void-packages/srcpkgs/synapse/patches/sample_config.patch
Joel Beckmeyer 913ee1bd96 synapse: update to 1.49.0.
Remove outdated INSTALL and include default configs in package instead

Remove unneeded `finish` script from `synapse` service

Use `synapse_homeserver` entrypoint instead of calling python directly

Redirect stderr to stdout so that errors with config can be seen by user

Support ${makejobs} in do_check()
2021-12-19 16:55:32 -03:00

88 lines
3 KiB
Diff

diff --git a/docs/sample_config.yaml b/docs/sample_config.yaml
index 6696ed5d1..f17661fff 100644
--- a/docs/sample_config.yaml
+++ b/docs/sample_config.yaml
@@ -68,11 +68,11 @@ modules:
# lowercase and may contain an explicit port.
# Examples: matrix.org, localhost:8080
#
-server_name: "SERVERNAME"
+#server_name: "SERVERNAME"
# When running as a daemon, the file to store the pid in
#
-pid_file: DATADIR/homeserver.pid
+#pid_file: /var/lib/synapse/homeserver.pid
# The absolute URL to the web client which /_matrix/client will redirect
# to if 'webclient' is configured under the 'listeners' configuration.
@@ -370,8 +370,8 @@ manhole_settings:
# If these are left unset, then hardcoded and non-secret keys are used,
# which could allow traffic to be intercepted if sent over a public network.
#
- #ssh_priv_key_path: CONFDIR/id_rsa
- #ssh_pub_key_path: CONFDIR/id_rsa.pub
+ #ssh_priv_key_path: /etc/synapse/id_rsa
+ #ssh_pub_key_path: /etc/synapse/id_rsa.pub
# Forward extremities can build up in a room due to networking delays between
# homeservers. Once this happens in a large room, calculation of the state of
@@ -614,11 +614,11 @@ retention:
# any intermediate certificates (for instance, if using certbot, use
# `fullchain.pem` as your certificate, not `cert.pem`).
#
-#tls_certificate_path: "CONFDIR/SERVERNAME.tls.crt"
+#tls_certificate_path: "/etc/synapse/SERVERNAME.tls.crt"
# PEM-encoded private key for TLS
#
-#tls_private_key_path: "CONFDIR/SERVERNAME.tls.key"
+#tls_private_key_path: "/etc/synapse/SERVERNAME.tls.key"
# Whether to verify TLS server certificates for outbound federation requests.
#
@@ -808,7 +808,7 @@ caches:
database:
name: sqlite3
args:
- database: DATADIR/homeserver.db
+ database: /var/lib/synapse/homeserver.db
## Logging ##
@@ -816,7 +816,7 @@ database:
# A yaml python logging config file as described by
# https://docs.python.org/3.7/library/logging.config.html#configuration-dictionary-schema
#
-log_config: "CONFDIR/SERVERNAME.log.config"
+log_config: "/etc/synapse/log.yaml"
## Ratelimiting ##
@@ -942,7 +942,7 @@ log_config: "CONFDIR/SERVERNAME.log.config"
# Directory where uploaded images and attachments are stored.
#
-media_store_path: "DATADIR/media_store"
+media_store_path: "/var/lib/synapse/media_store"
# Media storage providers allow media to be stored in different
# locations.
@@ -1531,7 +1531,7 @@ room_prejoin_state:
# Path to the signing key to sign messages with
#
-signing_key_path: "CONFDIR/SERVERNAME.signing.key"
+signing_key_path: "/etc/synapse/SERVERNAME.signing.key"
# The keys that the server used to sign messages with but won't use
# to sign new messages.
@@ -1710,7 +1710,7 @@ saml2_config:
# Instead of putting the config inline as above, you can specify a
# separate pysaml2 configuration file:
#
- #config_path: "CONFDIR/sp_conf.py"
+ #config_path: "/etc/synapse/sp_conf.py"
# The lifetime of a SAML session. This defines how long a user has to
# complete the authentication process, if allow_unsolicited is unset.