This package allows you to install Synapse quickly and simply on a YunoHost server. If you don't have YunoHost, please consult the guide to learn how to install it.
Instant messaging server matrix network.
Yunohost chatroom with matrix : https://riot.im/app/#/room/#yunohost:matrix.org
Shipped version: 1.59.0~ynh1
For all slow or arm architecture it's recommended to build the dh file before the install to have a quicker install.
You could build it by this cmd : openssl dhparam -out /etc/ssl/private/dh2048.pem 2048 > /dev/null
After that you can install it without problem.
The package uses a prebuilt python virtual environnement. The binary are taken from this repository: https://github.com/Josue-T/synapse_python_build The script to build the binary is also available.
If you want a web client you can also install Element with this package: https://github.com/YunoHost-Apps/element_ynh .
If your server name is identical to the domain on which synapse is installed, and the default port 8448 is used, your server is normally already accessible by the federation.
If not, you can add the following line in the dns configuration but you normally don't need it as a .well-known file is edited during the install to declare your server name and port to the federation.
_matrix._tcp.<server_name.tld> <ttl> IN SRV 10 0 <port> <domain-or-subdomain-of-synapse.tld>
for example
_matrix._tcp.example.com. 3600 IN SRV 10 0 SYNAPSE_PORT synapse.example.com.
You need to replace SYNAPSE_PORT by the real port. This port can be obtained by the command: yunohost app setting SYNAPSE_INSTANCE_NAME synapse_tls_port
For more details, see : https://github.com/matrix-org/synapse/blob/master/docs/federate.md
If it is not automatically done, you need to open this in your ISP box.
You also need a valid TLS certificate for the domain used by synapse. To do that you can refer to the documentation here : https://yunohost.org/#/certificate_en
For Voip and video conferencing a turnserver is also installed (and configured). The turnserver listens on two UDP and TCP ports. You can get them with these commands:
yunohost app setting synapse turnserver_tls_port
yunohost app setting synapse turnserver_alt_tls_port
The turnserver will also choose a port dynamically when a new call starts. The range is between 49153 - 49193.
For some security reason the ports range (49153 - 49193) isn't automatically open by default. If you want to use the synapse server for voip or conferencing you will need to open this port range manually. To do this just run this command:
yunohost firewall allow Both 49153:49193
You might also need to open these ports (if it is not automatically done) on your ISP box.
To prevent the situation when the server is behind a NAT, the public IP is written in the turnserver config. By this the turnserver can send its real public IP to the client. For more information see the coturn example config file.So if your IP changes, you could run the script /opt/yunohost/__SYNAPSE_INSTANCE_NAME__/Coturn_config_rotate.sh
to update your config.
If you have a dynamic IP address, you also might need to update this config automatically. To do that just edit a file named /etc/cron.d/coturn_config_rotate
and add the following content (just adapt the SYNAPSE_INSTANCE_NAME which could be synapse
or maybe synapse__2
).
*/15 * * * * root bash /opt/yunohost/__SYNAPSE_INSTANCE_NAME__/Coturn_config_rotate.sh;
In case of you have an OpenVPN server you might want than coturn-synapse
restart when the VPN restart. To do this create a file named /usr/local/bin/openvpn_up_script.sh
with this content:
#!/bin/bash
(
sleep 5
sudo systemctl restart coturn-synapse.service
) &
exit 0
Add this line in you sudo config file /etc/sudoers
openvpn ALL=(ALL) NOPASSWD: /bin/systemctl restart coturn-synapse.service
And add this line in your OpenVPN config file
ipchange /usr/local/bin/openvpn_up_script.sh
We do not recommend running Element from the same domain name as your Matrix homeserver (synapse). The reason is the risk of XSS (cross-site-scripting) vulnerabilities that could occur if someone caused Element to load and render malicious user generated content from a Matrix API which then had trusted access to Element (or other apps) due to sharing the same domain.
We have put some coarse mitigations into place to try to protect against this situation, but it's still not a good practice to do it in the first place. See element-hq/element-web#1977 for more details.
Synapse uses a lot of ressource. So on slow architecture (like small ARM board), this app could take a lot of CPU and RAM.
This app doesn't provide any real good web interface. So it's recommended to use Element client to connect to this app. This app is available here
To give a possibility to have multiple domains you can use multiple instances of synapse. In this case all instances will run on different ports so it's really important to put a SRV record in your domain. You can get the port that you need to put in your SRV record with this following command:
yunohost app setting synapse__<instancenumber> synapse_tls_port
Before installing a second instance of the app it's really recommended to update all existing instances.
- Official app website: https://matrix.org/
- Upstream app code repository: https://github.com/matrix-org/synapse
- YunoHost documentation for this app: https://yunohost.org/app_synapse
- Report a bug: https://github.com/YunoHost-Apps/synapse_ynh/issues
Please send your pull request to the testing branch.
To try the testing branch, please proceed like that.
sudo yunohost app install https://github.com/YunoHost-Apps/synapse_ynh/tree/testing --debug
or
sudo yunohost app upgrade synapse -u https://github.com/YunoHost-Apps/synapse_ynh/tree/testing --debug
More info regarding app packaging: https://yunohost.org/packaging_apps