Replace mxisd with ma1sd in docs, fixing URLs
This commit is contained in:
parent
187dedf920
commit
5fedd6cbf0
|
@ -20,13 +20,13 @@ Using this playbook, you can get the following services configured on your serve
|
||||||
|
|
||||||
- (optional, default) a [Riot](https://riot.im/) web UI, which is configured to connect to your own Synapse server by default
|
- (optional, default) a [Riot](https://riot.im/) web UI, which is configured to connect to your own Synapse server by default
|
||||||
|
|
||||||
- (optional, default) an [mxisd](https://github.com/kamax-io/mxisd) Matrix Identity server
|
- (optional, default) an [ma1sd](https://github.com/ma1uta/ma1sd) Matrix Identity server
|
||||||
|
|
||||||
- (optional, default) an [Exim](https://www.exim.org/) mail server, through which all Matrix services send outgoing email (can be configured to relay through another SMTP server)
|
- (optional, default) an [Exim](https://www.exim.org/) mail server, through which all Matrix services send outgoing email (can be configured to relay through another SMTP server)
|
||||||
|
|
||||||
- (optional, default) an [nginx](http://nginx.org/) web server, listening on ports 80 and 443 - standing in front of all the other services. Using your own webserver [is possible](docs/configuring-playbook-own-webserver.md)
|
- (optional, default) an [nginx](http://nginx.org/) web server, listening on ports 80 and 443 - standing in front of all the other services. Using your own webserver [is possible](docs/configuring-playbook-own-webserver.md)
|
||||||
|
|
||||||
- (optional, advanced) the [matrix-synapse-rest-auth](https://github.com/kamax-io/matrix-synapse-rest-auth) REST authentication password provider module
|
- (optional, advanced) the [matrix-synapse-rest-auth](https://github.com/ma1uta/matrix-synapse-rest-password-provider) REST authentication password provider module
|
||||||
|
|
||||||
- (optional, advanced) the [matrix-synapse-shared-secret-auth](https://github.com/devture/matrix-synapse-shared-secret-auth) password provider module
|
- (optional, advanced) the [matrix-synapse-shared-secret-auth](https://github.com/devture/matrix-synapse-shared-secret-auth) password provider module
|
||||||
|
|
||||||
|
@ -112,7 +112,7 @@ This playbook sets up your server using the following Docker images:
|
||||||
|
|
||||||
- [vectorim/riot-web](https://hub.docker.com/r/vectorim/riot-web/) - the [Riot.im](https://about.riot.im/) web client (optional)
|
- [vectorim/riot-web](https://hub.docker.com/r/vectorim/riot-web/) - the [Riot.im](https://about.riot.im/) web client (optional)
|
||||||
|
|
||||||
- [kamax/mxisd](https://hub.docker.com/r/kamax/mxisd/) - the [mxisd](https://github.com/kamax-io/mxisd) Matrix Identity server (optional)
|
- [ma1uta/ma1sd](https://hub.docker.com/r/ma1uta/ma1sd/) - the [ma1sd](https://github.com/ma1uta/ma1sd) Matrix Identity server (optional)
|
||||||
|
|
||||||
- [postgres](https://hub.docker.com/_/postgres/) - the [Postgres](https://www.postgresql.org/) database server (optional)
|
- [postgres](https://hub.docker.com/_/postgres/) - the [Postgres](https://www.postgresql.org/) database server (optional)
|
||||||
|
|
||||||
|
|
|
@ -44,7 +44,7 @@ The `jitsi.<your-domain>` subdomain may be necessary, because this playbook coul
|
||||||
|
|
||||||
## `_matrix-identity._tcp` SRV record setup
|
## `_matrix-identity._tcp` SRV record setup
|
||||||
|
|
||||||
To make the [mxisd](https://github.com/kamax-io/mxisd) Identity Server (which this playbook installs for you) be authoritative for your domain name, set up one more SRV record that looks like this:
|
To make the [ma1sd](https://github.com/ma1uta/ma1sd) Identity Server (which this playbook installs for you) be authoritative for your domain name, set up one more SRV record that looks like this:
|
||||||
- Name: `_matrix-identity._tcp` (use this text as-is)
|
- Name: `_matrix-identity._tcp` (use this text as-is)
|
||||||
- Content: `10 0 443 matrix.<your-domain>` (replace `<your-domain>` with your own)
|
- Content: `10 0 443 matrix.<your-domain>` (replace `<your-domain>` with your own)
|
||||||
|
|
||||||
|
|
|
@ -28,5 +28,5 @@ If you wish for users to **authenticate only against configured password provide
|
||||||
matrix_synapse_password_config_localdb_enabled: false
|
matrix_synapse_password_config_localdb_enabled: false
|
||||||
```
|
```
|
||||||
|
|
||||||
## Using mxisd Identity Server for authentication
|
## Using ma1sd Identity Server for authentication
|
||||||
If you wish to use the mxisd Identity Server for LDAP authentication instead of [matrix-synapse-ldap3](https://github.com/matrix-org/matrix-synapse-ldap3) consult [Adjusting mxisd Identity Server configuration](configuring-playbook-mxisd.md#authentication).
