||||||
|
## Quickstart
|
||||||
|
|
||||||
|
Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
matrix_ldap_registration_proxy_enabled: true
|
||||||
|
# LDAP credentials
|
||||||
|
matrix_ldap_registration_proxy_ldap_uri: <URI>
|
||||||
|
matrix_ldap_registration_proxy_ldap_base_dn: <DN>
|
||||||
|
matrix_ldap_registration_proxy_ldap_user: <USER>
|
||||||
|
matrix_ldap_registration_proxy_ldap_password: <password>
|
||||||
|
```
|
||||||
|
|
||||||
|
If you already use the [synapse external password provider via LDAP](docs/configuring-playbook-ldap-auth.md) (that is, you have `matrix_synapse_ext_password_provider_ldap_enabled: true` and other options in your configuration)
|
||||||
|
you can use the following values as configuration:
|
||||||
|
|
||||||
|
```yaml
|
||||||
|
# Use the LDAP values specified for the synapse role to setup LDAP proxy
|
||||||
|
matrix_ldap_registration_proxy_ldap_uri: "{{ matrix_synapse_ext_password_provider_ldap_uri }}"
|
||||||
|
matrix_ldap_registration_proxy_ldap_base_dn: "{{ matrix_synapse_ext_password_provider_ldap_base }}"
|
||||||
|
matrix_ldap_registration_proxy_ldap_user: "{{ matrix_synapse_ext_password_provider_ldap_bind_dn }}"
|
||||||
|
matrix_ldap_registration_proxy_ldap_password: "{{ matrix_synapse_ext_password_provider_ldap_bind_password }}"
|
||||||
|
```
|
||||||
|
|
@ -86,6 +86,8 @@ When you're done with all the configuration you'd like to do, continue with [Ins
|
|||||||
|
|
||||||
- [Setting up the LDAP password provider module](configuring-playbook-ldap-auth.md) (optional, advanced)
|
- [Setting up the LDAP password provider module](configuring-playbook-ldap-auth.md) (optional, advanced)
|
||||||
|
|
||||||
|
- [Setting up the ldap-registration-proxy](configuring-playbook-matrix-ldap-registration-proxy.md) (optional, advanced)
|
||||||
|
|
||||||
- [Setting up Synapse Simple Antispam](configuring-playbook-synapse-simple-antispam.md) (optional, advanced)
|
- [Setting up Synapse Simple Antispam](configuring-playbook-synapse-simple-antispam.md) (optional, advanced)
|
||||||
|
|
||||||
- [Setting up Matrix Corporal](configuring-playbook-matrix-corporal.md) (optional, advanced)
|
- [Setting up Matrix Corporal](configuring-playbook-matrix-corporal.md) (optional, advanced)
|
||||||
|
@ -1570,6 +1570,20 @@ matrix_jitsi_etherpad_base: "{{ matrix_etherpad_base_url if matrix_etherpad_enab
