Initial mautrix-signal Cloudron package

This commit is contained in:
2026-01-15 16:38:10 -06:00
parent 78176153d6
commit be2944dda1
7 changed files with 460 additions and 1 deletions

11
CHANGELOG.md Normal file
View File

@@ -0,0 +1,11 @@
# Changelog
## 1.0.0 - 2026-01-15
- Initial Cloudron package release
- Based on mautrix-signal v0.2512.0
- PostgreSQL database support
- Automatic configuration for Cloudron environment
- End-to-bridge encryption support
- Cleanup on logout functionality
- Health check endpoint

32
CloudronManifest.json Normal file
View File

@@ -0,0 +1,32 @@
{
"version": "1.0.0",
"upstreamVersion": "0.2512.0",
"id": "dev.maunium.signal.cloudronapp",
"title": "Matrix Signal Bridge",
"author": "Tulir Asokan <tulir@maunium.net>",
"description": "file://DESCRIPTION.md",
"tagline": "Bridge between Matrix and Signal",
"healthCheckPath": "/health",
"httpPort": 29328,
"icon": "logo.png",
"addons": {
"localstorage": {},
"postgresql": {},
"tls": {}
},
"manifestVersion": 2,
"website": "https://docs.mau.fi/bridges/go/signal/index.html",
"contactEmail": "support@cloudron.io",
"tags": [
"matrix",
"signal",
"chat",
"bridge",
"communication"
],
"minBoxVersion": "7.1.0",
"postInstallMessage": "Mautrix-Signal bridge is installed!\n\nPlease note you will need to:\n1. Configure your homeserver by setting up the registration\n2. Configure the bridge in the data directory\n3. Link your Signal account using QR code or phone number\n\nVisit https://docs.mau.fi/bridges/go/signal/index.html for detailed instructions.",
"changelog": "file://CHANGELOG.md",
"documentationUrl": "https://docs.mau.fi/bridges/go/signal/index.html",
"forumUrl": "https://matrix.to/#/#signal:maunium.net"
}

24
DESCRIPTION.md Normal file
View File

@@ -0,0 +1,24 @@
# Matrix Signal Bridge
A Matrix-Signal puppeting bridge that allows you to use Signal Messenger through Matrix.
## Features
- **Two-way messaging**: Send and receive messages between Matrix and Signal
- **Media support**: Share images, videos, documents, and other files
- **Group chats**: Bridge Signal groups to Matrix rooms
- **Reactions**: React to messages across platforms
- **Read receipts**: Sync read status between Matrix and Signal
- **Typing indicators**: See when someone is typing
- **End-to-bridge encryption**: Optional encryption for messages between Matrix and the bridge
## Setup
After installation:
1. Copy the registration file from `/app/data/registration.yaml` to your Matrix homeserver
2. Add the registration to your homeserver configuration and restart it
3. Start a chat with `@signalbot:yourdomain.com` in Matrix
4. Follow the authentication instructions to link your Signal account
For detailed setup instructions, visit the [official documentation](https://docs.mau.fi/bridges/go/signal/index.html).

44
Dockerfile.cloudron Normal file
View File

@@ -0,0 +1,44 @@
FROM cloudron/base:5.0.0@sha256:04fd70dbd8ad6149c19de39e35718e024417c3e01dc9c6637eaf4a41ec4e596c
# Install dependencies
RUN apt-get update && apt-get install -y \
curl \
ca-certificates \
netcat-openbsd \
bash \
jq \
yq \
git \
build-essential \
libolm-dev \
gosu \
&& apt-get clean \
&& rm -rf /var/lib/apt/lists/*
# Install Go
ENV GO_VERSION=1.24.0
RUN curl -LO https://golang.org/dl/go${GO_VERSION}.linux-amd64.tar.gz \
&& tar -C /usr/local -xzf go${GO_VERSION}.linux-amd64.tar.gz \
&& rm go${GO_VERSION}.linux-amd64.tar.gz
ENV PATH="/usr/local/go/bin:$PATH"
# Create app directories
RUN mkdir -p /app/code /app/pkg /app/data
WORKDIR /app/code
# Download and build mautrix-signal
RUN git clone --branch v0.2512.0 https://github.com/mautrix/signal.git . \
&& go build -o /app/pkg/mautrix-signal ./cmd/mautrix-signal
# Copy startup script
COPY start.sh /app/pkg/
# Set volumes and environment
VOLUME /app/data
ENV UID=1337 GID=1337
# Add health check endpoint - check if the appservice port is responding
HEALTHCHECK --interval=60s --timeout=10s --start-period=30s --retries=3 \
CMD nc -z localhost 29328 || exit 1
CMD ["/app/pkg/start.sh"]