|
If you wish to use the ma1sd Identity Server for LDAP authentication instead of [matrix-synapse-ldap3](https://github.com/matrix-org/matrix-synapse-ldap3) consult [Adjusting ma1sd Identity Server configuration](configuring-playbook-ma1sd.md#authentication).
|
||||||
|
|
|
@ -1,52 +1,53 @@
|
||||||
# Adjusting mxisd Identity Server configuration (optional)
|
# Adjusting ma1sd Identity Server configuration (optional)
|
||||||
|
|
||||||
By default, this playbook configures an [mxisd](https://github.com/kamax-io/mxisd) Identity Server for you.
|
By default, this playbook configures an [ma1sd](https://github.com/ma1uta/ma1sd) Identity Server for you.
|
||||||
|
|
||||||
This server is private by default, potentially at the expense of user discoverability.
|
This server is private by default, potentially at the expense of user discoverability.
|
||||||
|
|
||||||
|
ma1sd is a fork of [mxisd](https://github.com/kamax-io/mxisd) which was pronounced end of life 2019-06-21.
|
||||||
|
|
||||||
## Matrix.org lookup forwarding
|
## Matrix.org lookup forwarding
|
||||||
|
|
||||||
To ensure maximum discovery, you can make your identity server also forward lookups to the central matrix.org Identity server (at the cost of potentially leaking all your contacts information).
|
To ensure maximum discovery, you can make your identity server also forward lookups to the central matrix.org Identity server (at the cost of potentially leaking all your contacts information).
|
||||||
|
|
||||||
Enabling this is discouraged and you'd better [learn more](https://github.com/kamax-io/mxisd/blob/master/docs/features/identity.md#lookups) before proceeding.
|
Enabling this is discouraged and you'd better [learn more](https://github.com/ma1uta/ma1sd/blob/master/docs/features/identity.md#lookups) before proceeding.
|
||||||
|
|
||||||
Enabling matrix.org forwarding can happen with the following configuration:
|
Enabling matrix.org forwarding can happen with the following configuration:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mxisd_matrixorg_forwarding_enabled: true
|
matrix_ma1sd_matrixorg_forwarding_enabled: true
|
||||||
```
|
```
|
||||||
|
|
||||||
|
|
||||||
## Customizing email templates
|
## Customizing email templates
|
||||||
|
|
||||||
If you'd like to change the default email templates used by mxisd, take a look at the `matrix_mxisd_threepid_medium_email_custom_` variables
|
If you'd like to change the default email templates used by ma1sd, take a look at the `matrix_ma1sd_threepid_medium_email_custom_` variables
|
||||||
(in the `roles/matrix-mxisd/defaults/main.yml` file.
|
(in the `roles/matrix-ma1sd/defaults/main.yml` file.
|
||||||
|
|
||||||
|
|
||||||
## mxisd-controlled Registration
|
## ma1sd-controlled Registration
|
||||||
|
|
||||||
To use the [Registration](https://github.com/kamax-matrix/mxisd/blob/master/docs/features/registration.md) feature of mxisd, you can make use of the following variables:
|
To use the [Registration](https://github.com/ma1uta/ma1sd/blob/master/docs/features/registration.md) feature of ma1sd, you can make use of the following variables:
|
||||||
|
|
||||||
- `matrix_synapse_enable_registration` - to enable user-initiated registration in Synapse
|
- `matrix_synapse_enable_registration` - to enable user-initiated registration in Synapse
|
||||||
|
|
||||||
- `matrix_synapse_registrations_require_3pid` - to control the types of 3pid (`'email'`, `'msisdn'`) required by the Synapse server for registering
|
- `matrix_synapse_registrations_require_3pid` - to control the types of 3pid (`'email'`, `'msisdn'`) required by the Synapse server for registering
|
||||||
|
|
||||||
- variables prefixed with `matrix_nginx_proxy_proxy_matrix_3pid_registration_` (e.g. `matrix_nginx_proxy_proxy_matrix_3pid_registration_enabled`) - to configure the integrated nginx webserver to send registration requests to mxisd (instead of Synapse), so it can apply its additional functionality
|
- variables prefixed with `matrix_nginx_proxy_proxy_matrix_3pid_registration_` (e.g. `matrix_nginx_proxy_proxy_matrix_3pid_registration_enabled`) - to configure the integrated nginx webserver to send registration requests to ma1sd (instead of Synapse), so it can apply its additional functionality
|
||||||
|
|
||||||
- `matrix_mxisd_configuration_extension_yaml` - to configure mxisd as required. See the [Registration feature's docs](https://github.com/kamax-matrix/mxisd/blob/master/docs/features/registration.md) for inspiration. Also see the [Additional features](#additional-features) section below to learn more about how to use `matrix_mxisd_configuration_extension_yaml`.
|
- `matrix_ma1sd_configuration_extension_yaml` - to configure ma1sd as required. See the [Registration feature's docs](https://github.com/ma1uta/ma1sd/blob/master/docs/features/registration.md) for inspiration. Also see the [Additional features](#additional-features) section below to learn more about how to use `matrix_ma1sd_configuration_extension_yaml`.
|
||||||
|
|
||||||
## Authentication
|
## Authentication
|
||||||
|
|
||||||
[Authentication](https://github.com/kamax-matrix/mxisd/blob/master/docs/features/authentication.md) provides the possibility to use your own [Identity Stores](https://github.com/kamax-matrix/mxisd/blob/master/docs/stores/README.md) (for example LDAP) to authenticate users on your Homeserver. The following configuration can be used to authenticate against an LDAP server:
|
[Authentication](https://github.com/ma1uta/ma1sd/blob/master/docs/features/authentication.md) provides the possibility to use your own [Identity Stores](https://github.com/ma1uta/ma1sd/blob/master/docs/stores/README.md) (for example LDAP) to authenticate users on your Homeserver. The following configuration can be used to authenticate against an LDAP server:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_synapse_ext_password_provider_rest_auth_enabled: true
|
matrix_synapse_ext_password_provider_rest_auth_enabled: true
|
||||||
|
|
||||||
# matrix-mxisd is the hostname of the mxisd Docker container
|
# matrix-ma1sd is the hostname of the ma1sd Docker container
|
||||||
matrix_synapse_ext_password_provider_rest_auth_endpoint: "http://matrix-mxisd:8090"
|
matrix_synapse_ext_password_provider_rest_auth_endpoint: "http://matrix-ma1sd:8090"
|
||||||
|
|
||||||
matrix_mxisd_configuration_extension_yaml: |
|
matrix_ma1sd_configuration_extension_yaml: |
|
||||||
ldap:
|
ldap:
|
||||||
enabled: true
|
enabled: true
|
||||||
connection:
|
connection:
|
||||||
|
@ -54,7 +55,7 @@ matrix_mxisd_configuration_extension_yaml: |
|
||||||
tls: false
|
tls: false
|
||||||
port: 389
|
port: 389
|
||||||
baseDNs: ['OU=Users,DC=example,DC=org']
|
baseDNs: ['OU=Users,DC=example,DC=org']
|
||||||
bindDn: CN=My Mxisd User,OU=Users,DC=example,DC=org
|
bindDn: CN=My ma1sd User,OU=Users,DC=example,DC=org
|
||||||
bindPassword: TheUserPassword
|
bindPassword: TheUserPassword
|
||||||
```
|
```
|
||||||
|
|
||||||
|
@ -62,24 +63,24 @@ matrix_mxisd_configuration_extension_yaml: |
|
||||||
|
|
||||||
What this playbook configures for your is some bare minimum Identity Server functionality, so that you won't need to rely on external 3rd party services.
|
What this playbook configures for your is some bare minimum Identity Server functionality, so that you won't need to rely on external 3rd party services.
|
||||||
|
|
||||||
A few variables can be toggled in this playbook to alter the mxisd configuration that gets generated.
|
A few variables can be toggled in this playbook to alter the ma1sd configuration that gets generated.
|
||||||
|
|
||||||
Still, mxisd can do much more.
|
Still, ma1sd can do much more.
|
||||||
You can refer to the [mxisd website](https://github.com/kamax-io/mxisd) for more details and configuration options.
|
You can refer to the [ma1sd website](https://github.com/ma1uta/ma1sd) for more details and configuration options.
|
||||||
|
|
||||||
To use a more custom configuration, you can define a `matrix_mxisd_configuration_extension_yaml` string variable
|
To use a more custom configuration, you can define a `matrix_ma1sd_configuration_extension_yaml` string variable
|
||||||
and put your configuration in it.
|
and put your configuration in it.
