Add Mautrix Slack bridge

Signed-off-by: magic_rb <magic_rb@redalder.org>
This commit is contained in:
magic_rb 2023-11-18 16:00:30 +01:00
parent a92d44383d
commit d59e96181b
No known key found for this signature in database
GPG key ID: 08D5287CC5DDCA0E
8 changed files with 554 additions and 0 deletions

View file

@ -67,6 +67,7 @@
nixng/containers/ingress-toothpick nixng/containers/ingress-toothpick
nixng/containers/matrix/mautrix-signal nixng/containers/matrix/mautrix-signal
nixng/containers/matrix/mautrix-discord nixng/containers/matrix/mautrix-discord
nixng/containers/matrix/mautrix-slack
nixng/containers/matrix/mautrix-facebook nixng/containers/matrix/mautrix-facebook
nixng/containers/matrix/heisenbridge nixng/containers/matrix/heisenbridge
nixng/containers/matrix/synapse nixng/containers/matrix/synapse
@ -90,6 +91,7 @@
overlays/emacs-master-nativecomp overlays/emacs-master-nativecomp
overlays/zfs-relmount overlays/zfs-relmount
overlays/mautrix-discord.nix overlays/mautrix-discord.nix
overlays/mautrix-slack.nix
overlays/getmail6 overlays/getmail6
overlays/maildrop overlays/maildrop
overlays/courier-unicode.nix overlays/courier-unicode.nix

View file

@ -0,0 +1,43 @@
{ inputs, config, ... }:
{
flake.nixngConfigurations.mautrixSlack = inputs.nixng.nglib.makeSystem {
system = "x86_64-linux";
name = "mautrix-slack";
inherit (inputs) nixpkgs;
config =
{ pkgs, lib, ... }:
{
dumb-init = {
enable = true;
type.services = { };
};
init.services.mautrix-slack = {
enabled = true;
shutdownOnExit = true;
script =
let
inherit (lib)
getExe'
makeBinPath;
mautrix-slack = (pkgs.appendOverlays [ config.flake.overlays.mautrix-slack ]).mautrix-slack;
in
pkgs.writeShellScript "mautrix-slack"
''
DATA_DIR="/var/lib/mautrix-slack"
CONFIG_FILE="$DATA_DIR/config.yaml"
REGISTRATION_FILE="/var/lib/registrations/mautrix-slack.yaml"
${getExe' pkgs.envsubst "envsubst"} < ${./mautrix-slack.yaml} > "$CONFIG_FILE"
chmod 755 "$CONFIG_FILE"
export PATH="$PATH:${makeBinPath [ pkgs.lottieconverter ]};"
[ -e "$REGISTRATION_FILE" ] || \
${getExe' mautrix-slack "mautrix-slack"} -c "$CONFIG_FILE" -r "$REGISTRATION_FILE" -g
${getExe' mautrix-slack "mautrix-slack"} -c "$CONFIG_FILE" -r "$REGISTRATION_FILE" -n
'';
};
};
};
}

View file

@ -0,0 +1,288 @@
# Homeserver details.
homeserver:
# The address that this appservice can use to connect to the homeserver.
address: https://matrix.redalder.org
# Publicly accessible base URL for media, used for avatars in relay mode.
# If not set, the connection address above will be used.
public_address: null
# The domain of the homeserver (also known as server_name, used for MXIDs, etc).
domain: matrix.redalder.org
# What software is the homeserver running?
# Standard Matrix homeservers like Synapse, Dendrite and Conduit should just use "standard" here.
software: standard
# The URL to push real-time bridge status to.
# If set, the bridge will make POST requests to this URL whenever a user's discord connection state changes.
# The bridge will use the appservice as_token to authorize requests.
status_endpoint: null
# Endpoint for reporting per-message status.
message_send_checkpoint_endpoint: null
# Does the homeserver support https://github.com/matrix-org/matrix-spec-proposals/pull/2246?
async_media: false
# Application service host/registration related details.
# Changing these values requires regeneration of the registration.
appservice:
# The address that the homeserver can use to connect to this appservice.
address: http://localhost:29335
# The hostname and port where this appservice should listen.
hostname: 0.0.0.0
port: 29335
# Database config.
database:
# The database type. "sqlite3-fk-wal" and "postgres" are supported.
type: postgres
# The database URI.
# SQLite: A raw file path is supported, but `file:<path>?_txlock=immediate` is recommended.
# https://github.com/mattn/go-sqlite3#connection-string
# Postgres: Connection string. For example, postgres://user:password@host/database?sslmode=disable
# To connect via Unix socket, use something like postgres:///dbname?host=/var/run/postgresql
uri: postgres://mautrix-slack:${MAUTRIX_SLACK_APPSERVICE_DATABASE_PASSWORD}@127.0.0.1/mautrix-slack?sslmode=disable
# Maximum number of connections. Mostly relevant for Postgres.
max_open_conns: 10
max_idle_conns: 2
# Maximum connection idle time and lifetime before they're closed. Disabled if null.
# Parsed with https://pkg.go.dev/time#ParseDuration
max_conn_idle_time: null
max_conn_lifetime: null
# The unique ID of this appservice.
id: muslack
# Appservice bot details.
bot:
# Username of the appservice bot.
username: muslackbot
# Display name and avatar for bot. Set to "remove" to remove display name/avatar, leave empty
# to leave display name/avatar as-is.
displayname: Mautrix Slack bridge bot
avatar: mxc://maunium.net/pVtzLmChZejGxLqmXtQjFxem
# Whether or not to receive ephemeral events via appservice transactions.
# Requires MSC2409 support (i.e. Synapse 1.22+).
ephemeral_events: true
# Should incoming events be handled asynchronously?
# This may be necessary for large public instances with lots of messages going through.
# However, messages will not be guaranteed to be bridged in the same order they were sent in.
async_transactions: false
# Authentication tokens for AS <-> HS communication. Autogenerated; do not modify.
as_token: "${MAUTRIX_SLACK_APPSERVICE_AS_TOKEN}"
hs_token: "${MAUTRIX_SLACK_APPSERVICE_HS_TOKEN}"
bridge:
# Localpart template of MXIDs for Slack users.
# {{.}} is replaced with the internal ID of the Slack user.
username_template: slack_{{.}}
# Displayname template for Slack users.
# TODO: document variables
displayname_template: '{{.RealName}} (S)'
bot_displayname_template: '{{.Name}} (bot)'
channel_name_template: '#{{.Name}}'
portal_message_buffer: 128
# Should the bridge send a read receipt from the bridge bot when a message has been sent to Slack?
delivery_receipts: true
# Whether the bridge should send the message status as a custom com.beeper.message_send_status event.
message_status_events: false
# Whether the bridge should send error notices via m.notice events when a message fails to bridge.
message_error_notices: true
# Should incoming custom emoji reactions be bridged as mxc:// URIs?
# If set to false, custom emoji reactions will be bridged as the shortcode instead, and the image won't be available.
custom_emoji_reactions: true
# Should the bridge sync with double puppeting to receive EDUs that aren't normally sent to appservices.
sync_with_custom_puppets: false
# Should the bridge update the m.direct account data event when double puppeting is enabled.
# Note that updating the m.direct event is not atomic (except with mautrix-asmux)
# and is therefore prone to race conditions.
sync_direct_chat_list: false
# Whether or not created rooms should have federation enabled.
# If false, created portal rooms will never be federated.
federate_rooms: true
# Whether to explicitly set the avatar and room name for private chat portal rooms.
# If set to `default`, this will be enabled in encrypted rooms and disabled in unencrypted rooms.
# If set to `always`, all DM rooms will have explicit names and avatars set.
# If set to `never`, DM rooms will never have names and avatars set.
private_chat_portal_meta: default
# Servers to always allow double puppeting from
double_puppet_server_map:
example.com: https://example.com
# Allow using double puppeting from any server with a valid client .well-known file.
double_puppet_allow_discovery: false
# Shared secrets for https://github.com/devture/matrix-synapse-shared-secret-auth
#
# If set, double puppeting will be enabled automatically for local users
# instead of users having to find an access token and run `login-matrix`
# manually.
login_shared_secret_map:
example.com: foobar
message_handling_timeout:
# Send an error message after this timeout, but keep waiting for the response until the deadline.
# This is counted from the origin_server_ts, so the warning time is consistent regardless of the source of delay.
# If the message is older than this when it reaches the bridge, the message won't be handled at all.
error_after: 10s
# Drop messages after this timeout. They may still go through if the message got sent to the servers.
# This is counted from the time the bridge starts handling the message.
deadline: 60s
# The prefix for commands. Only required in non-management rooms.
command_prefix: '!slack'
# Messages sent upon joining a management room.
# Markdown is supported. The defaults are listed below.
management_room_text:
# Sent when joining a room.
welcome: "Hello, I'm a Slack bridge bot."
# Sent when joining a management room and the user is already logged in.
welcome_connected: "Use `help` for help."
# Sent when joining a management room and the user is not logged in.
welcome_unconnected: "Use `help` for help, or `login-token` or `login-password` to log in."
# Optional extra text sent when joining a management room.
additional_help: ""
backfill:
# Allow backfilling at all? Requires MSC2716 support on homeserver.
enable: true
# Maximum number of conversations to fetch from Slack when syncing team from Slack.
# Must be 0-999
conversations_count: 200
# If a backfilled chat is older than this number of hours, mark it as read even if it's unread on Slack.
# Set to -1 to let any chat be unread.
unread_hours_threshold: 720
# Number of messages to immediately backfill when creating a portal.
immediate_messages: 10
# Settings for incremental backfill of history.
incremental:
# Maximum number of messages to backfill per batch.
messages_per_batch: 100
# The number of seconds to wait after backfilling the batch of messages.
post_batch_delay: 20
# The maximum number of messages to backfill per portal, split by the chat type.
# If set to -1, all messages in the chat will eventually be backfilled.
max_messages:
# Channels
channel: -1
# Group direct messages
group_dm: -1
# 1:1 direct messages
dm: -1
# End-to-bridge encryption support options.
#
# See https://docs.mau.fi/bridges/general/end-to-bridge-encryption.html for more info.
encryption:
# Allow encryption, work in group chat rooms with e2ee enabled
allow: false
# Default to encryption, force-enable encryption in all portals the bridge creates
# This will cause the bridge bot to be in private chats for the encryption to work properly.
default: false
# Whether to use MSC2409/MSC3202 instead of /sync long polling for receiving encryption-related data.
appservice: false
# Require encryption, drop any unencrypted messages.
require: false
# Enable key sharing? If enabled, key requests for rooms where users are in will be fulfilled.
# You must use a client that supports requesting keys from other users to use this feature.
allow_key_sharing: false
# Options for deleting megolm sessions from the bridge.
delete_keys:
# Beeper-specific: delete outbound sessions when hungryserv confirms
# that the user has uploaded the key to key backup.
delete_outbound_on_ack: false
# Don't store outbound sessions in the inbound table.
dont_store_outbound: false
# Ratchet megolm sessions forward after decrypting messages.
ratchet_on_decrypt: false
# Delete fully used keys (index >= max_messages) after decrypting messages.
delete_fully_used_on_decrypt: false
# Delete previous megolm sessions from same device when receiving a new one.
delete_prev_on_new_session: false
# Delete megolm sessions received from a device when the device is deleted.
delete_on_device_delete: false
# Periodically delete megolm sessions when 2x max_age has passed since receiving the session.
periodically_delete_expired: false
# Delete inbound megolm sessions that don't have the received_at field used for
# automatic ratcheting and expired session deletion. This is meant as a migration
# to delete old keys prior to the bridge update.
delete_outdated_inbound: false
# What level of device verification should be required from users?
#
# Valid levels:
# unverified - Send keys to all device in the room.
# cross-signed-untrusted - Require valid cross-signing, but trust all cross-signing keys.
# cross-signed-tofu - Require valid cross-signing, trust cross-signing keys on first use (and reject changes).
# cross-signed-verified - Require valid cross-signing, plus a valid user signature from the bridge bot.
# Note that creating user signatures from the bridge bot is not currently possible.
# verified - Require manual per-device verification
# (currently only possible by modifying the `trust` column in the `crypto_device` database table).
verification_levels:
# Minimum level for which the bridge should send keys to when bridging messages from WhatsApp to Matrix.
receive: unverified
# Minimum level that the bridge should accept for incoming Matrix messages.
send: unverified
# Minimum level that the bridge should require for accepting key requests.
share: cross-signed-tofu
# Options for Megolm room key rotation. These options allow you to
# configure the m.room.encryption event content. See:
# https://spec.matrix.org/v1.3/client-server-api/#mroomencryption for
# more information about that event.
rotation:
# Enable custom Megolm room key rotation settings. Note that these
# settings will only apply to rooms created after this option is
# set.
enable_custom: false
# The maximum number of milliseconds a session should be used
# before changing it. The Matrix spec recommends 604800000 (a week)
# as the default.
milliseconds: 604800000
# The maximum number of messages that should be sent with a given a
# session before changing it. The Matrix spec recommends 100 as the
# default.
messages: 100
# Disable rotating keys when a user's devices change?
# You should not enable this option unless you understand all the implications.
disable_device_change_key_rotation: false
# Settings for provisioning API
provisioning:
# Prefix for the provisioning API paths.
prefix: /_matrix/provision
# Shared secret for authentication. If set to "generate", a random secret will be generated,
# or if set to "disable", the provisioning API will be disabled.
shared_secret: generate
# Permissions for using the bridge.
# Permitted values:
# relay - Talk through the relaybot (if enabled), no access otherwise
# user - Access to use the bridge to chat with a Discord account.
# admin - User level and some additional administration tools
# Permitted keys:
# * - All Matrix users
# domain - All users on that homeserver
# mxid - Specific user
permissions:
"*": relay
"matrix.redalder.org": user
"@magic_rb:matrix.redalder.org": admin
# Logging config. See https://github.com/tulir/zeroconfig for details.
logging:
min_level: debug
writers:
- type: stdout
format: pretty-colored
- type: file
format: json
filename: ./logs/mautrix-discord.log
max_size: 100
max_backups: 10
compress: true

