Matrix

Matrix is an ambitious new ecosystem for open federated instant messaging and VoIP. It consists of servers, clients and bridge software to connect to existing messaging solutions like IRC.

A Matrix channel for Arch Linux exists at #archlinux:archlinux.org. Some international communities have their own matrix rooms; see International communities for details.

You can either use an existing server like https://matrix.org or host your own Synapse server, which is described below.

See List of applications#Matrix clients for a list of Matrix clients.

Installation

The reference server implementation Synapse is available in the community repository as matrix-synapse. The community package creates a synapse user.

Configuration

After installation, a configuration file needs to be generated. It should be readable by the synapse user:

$ cd /var/lib/synapse
$ sudo -u synapse python -m synapse.app.homeserver \
  --server-name my.domain.name \
  --config-path /etc/synapse/homeserver.yaml \
  --generate-config \
  --report-stats=yes

Note that this will generate corresponding SSL keys and self-signed certificates for the specified server name. You have to regenerate those if you change the server name.

If your Synapse server is meant to be accessed over the internet, it is highly recommended to configure a reverse proxy.

Service

The synapse.service systemd service is included in the matrix-synapse package. It will start the synapse server as user synapse and use the configuration file /etc/synapse/homeserver.yaml.

User management

You need at least one user on your fresh synapse server. You may create one as your normal non-root user with the command

$ register_new_matrix_user -c /etc/synapse/homeserver.yaml http://127.0.0.1:8008

or using one of the matrix clients, for example element-desktop, or the purple-matrix-gitAUR plug-in for libpurple.

Spider Webcrawler

To enable the webcrawler, for server generated link previews, the additional packages python-lxml and python-netaddr have to be installed. After that, the option can be set in your . To prevent the synapse server from issuing arbitrary GET requests to internal hosts, the has to be set.

There are some examples that can be uncommented. Add your local IP ranges to that list to prevent the synapse server from trying to crawl them. After changing the , the service has to be restarted.

Interesting channels

KDE community has a wide variety of matrix rooms for specific applications, languages, events and etc. See https://community.kde.org/Matrix for details.

The GNOME Community also has a Matrix instance for its instant communications with a wide variety of matrix rooms. See https://wiki.gnome.org/GettingInTouch/Matrix for details.

Troubleshooting

Read-only file system

By default, synapse can only write to the working-directory (/var/lib/synapse) set in its service file. A write-error may occur if synapse writes to a different path (e.g. your media-store is in /var/lib/matrix-synapse/media).

You can allow access to other directories by creating a replacement unit file for synapse.service and by adding to the section.

gollark: Since 5 days ago.
gollark: No, it's running.
gollark: No, I mean the performance could be improved.
gollark: It calls that in a loop.
gollark: Maybe the weighted random implementation is bad?
This article is issued from Archlinux. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.