Skip to content
Snippets Groups Projects
config_documentation.md 153 KiB
Newer Older
  • Learn to ignore specific revisions
  • # Configuring Synapse
    
    
    This is intended as a guide to the Synapse configuration. The behavior of a Synapse instance can be modified
    through the many configuration settings documented here — each config option is explained,
    
    including what the default is, how to change the default and what sort of behaviour the setting governs.
    
    Also included is an example configuration for each setting. If you don't want to spend a lot of time
    
    thinking about options, the config as generated sets sensible defaults for all values. Do note however that the
    
    database defaults to SQLite, which is not recommended for production usage. You can read more on this subject
    
    [here](../../setup/installation.md#using-postgresql).
    
    ## Config Conventions
    
    Configuration options that take a time period can be set using a number
    followed by a letter. Letters have the following meanings:
    
    * `s` = second
    * `m` = minute
    * `h` = hour
    * `d` = day
    * `w` = week
    * `y` = year
    
    For example, setting `redaction_retention_period: 5m` would remove redacted
    messages from the database after 5 minutes, rather than 5 months.
    
    
    In addition, configuration options referring to size use the following suffixes:
    
    
    * `M` = MiB, or 1,048,576 bytes
    * `G` = GiB, or 1,073,741,824 bytes
    * `T` = TiB, or 1,099,511,627,776 bytes
    
    
    For example, setting `max_avatar_size: 10M` means that Synapse will not accept files larger than 10,485,760 bytes
    
    The configuration file is a [YAML](https://yaml.org/) file, which means that certain syntax rules
    apply if you want your config file to be read properly. A few helpful things to know:
    
    * `#` before any option in the config will comment out that setting and either a default (if available) will
    
       be applied or Synapse will ignore the setting. Thus, in example #1 below, the setting will be read and
    
       applied, but in example #2 the setting will not be read and a default will be applied.
    
    
       Example #1:
       ```yaml
       pid_file: DATADIR/homeserver.pid
       ```
       Example #2:
       ```yaml
       #pid_file: DATADIR/homeserver.pid
       ```
    * Indentation matters! The indentation before a setting
      will determine whether a given setting is read as part of another
      setting, or considered on its own. Thus, in example #1, the `enabled` setting
      is read as a sub-option of the `presence` setting, and will be properly applied.
    
      However, the lack of indentation before the `enabled` setting in example #2 means
      that when reading the config, Synapse will consider both `presence` and `enabled` as
      different settings. In this case, `presence` has no value, and thus a default applied, and `enabled`
      is an option that Synapse doesn't recognize and thus ignores.
    
      ```yaml
      presence:
        enabled: false
      ```
      Example #2:
      ```yaml
      presence:
      enabled: false
      ```
    
      In this manual, all top-level settings (ones with no indentation) are identified
      at the beginning of their section (i.e. "### `example_setting`") and
      the sub-options, if any, are identified and listed in the body of the section.
    
      In addition, each setting has an example of its usage, with the proper indentation
    
    
    ## Modules
    
    Server admins can expand Synapse's functionality with external modules.
    
    See [here](../../modules/index.md) for more
    documentation on how to configure or create custom modules for Synapse.
    
    
    ---
    
    Use the `module` sub-option to add modules under this option to extend functionality.
    
    The `module` setting then has a sub-option, `config`, which can be used to define some configuration
    for the `module`.
    
    Defaults to none.
    
    Example configuration:
    ```yaml
    modules:
      - module: my_super_module.MySuperClass
        config:
          do_thing: true
      - module: my_other_super_module.SomeClass
        config: {}
    ```
    ---
    
    
    Define your homeserver name and other base options.
    
    ---
    
    
    This sets the public-facing domain of the server.
    
    The `server_name` name will appear at the end of usernames and room addresses
    created on your server. For example if the `server_name` was example.com,
    usernames on your server would be in the format `@user:example.com`
    
    In most cases you should avoid using a matrix specific subdomain such as
    matrix.example.com or synapse.example.com as the `server_name` for the same
    reasons you wouldn't use user@email.example.com as your email address.
    See [here](../../delegate.md)
    for information on how to host Synapse on a subdomain while preserving
    a clean `server_name`.
    
    The `server_name` cannot be changed later so it is important to
    configure this correctly before you start Synapse. It should be all
    lowercase and may contain an explicit port.
    
    
    There is no default for this option.
    
    
    Example configuration #1:
    ```yaml
    
    ```
    Example configuration #2:
    ```yaml
    server_name: localhost:8080
    ```
    ---
    
    
    When running Synapse as a daemon, the file to store the pid in. Defaults to none.
    
    Example configuration:
    ```yaml
    pid_file: DATADIR/homeserver.pid
    ```
    ---
    
    The absolute URL to the web client which `/` will redirect to. Defaults to none.
    
    
    Example configuration:
    ```yaml
    web_client_location: https://riot.example.com/
    ```
    ---
    
    
    The public-facing base URL that clients use to access this Homeserver (not
    including _matrix/...). This is the same URL a user might enter into the
    'Custom Homeserver URL' field on their client. If you use Synapse with a
    reverse proxy, this should be the URL to reach Synapse via the proxy.
    Otherwise, it should be the URL to reach Synapse's client HTTP listener (see
    
    ['listeners'](#listeners) below).
    
    
    Defaults to `https://<server_name>/`.
    
    Example configuration:
    ```yaml
    public_baseurl: https://example.com/
    ```
    ---
    
    
    By default, other servers will try to reach our server on port 8448, which can
    be inconvenient in some environments.
    
    Provided `https://<server_name>/` on port 443 is routed to Synapse, this
    
    option configures Synapse to serve a file at `https://<server_name>/.well-known/matrix/server`.
    
    This will tell other servers to send traffic to port 443 instead.
    
    This option currently defaults to false.
    
    
    See [Delegation of incoming federation traffic](../../delegate.md) for more
    
    information.
    
    Example configuration:
    ```yaml
    serve_server_wellknown: true
    ```
    ---
    
    ### `extra_well_known_client_content `
    
    This option allows server runners to add arbitrary key-value pairs to the [client-facing `.well-known` response](https://spec.matrix.org/latest/client-server-api/#well-known-uri).
    Note that the `public_baseurl` config option must be provided for Synapse to serve a response to `/.well-known/matrix/client` at all.
    
    
    If this option is provided, it parses the given yaml to json and
    
    serves it on `/.well-known/matrix/client` endpoint
    alongside the standard properties.
    
    
    Example configuration:
    ```yaml
    
    extra_well_known_client_content :
    
      option1: value1
      option2: value2
    ```
    ---
    
    Set the soft limit on the number of file descriptors synapse can use.
    Zero is used to indicate synapse should set the soft limit to the hard limit.
    
    
    Example configuration:
    ```yaml
    soft_file_limit: 3
    ```
    ---
    
    
    Presence tracking allows users to see the state (e.g online/offline)
    
    of other local and remote users. Set the `enabled` sub-option to false to
    disable presence tracking on this homeserver. Defaults to true.
    
    This option replaces the previous top-level 'use_presence' option.
    
    Example configuration:
    ```yaml
    presence:
      enabled: false
    ```
    ---
    
    Whether to require authentication to retrieve profile data (avatars, display names) of other
    users through the client API. Defaults to false. Note that profile data is also available
    
    via the federation API, unless `allow_profile_lookup_over_federation` is set to false.
    
    Example configuration:
    ```yaml
    require_auth_for_profile_requests: true
    ```
    ---
    
    ### `limit_profile_requests_to_users_who_share_rooms`
    
    
    Use this option to require a user to share a room with another user in order
    
    to retrieve their profile information. Only checked on Client-Server
    
    requests. Profile requests from other servers should be checked by the
    requesting server. Defaults to false.
    
    
    ```yaml
    limit_profile_requests_to_users_who_share_rooms: true
    ```
    ---
    
    
    Use this option to prevent a user's profile data from being retrieved and
    displayed in a room until they have joined it. By default, a user's
    profile data is included in an invite event, regardless of the values
    of the above two settings, and whether or not the users share a server.
    Defaults to true.
    
    Example configuration:
    ```yaml
    include_profile_data_on_invite: false
    ```
    ---
    
    
    If set to true, removes the need for authentication to access the server's
    public rooms directory through the client API, meaning that anyone can
    query the room directory. Defaults to false.
    
