aboutsummaryrefslogtreecommitdiff
path: root/app/config/configuration/chat
diff options
context:
space:
mode:
authorAlex Auvolat <alex@adnab.me>2021-01-16 17:07:01 +0100
committerAlex Auvolat <alex@adnab.me>2021-01-16 17:07:01 +0100
commitc74dc92febd1841c8ea5ff31caab0f941d57527d (patch)
treed05a203d95cac988952799667ec43c327a5d9038 /app/config/configuration/chat
parent0c4ee40e01c95d7bf73236cbead5cc261f67eb9d (diff)
downloadinfrastructure-c74dc92febd1841c8ea5ff31caab0f941d57527d.tar.gz
infrastructure-c74dc92febd1841c8ea5ff31caab0f941d57527d.zip
Proposal: reorganize app/ folder by modules
Diffstat (limited to 'app/config/configuration/chat')
-rw-r--r--app/config/configuration/chat/coturn/turnserver.conf.tpl19
-rw-r--r--app/config/configuration/chat/easybridge/config.json.tpl17
-rw-r--r--app/config/configuration/chat/easybridge/registration.yaml.tpl14
-rw-r--r--app/config/configuration/chat/fb2mx/config.yaml133
-rw-r--r--app/config/configuration/chat/fb2mx/registration.yaml11
-rw-r--r--app/config/configuration/chat/riot_web/config.json49
-rw-r--r--app/config/configuration/chat/synapse/conf.d/report_stats.yaml1
-rw-r--r--app/config/configuration/chat/synapse/conf.d/server_name.yaml1
-rw-r--r--app/config/configuration/chat/synapse/homeserver.yaml420
-rw-r--r--app/config/configuration/chat/synapse/log.yaml41
10 files changed, 0 insertions, 706 deletions
diff --git a/app/config/configuration/chat/coturn/turnserver.conf.tpl b/app/config/configuration/chat/coturn/turnserver.conf.tpl
deleted file mode 100644
index f867ac0..0000000
--- a/app/config/configuration/chat/coturn/turnserver.conf.tpl
+++ /dev/null
@@ -1,19 +0,0 @@
-use-auth-secret
-static-auth-secret={{ key "secrets/chat/coturn/static-auth" | trimSpace }}
-realm=turn.deuxfleurs.fr
-
-# VoIP traffic is all UDP. There is no reason to let users connect to arbitrary TCP endpoints via the relay.
-#no-tcp-relay
-
-# don't let the relay ever try to connect to private IP address ranges within your network (if any)
-# given the turn server is likely behind your firewall, remember to include any privileged public IPs too.
-#denied-peer-ip=10.0.0.0-10.255.255.255
-#denied-peer-ip=192.168.0.0-192.168.255.255
-#denied-peer-ip=172.16.0.0-172.31.255.255
-
-# consider whether you want to limit the quota of relayed streams per user (or total) to avoid risk of DoS.
-user-quota=12 # 4 streams per video call, so 12 streams = 3 simultaneous relayed calls per user.