|
|||||||
# /matrix-jitsi
|
# /matrix-jitsi
|
||||||
#
|
#
|
||||||
######################################################################
|
######################################################################
|
||||||
|
######################################################################
|
||||||
|
#
|
||||||
|
# matrix-ldap-registration-proxy
|
||||||
|
#
|
||||||
|
######################################################################
|
||||||
|
|
||||||
|
# This is only for users with a specific LDAP setup
|
||||||
|
matrix_ldap_registration_proxy_enabled: false
|
||||||
|
|
||||||
|
######################################################################
|
||||||
|
#
|
||||||
|
# /matrix-ldap-registration-proxy
|
||||||
|
#
|
||||||
|
######################################################################
|
||||||
|
|
||||||
######################################################################
|
######################################################################
|
||||||
#
|
#
|
||||||
|
58
roles/matrix-ldap-registration-proxy/defaults/main.yml
Normal file
58
roles/matrix-ldap-registration-proxy/defaults/main.yml
Normal file
@ -0,0 +1,58 @@
|
|||||||
|
---
|
||||||
|
# matrix_ldap_registration_proxy - Want to build a large-scale Matrix server using external registration on LDAP?
|
||||||
|
# Project source code URL: https://gitlab.com/activism.international/matrix_ldap_registration_proxy
|
||||||
|
|
||||||
|
matrix_ldap_registration_proxy_enabled: true
|
||||||
|
|
||||||
|
matrix_ldap_registration_proxy_docker_image: matrix_ldap_registration_proxy
|
||||||
|
matrix_ldap_registration_proxy_container_image_self_build_repo: "https://gitlab.com/activism.international/matrix_ldap_registration_proxy.git"
|
||||||
|
matrix_ldap_registration_proxy_container_image_self_build_branch: "{{ matrix_ldap_registration_proxy_version }}"
|
||||||
|
|
||||||
|
matrix_ldap_registration_proxy_version: "296246afc6a9b3105e67fcf6621cf05ebc74b873"
|
||||||
|
|
||||||
|
matrix_ldap_registration_proxy_base_path: "{{ matrix_base_data_path }}/matrix_ldap_registration_proxy"
|
||||||
|
# We need the docker src directory to be named matrix_ldap_registration_proxy.
|
||||||
|
matrix_ldap_registration_proxy_docker_src_files_path: "{{ matrix_ldap_registration_proxy_base_path }}/docker-src/matrix_ldap_registration_proxy"
|
||||||
|
matrix_ldap_registration_proxy_config_path: "{{ matrix_ldap_registration_proxy_base_path }}/config"
|
||||||
|
|
||||||
|
matrix_ldap_registration_proxy_ldap_uri: ""
|
||||||
|
matrix_ldap_registration_proxy_ldap_base_dn: ""
|
||||||
|
matrix_ldap_registration_proxy_ldap_user: ""
|
||||||
|
matrix_ldap_registration_proxy_ldap_password: ""
|
||||||
|
matrix_ldap_registration_proxy_matrix_server_name: "{{ matrix_domain }}"
|
||||||
|
matrix_ldap_registration_proxy_matrix_server_url: "https://{{ matrix_server_fqn_matrix }}"
|
||||||
|
|
||||||
|
matrix_ldap_registration_proxy_registration_endpoint: "/_matrix/client/r0/register"
|
||||||
|
|
||||||
|
# Controls whether the self-check feature should validate SSL certificates.
|
||||||
|
matrix_matrix_ldap_registration_proxy_self_check_validate_certificates: true
|
||||||
|
|
||||||
|
matrix_ldap_registration_proxy_container_port: 8080
|
||||||
|
# Controls whether the matrix_ldap_registration_proxy container exposes its HTTP port (tcp/{{ matrix_ldap_registration_proxy_container_port }} in the container).
|
||||||
|
#
|
||||||
|
# Takes an "<ip>:<port>" or "<port>" value (e.g. "127.0.0.1:8080"), or empty string to not expose.
|
||||||
|
matrix_ldap_registration_proxy_container_http_host_bind_port: ''
|
||||||
|
|
||||||
|
# `matrix_ldap_registration_proxy_container_http_host_bind_port_number_raw` contains the raw port number extracted from `matrix_ldap_registration_proxy_container_http_host_bind_port`,
|
||||||
|
# which can contain values like this: ('1234', '127.0.0.1:1234', '0.0.0.0:1234')
|
||||||
|
matrix_ldap_registration_proxy_container_http_host_bind_port_number_raw: "{{ '' if matrix_ldap_registration_proxy_container_http_host_bind_port == '' else (matrix_ldap_registration_proxy_container_http_host_bind_port.split(':')[1] if ':' in matrix_ldap_registration_proxy_container_http_host_bind_port else matrix_ldap_registration_proxy_container_http_host_bind_port) }}"
|
||||||
|
|
||||||
|
matrix_ldap_registration_proxy_registration_addr_with_container: "matrix-ldap_registration-proxy:{{ matrix_ldap_registration_proxy_container_http_host_bind_port_number_raw }}"
|
||||||
|
matrix_ldap_registration_proxy_registration_addr_sans_container: "127.0.0.1:{{ matrix_ldap_registration_proxy_container_http_host_bind_port_number_raw }}"
|
||||||
|
|
||||||
|
|
||||||
|
# A list of extra arguments to pass to the container
|
||||||
|
matrix_ldap_registration_proxy_container_extra_arguments: []
|
||||||
|
|
||||||
|
# List of systemd services that matrix_ldap_registration_proxy.service depends on
|
||||||
|
matrix_ldap_registration_proxy_systemd_required_services_list: ['docker.service']
|
||||||
|
|
||||||
|
# List of systemd services that matrix_ldap_registration_proxy.service wants
|
||||||
|
matrix_ldap_registration_proxy_systemd_wanted_services_list: []
