matrix-docker-compose/ansible/inventory/runa.yml

161 lines
6.6 KiB
YAML

runa:
vars:
ansible_user: nschottelius
ansible_become: true
docker_compose: []
docker_compose_version: "1.29.1"
has_ssl_certificates: true
ssh_keys:
- "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE9P5aA5O4Vsgg5sB6Ojk+z1f5F97hvwRRd3gi+a+GGq nico-2016"
- "ssh-rsa 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 nico-2014"
matrix_service: ""
turn:
realm: ""
nfs:
mounts: []
logs_dirs:
- name: nginx
uid: 101
- name: synapse
uid: 991
- name: turn
uid: 65534
matrix:
homeserver: ""
elementweb: ""
matrixdomain: ""
logout_redirect_url: ""
turn_uris: []
turn_shared_secret: ""
elementweb_version: "v1.11.59"
nginx_version: "1.25.3-alpine"
synapse_version: "v1.101.0"
children:
ank:
hosts:
mtx-turn-1.ankr.corp-services.app:
matrix_service: "turn"
turn:
realm: "turn-1.corp-serv.net"
external_ip: "135.125.151.180/10.80.24.41"
mtx-turn-2.ankr.corp-services.app:
matrix_service: "turn"
turn:
realm: "turn-2.corp-serv.net"
external_ip: "135.125.151.177/10.80.24.42"
lat:
vars:
matrix:
homeserver: "synapse.corp-apps.com"
elementweb: "element.corp-serv.net"
matrixdomain: "corp-serv.net"
logout_redirect_url: "https://idp.corp-serv.net/realms/MAT/protocol/openid-connect/logout"
turn_uris:
- turn:turn-1.corp-serv.net?transport=udp
- turn:turn-2.corp-serv.net?transport=udp
- turn:turn-1.corp-serv.net?transport=tcp
- turn:turn-2.corp-serv.net?transport=tcp
- turns:turn-1.corp-serv.net?transport=tcp
- turns:turn-2.corp-serv.net?transport=tcp
- turns:turn-1.corp-serv.net?transport=udp
- turns:turn-2.corp-serv.net?transport=udp
turn_shared_secret: ihaaCac6Oow3ohzuvequ6esoo9eegheex
postgres_user: matrix-synapse
postgres_password: "31913hkVN_L9b3i_0v1RX_ZJXx_AD564_MM_nz"
postgres_db: matrix-synapse-db
postgres_host: postgresql-mtx.lat.internal.ru.com
oidc_providers: |
- idp_id: keycloak
idp_name: "Corp Login"
issuer: "https://idp.corp-serv.net/realms/MAT/"
client_id: "synapse"
client_secret: "vulBbPIatTqthf3wVgWbXjrLa00Ejk913gQEqgFhZm6FTJj4rc5CWgGGIBjH6CBDaAmeyZ4Tgs0iK7w9tannkaY8u3ziW4vhU0Ji"
scopes: ["openid", "profile"]
user_mapping_provider:
config:
localpart_template: "{{ '{{' }} user.preferred_username {{ '}}' }}"
display_name_template: "{{ '{{' }} user.name {{ '}}' }}"
subject_template: "{{ '{{' }} user.preferred_username {{ '}}' }}"
backchannel_logout_enabled: true
hosts:
mtx-elem-1.lat.internal.ru.com:
matrix_service: "elementweb"
mtx-elem-2.lat.internal.ru.com:
matrix_service: "elementweb"
mtx-syna-1.lat.internal.ru.com:
matrix_service: "synapse"
nfs:
mounts:
- src: 10.165.71.1:/mtx_syna_lat_internal_ru
path: /mnt
mtx-syna-2.lat.internal.ru.com:
matrix_service: "synapse"
nfs:
mounts:
- src: 10.165.71.1:/mtx_syna_lat_internal_ru
path: /mnt
mtx-mngm-1.lat.internal.ru.com:
matrix_service: "synapse-admin"
mtx-mngm-2.lat.internal.ru.com:
matrix_service: "synapse-admin"
lta:
vars:
matrix:
homeserver: "synapse.lta.corp-apps.com"
elementweb: "element.lta.corp-serv.net"
matrixdomain: "lta.corp-serv.net"
logout_redirect_url: "https://idp-broker.lta.internal.ru.com/realms/MATLAB/protocol/openid-connect/logout"
turn_uris:
- turn:mtx-turn-1.lta.internal.ru.com?transport=udp
- turn:mtx-turn-1.lta.internal.ru.com?transport=tcp
- turns:mtx-turn-1.lta.internal.ru.com?transport=tcp
- turns:mtx-turn-1.lta.internal.ru.com?transport=udp
turn_shared_secret: "ushaHimahxi6eisaeV4Chu0quaeyeish"
postgres_user: matrix-synapse
postgres_password: "0Dt9G739GRUpb9dgSgWG"
postgres_db: matrix-synapse-db
postgres_host: postgresql-mtx.ltrudev.internal
oidc_providers: |
- idp_id: keycloak
idp_name: "Corp LAB Login"
issuer: "https://idp-broker.lta.internal.ru.com/realms/MATLAB/"
client_id: "synapse"
client_secret: "gLbFFBmgZCBBNFxwnWJwTnQAkKbbWTfSRHgdTnNZAcrIsdvVOtSYtyghqiwoTgflCwKsjwtWhjhnbkYwjJlYgXkiDicxHIzOckfq"
scopes: ["openid", "profile"]
user_mapping_provider:
config:
localpart_template: "{{ '{{' }} user.preferred_username {{ '}}' }}"
display_name_template: "{{ '{{' }} user.name {{ '}}' }}"
subject_template: "{{ '{{' }} user.preferred_username {{ '}}' }}"
backchannel_logout_enabled: true
hosts:
mtx-mngm-1.lta.internal.ru.com:
matrix_service: "synapse-admin"
mtx-elem-1.lta.internal.ru.com:
matrix_service: "elementweb"
mtx-syna-1.lta.internal.ru.com:
matrix_service: "synapse"
nfs:
mounts:
- src: mtx-storage-1.lta.internal.ru.com:/srv/nfs_synapse
path: /mnt
mtx-syna-2.lta.internal.ru.com:
matrix_service: "synapse"
nfs:
mounts:
- src: mtx-storage-1.lta.internal.ru.com:/srv/nfs_synapse
path: /mnt
mtx-turn-1.lta.internal.ru.com: # waiting for public IP
matrix_service: "turn"
turn:
realm: "mtx-turn-1.lta.internal.ru.com"
dev:
children:
lta:
prod:
children:
ank:
lat: