From 90bcfaa2aa39b6e32ac8044f888d8a7de1f36c67 Mon Sep 17 00:00:00 2001
From: Azrenbeth
Note that this will give administrative access to synapse to all users with shell access to the server. It should therefore not be enabled in environments where untrusted users have shell access.
-To enable it, first uncomment the manhole
listener configuration in
homeserver.yaml
. The configuration is slightly different if you're using docker.
bind_addresses
in the example below is important: it ensures th
bind_addresses: ['::1', '127.0.0.1']
type: manhole
-The following config options are available:
+username
- The username for the manhole (defaults to matrix
)password
- The password for the manhole (defaults to rabbithole
)ssh_priv_key
- The path to a private SSH key (defaults to a hardcoded value)ssh_pub_key
- The path to a public SSH key (defaults to a hardcoded value)For example:
+manhole_settings:
+ username: manhole
+ password: mypassword
+ ssh_priv_key: "/home/synapse/manhole_keys/id_rsa"
+ ssh_pub_key: "/home/synapse/manhole_keys/id_rsa.pub"
+
+Then restart synapse, and point an ssh client at port 9000 on localhost, using
-the username matrix
:
homeserver.yaml
- with the default
+configuration, this would be:
ssh -p9000 matrix@localhost
-The password is rabbithole
.
Then enter the password when prompted (the default is rabbithole
).
This gives a Python REPL in which hs
gives access to the
synapse.server.HomeServer
object - which in turn gives access to many other
parts of the process.