-total-quota=1200
-
-min-port=49152
-max-port=49252
diff --git a/app/config/configuration/chat/easybridge/config.json.tpl b/app/config/configuration/chat/easybridge/config.json.tpl
deleted file mode 100644
index 40ecc44..0000000
--- a/app/config/configuration/chat/easybridge/config.json.tpl
+++ /dev/null
@@ -1,17 +0,0 @@
-{
- "log_level": "info",
- "easybridge_avatar": "/app/easybridge.jpg",
-
- "web_bind_addr": "0.0.0.0:8281",
- "web_url": "https://easybridge.deuxfleurs.fr",
- "web_session_key": "{{ key "secrets/chat/easybridge/web_session_key" | trimSpace }}",
-
- "appservice_bind_addr": "0.0.0.0:8321",
- "registration": "/data/registration.yaml",
- "homeserver_url": "https://im.deuxfleurs.fr",
- "matrix_domain": "deuxfleurs.fr",
- "name_format": "{}_ezbr_",
-
- "db_type": "postgres",
- "db_path": "host=psql-proxy.service.2.cluster.deuxfleurs.fr port=5432 user={{ key "secrets/chat/easybridge/db_user" | trimSpace }} dbname=easybridge password={{ key "secrets/chat/easybridge/db_pass" | trimSpace }} sslmode=disable"
-}
diff --git a/app/config/configuration/chat/easybridge/registration.yaml.tpl b/app/config/configuration/chat/easybridge/registration.yaml.tpl
deleted file mode 100644
index ec098fd..0000000
--- a/app/config/configuration/chat/easybridge/registration.yaml.tpl
+++ /dev/null
@@ -1,14 +0,0 @@
-id: Easybridge
-url: http://easybridge-api.service.2.cluster.deuxfleurs.fr:8321
-as_token: {{ key "secrets/chat/easybridge/as_token" | trimSpace }}
-hs_token: {{ key "secrets/chat/easybridge/hs_token" | trimSpace }}
-sender_localpart: _ezbr_
-rate_limited: false
-namespaces:
- users:
- - exclusive: true
- regex: '@.*_ezbr_'
- aliases:
- - exclusive: true
- regex: '#.*_ezbr_'
- rooms: []
diff --git a/app/config/configuration/chat/fb2mx/config.yaml b/app/config/configuration/chat/fb2mx/config.yaml
deleted file mode 100644
index 964c681..0000000
--- a/app/config/configuration/chat/fb2mx/config.yaml
+++ /dev/null
@@ -1,133 +0,0 @@
-# Homeserver details
-homeserver:
- # The address that this appservice can use to connect to the homeserver.
- address: https://im.deuxfleurs.fr
- # The domain of the homeserver (for MXIDs, etc).
- domain: deuxfleurs.fr
- # Whether or not to verify the SSL certificate of the homeserver.
- # Only applies if address starts with https://
- verify_ssl: true
-
-# Application service host/registration related details
-# Changing these values requires regeneration of the registration.
-appservice:
- # The address that the homeserver can use to connect to this appservice.
- address: http://fb2mx.service.2.cluster.deuxfleurs.fr:29319
-
- # The hostname and port where this appservice should listen.
- hostname: 0.0.0.0
- port: 29319
- # The maximum body size of appservice API requests (from the homeserver) in mebibytes
- # Usually 1 is enough, but on high-traffic bridges you might need to increase this to avoid 413s
- max_body_size: 1
-
- # The full URI to the database. SQLite and Postgres are fully supported.
- # Other DBMSes supported by SQLAlchemy may or may not work.
- # Format examples:
- # SQLite: sqlite:///filename.db
- # Postgres: postgres://username:password@hostname/dbname
- database: '{{ key "secrets/chat/fb2mx/db_url" | trimSpace }}'
-
- # The unique ID of this appservice.
- id: facebook
- # Username of the appservice bot.
- bot_username: facebookbot
- # Display name and avatar for bot. Set to "remove" to remove display name/avatar, leave empty
- # to leave display name/avatar as-is.
- bot_displayname: Facebook bridge bot
- bot_avatar: mxc://maunium.net/ddtNPZSKMNqaUzqrHuWvUADv
-
- # Community ID for bridged users (changes registration file) and rooms.
- # Must be created manually.
- community_id: "+fbusers:deuxfleurs.fr"
-
- # Authentication tokens for AS <-> HS communication. Autogenerated; do not modify.
- as_token: '{{ key "secrets/chat/fb2mx/as_token" | trimSpace }}'
- hs_token: '{{ key "secrets/chat/fb2mx/hs_token" | trimSpace }}'
-
-# Bridge config
-bridge:
- # Localpart template of MXIDs for Facebook users.
- # {userid} is replaced with the user ID of the Facebook user.
- username_template: "facebook_{userid}"
- # Localpart template for per-user room grouping community IDs.
- # The bridge will create these communities and add all of the specific user's portals to the community.
- # {localpart} is the MXID localpart and {server} is the MXID server part of the user.
- #
- # `facebook_{localpart}={server}` is a good value.
- community_template: "facebook_{localpart}={server}"
- # Displayname template for Facebook users.
- # {displayname} is replaced with the display name of the Facebook user
- # as defined below in displayname_preference.
- # Keys available for displayname_preference are also available here.
- displayname_template: "{displayname} (FB)"
- # Available keys:
- # "name" (full name)
- # "first_name"
- # "last_name"
- # "nickname"
- # "own_nickname" (user-specific!)
- displayname_preference:
- - name
-
- # The prefix for commands. Only required in non-management rooms.
- command_prefix: "!fb"
-
- # Number of chats to sync (and create portals for) on startup/login.
- # Maximum 20, set 0 to disable automatic syncing.
- initial_chat_sync: 10
- # Whether or not the Facebook users of logged in Matrix users should be
- # invited to private chats when the user sends a message from another client.
- invite_own_puppet_to_pm: false
- # Whether or not to use /sync to get presence, read receipts and typing notifications when using
- # your own Matrix account as the Matrix puppet for your Facebook account.
- sync_with_custom_puppets: true
- # Whether or not to bridge presence in both directions. Facebook allows users not to broadcast
- # presence, but then it won't send other users' presence to the client.
- presence: true
- # Whether or not to update avatars when syncing all contacts at startup.
- update_avatar_initial_sync: true
-
- # Permissions for using the bridge.
- # Permitted values:
- # user - Use the bridge with puppeting.
- # admin - Use and administrate the bridge.
- # Permitted keys:
- # * - All Matrix users
- # domain - All users on that homeserver
- # mxid - Specific user
- permissions:
- "deuxfleurs.fr": "user"
-
-# Python logging configuration.
-#
-# See section 16.7.2 of the Python documentation for more info:
-# https://docs.python.org/3.6/library/logging.config.html#configuration-dictionary-schema
-logging:
- version: 1
- formatters:
- colored:
- (): mautrix_facebook.util.ColorFormatter
- format: "[%(asctime)s] [%(levelname)s@%(name)s] %(message)s"
- normal:
- format: "[%(asctime)s] [%(levelname)s@%(name)s] %(message)s"
- handlers:
- file:
- class: logging.handlers.RotatingFileHandler
- formatter: normal
- filename: ./mautrix-facebook.log
- maxBytes: 10485760
- backupCount: 10
- console:
- class: logging.StreamHandler
- formatter: colored
- loggers:
- mau:
- level: DEBUG
- fbchat:
- level: DEBUG
- aiohttp:
- level: INFO
- root:
- level: DEBUG
- handlers: [file, console]
diff --git a/app/config/configuration/chat/fb2mx/registration.yaml b/app/config/configuration/chat/fb2mx/registration.yaml
deleted file mode 100644
index c3d8c05..0000000
--- a/app/config/configuration/chat/fb2mx/registration.yaml
+++ /dev/null
@@ -1,11 +0,0 @@
-id: facebook
-as_token: '{{ key "secrets/chat/fb2mx/as_token" | trimSpace }}'
-hs_token: '{{ key "secrets/chat/fb2mx/hs_token" | trimSpace }}'
-namespaces:
- users:
- - exclusive: true
- regex: '@facebook_.+:deuxfleurs.fr'
- group_id: '+fbusers:deuxfleurs.fr'
-url: http://fb2mx.service.2.cluster.deuxfleurs.fr:29319
-sender_localpart: facebookbot
-rate_limited: false
diff --git a/app/config/configuration/chat/riot_web/config.json b/app/config/configuration/chat/riot_web/config.json
deleted file mode 100644
index 9c898f0..0000000
--- a/app/config/configuration/chat/riot_web/config.json
+++ /dev/null
@@ -1,49 +0,0 @@
-{
- "default_server_config": {
- "m.homeserver": {
- "base_url": "https://im.deuxfleurs.fr",
- "server_name": "deuxfleurs.fr"
- },
- "m.identity_server": {
- "base_url": "https://vector.im"
- }
- },
- "disable_custom_urls": false,
- "disable_guests": false,
- "disable_login_language_selector": false,
- "disable_3pid_login": false,
- "brand": "Deuxfleurs",
- "integrations_ui_url": "https://scalar.vector.im/",
- "integrations_rest_url": "https://scalar.vector.im/api",
- "integrations_widgets_urls": [
- "https://scalar.vector.im/_matrix/integrations/v1",
- "https://scalar.vector.im/api",