View File

@@ -1,2 +1,95 @@
# mautrix-signal-cloudron
# Mautrix-Signal Bridge for Cloudron
This is a Cloudron package for the [mautrix-signal](https://github.com/mautrix/signal) Matrix bridge.
## Features
- Bridge between Matrix and Signal Messenger
- Two-way messaging with media support
- Group chat support
- End-to-bridge encryption
- Automatic Cloudron integration
## Building
Build the package using the Cloudron build service:
```bash
cloudron build --set-build-service builder.docker.due.ren \
--build-service-token e3265de06b1d0e7bb38400539012a8433a74c2c96a17955e \
--set-repository andreasdueren/mautrix-signal \
--tag 1.0.0
```
## Installing
Install on your Cloudron:
```bash
cloudron install --location signal.matrix.due.ren \
--image andreasdueren/mautrix-signal:1.0.0
```
## Setup
After installation:
1. Access the app data directory to get the registration file:
```bash
cloudron exec --app signal.matrix.due.ren
cat /app/data/registration.yaml
```
2. Copy the registration file content to your Matrix homeserver's configuration directory
3. Add the registration to your homeserver configuration (e.g., in Synapse's `homeserver.yaml`):
```yaml
app_service_config_files:
- /path/to/signal-registration.yaml
```
4. Restart your Matrix homeserver
5. Start a chat with `@signalbot:due.ren` in your Matrix client
6. Follow the authentication instructions to link your Signal account
## Viewing Logs
To view the application logs:
```bash
cloudron logs --app signal.matrix.due.ren -f
```
## Configuration
The bridge configuration is located at `/app/data/config.yaml` inside the app. You can edit it by:
```bash
cloudron exec --app signal.matrix.due.ren
nano /app/data/config.yaml
```
After making changes, restart the app from the Cloudron dashboard.
## Troubleshooting
### Bridge not connecting to homeserver
Check that:
- The registration file is correctly configured in your homeserver
- The homeserver has been restarted after adding the registration
- The app is running (check logs)
### Authentication issues
Make sure you're messaging `@signalbot:due.ren` (replace `due.ren` with your actual base domain).
## Documentation
For more information, visit the [official mautrix-signal documentation](https://docs.mau.fi/bridges/go/signal/index.html).
## License
This Cloudron package is licensed under the same terms as mautrix-signal (AGPL-3.0).

BIN
logo.png Normal file

Binary file not shown.