View file

@ -47,6 +47,7 @@ makeSystem {
"mautrix-signal" = { ENCODING = "UTF8"; TEMPLATE = "template0"; }; "mautrix-signal" = { ENCODING = "UTF8"; TEMPLATE = "template0"; };
"mautrix-whatsapp" = { ENCODING = "UTF8"; TEMPLATE = "template0"; }; "mautrix-whatsapp" = { ENCODING = "UTF8"; TEMPLATE = "template0"; };
"mautrix-discord" = { ENCODING = "UTF8"; TEMPLATE = "template0"; }; "mautrix-discord" = { ENCODING = "UTF8"; TEMPLATE = "template0"; };
"mautrix-slack" = { ENCODING = "UTF8"; TEMPLATE = "template0"; };
}; };
ensureExtensions = {}; ensureExtensions = {};
ensureUsers = [ ensureUsers = [
@ -70,6 +71,10 @@ makeSystem {
name = "mautrix-discord"; name = "mautrix-discord";
ensurePermissions."DATABASE \"mautrix-discord\"" = "ALL PRIVILEGES"; ensurePermissions."DATABASE \"mautrix-discord\"" = "ALL PRIVILEGES";
} }
{
name = "mautrix-slack";
ensurePermissions."DATABASE \"mautrix-slack\"" = "ALL PRIVILEGES";
}
]; ];
}; };
}; };

View file

@ -0,0 +1,39 @@
# SPDX-FileCopyrightText: 2022 Richard Brežák <richard@brezak.sk>
#
# SPDX-License-Identifier: LGPL-3.0-or-later
{ inputs, ... }:
{
flake.overlays.mautrix-slack =
final: prev:
let
inherit (prev.lib)
singleton;
in
{
mautrix-slack =
prev.buildGoModule rec {
pname = "mautrix-slack";
version = "0.6.3";
src = prev.fetchFromGitHub {
owner = "mautrix";
repo = "slack";
rev = "4530ff397d08d93b673cd71da4c2a75d969ca0df";
hash = "sha256-zq5Qzdw6MhBJDMmi2SWHTEyOghpfLiQOEf0e2Fn+ww8=";
};
buildInputs = singleton prev.olm;
vendorSha256 = "sha256-Adfz6mHYa22OqEZZHrvst31XdZFo7LuxQI20whq3Zes=";
doCheck = false;
meta = with prev.lib; {
homepage = "https://github.com/tulir/mautrix-slack";
description = "Matrix <-> Slack hybrid puppeting/relaybot bridge";
license = licenses.agpl3Plus;
maintainers = with maintainers; [ ];
};
};
};
}

