mautrix-signal
Alpha
WARNING
We stop working on this Helm-Chart. There are still many breaking change like:
We hope that stalward mail-server becomes more stable.
Usage
Helm must be installed and setup to your kubernetes cluster to use the charts. Refer to Helm’s documentation to get started. Once Helm has been set up correctly, fetch the charts as follows:
helm pull oci://codeberg.org/wrenix/helm-charts/mautrix-signal
You can install a chart release using the following command:
helm install mautrix-signal-release oci://codeberg.org/wrenix/helm-charts/mautrix-signal --values values.yaml
To uninstall a chart release use `helm’s delete command:
helm uninstall mautrix-signal-release
Values
Key | Type | Default | Description |
---|---|---|---|
affinity |
object |
|
|
autoscaling.enabled |
bool |
|
|
autoscaling.maxReplicas |
int |
|
|
autoscaling.minReplicas |
int |
|
|
autoscaling.targetCPUUtilizationPercentage |
int |
|
|
config.appservice.address |
string |
|
The address that the homeserver can use to connect to this appservice. |
config.appservice.async_transactions |
bool |
|
Should incoming events be handled asynchronously? This may be necessary for large public instances with lots of messages going through. However, messages will not be guaranteed to be bridged in the same order they were sent in. |
config.appservice.bot.avatar |
string |
|
|
config.appservice.bot.displayname |
string |
|
Display name and avatar for bot. Set to "remove" to remove display name/avatar, leave empty to leave display name/avatar as-is. |
config.appservice.bot.username |
string |
|
Username of the appservice bot. |
config.appservice.database.max_conn_idle_time |
string |
|
Maximum connection idle time and lifetime before they’re closed. Disabled if null. Parsed with https://pkg.go.dev/time#ParseDuration |
config.appservice.database.max_conn_lifetime |
string |
|
|
config.appservice.database.max_idle_conns |
int |
|
|
config.appservice.database.max_open_conns |
int |
|
Maximum number of connections. Mostly relevant for Postgres. |
config.appservice.database.type |
string |
|
The database type. "sqlite3-fk-wal" and "postgres" are supported. |
config.appservice.database.uri |
string |
|
The database URI. SQLite: A raw file path is supported, but |
config.appservice.ephemeral_events |
bool |
|
Whether or not to receive ephemeral events via appservice transactions. Requires MSC2409 support (i.e. Synapse 1.22+). |
config.appservice.hostname |
string |
|
The hostname and port where this appservice should listen. |
config.appservice.id |
string |
|
The unique ID of this appservice. |
config.appservice.port |
int |
|
|
config.bridge |
object |
|
Bridge config |
config.bridge.bridge_notices |
bool |
|
Should Matrix m.notice-type messages be bridged? |
config.bridge.caption_in_message |
bool |
|
Send captions in the same message as images. This will send data compatible with both MSC2530. This is currently not supported in most clients. |
config.bridge.command_prefix |
string |
|
The prefix for commands. Only required in non-management rooms. |
config.bridge.delivery_receipts |
bool |
|
Should the bridge send a read receipt from the bridge bot when a message has been sent to Signal? |
config.bridge.displayname_template |
string |
|
Displayname template for Signal users. This is also used as the room name in DMs if private_chat_portal_meta is enabled. {{.ProfileName}} - The Signal profile name set by the user. {{.ContactName}} - The name for the user from your phone’s contact list. This is not safe on multi-user instances. {{.PhoneNumber}} - The phone number of the user. {{.UUID}} - The UUID of the Signal user. {{.AboutEmoji}} - The emoji set by the user in their profile. |
config.bridge.double_puppet_allow_discovery |
bool |
|
Allow using double puppeting from any server with a valid client .well-known file. |
config.bridge.double_puppet_server_map |
object |
|
Servers to always allow double puppeting from |
config.bridge.encryption.allow |
bool |
|
Allow encryption, work in group chat rooms with e2ee enabled |