After

Width:  |  Height:  |  Size: 50 KiB

255
start.sh Normal file
View File

@@ -0,0 +1,255 @@
#!/bin/bash
set -eu
echo "=> Setting up mautrix-signal bridge"
# Create necessary directories
mkdir -p /app/data
mkdir -p /app/data/logs
# For Cloudron, we run as the cloudron user
UID=$(id -u cloudron)
GID=$(id -g cloudron)
# Set ownership early to avoid permission issues
chown -R cloudron:cloudron /app/data
# Configuration file paths
CONFIG_PATH="/app/data/config.yaml"
REGISTRATION_PATH="/app/data/registration.yaml"
BACKUP_PATH="/app/data/config.yaml.bak"
# Try to generate config from built-in template
if [ ! -f "$CONFIG_PATH" ]; then
echo "=> Attempting to generate configuration using mautrix-signal"
# Run as cloudron user to avoid permission issues and change to data directory
cd /app/data
gosu cloudron:cloudron /app/pkg/mautrix-signal -e -c "$CONFIG_PATH"
# Configure basic settings first before generating registration
if [ -f "$CONFIG_PATH" ]; then
echo "=> Applying basic Cloudron configuration to generated config"
# Configure for Cloudron environment
if [ -n "${CLOUDRON_POSTGRESQL_URL:-}" ]; then
echo "=> Configuring PostgreSQL database: $CLOUDRON_POSTGRESQL_URL"
# Add SSL mode disable to Cloudron PostgreSQL URL if not already present
if [[ "$CLOUDRON_POSTGRESQL_URL" == *"sslmode="* ]]; then
DB_URL="$CLOUDRON_POSTGRESQL_URL"
else
DB_URL="$CLOUDRON_POSTGRESQL_URL?sslmode=disable"
fi
yq -i -y '.database.uri = "'"$DB_URL"'"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure database"
fi
if [ -n "${CLOUDRON_APP_DOMAIN:-}" ]; then
echo "=> Configuring homeserver and appservice settings for domain: $CLOUDRON_APP_DOMAIN"
# Extract base domain (e.g., signal.matrix.due.ren -> due.ren)
BASE_DOMAIN=$(echo "$CLOUDRON_APP_DOMAIN" | rev | cut -d. -f1-2 | rev)
echo "=> Base domain extracted: $BASE_DOMAIN"
# Update homeserver configuration
yq -i -y '.homeserver.address = "https://matrix.'"$BASE_DOMAIN"'"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure homeserver address"
yq -i -y '.homeserver.domain = "'"$BASE_DOMAIN"'"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure homeserver domain"
# Update appservice configuration
yq -i -y '.appservice.address = "https://'"$CLOUDRON_APP_DOMAIN"'"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure appservice address"
yq -i -y '.appservice.public_address = "https://'"$CLOUDRON_APP_DOMAIN"'"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure appservice public_address"
yq -i -y '.appservice.hostname = "0.0.0.0"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure appservice hostname"
yq -i -y '.appservice.port = 29328' "$CONFIG_PATH" || echo "=> ERROR: Could not configure appservice port"
yq -i -y '.appservice.bot_username = "signalbot"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure appservice bot_username"
# Configure permissions for base domain users
yq -i -y '.bridge.permissions."'"$BASE_DOMAIN"'" = "user"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure permissions"
# Configure cleanup on logout to delete everything
yq -i -y '.bridge.cleanup_on_logout.enabled = true' "$CONFIG_PATH" || echo "=> ERROR: Could not configure cleanup enabled"
yq -i -y '.bridge.cleanup_on_logout.manual.private = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure cleanup manual private"
yq -i -y '.bridge.cleanup_on_logout.manual.relayed = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure cleanup manual relayed"
yq -i -y '.bridge.cleanup_on_logout.manual.shared_no_users = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure cleanup manual shared_no_users"
yq -i -y '.bridge.cleanup_on_logout.manual.shared_has_users = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure cleanup manual shared_has_users"
yq -i -y '.bridge.cleanup_on_logout.bad_credentials.private = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure cleanup bad_credentials private"
yq -i -y '.bridge.cleanup_on_logout.bad_credentials.relayed = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure cleanup bad_credentials relayed"
yq -i -y '.bridge.cleanup_on_logout.bad_credentials.shared_no_users = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure cleanup bad_credentials shared_no_users"
yq -i -y '.bridge.cleanup_on_logout.bad_credentials.shared_has_users = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure cleanup bad_credentials shared_has_users"
# Configure end-to-bridge encryption with best practices
yq -i -y '.encryption.allow = true' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption allow"
yq -i -y '.encryption.default = false' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption default"
