|
|
|
@@ -110,6 +110,24 @@ use_presence: {{ matrix_synapse_use_presence|to_json }} |
|
|
|
federation_domain_whitelist: {{ matrix_synapse_federation_domain_whitelist|to_json }} |
|
|
|
{% endif %} |
|
|
|
|
|
|
|
# Prevent federation requests from being sent to the following |
|
|
|
# blacklist IP address CIDR ranges. If this option is not specified, or |
|
|
|
# specified with an empty list, no ip range blacklist will be enforced. |
|
|
|
# |
|
|
|
# (0.0.0.0 and :: are always blacklisted, whether or not they are explicitly |
|
|
|
# listed here, since they correspond to unroutable addresses.) |
|
|
|
# |
|
|
|
federation_ip_range_blacklist: |
|
|
|
- '127.0.0.0/8' |
|
|
|
- '10.0.0.0/8' |
|
|
|
- '172.16.0.0/12' |
|
|
|
- '192.168.0.0/16' |
|
|
|
- '100.64.0.0/10' |
|
|
|
- '169.254.0.0/16' |
|
|
|
- '::1/128' |
|
|
|
- 'fe80::/64' |
|
|
|
- 'fc00::/7' |
|
|
|
|
|
|
|
# List of ports that Synapse should listen on, their purpose and their |
|
|
|
# configuration. |
|
|
|
# |
|
|
|
@@ -260,6 +278,12 @@ listeners: |
|
|
|
# |
|
|
|
#require_membership_for_aliases: false |
|
|
|
|
|
|
|
# Whether to allow per-room membership profiles through the send of membership |
|
|
|
# events with profile information that differ from the target's global profile. |
|
|
|
# Defaults to 'true'. |
|
|
|
# |
|
|
|
#allow_per_room_profiles: false |
|
|
|
|
|
|
|
|
|
|
|
## TLS ## |
|
|
|
|
|
|
|
@@ -433,21 +457,15 @@ log_config: "/data/{{ matrix_server_fqn_matrix }}.log.config" |
|
|
|
|
|
|
|
## Ratelimiting ## |
|
|
|
|
|
|
|
# Number of messages a client can send per second |
|
|
|
# |
|
|
|
rc_messages_per_second: {{ matrix_synapse_rc_messages_per_second }} |
|
|
|
|
|
|
|
# Number of message a client can send before being throttled |
|
|
|
# |
|
|
|
rc_message_burst_count: {{ matrix_synapse_rc_message_burst_count }} |
|
|
|
|
|
|
|
# Ratelimiting settings for registration and login. |
|
|
|
# Ratelimiting settings for client actions (registration, login, messaging). |
|
|
|
# |
|
|
|
# Each ratelimiting configuration is made of two parameters: |
|
|
|
# - per_second: number of requests a client can send per second. |
|
|
|
# - burst_count: number of requests a client can send before being throttled. |
|
|
|
# |
|
|
|
# Synapse currently uses the following configurations: |
|
|
|
# - one for messages that ratelimits sending based on the account the client |
|
|
|
# is using |
|
|
|
# - one for registration that ratelimits registration requests based on the |
|
|
|
# client's IP address. |
|
|
|
# - one for login that ratelimits login requests based on the client's IP |
|
|
|
@@ -460,6 +478,12 @@ rc_message_burst_count: {{ matrix_synapse_rc_message_burst_count }} |
|
|
|
# |
|
|
|
# The defaults are as shown below. |
|
|
|
# |
|
|
|
#rc_message: |
|
|
|
# per_second: 0.2 |
|
|
|
# burst_count: 10 |
|
|
|
# |
|
|
|
rc_message: {{ matrix_synapse_rc_message|to_json }} |
|
|
|
# |
|
|
|
#rc_registration: |
|
|
|
# per_second: 0.17 |
|
|
|
# burst_count: 3 |
|
|
|
@@ -477,34 +501,29 @@ rc_registration: {{ matrix_synapse_rc_registration|to_json }} |
|
|
|
# burst_count: 3 |
|
|
|
rc_login: {{ matrix_synapse_rc_login|to_json }} |
|
|
|
|
|
|
|
# The federation window size in milliseconds |
|
|
|
# |
|
|
|
#federation_rc_window_size: 1000 |
|
|
|
federation_rc_window_size: {{ matrix_synapse_federation_rc_window_size }} |
|
|
|
|
|
|
|
# The number of federation requests from a single server in a window |
|
|
|
# before the server will delay processing the request. |
|
|
|
# |
|
|
|
#federation_rc_sleep_limit: 10 |
|
|
|
federation_rc_sleep_limit: {{ matrix_synapse_federation_rc_sleep_limit }} |
|
|
|
|
|
|
|
# The duration in milliseconds to delay processing events from |
|
|
|
# remote servers by if they go over the sleep limit. |
|
|
|
# Ratelimiting settings for incoming federation |
|
|
|
# |
|
|
|
#federation_rc_sleep_delay: 500 |
|
|
|
federation_rc_sleep_delay: {{ matrix_synapse_federation_rc_sleep_delay }} |
|
|
|
|
|
|
|
# The maximum number of concurrent federation requests allowed |
|
|
|
# from a single server |
|
|
|
# The rc_federation configuration is made up of the following settings: |
|
|
|
# - window_size: window size in milliseconds |
|
|
|
# - sleep_limit: number of federation requests from a single server in |
|
|
|
# a window before the server will delay processing the request. |
|
|
|
# - sleep_delay: duration in milliseconds to delay processing events |
|
|
|
# from remote servers by if they go over the sleep limit. |
|
|
|
# - reject_limit: maximum number of concurrent federation requests |
|
|
|
# allowed from a single server |
|
|
|
# - concurrent: number of federation requests to concurrently process |
|
|
|
# from a single server |
|
|
|
# |
|
|
|
#federation_rc_reject_limit: 50 |
|
|
|
federation_rc_reject_limit: {{ matrix_synapse_federation_rc_reject_limit }} |
|
|
|
|
|
|
|
# The number of federation requests to concurrently process from a |
|
|
|
# single server |
|
|
|
# The defaults are as shown below. |
|
|
|
# |
|
|
|
#federation_rc_concurrent: 3 |
|
|
|
federation_rc_concurrent: {{ matrix_synapse_federation_rc_concurrent }} |
|
|
|
#rc_federation: |
|
|
|
# window_size: 1000 |
|
|
|
# sleep_limit: 10 |
|
|
|
# sleep_delay: 500 |
|
|
|
# reject_limit: 50 |
|
|
|
# concurrent: 3 |
|
|
|
rc_federation: {{ matrix_synapse_rc_federation|to_json }} |
|
|
|
|
|
|
|
# Target outgoing federation transaction frequency for sending read-receipts, |
|
|
|
# per-room. |
|
|
|
@@ -719,6 +738,40 @@ turn_allow_guests: False |
|
|
|
# |
|
|
|
enable_registration: {{ matrix_synapse_enable_registration|to_json }} |
|
|
|
|
|
|
|
# Optional account validity configuration. This allows for accounts to be denied |
|
|
|
# any request after a given period. |
|
|
|
# |
|
|
|
# ``enabled`` defines whether the account validity feature is enabled. Defaults |
|
|
|
# to False. |
|
|
|
# |
|
|
|
# ``period`` allows setting the period after which an account is valid |
|
|
|
# after its registration. When renewing the account, its validity period |
|
|
|
# will be extended by this amount of time. This parameter is required when using |
|
|
|
# the account validity feature. |
|
|
|
# |
|
|
|
# ``renew_at`` is the amount of time before an account's expiry date at which |
|
|
|
# Synapse will send an email to the account's email address with a renewal link. |
|
|
|
# This needs the ``email`` and ``public_baseurl`` configuration sections to be |
|
|
|
# filled. |
|
|
|
# |
|
|
|
# ``renew_email_subject`` is the subject of the email sent out with the renewal |
|
|
|
# link. ``%(app)s`` can be used as a placeholder for the ``app_name`` parameter |
|
|
|
# from the ``email`` section. |
|
|
|
# |
|
|
|
# Once this feature is enabled, Synapse will look for registered users without an |
|
|
|
# expiration date at startup and will add one to every account it found using the |
|
|
|
# current settings at that time. |
|
|
|
# This means that, if a validity period is set, and Synapse is restarted (it will |
|
|
|
# then derive an expiration date from the current validity period), and some time |
|
|
|
# after that the validity period changes and Synapse is restarted, the users' |
|
|
|
# expiration dates won't be updated unless their account is manually renewed. |
|
|
|
# |
|
|
|
#account_validity: |
|
|
|
# enabled: True |
|
|
|
# period: 6w |
|
|
|
# renew_at: 1w |
|
|
|
# renew_email_subject: "Renew your %(app)s account" |
|
|
|
|
|
|
|
# The user must provide all of the below types of 3PID when registering. |
|
|
|
# |
|
|
|
#registrations_require_3pid: |
|
|
|
|