    Example configuration:
    ```yaml
    allow_public_rooms_without_auth: true
    ```
    ---
    
    ### `allow_public_rooms_over_federation`
    
    
    If set to true, allows any other homeserver to fetch the server's public
    rooms directory via federation. Defaults to false.
    
    Example configuration:
    ```yaml
    allow_public_rooms_over_federation: true
    ```
    ---
    
    
    The default room version for newly created rooms on this server.
    
    Known room versions are listed [here](https://spec.matrix.org/latest/rooms/#complete-list-of-room-versions)
    
    For example, for room version 1, `default_room_version` should be set
    
    Currently defaults to ["10"](https://spec.matrix.org/v1.5/rooms/v10/).
    
    _Changed in Synapse 1.76:_ the default version room version was increased from [9](https://spec.matrix.org/v1.5/rooms/v9/) to [10](https://spec.matrix.org/v1.5/rooms/v10/).
    
    
    Example configuration:
    ```yaml
    default_room_version: "8"
    ```
    ---
    
    
    The garbage collection threshold parameters to pass to `gc.set_threshold`, if defined.
    
    
    Example configuration:
    ```yaml
    gc_thresholds: [700, 10, 10]
    ```
    ---
    
    
    The minimum time in seconds between each GC for a generation, regardless of
    
    the GC thresholds. This ensures that we don't do GC too frequently. A value of `[1s, 10s, 30s]`
    
    indicates that a second must pass between consecutive generation 0 GCs, etc.
    
    Defaults to `[1s, 10s, 30s]`.
    
    Example configuration:
    ```yaml
    gc_min_interval: [0.5s, 30s, 1m]
    ```
    ---
    
    
    Set the limit on the returned events in the timeline in the get
    and sync operations. Defaults to 100. A value of -1 means no upper limit.
    
    
    Example configuration:
    ```yaml
    filter_timeline_limit: 5000
    ```
    ---
    
    
    Whether room invites to users on this server should be blocked
    (except those sent by local server admins). Defaults to false.
    
    Example configuration:
    ```yaml
    block_non_admin_invites: true
    ```
    ---
    
    
    If set to false, new messages will not be indexed for searching and users
    will receive errors when searching for messages. Defaults to true.
    
    Example configuration:
    ```yaml
    enable_search: false
    ```
    ---
    
    This option prevents outgoing requests from being sent to the specified blacklisted IP address
    CIDR ranges. If this option is not specified then it defaults to private IP
    address ranges (see the example below).
    
    The blacklist applies to the outbound requests for federation, identity servers,
    push servers, and for checking key validity for third-party invite events.
    
    (0.0.0.0 and :: are always blacklisted, whether or not they are explicitly
    listed here, since they correspond to unroutable addresses.)
    
    This option replaces `federation_ip_range_blacklist` in Synapse v1.25.0.
    
    Note: The value is ignored when an HTTP proxy is in use.
    
    Example configuration:
    ```yaml
    ip_range_blacklist:
      - '127.0.0.0/8'
      - '10.0.0.0/8'
      - '172.16.0.0/12'
      - '192.168.0.0/16'
      - '100.64.0.0/10'
      - '192.0.0.0/24'
      - '169.254.0.0/16'
      - '192.88.99.0/24'
      - '198.18.0.0/15'
      - '192.0.2.0/24'
      - '198.51.100.0/24'
      - '203.0.113.0/24'
      - '224.0.0.0/4'
      - '::1/128'
      - 'fe80::/10'
      - 'fc00::/7'
      - '2001:db8::/32'
      - 'ff00::/8'
      - 'fec0::/10'
    ```
    ---
    
    
    List of IP address CIDR ranges that should be allowed for federation,
    identity servers, push servers, and for checking key validity for
    third-party invite events. This is useful for specifying exceptions to
    wide-ranging blacklisted target IP ranges - e.g. for communication with
    a push server only visible in your network.
    
    This whitelist overrides `ip_range_blacklist` and defaults to an empty
    list.
    
    Example configuration:
    ```yaml
    ip_range_whitelist:
       - '192.168.1.1'
    ```
    ---
    
    
    List of ports that Synapse should listen on, their purpose and their
    configuration.
    
    Sub-options for each listener include:
    
    
    * `port`: the TCP port to bind to.
    
    * `tag`: An alias for the port in the logger name. If set the tag is logged instead
    of the port. Default to `None`, is optional and only valid for listener with `type: http`.
    See the docs [request log format](../administration/request_log.md).
    
    
    * `bind_addresses`: a list of local addresses to listen on. The default is
           'all local interfaces'.
    
    * `type`: the type of listener. Normally `http`, but other valid options are:
    
       * `manhole`: (see the docs [here](../../manhole.md)),
    
       * `metrics`: (see the docs [here](../../metrics-howto.md)),
    
    * `tls`: set to true to enable TLS for this listener. Will use the TLS key/cert specified in tls_private_key_path / tls_certificate_path.
    
    * `x_forwarded`: Only valid for an 'http' listener. Set to true to use the X-Forwarded-For header as the client IP. Useful when Synapse is
    
       behind a [reverse-proxy](../../reverse_proxy.md).
    
    * `request_id_header`: The header extracted from each incoming request that is
       used as the basis for the request ID. The request ID is used in
       [logs](../administration/request_log.md#request-log-format) and tracing to
       correlate and match up requests. When unset, Synapse will automatically
       generate sequential request IDs. This option is useful when Synapse is behind
       a [reverse-proxy](../../reverse_proxy.md).
    
       _Added in Synapse 1.68.0._
    
    
    * `resources`: Only valid for an 'http' listener. A list of resources to host
       on this port. Sub-options for each resource are:
    
       * `names`: a list of names of HTTP resources. See below for a list of valid resource names.
    
    
       * `compress`: set to true to enable gzip compression on HTTP bodies for this resource. This is currently only supported with the
    
         `client`, `consent`, `metrics` and `federation` resources.
    
    
    * `additional_resources`: Only valid for an 'http' listener. A map of
       additional endpoints which should be loaded via dynamic modules.
    
    
    Unix socket support (_Added in Synapse 1.89.0_):
    
    * `path`: A path and filename for a Unix socket. Make sure it is located in a
      directory with read and write permissions, and that it already exists (the directory
      will not be created). Defaults to `None`.
      * **Note**: The use of both `path` and `port` options for the same `listener` is not
        compatible.
      * The `x_forwarded` option defaults to true  when using Unix sockets and can be omitted.
      * Other options that would not make sense to use with a UNIX socket, such as 
        `bind_addresses` and `tls` will be ignored and can be removed.
    * `mode`: The file permissions to set on the UNIX socket. Defaults to `666`
    * **Note:** Must be set as `type: http` (does not support `metrics` and `manhole`). 
      Also make sure that `metrics` is not included in `resources` -> `names`
    
    
    
    Valid resource names are:
    
    
    * `client`: the client-server API (/_matrix/client), and the synapse admin API (/_synapse/admin). Also implies `media` and `static`.
    
    
    * `consent`: user consent forms (/_matrix/consent). See [here](../../consent_tracking.md) for more.
    
    * `federation`: the server-server API (/_matrix/federation). Also implies `media`, `keys`, `openid`
    
    
    * `keys`: the key discovery API (/_matrix/key).
    
    
    * `media`: the media API (/_matrix/media).
    
    
    * `metrics`: the metrics interface. See [here](../../metrics-howto.md). (Not compatible with Unix sockets)
    
    
    * `openid`: OpenID authentication. See [here](../../openid.md).
    
    * `replication`: the HTTP replication API (/_synapse/replication). See [here](../../workers.md).
    
    * `static`: static resources under synapse/static (/_matrix/static). (Mostly useful for 'fallback authentication'.)
    
    
    * `health`: the [health check endpoint](../../reverse_proxy.md#health-check-endpoint). This endpoint
      is by default active for all other resources and does not have to be activated separately.
      This is only useful if you want to use the health endpoint explicitly on a dedicated port or
      for [workers](../../workers.md) and containers without listener e.g.
      [application services](../../workers.md#notifying-application-services).
    