- "https://scalar-staging.vector.im/_matrix/integrations/v1",
- "https://scalar-staging.vector.im/api",
- "https://scalar-staging.riot.im/scalar/api"
- ],
- "bug_report_endpoint_url": "https://element.io/bugreports/submit",
- "defaultCountryCode": "FR",
- "showLabsSettings": true,
- "features": {
- "feature_new_spinner": true,
- "feature_groups": "labs",
- "feature_pinning": "labs"
- },
- "default_federate": true,
- "default_theme": "light",
- "roomDirectory": {
- "servers": [
- "deuxfleurs.fr",
- "matrix.org",
- "tedomum.net",
- "zinz.dev"
- ]
- },
- "settingDefaults": {
- "breadcrumbs": true
- },
- "jitsi": {
- "preferredDomain": "jitsi.deuxfleurs.fr"
- }
-}
diff --git a/app/config/configuration/chat/synapse/conf.d/report_stats.yaml b/app/config/configuration/chat/synapse/conf.d/report_stats.yaml
deleted file mode 100644
index cb95cc3..0000000
--- a/app/config/configuration/chat/synapse/conf.d/report_stats.yaml
+++ /dev/null
@@ -1 +0,0 @@
-report_stats: true
diff --git a/app/config/configuration/chat/synapse/conf.d/server_name.yaml b/app/config/configuration/chat/synapse/conf.d/server_name.yaml
deleted file mode 100644
index 540ce45..0000000
--- a/app/config/configuration/chat/synapse/conf.d/server_name.yaml
+++ /dev/null
@@ -1 +0,0 @@
-server_name: deuxfleurs.fr
diff --git a/app/config/configuration/chat/synapse/homeserver.yaml b/app/config/configuration/chat/synapse/homeserver.yaml
deleted file mode 100644
index 7f313f6..0000000
--- a/app/config/configuration/chat/synapse/homeserver.yaml
+++ /dev/null
@@ -1,420 +0,0 @@
-# vim:ft=yaml
-
-server_name: "deuxfleurs.fr"
-# PEM encoded X509 certificate for TLS.
-# You can replace the self-signed certificate that synapse
-# autogenerates on launch with your own SSL certificate + key pair
-# if you like. Any required intermediary certificates can be
-# appended after the primary certificate in hierarchical order.
-tls_certificate_path: "/etc/matrix-synapse/homeserver.tls.crt"
-
-# PEM encoded private key for TLS
-tls_private_key_path: "/etc/matrix-synapse/homeserver.tls.key"
-
-# PEM dh parameters for ephemeral keys
-tls_dh_params_path: "/etc/matrix-synapse/homeserver.tls.dh"
-
-# Don't bind to the https port
-no_tls: True
-
-
-## Server ##
-
-# When running as a daemon, the file to store the pid in
-pid_file: "/var/run/matrix-synapse.pid"
-
-# Whether to serve a web client from the HTTP/HTTPS root resource.
-web_client: False
-
-# The public-facing base URL for the client API (not including _matrix/...)
-public_baseurl: https://im.deuxfleurs.fr/
-
-# Set the soft limit on the number of file descriptors synapse can use
-# Zero is used to indicate synapse should set the soft limit to the
-# hard limit.
-soft_file_limit: 0
-
-# The GC threshold parameters to pass to `gc.set_threshold`, if defined
-# gc_thresholds: [700, 10, 10]
-
-# A list of other Home Servers to fetch the public room directory from
-# and include in the public room directory of this home server
-# This is a temporary stopgap solution to populate new server with a
-# list of rooms until there exists a good solution of a decentralized
-# room directory.
-# secondary_directory_servers:
-# - matrix.org
-# - vector.im
-
-# List of ports that Synapse should listen on, their purpose and their
-# configuration.
-listeners:
- # Unsecure HTTP listener,
- # For when matrix traffic passes through loadbalancer that unwraps TLS.
- - port: 8008
- tls: false
- bind_address: ''
- type: http
-
- x_forwarded: false
-
- resources:
- - names: [client]
- compress: true
-
- - port: 8448
- tls: false
- bind_address: ''
- type: http
-
- x_forwarded: false
-
- resources:
- - names: [federation]
- compress: false
-
- # Turn on the twisted ssh manhole service on localhost on the given
- # port.