|
||||||
|
|
||||||
|
# Additional environment variables to pass to the LDAP proxy environment variables.
|
||||||
|
#
|
||||||
|
# Example:
|
||||||
|
# matrix_ldap_registration_proxy_env_variables_extension: |
|
||||||
|
# KEY=value
|
||||||
|
matrix_ldap_registration_proxy_env_variables_extension: ''
|
58
roles/matrix-ldap-registration-proxy/tasks/init.yml
Normal file
58
roles/matrix-ldap-registration-proxy/tasks/init.yml
Normal file
@ -0,0 +1,58 @@
|
|||||||
|
---
|
||||||
|
# See https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1070
|
||||||
|
# and https://github.com/spantaleev/matrix-docker-ansible-deploy/commit/1ab507349c752042d26def3e95884f6df8886b74#commitcomment-51108407
|
||||||
|
- name: Fail if trying to self-build on Ansible < 2.8
|
||||||
|
ansible.builtin.fail:
|
||||||
|
msg: "To self-build the matrix_ldap_registration_proxy image, you should use Ansible 2.8 or higher. See docs/ansible.md"
|
||||||
|
when: "ansible_version.major == 2 and ansible_version.minor < 8 and matrix_ldap_registration_proxy_container_image_self_build and matrix_ldap_registration_proxy_enabled | bool"
|
||||||
|
|
||||||
|
- ansible.builtin.set_fact:
|
||||||
|
matrix_systemd_services_list: "{{ matrix_systemd_services_list + ['matrix-ldap-registration-proxy.service'] }}"
|
||||||
|
when: matrix_ldap_registration_proxy_enabled | bool
|
||||||
|
|
||||||
|
- block:
|
||||||
|
- name: Fail if matrix-nginx-proxy role already executed
|
||||||
|
ansible.builtin.fail:
|
||||||
|
msg: >-
|
||||||
|
Trying to append Matrix LDAP registration proxy's reverse-proxying configuration to matrix-nginx-proxy,
|
||||||
|
but it's pointless since the matrix-nginx-proxy role had already executed.
|
||||||
|
To fix this, please change the order of roles in your playbook,
|
||||||
|
so that the matrix-nginx-proxy role would run after the matrix-bridge-mautrix-telegram role.
|
||||||
|
when: matrix_nginx_proxy_role_executed | default(False) | bool
|
||||||
|
|
||||||
|
- name: Generate Matrix LDAP registration proxy proxying configuration for matrix-nginx-proxy
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
matrix_ldap_registration_proxy_matrix_nginx_proxy_configuration: |
|
||||||
|
location {{ matrix_ldap_registration_proxy_registration_endpoint }} {
|
||||||
|
{% if matrix_nginx_proxy_enabled | default(False) %}
|
||||||
|
{# Use the embedded DNS resolver in Docker containers to discover the service #}
|
||||||
|
resolver 127.0.0.11 valid=5s;
|
||||||
|
set $backend "{{ matrix_ldap_registration_proxy_registration_addr_with_container }}";
|
||||||
|
proxy_pass http://$backend/register;
|
||||||
|
{% else %}
|
||||||
|
{# Generic configuration for use outside of our container setup #}
|
||||||
|
proxy_pass http://{{ matrix_ldap_registration_proxy_registration_addr_sans_container }}/register;
|
||||||
|
{% endif %}
|
||||||
|
}
|
||||||
|
|
||||||
|
- name: Register Matrix LDAP registration proxy proxying configuration with matrix-nginx-proxy
|
||||||
|
ansible.builtin.set_fact:
|
||||||
|
matrix_nginx_proxy_proxy_matrix_additional_server_configuration_blocks: |
|
||||||
|
{{
|
||||||
|
matrix_nginx_proxy_proxy_matrix_additional_server_configuration_blocks | default([])
|
||||||
|
+
|
||||||
|
[matrix_ldap_registration_proxy_matrix_nginx_proxy_configuration]
|
||||||
|
}}
|
||||||
|
- name: Warn about reverse-proxying if matrix-nginx-proxy not used
|
||||||
|
ansible.builtin.debug:
|
||||||
|
msg: >-
|
||||||
|
NOTE: You've enabled the Matrix LDAP registration proxy bridge but are not using the matrix-nginx-proxy
|
||||||
|
reverse proxy.
|
||||||
|
Please make sure that you're proxying the `{{ matrix_ldap_registration_proxy_public_endpoint }}`
|
||||||
|
URL endpoint to the matrix-ldap-proxy container.
|
||||||
|
You can expose the container's port using the `matrix_ldap_registration_proxy_container_http_host_bind_port` variable.