    
    Example configuration #1:
    ```yaml
    listeners:
      # TLS-enabled listener: for when matrix traffic is sent directly to synapse.
      #
      # (Note that you will also need to give Synapse a TLS key and certificate: see the TLS section
      # below.)
      #
      - port: 8448
        type: http
        tls: true
        resources:
          - names: [client, federation]
    ```
    Example configuration #2:
    ```yaml
    listeners:
    
      # Insecure HTTP listener: for when matrix traffic passes through a reverse proxy
    
      # that unwraps TLS.
      #
      # If you plan to use a reverse proxy, please see
      # https://matrix-org.github.io/synapse/latest/reverse_proxy.html.
      #
      - port: 8008
        tls: false
        type: http
        x_forwarded: true
        bind_addresses: ['::1', '127.0.0.1']
    
        resources:
          - names: [client, federation]
            compress: false
    
        # example additional_resources:
        additional_resources:
          "/_matrix/my/custom/endpoint":
            module: my_module.CustomRequestHandler
            config: {}
    
      # Turn on the twisted ssh manhole service on localhost on the given
      # port.
      - port: 9000
        bind_addresses: ['::1', '127.0.0.1']
        type: manhole
    ```
    
    Example configuration #3:
    ```yaml
    listeners:
      # Unix socket listener: Ideal for Synapse deployments behind a reverse proxy, offering
      # lightweight interprocess communication without TCP/IP overhead, avoid port
      # conflicts, and providing enhanced security through system file permissions.
      #
      # Note that x_forwarded will default to true, when using a UNIX socket. Please see
      # https://matrix-org.github.io/synapse/latest/reverse_proxy.html.
      #
      - path: /var/run/synapse/main_public.sock
        type: http
        resources:
          - names: [client, federation]
    ```
    
    
    
    Connection settings for the manhole. You can find more information
    on the manhole [here](../../manhole.md). Manhole sub-options include:
    * `username` : the username for the manhole. This defaults to 'matrix'.
    * `password`: The password for the manhole. This defaults to 'rabbithole'.
    * `ssh_priv_key_path` and `ssh_pub_key_path`: The private and public SSH key pair used to encrypt the manhole traffic.
      If these are left unset, then hardcoded and non-secret keys are used,
      which could allow traffic to be intercepted if sent over a public network.
    
    Example configuration:
    ```yaml
    manhole_settings:
      username: manhole
      password: mypassword
      ssh_priv_key_path: CONFDIR/id_rsa
      ssh_pub_key_path: CONFDIR/id_rsa.pub
    ```
    ---
    
    
    Forward extremities can build up in a room due to networking delays between
    homeservers. Once this happens in a large room, calculation of the state of
    that room can become quite expensive. To mitigate this, once the number of
    forward extremities reaches a given threshold, Synapse will send an
    `org.matrix.dummy_event` event, which will reduce the forward extremities
    in the room.
    
    
    This setting defines the threshold (i.e. number of forward extremities in the room) at which dummy events are sent.
    
    The default value is 10.
    
    Example configuration:
    ```yaml
    dummy_events_threshold: 5
    ```
    ---
    
    ### `delete_stale_devices_after`
    
    
    An optional duration. If set, Synapse will run a daily background task to log out and
    delete any device that hasn't been accessed for more than the specified amount of time.
    
    Defaults to no duration, which means devices are never pruned.
    
    
    **Note:** This task will always run on the main process, regardless of the value of
    `run_background_tasks_on`. This is due to workers currently not having the ability to
    delete devices.
    
    
    Example configuration:
    ```yaml
    delete_stale_devices_after: 1y
    ```
    
    ---
    ### `email`
    
    Configuration for sending emails from Synapse.
    
    Server admins can configure custom templates for email content. See
    [here](../../templates.md) for more information.
    
    This setting has the following sub-options:
    * `smtp_host`: The hostname of the outgoing SMTP server to use. Defaults to 'localhost'.
    * `smtp_port`: The port on the mail server for outgoing SMTP. Defaults to 465 if `force_tls` is true, else 25.
    
      _Changed in Synapse 1.64.0:_ the default port is now aware of `force_tls`.
    * `smtp_user` and `smtp_pass`: Username/password for authentication to the SMTP server. By default, no
       authentication is attempted.
    * `force_tls`: By default, Synapse connects over plain text and then optionally upgrades
       to TLS via STARTTLS. If this option is set to true, TLS is used from the start (Implicit TLS),
       and the option `require_transport_security` is ignored.
       It is recommended to enable this if supported by your mail server.
    