config.bridge.encryption.allow_key_sharing |
bool |
|
Enable key sharing? If enabled, key requests for rooms where users are in will be fulfilled. You must use a client that supports requesting keys from other users to use this feature. |
config.bridge.encryption.appservice |
bool |
|
Whether to use MSC2409/MSC3202 instead of /sync long polling for receiving encryption-related data. |
config.bridge.encryption.default |
bool |
|
Default to encryption, force-enable encryption in all portals the bridge creates This will cause the bridge bot to be in private chats for the encryption to work properly. |
config.bridge.encryption.delete_keys |
object |
|
Options for deleting megolm sessions from the bridge. |
config.bridge.encryption.delete_keys.delete_fully_used_on_decrypt |
bool |
|
Delete fully used keys (index >= max_messages) after decrypting messages. |
config.bridge.encryption.delete_keys.delete_on_device_delete |
bool |
|
Delete megolm sessions received from a device when the device is deleted. |
config.bridge.encryption.delete_keys.delete_outbound_on_ack |
bool |
|
Beeper-specific: delete outbound sessions when hungryserv confirms that the user has uploaded the key to key backup. |
config.bridge.encryption.delete_keys.delete_outdated_inbound |
bool |
|
Delete inbound megolm sessions that don’t have the received_at field used for automatic ratcheting and expired session deletion. This is meant as a migration to delete old keys prior to the bridge update. |
config.bridge.encryption.delete_keys.delete_prev_on_new_session |
bool |
|
Delete previous megolm sessions from same device when receiving a new one. |
config.bridge.encryption.delete_keys.dont_store_outbound |
bool |
|
Don’t store outbound sessions in the inbound table. |
config.bridge.encryption.delete_keys.periodically_delete_expired |
bool |
|
Periodically delete megolm sessions when 2x max_age has passed since receiving the session. |
config.bridge.encryption.delete_keys.ratchet_on_decrypt |
bool |
|
Ratchet megolm sessions forward after decrypting messages. |
config.bridge.encryption.require |
bool |
|
Require encryption, drop any unencrypted messages. |
config.bridge.encryption.rotation.disable_device_change_key_rotation |
bool |
|
Disable rotating keys when a user’s devices change? You should not enable this option unless you understand all the implications. |
config.bridge.encryption.rotation.enable_custom |
bool |
|
Enable custom Megolm room key rotation settings. Note that these settings will only apply to rooms created after this option is set. |
config.bridge.encryption.rotation.messages |
int |
|
The maximum number of messages that should be sent with a given a session before changing it. The Matrix spec recommends 100 as the default. |
config.bridge.encryption.rotation.milliseconds |
int |
|
The maximum number of milliseconds a session should be used before changing it. The Matrix spec recommends 604800000 (a week) as the default. |
config.bridge.encryption.verification_levels.receive |
string |
|
Minimum level for which the bridge should send keys to when bridging messages from Signal to Matrix. |
config.bridge.encryption.verification_levels.send |
string |
|
Minimum level that the bridge should accept for incoming Matrix messages. |
config.bridge.encryption.verification_levels.share |
string |
|
Minimum level that the bridge should require for accepting key requests. |
config.bridge.federate_rooms |
bool |
|
Whether or not created rooms should have federation enabled. If false, created portal rooms will never be federated. |
config.bridge.login_shared_secret_map |
object |
|
Shared secrets for https://github.com/devture/matrix-synapse-shared-secret-auth If set, double puppeting will be enabled automatically for local users instead of users having to find an access token and run |
config.bridge.management_room_text.additional_help |
string |
|
Optional extra text sent when joining a management room. |
config.bridge.management_room_text.welcome |
string |
|