- # - port: 9000
- # bind_address: 127.0.0.1
- # type: manhole
-
-
-# Database configuration
-database:
- name: psycopg2
- args:
- user: {{ key "secrets/chat/synapse/postgres_user" | trimSpace }}
- password: {{ key "secrets/chat/synapse/postgres_pwd" | trimSpace }}
- database: {{ key "secrets/chat/synapse/postgres_db" | trimSpace }}
- host: psql-proxy.service.2.cluster.deuxfleurs.fr
- port: 5432
- cp_min: 5
- cp_max: 10
-# Number of events to cache in memory.
-event_cache_size: "10K"
-
-
-# A yaml python logging config file
-log_config: "/etc/matrix-synapse/log.yaml"
-
-# Stop twisted from discarding the stack traces of exceptions in
-# deferreds by waiting a reactor tick before running a deferred's
-# callbacks.
-# full_twisted_stacktraces: true
-
-
-## Ratelimiting ##
-
-# Number of messages a client can send per second
-rc_messages_per_second: 0.2
-
-# Number of message a client can send before being throttled
-rc_message_burst_count: 10.0
-
-# The federation window size in milliseconds
-federation_rc_window_size: 1000
-
-# The number of federation requests from a single server in a window
-# before the server will delay processing the request.
-federation_rc_sleep_limit: 10
-
-# The duration in milliseconds to delay processing events from
-# remote servers by if they go over the sleep limit.
-federation_rc_sleep_delay: 500
-
-# The maximum number of concurrent federation requests allowed
-# from a single server
-federation_rc_reject_limit: 50
-
-# The number of federation requests to concurrently process from a
-# single server
-federation_rc_concurrent: 3
-
-
-
-# Directory where uploaded images and attachments are stored.
-media_store_path: "/var/lib/matrix-synapse/media"
-uploads_path: "/var/lib/matrix-synapse/uploads"
-
-# The largest allowed upload size in bytes
-max_upload_size: "100M"
-
-# Maximum number of pixels that will be thumbnailed
-max_image_pixels: "32M"
-
-# Whether to generate new thumbnails on the fly to precisely match
-# the resolution requested by the client. If true then whenever
-# a new resolution is requested by the client the server will
-# generate a new thumbnail. If false the server will pick a thumbnail
-# from a precalculated list.
-dynamic_thumbnails: false
-
-# List of thumbnail to precalculate when an image is uploaded.
-thumbnail_sizes:
-- width: 32
- height: 32
- method: crop
-- width: 96
- height: 96
- method: crop
-- width: 320
- height: 240
- method: scale
-- width: 640
- height: 480
- method: scale
-- width: 800
- height: 600
- method: scale
-
-# Is the preview URL API enabled? If enabled, you *must* specify
-# an explicit url_preview_ip_range_blacklist of IPs that the spider is
-# denied from accessing.
-url_preview_enabled: True
-
-# List of IP address CIDR ranges that the URL preview spider is denied
-# from accessing. There are no defaults: you must explicitly
-# specify a list for URL previewing to work. You should specify any
-# internal services in your network that you do not want synapse to try
-# to connect to, otherwise anyone in any Matrix room could cause your
-# synapse to issue arbitrary GET requests to your internal services,
-# causing serious security issues.
-#
-url_preview_ip_range_blacklist:
- - '127.0.0.0/8'
- - '10.0.0.0/8'
- - '172.16.0.0/12'
- - '192.168.0.0/16'
-#
-# List of IP address CIDR ranges that the URL preview spider is allowed
-# to access even if they are specified in url_preview_ip_range_blacklist.
-# This is useful for specifying exceptions to wide-ranging blacklisted
-# target IP ranges - e.g. for enabling URL previews for a specific private
-# website only visible in your network.
-#
-# url_preview_ip_range_whitelist:
-# - '192.168.1.1'
-
-# Optional list of URL matches that the URL preview spider is
-# denied from accessing. You should use url_preview_ip_range_blacklist
-# in preference to this, otherwise someone could define a public DNS
-# entry that points to a private IP address and circumvent the blacklist.
-# This is more useful if you know there is an entire shape of URL that
-# you know that will never want synapse to try to spider.