      _New in Synapse 1.64.0._
    * `require_transport_security`: Set to true to require TLS transport security for SMTP.
       By default, Synapse will connect over plain text, and will then switch to
       TLS via STARTTLS *if the SMTP server supports it*. If this option is set,
       Synapse will refuse to connect unless the server supports STARTTLS.
    * `enable_tls`: By default, if the server supports TLS, it will be used, and the server
       must present a certificate that is valid for 'smtp_host'. If this option
       is set to false, TLS will not be used.
    * `notif_from`: defines the "From" address to use when sending emails.
        It must be set if email sending is enabled. The placeholder '%(app)s' will be replaced by the application name,
        which is normally set in `app_name`, but may be overridden by the
        Matrix client application. Note that the placeholder must be written '%(app)s', including the
        trailing 's'.
    * `app_name`: `app_name` defines the default value for '%(app)s' in `notif_from` and email
       subjects. It defaults to 'Matrix'.
    * `enable_notifs`: Set to true to enable sending emails for messages that the user
       has missed. Disabled by default.
    * `notif_for_new_users`: Set to false to disable automatic subscription to email
       notifications for new users. Enabled by default.
    * `client_base_url`: Custom URL for client links within the email notifications. By default
       links will be based on "https://matrix.to". (This setting used to be called `riot_base_url`;
       the old name is still supported for backwards-compatibility but is now deprecated.)
    * `validation_token_lifetime`: Configures the time that a validation email will expire after sending.
       Defaults to 1h.
    * `invite_client_location`: The web client location to direct users to during an invite. This is passed
       to the identity server as the `org.matrix.web_client_location` key. Defaults
       to unset, giving no guidance to the identity server.
    * `subjects`: Subjects to use when sending emails from Synapse. The placeholder '%(app)s' will
       be replaced with the value of the `app_name` setting, or by a value dictated by the Matrix client application.
       In addition, each subject can use the following placeholders: '%(person)s', which will be replaced by the displayname
       of the user(s) that sent the message(s), e.g. "Alice and Bob", and '%(room)s', which will be replaced by the name of the room the
       message(s) have been sent to, e.g. "My super room". In addition, emails related to account administration will
       can use the '%(server_name)s' placeholder, which will be replaced by the value of the
       `server_name` setting in your Synapse configuration.
    
       Here is a list of subjects for notification emails that can be set:
         * `message_from_person_in_room`: Subject to use to notify about one message from one or more user(s) in a
            room which has a name. Defaults to "[%(app)s] You have a message on %(app)s from %(person)s in the %(room)s room..."
         * `message_from_person`: Subject to use to notify about one message from one or more user(s) in a
            room which doesn't have a name. Defaults to "[%(app)s] You have a message on %(app)s from %(person)s..."
         * `messages_from_person`: Subject to use to notify about multiple messages from one or more users in
            a room which doesn't have a name. Defaults to "[%(app)s] You have messages on %(app)s from %(person)s..."
         * `messages_in_room`: Subject to use to notify about multiple messages in a room which has a
            name. Defaults to "[%(app)s] You have messages on %(app)s in the %(room)s room..."
         * `messages_in_room_and_others`: Subject to use to notify about multiple messages in multiple rooms.
            Defaults to "[%(app)s] You have messages on %(app)s in the %(room)s room and others..."
         * `messages_from_person_and_others`: Subject to use to notify about multiple messages from multiple persons in
            multiple rooms. This is similar to the setting above except it's used when
            the room in which the notification was triggered has no name. Defaults to
            "[%(app)s] You have messages on %(app)s from %(person)s and others..."
         * `invite_from_person_to_room`: Subject to use to notify about an invite to a room which has a name.
            Defaults to  "[%(app)s] %(person)s has invited you to join the %(room)s room on %(app)s..."
         * `invite_from_person`: Subject to use to notify about an invite to a room which doesn't have a
            name. Defaults to "[%(app)s] %(person)s has invited you to chat on %(app)s..."
         * `password_reset`: Subject to use when sending a password reset email. Defaults to "[%(server_name)s] Password reset"
         * `email_validation`: Subject to use when sending a verification email to assert an address's
            ownership. Defaults to "[%(server_name)s] Validate your email"
    
    Example configuration:
    
