Compare commits

..

6 Commits

Author SHA1 Message Date
Slavi Pantaleev
22f527ad1a
Merge pull request #3620 from luixxiul/fix
Update docs/configuring-playbook-bot-postmoogle.md: add "bots" to the comment
2024-10-17 10:58:34 +03:00
Suguru Hirahara
3d7cef0490
Update docs/configuring-playbook-bot-postmoogle.md: add "bots" to the comment
Signed-off-by: Suguru Hirahara <acioustick@noreply.codeberg.org>
2024-10-17 15:22:17 +09:00
Slavi Pantaleev
57e2fb291d
Merge pull request #3619 from luixxiul/fix
Update docs/configuring-playbook-external-postgres.md: remove a duplicate sentence
2024-10-17 09:14:04 +03:00
Suguru Hirahara
a874d5f918
Update docs/configuring-playbook-external-postgres.md: remove a duplicate sentence
Signed-off-by: Suguru Hirahara <acioustick@noreply.codeberg.org>
2024-10-17 15:01:43 +09:00
Slavi Pantaleev
72f31faac0
Merge pull request #3618 from luixxiul/fix
Use a common expression for password setting
2024-10-17 08:47:36 +03:00
Suguru Hirahara
9b76a86daf
Use a common expression for password setting
Signed-off-by: Suguru Hirahara <acioustick@noreply.codeberg.org>
2024-10-17 14:22:45 +09:00
5 changed files with 6 additions and 9 deletions

View File

@ -46,7 +46,7 @@ matrix_bot_baibot_enabled: true
matrix_bot_baibot_config_user_password: 'PASSWORD_FOR_THE_BOT' matrix_bot_baibot_config_user_password: 'PASSWORD_FOR_THE_BOT'
# An optional passphrase to use for backing up and recovering the bot's encryption keys. # An optional passphrase to use for backing up and recovering the bot's encryption keys.
# You can use any string here. Consider generating it with `pwgen -s 64 1`. # You can put any string here, but generating a strong one is preferred (e.g. `pwgen -s 64 1`).
# #
# If set to null, the recovery module will not be used and losing your session/database # If set to null, the recovery module will not be used and losing your session/database
# will mean you lose access to old messages in encrypted room. # will mean you lose access to old messages in encrypted room.

View File

@ -41,7 +41,7 @@ matrix_bot_postmoogle_password: PASSWORD_FOR_THE_BOT
# matrix_bot_postmoogle_admins: # matrix_bot_postmoogle_admins:
# - '@yourAdminAccount:domain.com' # - '@yourAdminAccount:domain.com'
# #
# .. unless you've made yourself an admin of all bridges like this: # .. unless you've made yourself an admin of all bots/bridges like this:
# #
# matrix_admin: '@yourAdminAccount:domain.com' # matrix_admin: '@yourAdminAccount:domain.com'
``` ```

View File

@ -3,11 +3,9 @@
By default, this playbook would set up a PostgreSQL database server on your machine, running in a Docker container. By default, this playbook would set up a PostgreSQL database server on your machine, running in a Docker container.
If that's alright, you can skip this. If that's alright, you can skip this.
If you'd like to use an external PostgreSQL server that you manage, you can edit your configuration file (`inventory/host_vars/matrix.<your-domain>/vars.yml`).
**Note**: using **an external Postgres server is currently [not very seamless](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1682#issuecomment-1061461683) when it comes to enabling various other playbook services** - you will need to create a new database/credentials for each service and to point each service to its corresponding database using custom `vars.yml` configuration. **For the best experience with the playbook, stick to using the integrated Postgres server**. **Note**: using **an external Postgres server is currently [not very seamless](https://github.com/spantaleev/matrix-docker-ansible-deploy/issues/1682#issuecomment-1061461683) when it comes to enabling various other playbook services** - you will need to create a new database/credentials for each service and to point each service to its corresponding database using custom `vars.yml` configuration. **For the best experience with the playbook, stick to using the integrated Postgres server**.
If you'd like to use an external Postgres server, add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file (adapt to your needs): If you'd like to use an external Postgres server that you manage, add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.yml` file (adapt to your needs):
```yaml ```yaml
postgres_enabled: false postgres_enabled: false

View File

@ -24,7 +24,7 @@ Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.
```yaml ```yaml
matrix_registration_enabled: true matrix_registration_enabled: true
# Generate a strong secret using: `pwgen -s 64 1`. # Generate a strong secret here. Consider generating it with `pwgen -s 64 1`
matrix_registration_admin_secret: "ENTER_SOME_SECRET_HERE" matrix_registration_admin_secret: "ENTER_SOME_SECRET_HERE"
``` ```

View File

@ -10,12 +10,11 @@ Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.
```yaml ```yaml
matrix_synapse_ext_password_provider_shared_secret_auth_enabled: true matrix_synapse_ext_password_provider_shared_secret_auth_enabled: true
# Generate a strong shared secret here. Consider generating it with `pwgen -s 64 1`
matrix_synapse_ext_password_provider_shared_secret_auth_shared_secret: YOUR_SHARED_SECRET_GOES_HERE matrix_synapse_ext_password_provider_shared_secret_auth_shared_secret: YOUR_SHARED_SECRET_GOES_HERE
``` ```
You can generate a strong shared secret with a command like this: `pwgen -s 64 1`
## Authenticating only using a password provider ## Authenticating only using a password provider
If you wish for users to **authenticate only against configured password providers** (like this one), **without consulting Synapse's local database**, feel free to disable it: If you wish for users to **authenticate only against configured password providers** (like this one), **without consulting Synapse's local database**, feel free to disable it: