|
|
|
@@ -141,6 +141,7 @@ default_room_version: {{ matrix_synapse_default_room_version|to_json }} |
|
|
|
# - '100.64.0.0/10' |
|
|
|
# - '192.0.0.0/24' |
|
|
|
# - '169.254.0.0/16' |
|
|
|
# - '192.88.99.0/24' |
|
|
|
# - '198.18.0.0/15' |
|
|
|
# - '192.0.2.0/24' |
|
|
|
# - '198.51.100.0/24' |
|
|
|
@@ -149,6 +150,9 @@ default_room_version: {{ matrix_synapse_default_room_version|to_json }} |
|
|
|
# - '::1/128' |
|
|
|
# - 'fe80::/10' |
|
|
|
# - 'fc00::/7' |
|
|
|
# - '2001:db8::/32' |
|
|
|
# - 'ff00::/8' |
|
|
|
# - 'fec0::/10' |
|
|
|
|
|
|
|
# List of IP address CIDR ranges that should be allowed for federation, |
|
|
|
# identity servers, push servers, and for checking key validity for |
|
|
|
@@ -993,6 +997,7 @@ url_preview_ip_range_blacklist: |
|
|
|
- '100.64.0.0/10' |
|
|
|
- '192.0.0.0/24' |
|
|
|
- '169.254.0.0/16' |
|
|
|
- '192.88.99.0/24' |
|
|
|
- '198.18.0.0/15' |
|
|
|
- '192.0.2.0/24' |
|
|
|
- '198.51.100.0/24' |
|
|
|
@@ -1001,6 +1006,9 @@ url_preview_ip_range_blacklist: |
|
|
|
- '::1/128' |
|
|
|
- 'fe80::/10' |
|
|
|
- 'fc00::/7' |
|
|
|
- '2001:db8::/32' |
|
|
|
- 'ff00::/8' |
|
|
|
- 'fec0::/10' |
|
|
|
|
|
|
|
# List of IP address CIDR ranges that the URL preview spider is allowed |
|
|
|
# to access even if they are specified in url_preview_ip_range_blacklist. |
|
|
|
@@ -1327,6 +1335,8 @@ account_threepid_delegates: |
|
|
|
# By default, any room aliases included in this list will be created |
|
|
|
# as a publicly joinable room when the first user registers for the |
|
|
|
# homeserver. This behaviour can be customised with the settings below. |
|
|
|
# If the room already exists, make certain it is a publicly joinable |
|
|
|
# room. The join rule of the room must be set to 'public'. |
|
|
|
# |
|
|
|
#auto_join_rooms: |
|
|
|
# - "#example:example.com" |
|
|
|
@@ -1869,9 +1879,9 @@ oidc_providers: |
|
|
|
# user_mapping_provider: |
|
|
|
# config: |
|
|
|
# subject_claim: "id" |
|
|
|
# localpart_template: "{ user.login }" |
|
|
|
# display_name_template: "{ user.name }" |
|
|
|
# email_template: "{ user.email }" |
|
|
|
# localpart_template: "{% raw %}{{ user.login }}{% endraw %}" |
|
|
|
# display_name_template: "{% raw %}{{ user.name }}{% endraw %}" |
|
|
|
# email_template: "{% raw %}{{ user.email }}{% endraw %}" |
|
|
|
|
|
|
|
# For use with Keycloak |
|
|
|
# |
|
|
|
@@ -1898,8 +1908,8 @@ oidc_providers: |
|
|
|
# user_mapping_provider: |
|
|
|
# config: |
|
|
|
# subject_claim: "id" |
|
|
|
# localpart_template: "{ user.login }" |
|
|
|
# display_name_template: "{ user.name }" |
|
|
|
# localpart_template: "{% raw %}{{ user.login }}{% endraw %}" |
|
|
|
# display_name_template: "{% raw %}{{ user.name }}{% endraw %}" |
|
|
|
|
|
|
|
|
|
|
|
# Enable Central Authentication Service (CAS) for registration and login. |
|
|
|
@@ -2227,11 +2237,11 @@ password_config: |
|
|
|
#require_uppercase: true |
|
|
|
|
|
|
|
ui_auth: |
|
|
|
# The number of milliseconds to allow a user-interactive authentication |
|
|
|
# session to be active. |
|
|
|
# The amount of time to allow a user-interactive authentication session |
|
|
|
# to be active. |
|
|
|
# |
|
|
|
# This defaults to 0, meaning the user is queried for their credentials |
|
|
|
# before every action, but this can be overridden to alow a single |
|
|
|
# before every action, but this can be overridden to allow a single |
|
|
|
# validation to be re-used. This weakens the protections afforded by |
|
|
|
# the user-interactive authentication process, by allowing for multiple |
|
|
|
# (and potentially different) operations to use the same validation session. |
|
|
|
@@ -2239,7 +2249,7 @@ ui_auth: |
|
|
|
# Uncomment below to allow for credential validation to last for 15 |
|
|
|
# seconds. |
|
|
|
# |
|
|
|
#session_timeout: 15000 |
|
|
|
#session_timeout: "15s" |
|
|
|
|
|
|
|
|
|
|
|
{% if matrix_synapse_email_enabled %} |
|
|
|
|