Getting help
If you run into any problems while setting up Continuwuity, ask us in
#continuwuity:continuwuity.orgor open an issue on Forgejo.
You may simply download the binary that fits your machine architecture (x86_64
or aarch64). Run uname -m to see what you need.
You can download prebuilt fully static musl binaries from the latest tagged
release here or
from the main CI branch workflow artifact output. These also include Debian/Ubuntu
packages.
You can download these directly using curl. The ci-bins are CI workflow binaries organized by commit
hash/revision, and releases are tagged releases. Sort by descending last
modified date to find the latest.
These binaries have jemalloc and io_uring statically linked and included with them, so no additional dynamic dependencies need to be installed.
For the best performance: if you are using an x86_64 CPU made in the last ~15 years,
we recommend using the -haswell- optimized binaries. These set
-march=haswell, which provides the most compatible and highest performance with
optimized binaries. The database backend, RocksDB, benefits most from this as it
uses hardware-accelerated CRC32 hashing/checksumming, which is critical
for performance.
Alternatively, you may compile the binary yourself.
If wanting to build using standard Rust toolchains, make sure you install:
liburing-dev on the compiling machine, and liburing on the target hostpkg-config on the compiling machine to allow finding liburinglibclang for RocksDBYou can build Continuwuity using cargo build --release.
If you prefer, you can use Nix (or Lix) to build Continuwuity. This provides improved reproducibility and makes it easy to set up a build environment and generate output. This approach also allows for easy cross-compilation.
You can run the nix build -L .#static-x86_64-linux-musl-all-features or
nix build -L .#static-aarch64-linux-musl-all-features commands based
on architecture to cross-compile the necessary static binary located at
result/bin/conduwuit. This is reproducible with the static binaries produced
in our CI.
While Continuwuity can run as any user, it is better to use dedicated users for different services. This also ensures that the file permissions are set up correctly.
In Debian, you can use this command to create a Continuwuity user:
For distros without adduser (or where it's a symlink to useradd):
Matrix's default federation port is 8448, and clients must use port 443.
If you would like to use only port 443 or a different port, you will need to set up
delegation. Continuwuity has configuration options for delegation, or you can configure
your reverse proxy to manually serve the necessary JSON files for delegation
(see the [global.well_known] config section).
If Continuwuity runs behind a router or in a container and has a different public IP address than the host system, you need to forward these public ports directly or indirectly to the port mentioned in the configuration.
Note for NAT users: if you have trouble connecting to your server from inside your network, check if your router supports "NAT hairpinning" or "NAT loopback".
If your router does not support this feature, you need to research doing local
DNS overrides and force your Matrix DNS records to use your local IP internally.
This can be done at the host level using /etc/hosts. If you need this to be
on the network level, consider something like NextDNS or Pi-Hole.
You can find an example unit for continuwuity below.
You may need to change the ExecStart= path to match where you placed the Continuwuity
binary if it is not in /usr/bin/conduwuit.
On systems where rsyslog is used alongside journald (i.e. Red Hat-based distros
and OpenSUSE), put $EscapeControlCharactersOnReceive off inside
/etc/rsyslog.conf to allow color in logs.
If you are using a different database_path than the systemd unit's
configured default /var/lib/conduwuit, you need to add your path to the
systemd unit's ReadWritePaths=. You can do this by either directly editing
conduwuit.service and reloading systemd, or by running systemctl edit conduwuit.service
and entering the following:
You can also view the file on Foregejo.
Now you need to create the Continuwuity configuration file in
/etc/continuwuity/continuwuity.toml. You can find an example configuration at
conduwuit-example.toml.
Please take a moment to read the config. You need to change at least the server name.
RocksDB is the only supported database backend.
If you are using a dedicated user for Continuwuity, you need to allow it to read the configuration. To do this, run:
If you use the default database path you also need to run this:
We recommend Caddy as a reverse proxy because it is trivial to use and handles TLS certificates, reverse proxy headers, etc. transparently with proper defaults. For other software, please refer to their respective documentation or online guides.
After installing Caddy via your preferred method, create /etc/caddy/conf.d/conduwuit_caddyfile
and enter the following (substitute your actual server name):
That's it! Just start and enable the service and you're set.
As we prefer our users to use Caddy, we do not provide configuration files for other proxies.
You will need to reverse proxy everything under the following routes:
/_matrix/ - core Matrix C-S and S-S APIs/_conduwuit/ and/or /_continuwuity/ - ad-hoc Continuwuity routes such as /local_user_count and
/server_versionYou can optionally reverse proxy the following individual routes:
/.well-known/matrix/client and /.well-known/matrix/server if using
Continuwuity to perform delegation (see the [global.well_known] config section)/.well-known/matrix/support if using Continuwuity to send the homeserver admin
contact and support page (formerly known as MSC1929)/ if you would like to see hewwo from conduwuit woof! at the rootSee the following spec pages for more details on these files:
Examples of delegation:
For Apache and Nginx there are many examples available online.
Lighttpd is not supported as it appears to interfere with the X-Matrix Authorization
header, making federation non-functional. If you find a workaround, please share it so we can add it to this documentation.
If using Apache, you need to use nocanon in your ProxyPass directive to prevent httpd from interfering with the X-Matrix header (note that Apache is not ideal as a general reverse proxy, so we discourage using it if alternatives are available).
If using Nginx, you need to pass the request URI to Continuwuity using $request_uri, like this:
proxy_pass http://127.0.0.1:6167$request_uri;proxy_pass http://127.0.0.1:6167;Nginx users need to increase the client_max_body_size setting (default is 1M) to match the
max_request_size defined in conduwuit.toml.
Now you can start Continuwuity with:
Set it to start automatically when your system boots with:
You can open a Matrix client, enter your homeserver address, and try to register.
You can also use these commands as a quick health check (replace
your.server.name).
For Audio/Video call functionality see the TURN Guide.
If you want to set up an appservice, take a look at the Appservice Guide.