|
||||||
|
when: "not matrix_nginx_proxy_enabled | default(False) | bool"
|
||||||
|
|
||||||
|
tags:
|
||||||
|
- always
|
||||||
|
when: matrix_ldap_registration_proxy_enabled | bool
|
23
roles/matrix-ldap-registration-proxy/tasks/main.yml
Normal file
23
roles/matrix-ldap-registration-proxy/tasks/main.yml
Normal file
@ -0,0 +1,23 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- ansible.builtin.import_tasks: "{{ role_path }}/tasks/init.yml"
|
||||||
|
tags:
|
||||||
|
- always
|
||||||
|
|
||||||
|
- ansible.builtin.import_tasks: "{{ role_path }}/tasks/validate_config.yml"
|
||||||
|
when: "run_setup | bool and matrix_ldap_registration_proxy_enabled | bool"
|
||||||
|
tags:
|
||||||
|
- setup-all
|
||||||
|
- setup-matrix-ldap-registration-proxy
|
||||||
|
|
||||||
|
- ansible.builtin.import_tasks: "{{ role_path }}/tasks/setup_install.yml"
|
||||||
|
when: "run_setup | bool and matrix_ldap_registration_proxy_enabled | bool"
|
||||||
|
tags:
|
||||||
|
- setup-all
|
||||||
|
- setup-matrix-ldap-registration-proxy
|
||||||
|
|
||||||
|
- ansible.builtin.import_tasks: "{{ role_path }}/tasks/setup_uninstall.yml"
|
||||||
|
when: "run_setup | bool and not matrix_ldap_registration_proxy_enabled | bool"
|
||||||
|
tags:
|
||||||
|
- setup-all
|
||||||
|
- setup-matrix-ldap-registration-proxy
|
63
roles/matrix-ldap-registration-proxy/tasks/setup_install.yml
Normal file
63
roles/matrix-ldap-registration-proxy/tasks/setup_install.yml
Normal file
@ -0,0 +1,63 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Ensure matrix_ldap_registration_proxy paths exist
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ item.path }}"
|
||||||
|
state: directory
|
||||||
|
mode: 0750
|
||||||
|
owner: "{{ matrix_user_username }}"
|
||||||
|
group: "{{ matrix_user_groupname }}"
|
||||||
|
with_items:
|
||||||
|
- {path: "{{ matrix_ldap_registration_proxy_config_path }}", when: true}
|
||||||
|
- {path: "{{ matrix_ldap_registration_proxy_docker_src_files_path }}", when: true}
|
||||||
|
when: "item.when | bool"
|
||||||
|
|
||||||
|
- ansible.builtin.set_fact:
|
||||||
|
matrix_ldap_registration_proxy_requires_restart: false
|
||||||
|
|
||||||
|
- name: Ensure matrix_ldap_registration_proxy repository is present on self-build
|
||||||
|
ansible.builtin.git:
|
||||||
|
repo: "{{ matrix_ldap_registration_proxy_container_image_self_build_repo }}"
|
||||||
|
dest: "{{ matrix_ldap_registration_proxy_docker_src_files_path }}"
|
||||||
|
version: "{{ matrix_ldap_registration_proxy_container_image_self_build_branch }}"
|
||||||
|
force: "yes"
|
||||||
|
become: true
|
||||||
|
become_user: "{{ matrix_user_username }}"
|
||||||
|
register: matrix_ldap_registration_proxy_git_pull_results
|
||||||
|
|
||||||
|
- name: Ensure matrix_ldap_registration_proxy Docker image is built
|
||||||
|
docker_image:
|
||||||
|
name: "{{ matrix_ldap_registration_proxy_docker_image }}"
|
||||||
|
source: build
|
||||||
|
force_source: "{{ matrix_ldap_registration_proxy_git_pull_results.changed }}"
|
||||||
|
build:
|
||||||
|
dockerfile: Dockerfile
|
||||||
|
path: "{{ matrix_ldap_registration_proxy_docker_src_files_path }}"
|
||||||
|
pull: true
|
||||||
|
when: true
|
||||||
|
|
||||||
|
- name: Ensure matrix_ldap_registration_proxy config installed