yq -i -y '.encryption.require = false' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption require"
yq -i -y '.encryption.appservice = false' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption appservice"
yq -i -y '.encryption.plaintext_mentions = false' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption plaintext_mentions"
yq -i -y '.encryption.delete_keys.delete_outbound_on_ack = true' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption delete_outbound_on_ack"
yq -i -y '.encryption.delete_keys.dont_store_outbound = true' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption dont_store_outbound"
yq -i -y '.encryption.delete_keys.ratchet_on_decrypt = true' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption ratchet_on_decrypt"
yq -i -y '.encryption.delete_keys.delete_fully_used_on_decrypt = true' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption delete_fully_used_on_decrypt"
yq -i -y '.encryption.delete_keys.delete_prev_on_new_session = true' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption delete_prev_on_new_session"
yq -i -y '.encryption.delete_keys.delete_on_device_delete = true' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption delete_on_device_delete"
yq -i -y '.encryption.delete_keys.periodically_delete_expired = true' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption periodically_delete_expired"
yq -i -y '.encryption.delete_keys.delete_outdated_inbound = true' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption delete_outdated_inbound"
yq -i -y '.encryption.verification_levels.receive = "cross-signed-tofu"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption verification receive"
yq -i -y '.encryption.verification_levels.send = "cross-signed-tofu"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption verification send"
yq -i -y '.encryption.verification_levels.share = "cross-signed-tofu"' "$CONFIG_PATH" || echo "=> ERROR: Could not configure encryption verification share"
fi
# Now generate registration with proper config
echo "=> Generating registration file"
gosu cloudron:cloudron /app/pkg/mautrix-signal -g -c "$CONFIG_PATH" -r "$REGISTRATION_PATH"
# Fix registration file regex patterns to use base domain instead of homeserver domain
if [ -f "$REGISTRATION_PATH" ] && [ -n "${CLOUDRON_APP_DOMAIN:-}" ]; then
echo "=> Fixing registration file regex patterns for domain: $BASE_DOMAIN"
# Fix user regex patterns to use base domain instead of matrix subdomain
yq -i -y '.namespaces.users[0].regex = "^@signalbot:'"$BASE_DOMAIN"'$"' "$REGISTRATION_PATH" || echo "=> ERROR: Could not fix signalbot regex"
yq -i -y '.namespaces.users[1].regex = "^@signal_.+:'"$BASE_DOMAIN"'$"' "$REGISTRATION_PATH" || echo "=> ERROR: Could not fix signal_.+ regex"
yq -i -y '.sender_localpart = "signalbot"' "$REGISTRATION_PATH" || echo "=> ERROR: Could not fix sender_localpart"
fi
chown cloudron:cloudron "$CONFIG_PATH" "$REGISTRATION_PATH" 2>/dev/null || true
echo "=> Configuration applied successfully"
fi
if [ ! -f "$CONFIG_PATH" ]; then
echo "=> ERROR: Config generation failed and no config file was created"
echo "=> Will try to start without config to see error messages"
fi
else
echo "=> Using existing configuration"
# Fix configuration in existing config if needed
if [ -f "$CONFIG_PATH" ]; then
echo "=> Config file exists, applying fixes..."
# Always fix configuration on every start to ensure proper settings
echo "=> Applying configuration fixes"
# Fix database configuration if needed
if [ -n "${CLOUDRON_POSTGRESQL_URL:-}" ]; then
# Add SSL mode disable to Cloudron PostgreSQL URL if not already present
if [[ "$CLOUDRON_POSTGRESQL_URL" == *"sslmode="* ]]; then
DB_URL="$CLOUDRON_POSTGRESQL_URL"
else
DB_URL="$CLOUDRON_POSTGRESQL_URL?sslmode=disable"
fi
CURRENT_DB_URI=$(yq -r '.database.uri' "$CONFIG_PATH" 2>/dev/null || echo "")
if [ "$CURRENT_DB_URI" != "$DB_URL" ]; then
echo "=> Updating database configuration"
yq -i -y '.database.uri = "'"$DB_URL"'"' "$CONFIG_PATH" || echo "=> ERROR: Could not update database"
fi
fi
# Fix homeserver configuration if needed
if [ -n "${CLOUDRON_APP_DOMAIN:-}" ]; then
# Extract base domain (e.g., signal.matrix.due.ren -> due.ren)
BASE_DOMAIN=$(echo "$CLOUDRON_APP_DOMAIN" | rev | cut -d. -f1-2 | rev)
CURRENT_DOMAIN=$(yq -r '.homeserver.domain' "$CONFIG_PATH" 2>/dev/null || echo "")
if [ "$CURRENT_DOMAIN" != "$BASE_DOMAIN" ]; then
echo "=> Updating homeserver configuration"
echo "=> Setting homeserver.address to: https://matrix.$BASE_DOMAIN"
echo "=> Setting homeserver.domain to: $BASE_DOMAIN"