-#
-# Each list entry is a dictionary of url component attributes as returned
-# by urlparse.urlsplit as applied to the absolute form of the URL. See
-# https://docs.python.org/2/library/urlparse.html#urlparse.urlsplit
-# The values of the dictionary are treated as an filename match pattern
-# applied to that component of URLs, unless they start with a ^ in which
-# case they are treated as a regular expression match. If all the
-# specified component matches for a given list item succeed, the URL is
-# blacklisted.
-#
-# url_preview_url_blacklist:
-# # blacklist any URL with a username in its URI
-# - username: '*'
-#
-# # blacklist all *.google.com URLs
-# - netloc: 'google.com'
-# - netloc: '*.google.com'
-#
-# # blacklist all plain HTTP URLs
-# - scheme: 'http'
-#
-# # blacklist http(s)://www.acme.com/foo
-# - netloc: 'www.acme.com'
-# path: '/foo'
-#
-# # blacklist any URL with a literal IPv4 address
-# - netloc: '^[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+$'
-
-# The largest allowed URL preview spidering size in bytes
-max_spider_size: "10M"
-
-
-
-
-## Captcha ##
-
-# This Home Server's ReCAPTCHA public key.
-recaptcha_public_key: "YOUR_PUBLIC_KEY"
-
-# This Home Server's ReCAPTCHA private key.
-recaptcha_private_key: "YOUR_PRIVATE_KEY"
-
-# Enables ReCaptcha checks when registering, preventing signup
-# unless a captcha is answered. Requires a valid ReCaptcha
-# public/private key.
-enable_registration_captcha: False
-
-# A secret key used to bypass the captcha test entirely.
-#captcha_bypass_secret: "YOUR_SECRET_HERE"
-
-# The API endpoint to use for verifying m.login.recaptcha responses.
-recaptcha_siteverify_api: "https://www.google.com/recaptcha/api/siteverify"
-
-
-## Turn ##
-
-# The public URIs of the TURN server to give to clients
-turn_uris: [ "turn:turn.deuxfleurs.fr:3478?transport=udp", "turn:turn.deuxfleurs.fr:3478?transport=tcp" ]
-
-# The shared secret used to compute passwords for the TURN server
-turn_shared_secret: '{{ key "secrets/chat/coturn/static-auth" | trimSpace }}'
-
-# How long generated TURN credentials last
-turn_user_lifetime: "1h"
-
-turn_allow_guests: True
-
-## Registration ##
-
-# Enable registration for new users.
-enable_registration: False
-
-# If set, allows registration by anyone who also has the shared
-# secret, even if registration is otherwise disabled.
-registration_shared_secret: '{{ key "secrets/chat/synapse/registration_shared_secret" | trimSpace }}'
-
-# Sets the expiry for the short term user creation in
-# milliseconds. For instance the bellow duration is two weeks
-# in milliseconds.
-user_creation_max_duration: 1209600000
-
-# Set the number of bcrypt rounds used to generate password hash.
-# Larger numbers increase the work factor needed to generate the hash.
-# The default number of rounds is 12.
-bcrypt_rounds: 12
-
-# Allows users to register as guests without a password/email/etc, and
-# participate in rooms hosted on this server which have been made
-# accessible to anonymous users.
-allow_guest_access: True
-
-# The list of identity servers trusted to verify third party
-# identifiers by this server.
-trusted_third_party_id_servers:
- - matrix.org
- - vector.im
-
-
-## Metrics ###
-
-# Enable collection and rendering of performance metrics
-enable_metrics: False
-
-## API Configuration ##
-
-# A list of event types that will be included in the room_invite_state
-room_invite_state_types:
- - "m.room.join_rules"
- - "m.room.canonical_alias"
- - "m.room.avatar"
- - "m.room.name"
-
-
-# A list of application service config file to use
-app_service_config_files:
- - "/etc/matrix-synapse/easybridge_registration.yaml"
- #- "/etc/matrix-synapse/fb2mx_registration.yaml"
-
-
-# macaroon_secret_key: <PRIVATE STRING>
-
-# Used to enable access token expiration.
-expire_access_token: False
-
-## Signing Keys ##
-
-# Path to the signing key to sign messages with
-signing_key_path: "/etc/matrix-synapse/homeserver.signing.key"
-
-# The keys that the server used to sign messages with but won't use
-# to sign new messages. E.g. it has lost its private key
-old_signing_keys: {}
-# "ed25519:auto":
-# # Base64 encoded public key
-# key: "The public part of your old signing key."
-# # Millisecond POSIX timestamp when the key expired.
-# expired_ts: 123456789123
-
-# How long key response published by this server is valid for.
-# Used to set the valid_until_ts in /key/v2 APIs.
-# Determines how quickly servers will query to check which keys
-# are still valid.
-key_refresh_interval: "1d" # 1 Day.
-
-# The trusted servers to download signing keys from.
-perspectives:
- servers:
- "matrix.org":
- verify_keys:
- "ed25519:auto":
- key: "Noi6WqcDj0QmPxCNQqgezwTlBKrfqehY1u2FyWP9uYw"
-
-
-
-# Enable SAML2 for registration and login. Uses pysaml2
-# config_path: Path to the sp_conf.py configuration file
-# idp_redirect_url: Identity provider URL which will redirect
-# the user back to /login/saml2 with proper info.
-# See pysaml2 docs for format of config.
-#saml2_config:
-# enabled: true
-# config_path: "/home/erikj/git/synapse/sp_conf.py"
-# idp_redirect_url: "http://test/idp"
-
-
-
-# Enable CAS for registration and login.
-#cas_config:
-# enabled: true
-# server_url: "https://cas-server.com"
-# service_url: "https://homesever.domain.com:8448"
-# #required_attributes:
-# # name: value
-
-
-# The JWT needs to contain a globally unique "sub" (subject) claim.
-#
-# jwt_config:
-# enabled: true
-# secret: "a secret"
-# algorithm: "HS256"
-
-password_providers:
- - module: "ldap_auth_provider.LdapAuthProvider"
- config:
- enabled: true
- uri: "ldap://bottin2.service.2.cluster.deuxfleurs.fr:389"
- start_tls: false
- bind_dn: '{{ key "secrets/chat/synapse/ldap_binddn" | trimSpace }}'
- bind_password: '{{ key "secrets/chat/synapse/ldap_bindpw" | trimSpace }}'
- base: "ou=users,dc=deuxfleurs,dc=fr"
- attributes:
- uid: "cn"
- name: "displayName"
- mail: "mail"
-
-# Enable password for login.
-password_config:
- enabled: true
-
-# Enable sending emails for notification events
-#email:
-# enable_notifs: false
-# smtp_host: "localhost"
-# smtp_port: 25
-# notif_from: "Your Friendly %(app)s Home Server <noreply@example.com>"
-# app_name: Matrix
-# template_dir: res/templates
-# notif_template_html: notif_mail.html
-# notif_template_text: notif_mail.txt
-# notif_for_new_users: True
-
-# Key that had to be added after some synapse updates to please matrix developers...
-report_stats: false
-suppress_key_server_warning: true
-enable_group_creation: true
diff --git a/app/config/configuration/chat/synapse/log.yaml b/app/config/configuration/chat/synapse/log.yaml
deleted file mode 100644
index eb69d8f..0000000
--- a/app/config/configuration/chat/synapse/log.yaml
+++ /dev/null
@@ -1,41 +0,0 @@
-
-version: 1
-
-formatters:
- precise:
- format: '%(asctime)s - %(name)s - %(lineno)d - %(levelname)s - %(request)s- %(message)s'
-
-filters:
- context:
- (): synapse.util.logcontext.LoggingContextFilter
- request: ""
-
-handlers:
- file:
- class: logging.handlers.RotatingFileHandler
- formatter: precise
- filename: /var/log/matrix-synapse/homeserver.log
- maxBytes: 10485760
- backupCount: 3
- filters: [context]
- level: WARN
- console:
- class: logging.StreamHandler
- formatter: precise
- level: WARN
-
-loggers:
- synapse:
- level: INFO
-
- synapse.storage.SQL:
- level: INFO
-
- ldap3:
- level: DEBUG
- ldap_auth_provider:
- level: DEBUG
-
-root:
- level: INFO
- handlers: [file, console]