View file

@ -37,6 +37,14 @@ in
mount_flags = [ "hard" "vers=4.2" "rsize=16384" "wsize=16384" "async" ]; mount_flags = [ "hard" "vers=4.2" "rsize=16384" "wsize=16384" "async" ];
}; };
resource."nomad_volume"."matrix-mautrix-slack" = nfsVolume {
volume_name = "matrix-mautrix-slack";
access_mode = "single-node-writer";
server = "blowhole.hosts.in.redalder.org";
share = "/mnt/kyle/infrastructure/matrix/mautrix-slack";
mount_flags = [ "hard" "vers=4.2" "rsize=16384" "wsize=16384" "async" ];
};
resource."nomad_volume"."matrix-mautrix-facebook" = nfsVolume { resource."nomad_volume"."matrix-mautrix-facebook" = nfsVolume {
volume_name = "matrix-mautrix-facebook"; volume_name = "matrix-mautrix-facebook";
access_mode = "single-node-writer"; access_mode = "single-node-writer";
@ -93,6 +101,18 @@ in
''; '';
}; };
resource."vault_policy"."matrix-mautrix-slack-policy" = {
name = "matrix-mautrix-slack-policy";
policy = ''
path "kv/data/cluster/matrix/mautrix-slack/main" {
capabilities = ["read"]
}
path "kv/data/cluster/matrix/mautrix-slack/postgresql" {
capabilities = ["read"]
}
'';
};
resource."vault_policy"."matrix-mautrix-facebook-policy" = { resource."vault_policy"."matrix-mautrix-facebook-policy" = {
name = "matrix-mautrix-facebook-policy"; name = "matrix-mautrix-facebook-policy";
policy = '' policy = ''
@ -132,6 +152,10 @@ in
path "kv/data/cluster/matrix/mautrix-discord/postgresql" { path "kv/data/cluster/matrix/mautrix-discord/postgresql" {
capabilities = ["read"] capabilities = ["read"]
} }
path "kv/data/cluster/matrix/mautrix-slack/postgresql" {
capabilities = ["read"]
}
''; '';
}; };
@ -161,6 +185,15 @@ in
}; };
}; };
resource."nomad_job"."matrix-mautrix-slack" = nomadJob {
jobspec = ./matrix-mautrix-slack.hcl;
vars = {
flake_ref = "${vars.flake_host}?ref=${vars.flake_ref}&rev=${vars.flake_rev}";
flake_sha = vars.flake_sha;
store_path = builtins.unsafeDiscardStringContext config'.flake.nixngConfigurations.mautrixSlack.config.system.build.toplevel;
};
};
resource."nomad_job"."matrix-mautrix-facebook" = nomadJob { resource."nomad_job"."matrix-mautrix-facebook" = nomadJob {
jobspec = ./matrix-mautrix-facebook.hcl; jobspec = ./matrix-mautrix-facebook.hcl;
vars = { vars = {

View file

@ -0,0 +1,118 @@
variable "flake_ref" {
type = string
}
variable "flake_sha" {
type = string
}
variable "store_path" {
type = string
}
job "matrix-mautrix-slack" {
datacenters = [ "homelab-1" ]
type = "service"
group "mautrix-slack" {
count = 1
volume "matrix-mautrix-slack" {
type = "csi"
source = "matrix-mautrix-slack"
read_only = false
attachment_mode = "file-system"
access_mode = "single-node-writer"
}
volume "matrix-registrations" {
type = "csi"
source = "matrix-registrations"
read_only = false
attachment_mode = "file-system"
access_mode = "multi-node-multi-writer"
}
restart {
attempts = 5
delay = "5s"
}
network {
mode = "bridge"
}
service {
name = "matrix-mautrix-slack"
port = "29335"
# check {
# type = "http"
# address_mode = "alloc"
# path = "/public"
# port = "29319"
# interval = "2s"
# timeout = "2s"
# }
connect {
sidecar_service {
proxy {
upstreams {
destination_name = "matrix-postgresql"
local_bind_port = 5432
}
}
}
}
}
task "mautrix-slack" {
driver = "docker"
volume_mount {
volume = "matrix-mautrix-slack"
destination = "/var/lib/mautrix-slack"
read_only = false
}
volume_mount {
volume = "matrix-registrations"
destination = "/var/lib/registrations"
read_only = false
}
config {
nix_flake_ref = "${var.flake_ref}#nixngConfigurations.mautrixSlack.config.system.build.toplevel"
nix_flake_sha = var.flake_sha
nix_flake_store_path = var.store_path
entrypoint = [ "init" ]
}
vault {
policies = ["matrix-mautrix-slack-policy"]
}
template {
data = <<EOF
{{ with secret "kv/data/cluster/matrix/mautrix-slack/main" }}
MAUTRIX_SLACK_APPSERVICE_AS_TOKEN={{ .Data.data.as_token }}
MAUTRIX_SLACK_APPSERVICE_HS_TOKEN={{ .Data.data.hs_token }}
{{ end }}
{{ with secret "kv/data/cluster/matrix/mautrix-slack/postgresql" }}
MAUTRIX_SLACK_APPSERVICE_DATABASE_PASSWORD={{ .Data.data.pgpass }}
{{ end }}
EOF
destination = "secrets/environment"
env = true
}
resources {
cpu = 256
memory = 256
}
}
}
}

