Skip to content
GitLab
Menu
Projects
Groups
Snippets
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in
Toggle navigation
Menu
Open sidebar
Arch Linux
infrastructure
Commits
94982def
Verified
Commit
94982def
authored
Apr 09, 2021
by
Jan Alexander Steffens (heftig)
Browse files
matrix: Update synapse to 1.31.0
parent
24c85844
Pipeline
#6390
passed with stage
in 34 seconds
Changes
2
Pipelines
1
Hide whitespace changes
Inline
Side-by-side
roles/matrix/tasks/main.yml
View file @
94982def
...
...
@@ -78,7 +78,7 @@
-
name
:
install synapse
pip
:
name
:
-
'
matrix-synapse[postgres,systemd,url_preview,redis]==1.3
0.1
'
-
'
matrix-synapse[postgres,systemd,url_preview,redis]==1.3
1.0
'
state
:
latest
extra_args
:
'
--upgrade-strategy=eager'
virtualenv
:
/var/lib/synapse/venv
...
...
roles/matrix/templates/homeserver.yaml.j2
View file @
94982def
...
...
@@ -871,10 +871,10 @@ rc_message:
#rc_joins:
# local:
# per_second: 0.1
# burst_count:
3
# burst_count:
10
# remote:
# per_second: 0.01
# burst_count:
3
# burst_count:
10
#
#rc_3pid_validation:
# per_second: 0.003
...
...
@@ -1763,6 +1763,9 @@ saml2_config:
# Note that, if this is changed, users authenticating via that provider
# will no longer be recognised as the same user!
#
# (Use "oidc" here if you are migrating from an old "oidc_config"
# configuration.)
#
# idp_name: A user-facing name for this identity provider, which is used to
# offer the user a choice of login mechanisms.
#
...
...
@@ -1878,6 +1881,24 @@ saml2_config:
# which is set to the claims returned by the UserInfo Endpoint and/or
# in the ID Token.
#
# It is possible to configure Synapse to only allow logins if certain attributes
# match particular values in the OIDC userinfo. The requirements can be listed under
# `attribute_requirements` as shown below. All of the listed attributes must
# match for the login to be permitted. Additional attributes can be added to
# userinfo by expanding the `scopes` section of the OIDC config to retrieve
# additional information from the OIDC provider.
#
# If the OIDC claim is a list, then the attribute must match any value in the list.
# Otherwise, it must exactly match the value of the claim. Using the example
# below, the `family_name` claim MUST be "Stephensson", but the `groups`
# claim MUST contain "admin".
#
# attribute_requirements:
# - attribute: family_name
# value: "Stephensson"
# - attribute: groups
# value: "admin"
#
# See https://github.com/matrix-org/synapse/blob/master/docs/openid.md
# for information on how to configure these options.
#
...
...
@@ -1910,51 +1931,29 @@ oidc_providers:
# localpart_template: "{{ '{{ user.login }}' }}"
# display_name_template: "{{ '{{ user.name }}' }}"
# email_template: "{{ '{{ user.email }}' }}"
# For use with Keycloak
#
#- idp_id: keycloak
# idp_name: Keycloak
# issuer: "https://127.0.0.1:8443/auth/realms/my_realm_name"
# client_id: "synapse"
# client_secret: "copy secret generated in Keycloak UI"
# scopes: ["openid", "profile"]
# For use with Github
#
#- idp_id: github
# idp_name: Github
# idp_brand: github
# discover: false
# issuer: "https://github.com/"
# client_id: "your-client-id" # TO BE FILLED
# client_secret: "your-client-secret" # TO BE FILLED
# authorization_endpoint: "https://github.com/login/oauth/authorize"
# token_endpoint: "https://github.com/login/oauth/access_token"
# userinfo_endpoint: "https://api.github.com/user"
# scopes: ["read:user"]
# user_mapping_provider:
# config:
# subject_claim: "id"
# localpart_template: "{{ '{{ user.login }}' }}"
# display_name_template: "{{ '{{ user.name }}' }}"
# attribute_requirements:
# - attribute: userGroup
# value: "synapseUsers"
# Arch Linux accounts
#
#- idp_id: oidc
# idp_name: "Arch Linux"
# idp_icon: "mxc://archlinux.org/iQmyhmksPLmphXWFUxiLEwVw"
# idp_brand:
org.
archlinux
# idp_brand: archlinux
# issuer: "https://accounts.archlinux.org/auth/realms/archlinux"
# client_id: "openid_matrix"
# client_secret: "your-client-secret" # TO BE FILLED
# scopes: ["openid", "profile"]
# allow_existing_users:
tru
e
# scopes: ["openid", "profile"
, "email", "roles"
]
# allow_existing_users:
fals
e
# user_mapping_provider:
# config:
# localpart_template: "{{ '{{ user.preferred_username }}' }}"
# display_name_template: "{{ '{{ user.name | default(user.preferred_username, true) }}' }}"
# email_template: "{{ '{{ user.email }}' }}"
# attribute_requirements:
# - attribute: roles
# value: "Staff"
# Enable Central Authentication Service (CAS) for registration and login.
...
...
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment