Просмотр исходного кода

Use a common expression for password setting

Signed-off-by: Suguru Hirahara <acioustick@noreply.codeberg.org>
pull/3618/head
Suguru Hirahara 1 год назад
Родитель
Сommit
9b76a86daf
Не найден GPG ключ соответствующий данной подписи Идентификатор GPG ключа: E4F9743DAB4B7B75
3 измененных файлов: 4 добавлений и 5 удалений
  1. +1
    -1
      docs/configuring-playbook-bot-baibot.md
  2. +1
    -1
      docs/configuring-playbook-matrix-registration.md
  3. +2
    -3
      docs/configuring-playbook-shared-secret-auth.md

+ 1
- 1
docs/configuring-playbook-bot-baibot.md Просмотреть файл

@@ -46,7 +46,7 @@ matrix_bot_baibot_enabled: true
matrix_bot_baibot_config_user_password: 'PASSWORD_FOR_THE_BOT' matrix_bot_baibot_config_user_password: 'PASSWORD_FOR_THE_BOT'


# An optional passphrase to use for backing up and recovering the bot's encryption keys. # An optional passphrase to use for backing up and recovering the bot's encryption keys.
# You can use any string here. Consider generating it with `pwgen -s 64 1`.
# You can put any string here, but generating a strong one is preferred (e.g. `pwgen -s 64 1`).
# #
# If set to null, the recovery module will not be used and losing your session/database # If set to null, the recovery module will not be used and losing your session/database
# will mean you lose access to old messages in encrypted room. # will mean you lose access to old messages in encrypted room.


+ 1
- 1
docs/configuring-playbook-matrix-registration.md Просмотреть файл

@@ -24,7 +24,7 @@ Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.
```yaml ```yaml
matrix_registration_enabled: true matrix_registration_enabled: true


# Generate a strong secret using: `pwgen -s 64 1`.
# Generate a strong secret here. Consider generating it with `pwgen -s 64 1`
matrix_registration_admin_secret: "ENTER_SOME_SECRET_HERE" matrix_registration_admin_secret: "ENTER_SOME_SECRET_HERE"
``` ```




+ 2
- 3
docs/configuring-playbook-shared-secret-auth.md Просмотреть файл

@@ -10,12 +10,11 @@ Add the following configuration to your `inventory/host_vars/matrix.DOMAIN/vars.


```yaml ```yaml
matrix_synapse_ext_password_provider_shared_secret_auth_enabled: true matrix_synapse_ext_password_provider_shared_secret_auth_enabled: true

# Generate a strong shared secret here. Consider generating it with `pwgen -s 64 1`
matrix_synapse_ext_password_provider_shared_secret_auth_shared_secret: YOUR_SHARED_SECRET_GOES_HERE matrix_synapse_ext_password_provider_shared_secret_auth_shared_secret: YOUR_SHARED_SECRET_GOES_HERE
``` ```


You can generate a strong shared secret with a command like this: `pwgen -s 64 1`


## Authenticating only using a password provider ## Authenticating only using a password provider


If you wish for users to **authenticate only against configured password providers** (like this one), **without consulting Synapse's local database**, feel free to disable it: If you wish for users to **authenticate only against configured password providers** (like this one), **without consulting Synapse's local database**, feel free to disable it:


Загрузка…
Отмена
Сохранить