mirror of
				https://github.com/spantaleev/matrix-docker-ansible-deploy.git
				synced 2025-10-30 06:47:56 +01:00 
			
		
		
		
	Upgrade Synapse to 1.8.0
This commit is contained in:
		| @@ -3,7 +3,7 @@ | ||||
|  | ||||
| matrix_synapse_enabled: true | ||||
|  | ||||
| matrix_synapse_docker_image: "matrixdotorg/synapse:v1.7.3" | ||||
| matrix_synapse_docker_image: "matrixdotorg/synapse:v1.8.0" | ||||
| matrix_synapse_docker_image_force_pull: "{{ matrix_synapse_docker_image.endswith(':latest') }}" | ||||
|  | ||||
| matrix_synapse_base_path: "{{ matrix_base_data_path }}/synapse" | ||||
|   | ||||
| @@ -45,6 +45,13 @@ use_presence: {{ matrix_synapse_use_presence|to_json }} | ||||
| # | ||||
| #require_auth_for_profile_requests: true | ||||
|  | ||||
| # Uncomment to require a user to share a room with another user in order | ||||
| # to retrieve their profile information. Only checked on Client-Server | ||||
| # requests. Profile requests from other servers should be checked by the | ||||
| # requesting server. Defaults to 'false'. | ||||
| # | ||||
| #limit_profile_requests_to_users_who_share_rooms: true | ||||
|  | ||||
| # If set to 'true', removes the need for authentication to access the server's | ||||
| # public rooms directory through the client API, meaning that anyone can | ||||
| # query the room directory. Defaults to 'false'. | ||||
| @@ -1137,14 +1144,19 @@ form_secret: {{ matrix_synapse_form_secret|string|to_json }} | ||||
| signing_key_path: "/data/{{ matrix_server_fqn_matrix }}.signing.key" | ||||
|  | ||||
| # The keys that the server used to sign messages with but won't use | ||||
| # to sign new messages. E.g. it has lost its private key | ||||
| # to sign new messages. | ||||
| # | ||||
| #old_signing_keys: | ||||
| #  "ed25519:auto": | ||||
| #    # Base64 encoded public key | ||||
| #    key: "The public part of your old signing key." | ||||
| #    # Millisecond POSIX timestamp when the key expired. | ||||
| #    expired_ts: 123456789123 | ||||
| old_signing_keys: | ||||
|   # For each key, `key` should be the base64-encoded public key, and | ||||
|   # `expired_ts`should be the time (in milliseconds since the unix epoch) that | ||||
|   # it was last used. | ||||
|   # | ||||
|   # It is possible to build an entry from an old signing.key file using the | ||||
|   # `export_signing_key` script which is provided with synapse. | ||||
|   # | ||||
|   # For example: | ||||
|   # | ||||
|   #"ed25519:id": { key: "base64string", expired_ts: 123456789123 } | ||||
|  | ||||
| # How long key response published by this server is valid for. | ||||
| # Used to set the valid_until_ts in /key/v2 APIs. | ||||
| @@ -1241,7 +1253,7 @@ saml2_config: | ||||
|   #      - url: https://our_idp/metadata.xml | ||||
|   # | ||||
|   #    # By default, the user has to go to our login page first. If you'd like | ||||
|   #    # to allow IdP-initiated login, set 'allow_unsolicited: True' in a | ||||
|   #    # to allow IdP-initiated login, set 'allow_unsolicited: true' in a | ||||
|   #    # 'service.sp' section: | ||||
|   #    # | ||||
|   #    #service: | ||||
| @@ -1272,33 +1284,58 @@ saml2_config: | ||||
|   # | ||||
|   #config_path: "/data/sp_conf.py" | ||||
|  | ||||
|   # the lifetime of a SAML session. This defines how long a user has to | ||||
|   # The lifetime of a SAML session. This defines how long a user has to | ||||
|   # complete the authentication process, if allow_unsolicited is unset. | ||||
|   # The default is 5 minutes. | ||||
|   # | ||||
|   #saml_session_lifetime: 5m | ||||
|  | ||||
|   # The SAML attribute (after mapping via the attribute maps) to use to derive | ||||
|   # the Matrix ID from. 'uid' by default. | ||||
|   # An external module can be provided here as a custom solution to | ||||
|   # mapping attributes returned from a saml provider onto a matrix user. | ||||
|   # | ||||
|   #mxid_source_attribute: displayName | ||||
|   user_mapping_provider: | ||||
|     # The custom module's class. Uncomment to use a custom module. | ||||
|     # | ||||
|     #module: mapping_provider.SamlMappingProvider | ||||
|  | ||||
|   # The mapping system to use for mapping the saml attribute onto a matrix ID. | ||||
|   # Options include: | ||||
|   #  * 'hexencode' (which maps unpermitted characters to '=xx') | ||||
|   #  * 'dotreplace' (which replaces unpermitted characters with '.'). | ||||
|   # The default is 'hexencode'. | ||||
|   # | ||||
|   #mxid_mapping: dotreplace | ||||
|     # Custom configuration values for the module. Below options are | ||||
|     # intended for the built-in provider, they should be changed if | ||||
|     # using a custom module. This section will be passed as a Python | ||||
|     # dictionary to the module's `parse_config` method. | ||||
|     # | ||||
|     config: | ||||
|       # The SAML attribute (after mapping via the attribute maps) to use | ||||
|       # to derive the Matrix ID from. 'uid' by default. | ||||
|       # | ||||
|       # Note: This used to be configured by the | ||||
|       # saml2_config.mxid_source_attribute option. If that is still | ||||
|       # defined, its value will be used instead. | ||||
|       # | ||||
|       #mxid_source_attribute: displayName | ||||
|  | ||||
|   # In previous versions of synapse, the mapping from SAML attribute to MXID was | ||||
|   # always calculated dynamically rather than stored in a table. For backwards- | ||||
|   # compatibility, we will look for user_ids matching such a pattern before | ||||
|   # creating a new account. | ||||
|       # The mapping system to use for mapping the saml attribute onto a | ||||
|       # matrix ID. | ||||
|       # | ||||
|       # Options include: | ||||
|       #  * 'hexencode' (which maps unpermitted characters to '=xx') | ||||
|       #  * 'dotreplace' (which replaces unpermitted characters with | ||||
|       #     '.'). | ||||
|       # The default is 'hexencode'. | ||||
|       # | ||||
|       # Note: This used to be configured by the | ||||
|       # saml2_config.mxid_mapping option. If that is still defined, its | ||||
|       # value will be used instead. | ||||
|       # | ||||
|       #mxid_mapping: dotreplace | ||||
|  | ||||
|   # In previous versions of synapse, the mapping from SAML attribute to | ||||
|   # MXID was always calculated dynamically rather than stored in a | ||||
|   # table. For backwards- compatibility, we will look for user_ids | ||||
|   # matching such a pattern before creating a new account. | ||||
|   # | ||||
|   # This setting controls the SAML attribute which will be used for this | ||||
|   # backwards-compatibility lookup. Typically it should be 'uid', but if the | ||||
|   # attribute maps are changed, it may be necessary to change it. | ||||
|   # backwards-compatibility lookup. Typically it should be 'uid', but if | ||||
|   # the attribute maps are changed, it may be necessary to change it. | ||||
|   # | ||||
|   # The default is 'uid'. | ||||
|   # | ||||
|   | ||||
		Reference in New Issue
	
	Block a user