View file

@ -157,6 +157,11 @@ EOF
local_bind_port = 29334 local_bind_port = 29334
} }
upstreams {
destination_name = "matrix-mautrix-slack"
local_bind_port = 29335
}
upstreams { upstreams {
destination_name = "matrix-heisenbridge" destination_name = "matrix-heisenbridge"
local_bind_port = 9898 local_bind_port = 9898
@ -314,6 +319,11 @@ EOF
local_bind_port = 29334 local_bind_port = 29334
} }
upstreams {
destination_name = "matrix-mautrix-slack"
local_bind_port = 29335
}
upstreams { upstreams {
destination_name = "matrix-heisenbridge" destination_name = "matrix-heisenbridge"
local_bind_port = 9898 local_bind_port = 9898
@ -471,6 +481,11 @@ EOF
local_bind_port = 29334 local_bind_port = 29334
} }
upstreams {
destination_name = "matrix-mautrix-slack"
local_bind_port = 29335
}
upstreams { upstreams {
destination_name = "matrix-heisenbridge" destination_name = "matrix-heisenbridge"
local_bind_port = 9898 local_bind_port = 9898
@ -628,6 +643,11 @@ EOF
local_bind_port = 29334 local_bind_port = 29334
} }
upstreams {
destination_name = "matrix-mautrix-slack"
local_bind_port = 29335
}
upstreams { upstreams {
destination_name = "matrix-heisenbridge" destination_name = "matrix-heisenbridge"
local_bind_port = 9898 local_bind_port = 9898
@ -782,6 +802,7 @@ alter user "synapse" with password '{{ with secret "kv/data/cluster/matrix/synap
alter user "mautrix-facebook" with password '{{ with secret "kv/data/cluster/matrix/mautrix-facebook/postgresql" }}{{ .Data.data.pgpass }}{{ end }}'; alter user "mautrix-facebook" with password '{{ with secret "kv/data/cluster/matrix/mautrix-facebook/postgresql" }}{{ .Data.data.pgpass }}{{ end }}';
alter user "mautrix-signal" with password '{{ with secret "kv/data/cluster/matrix/mautrix-signal/postgresql" }}{{ .Data.data.pgpass }}{{ end }}'; alter user "mautrix-signal" with password '{{ with secret "kv/data/cluster/matrix/mautrix-signal/postgresql" }}{{ .Data.data.pgpass }}{{ end }}';
alter user "mautrix-discord" with password '{{ with secret "kv/data/cluster/matrix/mautrix-discord/postgresql" }}{{ .Data.data.pgpass }}{{ end }}'; alter user "mautrix-discord" with password '{{ with secret "kv/data/cluster/matrix/mautrix-discord/postgresql" }}{{ .Data.data.pgpass }}{{ end }}';
alter user "mautrix-slack" with password '{{ with secret "kv/data/cluster/matrix/mautrix-slack/postgresql" }}{{ .Data.data.pgpass }}{{ end }}';
EOF EOF
destination = "secrets/init.sql" destination = "secrets/init.sql"
change_mode = "noop" change_mode = "noop"
@ -854,6 +875,11 @@ EOF
local_bind_port = 29334 local_bind_port = 29334
} }
upstreams {
destination_name = "matrix-mautrix-slack"
local_bind_port = 29335
}
upstreams { upstreams {
destination_name = "matrix-heisenbridge" destination_name = "matrix-heisenbridge"
local_bind_port = 9898 local_bind_port = 9898