echo "=> Setting appservice.address to: https://$CLOUDRON_APP_DOMAIN"
yq -i -y '.homeserver.address = "https://matrix.'"$BASE_DOMAIN"'"' "$CONFIG_PATH" || echo "=> ERROR: Could not update homeserver address"
yq -i -y '.homeserver.domain = "'"$BASE_DOMAIN"'"' "$CONFIG_PATH" || echo "=> ERROR: Could not update homeserver domain"
yq -i -y '.appservice.address = "https://'"$CLOUDRON_APP_DOMAIN"'"' "$CONFIG_PATH" || echo "=> ERROR: Could not update appservice address"
yq -i -y '.appservice.public_address = "https://'"$CLOUDRON_APP_DOMAIN"'"' "$CONFIG_PATH" || echo "=> ERROR: Could not update appservice public_address"
yq -i -y '.appservice.hostname = "0.0.0.0"' "$CONFIG_PATH" || echo "=> ERROR: Could not update appservice hostname"
yq -i -y '.appservice.port = 29328' "$CONFIG_PATH" || echo "=> ERROR: Could not update appservice port"
yq -i -y '.appservice.bot_username = "signalbot"' "$CONFIG_PATH" || echo "=> ERROR: Could not update appservice bot_username"
# Configure permissions for base domain users
yq -i -y '.bridge.permissions."'"$BASE_DOMAIN"'" = "user"' "$CONFIG_PATH" || echo "=> ERROR: Could not update permissions"
# Configure cleanup on logout to delete everything
yq -i -y '.bridge.cleanup_on_logout.enabled = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update cleanup enabled"
yq -i -y '.bridge.cleanup_on_logout.manual.private = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not update cleanup manual private"
yq -i -y '.bridge.cleanup_on_logout.manual.relayed = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not update cleanup manual relayed"
yq -i -y '.bridge.cleanup_on_logout.manual.shared_no_users = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not update cleanup manual shared_no_users"
yq -i -y '.bridge.cleanup_on_logout.manual.shared_has_users = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not update cleanup manual shared_has_users"
yq -i -y '.bridge.cleanup_on_logout.bad_credentials.private = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not update cleanup bad_credentials private"
yq -i -y '.bridge.cleanup_on_logout.bad_credentials.relayed = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not update cleanup bad_credentials relayed"
yq -i -y '.bridge.cleanup_on_logout.bad_credentials.shared_no_users = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not update cleanup bad_credentials shared_no_users"
yq -i -y '.bridge.cleanup_on_logout.bad_credentials.shared_has_users = "delete"' "$CONFIG_PATH" || echo "=> ERROR: Could not update cleanup bad_credentials shared_has_users"
# Configure end-to-bridge encryption with best practices
yq -i -y '.encryption.allow = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption allow"
yq -i -y '.encryption.default = false' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption default"
yq -i -y '.encryption.require = false' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption require"
yq -i -y '.encryption.appservice = false' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption appservice"
yq -i -y '.encryption.plaintext_mentions = false' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption plaintext_mentions"
yq -i -y '.encryption.delete_keys.delete_outbound_on_ack = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption delete_outbound_on_ack"
yq -i -y '.encryption.delete_keys.dont_store_outbound = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption dont_store_outbound"
yq -i -y '.encryption.delete_keys.ratchet_on_decrypt = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption ratchet_on_decrypt"
yq -i -y '.encryption.delete_keys.delete_fully_used_on_decrypt = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption delete_fully_used_on_decrypt"
yq -i -y '.encryption.delete_keys.delete_prev_on_new_session = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption delete_prev_on_new_session"
yq -i -y '.encryption.delete_keys.delete_on_device_delete = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption delete_on_device_delete"
yq -i -y '.encryption.delete_keys.periodically_delete_expired = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption periodically_delete_expired"
yq -i -y '.encryption.delete_keys.delete_outdated_inbound = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption delete_outdated_inbound"
yq -i -y '.encryption.verification_levels.receive = "cross-signed-tofu"' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption verification receive"
yq -i -y '.encryption.verification_levels.send = "cross-signed-tofu"' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption verification send"