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "{{ role_path }}/templates/ldap-registration-proxy.env.j2"
|
||||||
|
dest: "{{ matrix_ldap_registration_proxy_config_path }}/ldap-registration-proxy.env"
|
||||||
|
mode: 0644
|
||||||
|
owner: "{{ matrix_user_username }}"
|
||||||
|
group: "{{ matrix_user_groupname }}"
|
||||||
|
|
||||||
|
- name: Ensure matrix-ldap-registration-proxy.service installed
|
||||||
|
ansible.builtin.template:
|
||||||
|
src: "{{ role_path }}/templates/systemd/matrix-ldap-registration-proxy.service.j2"
|
||||||
|
dest: "{{ matrix_systemd_path }}/matrix-ldap-registration-proxy.service"
|
||||||
|
mode: 0644
|
||||||
|
register: matrix_ldap_registration_proxy_systemd_service_result
|
||||||
|
|
||||||
|
- name: Ensure systemd reloaded after matrix-ldap-registration-proxy.service installation
|
||||||
|
ansible.builtin.service:
|
||||||
|
daemon_reload: true
|
||||||
|
when: "matrix_ldap_registration_proxy_systemd_service_result.changed | bool"
|
||||||
|
|
||||||
|
- name: Ensure matrix-ldap-registration-proxy.service restarted, if necessary
|
||||||
|
ansible.builtin.service:
|
||||||
|
name: "matrix-ldap-registration-proxy.service"
|
||||||
|
state: restarted
|
||||||
|
when: "matrix_ldap_registration_proxy_requires_restart | bool"
|
@ -0,0 +1,36 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Check existence of matrix-matrix_ldap_registration_proxy service
|
||||||
|
ansible.builtin.stat:
|
||||||
|
path: "{{ matrix_systemd_path }}/matrix-ldap-registration-proxy.service"
|
||||||
|
register: matrix_ldap_registration_proxy_service_stat
|
||||||
|
|
||||||
|
- name: Ensure matrix-matrix_ldap_registration_proxy is stopped
|
||||||
|
ansible.builtin.service:
|
||||||
|
name: matrix-matrix_ldap_registration_proxy
|
||||||
|
state: stopped
|
||||||
|
enabled: false
|
||||||
|
daemon_reload: true
|
||||||
|
register: stopping_result
|
||||||
|
when: "matrix_ldap_registration_proxy_service_stat.stat.exists | bool"
|
||||||
|
|
||||||
|
- name: Ensure matrix-ldap-registration-proxy.service doesn't exist
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ matrix_systemd_path }}/matrix-ldap-registration-proxy.service"
|
||||||
|
state: absent
|
||||||
|
when: "matrix_ldap_registration_proxy_service_stat.stat.exists | bool"
|
||||||
|
|
||||||
|
- name: Ensure systemd reloaded after matrix-ldap-registration-proxy.service removal
|
||||||
|
ansible.builtin.service:
|
||||||
|
daemon_reload: true
|
||||||
|
when: "matrix_ldap_registration_proxy_service_stat.stat.exists | bool"
|
||||||
|
|
||||||
|
- name: Ensure Matrix matrix_ldap_registration_proxy paths don't exist
|
||||||
|
ansible.builtin.file:
|
||||||
|
path: "{{ matrix_ldap_registration_proxy_base_path }}"
|
||||||
|
state: absent
|
||||||
|
|
||||||
|
- name: Ensure matrix_ldap_registration_proxy Docker image doesn't exist
|
||||||
|
docker_image:
|
||||||
|
name: "{{ matrix_ldap_registration_proxy_docker_image }}"
|
||||||
|
state: absent
|
@ -0,0 +1,12 @@
|
|||||||
|
---
|
||||||
|
|
||||||
|
- name: Fail if required settings not defined
|
||||||
|
ansible.builtin.fail:
|
||||||
|
msg: >-
|
||||||
|
You need to define a required configuration setting (`{{ item }}`).