Sent when joining a room. |
config.bridge.management_room_text.welcome_connected |
string |
|
Sent when joining a management room and the user is already logged in. |
config.bridge.management_room_text.welcome_unconnected |
string |
|
Sent when joining a management room and the user is not logged in. |
config.bridge.message_error_notices |
bool |
|
Whether the bridge should send error notices via m.notice events when a message fails to bridge. |
config.bridge.message_handling_timeout |
object |
|
Maximum time for handling Matrix events. Duration strings formatted for https://pkg.go.dev/time#ParseDuration Null means there’s no enforced timeout. |
config.bridge.message_handling_timeout.deadline |
string |
|
Drop messages after this timeout. They may still go through if the message got sent to the servers. This is counted from the time the bridge starts handling the message. |
config.bridge.message_handling_timeout.error_after |
string |
|
Send an error message after this timeout, but keep waiting for the response until the deadline. This is counted from the origin_server_ts, so the warning time is consistent regardless of the source of delay. If the message is older than this when it reaches the bridge, the message won’t be handled at all. |
config.bridge.message_status_events |
bool |
|
Whether the bridge should send the message status as a custom com.beeper.message_send_status event. |
config.bridge.note_to_self_avatar |
string |
|
Avatar image for the Note to Self room. |
config.bridge.number_in_topic |
bool |
|
Should the Signal user’s phone number be included in the room topic in private chat portal rooms? |
config.bridge.personal_filtering_spaces |
bool |
|
Should the bridge create a space for each logged-in user and add bridged rooms to it? Users who logged in before turning this on should run |
config.bridge.private_chat_portal_meta |
string |
|
Whether to explicitly set the avatar and room name for private chat portal rooms. If set to |
config.bridge.provisioning.debug_endpoints |
bool |
|
Enable debug API at /debug with provisioning authentication. |
config.bridge.provisioning.prefix |
string |
|
Prefix for the provisioning API paths. |
config.bridge.provisioning.shared_secret |
string |
|
Shared secret for authentication. If set to "generate", a random secret will be generated, or if set to "disable", the provisioning API will be disabled. |
config.bridge.public_portals |
bool |
|
Whether or not to make portals of groups that don’t need approval of an admin to join by invite link publicly joinable on Matrix. |
config.bridge.relay.admin_only |
bool |
|
Should only admins be allowed to set themselves as relay users? |
config.bridge.relay.enabled |
bool |
|
Whether relay mode should be allowed. If allowed, |
config.bridge.relay.message_formats |
object |
|
The formats to use when sending messages to Signal via the relaybot. |
config.bridge.resend_bridge_info |
bool |
|
Set this to true to tell the bridge to re-send m.bridge events to all rooms on the next run. This field will automatically be changed back to false after it, except if the config file is not writable. |
config.bridge.sync_direct_chat_list |
bool |
|
Should the bridge update the m.direct account data event when double puppeting is enabled. Note that updating the m.direct event is not atomic (except with mautrix-asmux) and is therefore prone to race conditions. |
config.bridge.use_contact_avatars |
bool |
|
Should avatars from the user’s contact list be used? This is not safe on multi-user instances. |
config.bridge.username_template |
string |
|
Localpart template of MXIDs for Signal users. {{.}} is replaced with the internal ID of the Signal user. |
config.homeserver.address |
string |
|
The address that this appservice can use to connect to the homeserver. |
config.homeserver.async_media |
bool |
|
Does the homeserver support https://github.com/matrix-org/matrix-spec-proposals/pull/2246? |
config.homeserver.domain |
string |
|
The domain of the homeserver (also known as server_name, used for MXIDs, etc). |