yq -i -y '.encryption.verification_levels.share = "cross-signed-tofu"' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption verification share"
# Verify the changes were applied
echo "=> Verifying configuration changes:"
echo "=> Current homeserver.address: $(yq -r '.homeserver.address' "$CONFIG_PATH")"
echo "=> Current homeserver.domain: $(yq -r '.homeserver.domain' "$CONFIG_PATH")"
fi
fi
# Fix logging configuration
yq -i -y '.logging.writers[1].filename = "/app/data/mautrix-signal.log"' "$CONFIG_PATH" 2>/dev/null || true
# Always apply encryption settings (regardless of domain changes)
echo "=> Applying encryption configuration"
yq -i -y '.encryption.allow = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption allow"
yq -i -y '.encryption.default = false' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption default"
yq -i -y '.encryption.require = false' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption require"
yq -i -y '.encryption.appservice = false' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption appservice"
yq -i -y '.encryption.plaintext_mentions = false' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption plaintext_mentions"
yq -i -y '.encryption.delete_keys.delete_outbound_on_ack = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption delete_outbound_on_ack"
yq -i -y '.encryption.delete_keys.dont_store_outbound = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption dont_store_outbound"
yq -i -y '.encryption.delete_keys.ratchet_on_decrypt = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption ratchet_on_decrypt"
yq -i -y '.encryption.delete_keys.delete_fully_used_on_decrypt = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption delete_fully_used_on_decrypt"
yq -i -y '.encryption.delete_keys.delete_prev_on_new_session = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption delete_prev_on_new_session"
yq -i -y '.encryption.delete_keys.delete_on_device_delete = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption delete_on_device_delete"
yq -i -y '.encryption.delete_keys.periodically_delete_expired = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption periodically_delete_expired"
yq -i -y '.encryption.delete_keys.delete_outdated_inbound = true' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption delete_outdated_inbound"
yq -i -y '.encryption.verification_levels.receive = "cross-signed-tofu"' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption verification receive"
yq -i -y '.encryption.verification_levels.send = "cross-signed-tofu"' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption verification send"
yq -i -y '.encryption.verification_levels.share = "cross-signed-tofu"' "$CONFIG_PATH" || echo "=> ERROR: Could not update encryption verification share"
# Update registration file with correct URL and fix regex patterns
if [ -f "$REGISTRATION_PATH" ] && [ -n "${CLOUDRON_APP_DOMAIN:-}" ]; then
yq -i -y '.url = "https://'"$CLOUDRON_APP_DOMAIN"'"' "$REGISTRATION_PATH" 2>/dev/null || true
# Fix user regex patterns to use base domain instead of matrix subdomain
yq -i -y '.namespaces.users[0].regex = "^@signalbot:'"$BASE_DOMAIN"'$"' "$REGISTRATION_PATH" || echo "=> ERROR: Could not fix signalbot regex"
yq -i -y '.namespaces.users[1].regex = "^@signal_.+:'"$BASE_DOMAIN"'$"' "$REGISTRATION_PATH" || echo "=> ERROR: Could not fix signal_.+ regex"
yq -i -y '.sender_localpart = "signalbot"' "$REGISTRATION_PATH" || echo "=> ERROR: Could not fix sender_localpart"
fi
# Let the bridge handle token generation automatically - remove any placeholder tokens
if [ -f "$REGISTRATION_PATH" ]; then
echo "=> Registration file generated, letting bridge handle token management"
fi
fi
echo "=> Configuration fixes completed"
fi
# Final permission fix before starting
echo "=> Setting final permissions..."
chown -R cloudron:cloudron /app/data
echo "=> Permissions set"
# Configure TLS if certificates are available
if [ -f "/run/tls/tls.crt" ] && [ -f "/run/tls/tls.key" ]; then
echo "=> Configuring TLS certificates"
yq -i -y '.appservice.tls_cert = "/run/tls/tls.crt"' "$CONFIG_PATH"
yq -i -y '.appservice.tls_key = "/run/tls/tls.key"' "$CONFIG_PATH"
fi
# Start the bridge from the data directory to ensure relative paths work
echo "=> Starting mautrix-signal bridge"
echo "=> Config path: $CONFIG_PATH"
echo "=> Registration path: $REGISTRATION_PATH"
echo "=> Working directory: $(pwd)"
cd /app/data
echo "=> About to exec bridge binary..."
exec gosu cloudron:cloudron /app/pkg/mautrix-signal -c "$CONFIG_PATH"