|
||||||
To learn more about how to do this, refer to the information about `matrix_mxisd_configuration_extension_yaml` in the [default variables file](../roles/matrix-mxisd/defaults/main.yml) of the mxisd component.
|
To learn more about how to do this, refer to the information about `matrix_ma1sd_configuration_extension_yaml` in the [default variables file](../roles/matrix-ma1sd/defaults/main.yml) of the ma1sd component.
|
||||||
|
|
||||||
|
|
||||||
## Troubleshooting
|
## Troubleshooting
|
||||||
|
|
||||||
If email address validation emails sent by mxisd are not reaching you, you should look into [Adjusting email-sending settings](configuring-playbook-email.md).
|
If email address validation emails sent by ma1sd are not reaching you, you should look into [Adjusting email-sending settings](configuring-playbook-email.md).
|
||||||
|
|
||||||
If you'd like additional logging information, temporarily enable verbose logging for mxisd.
|
If you'd like additional logging information, temporarily enable verbose logging for ma1sd.
|
||||||
|
|
||||||
Example configuration (`inventory/host_vars/matrix.DOMAIN/vars.yml`):
|
Example configuration (`inventory/host_vars/matrix.DOMAIN/vars.yml`):
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_mxisd_verbose_logging: true
|
matrix_ma1sd_verbose_logging: true
|
||||||
```
|
```
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
# Setting up the REST authentication password provider module (optional, advanced)
|
# Setting up the REST authentication password provider module (optional, advanced)
|
||||||
|
|
||||||
The playbook can install and configure [matrix-synapse-rest-auth](https://github.com/kamax-io/matrix-synapse-rest-auth) for you.
|
The playbook can install and configure [matrix-synapse-rest-auth](https://github.com/ma1uta/matrix-synapse-rest-password-provider) for you.
|
||||||
|
|
||||||
See that project's documentation to learn what it does and why it might be useful to you.
|
See that project's documentation to learn what it does and why it might be useful to you.
|
||||||
|
|
||||||
|
@ -8,7 +8,7 @@ If you decide that you'd like to let this playbook install it for you, you need
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
matrix_synapse_ext_password_provider_rest_auth_enabled: true
|
matrix_synapse_ext_password_provider_rest_auth_enabled: true
|
||||||
matrix_synapse_ext_password_provider_rest_auth_endpoint: "http://matrix-mxisd:8090"
|
matrix_synapse_ext_password_provider_rest_auth_endpoint: "http://matrix-ma1sd:8090"
|
||||||
matrix_synapse_ext_password_provider_rest_auth_registration_enforce_lowercase: false
|
matrix_synapse_ext_password_provider_rest_auth_registration_enforce_lowercase: false
|
||||||
matrix_synapse_ext_password_provider_rest_auth_registration_profile_name_autofill: true
|
matrix_synapse_ext_password_provider_rest_auth_registration_profile_name_autofill: true
|
||||||
matrix_synapse_ext_password_provider_rest_auth_login_profile_name_autofill: false
|
matrix_synapse_ext_password_provider_rest_auth_login_profile_name_autofill: false
|
||||||
|
|
|
@ -44,7 +44,7 @@ When you're done with all the configuration you'd like to do, continue with [Ins
|
||||||
|
|
||||||
- [Using an external PostgreSQL server](configuring-playbook-external-postgres.md) (optional)
|
- [Using an external PostgreSQL server](configuring-playbook-external-postgres.md) (optional)
|
||||||
|
|
||||||
- [Adjusting mxisd Identity Server configuration](configuring-playbook-mxisd.md) (optional)
|
- [Adjusting ma1sd Identity Server configuration](configuring-playbook-ma1sd.md) (optional)
|
||||||
|
|
||||||
- [Adjusting SSL certificate retrieval](configuring-playbook-ssl-certificates.md) (optional, advanced)
|
- [Adjusting SSL certificate retrieval](configuring-playbook-ssl-certificates.md) (optional, advanced)
|
||||||
|
|
||||||
|
|
|
@ -38,6 +38,6 @@ Re-run the playbook after making these configuration changes.
|
||||||
|
|
||||||
See the dedicated [PostgreSQL Maintenance](maintenance-postgres.md) documentation page.
|
See the dedicated [PostgreSQL Maintenance](maintenance-postgres.md) documentation page.
|
||||||
|
|
||||||
## Mxisd
|
## Ma1sd
|
||||||
|
|
||||||
See the dedicated [Adjusting mxisd Identity Server configuration](configuring-playbook-mxisd.md) documentation page.
|
See the dedicated [Adjusting ma1sd Identity Server configuration](configuring-playbook-ma1sd.md) documentation page.
|
||||||
|
|
Loading…
Reference in a new issue