config.homeserver.message_send_checkpoint_endpoint |
string |
|
Endpoint for reporting per-message status. |
config.homeserver.ping_interval_seconds |
int |
|
How often should the websocket be pinged? Pinging will be disabled if this is zero. |
config.homeserver.software |
string |
|
What software is the homeserver running? Standard Matrix homeservers like Synapse, Dendrite and Conduit should just use "standard" here. |
config.homeserver.status_endpoint |
string |
|
The URL to push real-time bridge status to. If set, the bridge will make POST requests to this URL whenever a user’s Signal connection state changes. The bridge will use the appservice as_token to authorize requests. |
config.homeserver.websocket |
bool |
|
Should the bridge use a websocket for connecting to the homeserver? The server side is currently not documented anywhere and is only implemented by mautrix-wsproxy, mautrix-asmux (deprecated), and hungryserv (proprietary). |
config.logging.min_level |
string |
|
|
config.logging.writers[0].format |
string |
|
|
config.logging.writers[0].type |
string |
|
|
config.metrics.enabled |
bool |
|
Enable prometheus metrics? |
config.metrics.listen |
string |
|
IP and port where the metrics listener should be. The path is always /metrics |
config.signal.device_name |
string |
|
Default device name that shows up in the Signal app. |
fullnameOverride |
string |
|
|
global.image.pullPolicy |
string |
|
if set it will overwrite all pullPolicy |
global.image.registry |
string |
|
if set it will overwrite all registry entries |
image.pullPolicy |
string |
|
|
image.registry |
string |
|
|
image.repository |
string |
|
|
image.tag |
string |
|
|
imagePullSecrets |
list |
|
|
ingress.annotations |
object |
|
|
ingress.className |
string |
|
|
ingress.enabled |
bool |
|
|
ingress.hosts[0].host |
string |
|
|
ingress.hosts[0].paths[0].path |
string |
|
|
ingress.hosts[0].paths[0].pathType |
string |
|
|
ingress.tls |
list |
|
|
livenessProbe.httpGet.path |
string |
|
|
livenessProbe.httpGet.port |
string |
|
|
nameOverride |
string |
|
|
nodeSelector |
object |
|
|
persistence.accessMode |
string |
|
accessMode |
persistence.annotations |
object |
|
|
persistence.enabled |
bool |
|
Enable persistence using Persistent Volume Claims ref: http://kubernetes.io/docs/user-guide/persistent-volumes/ |
persistence.existingClaim |
string |
|
A manually managed Persistent Volume and Claim Requires persistence.enabled: true If defined, PVC must be created manually before volume will be bound |
persistence.hostPath |
string |
|
Do not create an PVC, direct use hostPath in Pod |
persistence.size |
string |
|
size |
persistence.storageClass |
string |
|
Persistent Volume Storage Class If defined, storageClassName: <storageClass> If set to "-", storageClassName: "", which disables dynamic provisioning If undefined (the default) or set to null, no storageClassName spec is set, choosing the default provisioner. (gp2 on AWS, standard on GKE, AWS & OpenStack) |
podAnnotations |
object |
|
|
podLabels |
object |
|
|
podSecurityContext |
object |
|
|
prometheus.servicemonitor.enabled |
bool |
|
|
prometheus.servicemonitor.labels |
object |
|
|
readinessProbe.httpGet.path |
string |
|
|
readinessProbe.httpGet.port |
string |
|
|
registration."de.sorunome.msc2409.push_ephemeral" |
bool |
|
|
registration.namespaces.users[0].exclusive |
bool |
|
|
registration.namespaces.users[0].regex |
string |
|
|
registration.namespaces.users[1].exclusive |
bool |
|
|
registration.namespaces.users[1].regex |
string |
|
|
registration.push_ephemeral |
bool |
|
|
registration.rate_limited |
bool |
|
|
replicaCount |
int |
|
|
resources |
object |
|
|
securityContext |
object |
|
|
service.type |
string |
|
|
serviceAccount.annotations |
object |
|
|
serviceAccount.automount |
bool |
|
|
serviceAccount.create |
bool |
|
|
serviceAccount.name |
string |
|
|
tolerations |
list |
|
|
volumeMounts |
list |
|
|
volumes |
list |
|
Autogenerated from chart metadata using helm-docs