    ```yaml
    email:
      smtp_host: mail.server
      smtp_port: 587
      smtp_user: "exampleusername"
      smtp_pass: "examplepassword"
      force_tls: true
      require_transport_security: true
      enable_tls: false
      notif_from: "Your Friendly %(app)s homeserver <noreply@example.com>"
      app_name: my_branded_matrix_server
      enable_notifs: true
      notif_for_new_users: false
      client_base_url: "http://localhost/riot"
      validation_token_lifetime: 15m
      invite_client_location: https://app.element.io
    
      subjects:
        message_from_person_in_room: "[%(app)s] You have a message on %(app)s from %(person)s in the %(room)s room..."
        message_from_person: "[%(app)s] You have a message on %(app)s from %(person)s..."
        messages_from_person: "[%(app)s] You have messages on %(app)s from %(person)s..."
        messages_in_room: "[%(app)s] You have messages on %(app)s in the %(room)s room..."
        messages_in_room_and_others: "[%(app)s] You have messages on %(app)s in the %(room)s room and others..."
        messages_from_person_and_others: "[%(app)s] You have messages on %(app)s from %(person)s and others..."
        invite_from_person_to_room: "[%(app)s] %(person)s has invited you to join the %(room)s room on %(app)s..."
        invite_from_person: "[%(app)s] %(person)s has invited you to chat on %(app)s..."
        password_reset: "[%(server_name)s] Password reset"
        email_validation: "[%(server_name)s] Validate your email"
    ```
    
    ## Homeserver blocking
    
    Useful options for Synapse admins.
    
    ---
    
    
    How to reach the server admin, used in `ResourceLimitError`. Defaults to none.
    
    
    Example configuration:
    ```yaml
    admin_contact: 'mailto:admin@server.com'
    ```
    ---
    
    ### `hs_disabled` and `hs_disabled_message`
    
    
    Blocks users from connecting to the homeserver and provides a human-readable reason
    
    why the connection was blocked. Defaults to false.
    
    
    Example configuration:
    ```yaml
    hs_disabled: true
    hs_disabled_message: 'Reason for why the HS is blocked'
    ```
    ---
    
    This option disables/enables monthly active user blocking. Used in cases where the admin or
    server owner wants to limit to the number of monthly active users. When enabled and a limit is
    
    reached the server returns a `ResourceLimitError` with error type `Codes.RESOURCE_LIMIT_EXCEEDED`.
    Defaults to false. If this is enabled, a value for `max_mau_value` must also be set.
    
    
    See [Monthly Active Users](../administration/monthly_active_users.md) for details on how to configure MAU.
    
    
    Example configuration:
    ```yaml
    
    This option sets the hard limit of monthly active users above which the server will start
    blocking user actions if `limit_usage_by_mau` is enabled. Defaults to 0.
    
    
    Example configuration:
    ```yaml
    max_mau_value: 50
    ```
    ---
    
    
    The option `mau_trial_days` is a means to add a grace period for active users. It
    means that users must be active for the specified number of days before they
    can be considered active and guards against the case where lots of users
    sign up in a short space of time never to return after their initial
    
    
    Example configuration:
    ```yaml
    mau_trial_days: 5
    ```
    ---
    
    
    The option `mau_appservice_trial_days` is similar to `mau_trial_days`, but applies a different
    trial number if the user was registered by an appservice. A value
    of 0 means no trial days are applied. Appservices not listed in this dictionary
    use the value of `mau_trial_days` instead.
    
    Example configuration:
    ```yaml
    
      my_appservice_id: 3
      another_appservice_id: 6
    ```
    ---
    
    
    The option `mau_limit_alerting` is a means of limiting client-side alerting
    should the mau limit be reached. This is useful for small instances
    where the admin has 5 mau seats (say) for 5 specific people and no
    interest increasing the mau limit further. Defaults to true, which
    means that alerting is enabled.
    
    Example configuration:
    ```yaml
    mau_limit_alerting: false
    ```
    ---
    
    
    If enabled, the metrics for the number of monthly active users will
    be populated, however no one will be limited based on these numbers. If `limit_usage_by_mau`
    
    is true, this is implied to be true. Defaults to false.
    
    
    Example configuration:
    ```yaml
    mau_stats_only: true
    ```
    ---
    
    
    Sometimes the server admin will want to ensure certain accounts are
    never blocked by mau checking. These accounts are specified by this option.
    Defaults to none. Add accounts by specifying the `medium` and `address` of the
    reserved threepid (3rd party identifier).
    
    Example configuration:
    ```yaml
    mau_limit_reserved_threepids:
      - medium: 'email'
        address: 'reserved_user@example.com'
    ```
    ---
    
    
    This option is used by phonehome stats to group together related servers.
    
    
    Example configuration:
    ```yaml
    server_context: context
    ```
    ---
    
    
    When this option is enabled, the room "complexity" will be checked before a user
    joins a new remote room. If it is above the complexity limit, the server will
    disallow joining, or will instantly leave. This is useful for homeservers that are
    resource-constrained. Options for this setting include:
    * `enabled`: whether this check is enabled. Defaults to false.
    * `complexity`: the limit above which rooms cannot be joined. The default is 1.0.
    * `complexity_error`: override the error which is returned when the room is too complex with a
    
    * `admins_can_join`: allow server admins to join complex rooms. Default is false.
    
    Room complexity is an arbitrary measure based on factors such as the number of
    
    
    Example configuration:
    ```yaml
    limit_remote_rooms:
      enabled: true
      complexity: 0.5
      complexity_error: "I can't let you do that, Dave."
      admins_can_join: true
    ```
    ---
    
    
    Whether to require a user to be in the room to add an alias to it.
    Defaults to true.
    
    Example configuration:
    ```yaml
    require_membership_for_aliases: false
    ```
    ---
    
    
    Whether to allow per-room membership profiles through the sending of membership
    events with profile information that differs from the target's global profile.
    Defaults to true.
    
    Example configuration:
    ```yaml
    allow_per_room_profiles: false
    ```
    ---
    
    
    The largest permissible file size in bytes for a user avatar. Defaults to no restriction.
    
    
    Note that user avatar changes will not work if this is set without using Synapse's media repository.
    
    Example configuration:
    ```yaml
    max_avatar_size: 10M
    ```
    ---
    
    
    The MIME types allowed for user avatars. Defaults to no restriction.
    
    Note that user avatar changes will not work if this is set without
    using Synapse's media repository.
    
    Example configuration:
    ```yaml
    allowed_avatar_mimetypes: ["image/png", "image/jpeg", "image/gif"]
    ```
    ---
    
    
    How long to keep redacted events in unredacted form in the database. After
    this period redacted events get replaced with their redacted form in the DB.
    
    
    Synapse will check whether the rentention period has concluded for redacted
    events every 5 minutes. Thus, even if this option is set to `0`, Synapse may
    still take up to 5 minutes to purge redacted events from the database.
    
    
    Defaults to `7d`. Set to `null` to disable.
    
    Example configuration:
    ```yaml
    redaction_retention_period: 28d
    ```
    ---
    
    ### `forgotten_room_retention_period`
    
    How long to keep locally forgotten rooms before purging them from the DB.
    
    Defaults to `null`, meaning it's disabled.
    
    Example configuration:
    ```yaml
    forgotten_room_retention_period: 28d
    ```
    ---
    
    
    How long to track users' last seen time and IPs in the database.
    
    Defaults to `28d`. Set to `null` to disable clearing out of old rows.
    
    Example configuration:
    ```yaml
    user_ips_max_age: 14d
    ```
    ---
    
    
    Inhibits the `/requestToken` endpoints from returning an error that might leak
    information about whether an e-mail address is in use or not on this
    
    homeserver. Defaults to false.
    
    Note that for some endpoints the error situation is the e-mail already being
    used, and for others the error is entering the e-mail being unused.
    If this option is enabled, instead of returning an error, these endpoints will
    act as if no error happened and return a fake session ID ('sid') to clients.
    
    Example configuration:
    ```yaml
    request_token_inhibit_3pid_errors: true
    ```
    ---
    
    
    A list of domains that the domain portion of `next_link` parameters
    must match.
    
    This parameter is optionally provided by clients while requesting
    validation of an email or phone number, and maps to a link that
    users will be automatically redirected to after validation
    succeeds. Clients can make use this parameter to aid the validation
    process.
    
    The whitelist is applied whether the homeserver or an identity server is handling validation.
    
    The default value is no whitelist functionality; all domains are
    allowed. Setting this value to an empty list will instead disallow
    all domains.
    
    Example configuration:
    ```yaml
    next_link_domain_whitelist: ["matrix.org"]
    ```
    ---
    
    ### `templates` and `custom_template_directory`
    
    
    These options define templates to use when generating email or HTML page contents.