|
||||||
|
when: "vars[item] == ''"
|
||||||
|
with_items:
|
||||||
|
- "matrix_ldap_registration_proxy_ldap_uri"
|
||||||
|
- "matrix_ldap_registration_proxy_ldap_base_dn"
|
||||||
|
- "matrix_ldap_registration_proxy_ldap_user"
|
||||||
|
- "matrix_ldap_registration_proxy_ldap_password"
|
@ -0,0 +1,35 @@
|
|||||||
|
# please specify the configuration here
|
||||||
|
#
|
||||||
|
# these settings are mandatory
|
||||||
|
|
||||||
|
# The server to connect to. Please note it must be accessible from the Docker network
|
||||||
|
# example: `ldap://127.0.0.1:389`
|
||||||
|
LDAP_SERVER={{ matrix_ldap_registration_proxy_ldap_uri }}
|
||||||
|
|
||||||
|
# the base DN used for user creation
|
||||||
|
|
||||||
|
LDAP_BASE_DN={{ matrix_ldap_registration_proxy_ldap_base_dn }}
|
||||||
|
|
||||||
|
# the privileged user used for user creation including it's DN
|
||||||
|
# example: `uid=admin,cn=users,cn=accounts,dc=example,dc=org`
|
||||||
|
|
||||||
|
LDAP_USER={{ matrix_ldap_registration_proxy_ldap_user }}
|
||||||
|
|
||||||
|
# the password of the `LDAP_USER` used for authentication
|
||||||
|
LDAP_PASSWORD={{ matrix_ldap_registration_proxy_ldap_password }}
|
||||||
|
|
||||||
|
# the human-readable server name of your Matrix server as used in the Matrix ID
|
||||||
|
# example: `example.org`
|
||||||
|
MATRIX_SERVER_NAME={{ matrix_ldap_registration_proxy_matrix_server_name }}
|
||||||
|
|
||||||
|
# the url to access the Matrix server API without trailing `/`
|
||||||
|
# example: `https://matrix.example.org`
|
||||||
|
MATRIX_SERVER_URL={{ matrix_ldap_registration_proxy_matrix_server_url }}
|
||||||
|
|
||||||
|
# these settings are optional:
|
||||||
|
|
||||||
|
# Specify the port to listen on. Default to 8080
|
||||||
|
LISTEN_PORT={{ matrix_ldap_registration_proxy_container_port }}
|
||||||
|
|
||||||
|
# Use this to extend the configuration with custom variables
|
||||||
|
{{ matrix_ldap_registration_proxy_env_variables_extension }}
|
@ -0,0 +1,43 @@
|
|||||||
|
#jinja2: lstrip_blocks: "True"
|
||||||
|
[Unit]
|
||||||
|
Description=matrix_ldap_registration_proxy
|
||||||
|
{% for service in matrix_ldap_registration_proxy_systemd_required_services_list %}
|
||||||
|
Requires={{ service }}
|
||||||
|
After={{ service }}
|
||||||
|
{% endfor %}
|
||||||
|
{% for service in matrix_ldap_registration_proxy_systemd_wanted_services_list %}
|
||||||
|
Wants={{ service }}
|
||||||
|
{% endfor %}
|
||||||
|
DefaultDependencies=no
|
||||||
|
|
||||||
|
[Service]
|
||||||
|
Type=simple
|
||||||
|
Environment="HOME={{ matrix_systemd_unit_home_path }}"
|
||||||
|
ExecStartPre=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-ldap-registration-proxy 2>/dev/null || true'
|
||||||
|
ExecStartPre=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-ldap-registration-proxy 2>/dev/null || true'
|
||||||
|
|
||||||
|
# matrix_ldap_registration_proxy writes an SQLite shared library (libsqlitejdbc.so) to /tmp and executes it from there,
|
||||||
|
# so /tmp needs to be mounted with an exec option.
|
||||||
|
ExecStart={{ matrix_host_command_docker }} run --rm --name matrix-ldap-registration-proxy \
|
||||||
|
--log-driver=none \
|
||||||
|
--user={{ matrix_user_uid }}:{{ matrix_user_gid }} \
|
||||||
|
--cap-drop=ALL \
|
||||||
|
--read-only \
|
||||||
|
--network={{ matrix_docker_network }} \
|
||||||
|
{% if matrix_ldap_registration_proxy_container_http_host_bind_port %}
|
||||||
|
-p {{ matrix_ldap_registration_proxy_container_http_host_bind_port }}:{{ matrix_ldap_registration_proxy_container_port }} \
|
||||||
|
{% endif %}
|
||||||
|
--env-file {{ matrix_ldap_registration_proxy_config_path }}/ldap-registration-proxy.env \
|
||||||
|
{% for arg in matrix_ldap_registration_proxy_container_extra_arguments %}
|
||||||
|
{{ arg }} \
|
||||||
|
{% endfor %}
|
||||||
|
{{ matrix_ldap_registration_proxy_docker_image }}
|
||||||
|
|
||||||
|
ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} kill matrix-ldap-registration-proxy 2>/dev/null || true'
|
||||||
|
ExecStop=-{{ matrix_host_command_sh }} -c '{{ matrix_host_command_docker }} rm matrix-ldap-registration-proxy 2>/dev/null || true'
|
||||||
|
Restart=always
|
||||||
|
RestartSec=30
|
||||||
|
SyslogIdentifier=matrix-ldap-registration-proxy
|
||||||
|
|
||||||
|
[Install]
|
||||||
|
WantedBy=multi-user.target
|
Loading…
Reference in New Issue
Block a user