mirror of
https://github.com/NousResearch/hermes-agent.git
synced 2026-04-25 00:51:20 +00:00
* - make buffered streaming - fix path naming to expand `~` for agent. - fix stripping of matrix ID to not remove other mentions / localports. * fix(matrix): register MembershipEventDispatcher for invite auto-join The mautrix migration (#7518) broke auto-join because InternalEventType.INVITE events are only dispatched when MembershipEventDispatcher is registered on the client. Without it, _on_invite is dead code and the bot silently ignores all room invites. Closes #10094 Closes #10725 Refs: PR #10135 (digging-airfare-4u), PR #10732 (fxfitz) * fix(matrix): preserve _joined_rooms reference for CryptoStateStore connect() reassigned self._joined_rooms = set(...) after initial sync, orphaning the reference captured by _CryptoStateStore at init time. find_shared_rooms() returned [] forever, breaking Megolm session rotation on membership changes. Mutate in place with clear() + update() so the CryptoStateStore reference stays valid. Refs #8174, PR #8215 * fix(matrix): remove dual ROOM_ENCRYPTED handler to fix dedup race mautrix auto-registers DecryptionDispatcher when client.crypto is set. The adapter also registered _on_encrypted_event for the same event type. _on_encrypted_event had zero awaits and won the race to mark event IDs in the dedup set, causing _on_room_message to drop successfully decrypted events from DecryptionDispatcher. The retry loop masked this by re-decrypting every message ~4 seconds later. Remove _on_encrypted_event entirely. DecryptionDispatcher handles decryption; genuinely undecryptable events are logged by mautrix and retried on next key exchange. Refs #8174, PR #8215 * fix(matrix): re-verify device keys after share_keys() upload Matrix homeservers treat ed25519 identity keys as immutable per device. share_keys() can return 200 but silently ignore new keys if the device already exists with different identity keys. The bot would proceed with shared=True while peers encrypt to the old (unreachable) keys. Now re-queries the server after share_keys() and fails closed if keys don't match, with an actionable error message. Refs #8174, PR #8215 * fix(matrix): encrypt outbound attachments in E2EE rooms _upload_and_send() uploaded raw bytes and used the 'url' key for all rooms. In E2EE rooms, media must be encrypted client-side with encrypt_attachment(), the ciphertext uploaded, and the 'file' key (with key/iv/hashes) used instead of 'url'. Now detects encrypted rooms via state_store.is_encrypted() and branches to the encrypted upload path. Refs: PR #9822 (charles-brooks) * fix(matrix): add stop_typing to clear typing indicator after response The adapter set a 30-second typing timeout but never cleared it. The base class stop_typing() is a no-op, so the typing indicator lingered for up to 30 seconds after each response. Closes #6016 Refs: PR #6020 (r266-tech) * fix(matrix): cache all media types locally, not just photos/voice should_cache_locally only covered PHOTO, VOICE, and encrypted media. Unencrypted audio/video/documents in plaintext rooms were passed as MXC URLs that require authentication the agent doesn't have, resulting in 401 errors. Refs #3487, #3806 * fix(matrix): detect stale OTK conflict on startup and fail closed When crypto state is wiped but the same device ID is reused, the homeserver may still hold one-time keys signed with the previous identity key. Identity key re-upload succeeds but OTK uploads fail with "already exists" and a signature mismatch. Peers cannot establish new Olm sessions, so all new messages are undecryptable. Now proactively flushes OTKs via share_keys() during connect() and catches the "already exists" error with an actionable log message telling the operator to purge the device from the homeserver or generate a fresh device ID. Also documents the crypto store recovery procedure in the Matrix setup guide. Refs #8174 * docs(matrix): improve crypto recovery docs per review - Put easy path (fresh access token) first, manual purge second - URL-encode user ID in Synapse admin API example - Note that device deletion may invalidate the access token - Add "stop Synapse first" caveat for direct SQLite approach - Mention the fail-closed startup detection behavior - Add back-reference from upgrade section to OTK warning * refactor(matrix): cleanup from code review - Extract _extract_server_ed25519() and _reverify_keys_after_upload() to deduplicate the re-verification block (was copy-pasted in two places, three copies of ed25519 key extraction total) - Remove dead code: _pending_megolm, _retry_pending_decryptions, _MAX_PENDING_EVENTS, _PENDING_EVENT_TTL — all orphaned after removing _on_encrypted_event - Remove tautological TestMediaCacheGate (tested its own predicate, not production code) - Remove dead TestMatrixMegolmEventHandling and TestMatrixRetryPendingDecryptions (tested removed methods) - Merge duplicate TestMatrixStopTyping into TestMatrixTypingIndicator - Trim comment to just the "why"
645 lines
25 KiB
Markdown
645 lines
25 KiB
Markdown
---
|
|
sidebar_position: 9
|
|
title: "Matrix"
|
|
description: "Set up Hermes Agent as a Matrix bot"
|
|
---
|
|
|
|
# Matrix Setup
|
|
|
|
Hermes Agent integrates with Matrix, the open, federated messaging protocol. Matrix lets you run your own homeserver or use a public one like matrix.org — either way, you keep control of your communications. The bot connects via the `mautrix` Python SDK, processes messages through the Hermes Agent pipeline (including tool use, memory, and reasoning), and responds in real time. It supports text, file attachments, images, audio, video, and optional end-to-end encryption (E2EE).
|
|
|
|
Hermes works with any Matrix homeserver — Synapse, Conduit, Dendrite, or matrix.org.
|
|
|
|
Before setup, here's the part most people want to know: how Hermes behaves once it's connected.
|
|
|
|
## How Hermes Behaves
|
|
|
|
| Context | Behavior |
|
|
|---------|----------|
|
|
| **DMs** | Hermes responds to every message. No `@mention` needed. Each DM has its own session. Set `MATRIX_DM_MENTION_THREADS=true` to start a thread when the bot is `@mentioned` in a DM. |
|
|
| **Rooms** | By default, Hermes requires an `@mention` to respond. Set `MATRIX_REQUIRE_MENTION=false` or add room IDs to `MATRIX_FREE_RESPONSE_ROOMS` for free-response rooms. Room invites are auto-accepted. |
|
|
| **Threads** | Hermes supports Matrix threads (MSC3440). If you reply in a thread, Hermes keeps the thread context isolated from the main room timeline. Threads where the bot has already participated do not require a mention. |
|
|
| **Auto-threading** | By default, Hermes auto-creates a thread for each message it responds to in a room. This keeps conversations isolated. Set `MATRIX_AUTO_THREAD=false` to disable. |
|
|
| **Shared rooms with multiple users** | By default, Hermes isolates session history per user inside the room. Two people talking in the same room do not share one transcript unless you explicitly disable that. |
|
|
|
|
:::tip
|
|
The bot automatically joins rooms when invited. Just invite the bot's Matrix user to any room and it will join and start responding.
|
|
:::
|
|
|
|
### Session Model in Matrix
|
|
|
|
By default:
|
|
|
|
- each DM gets its own session
|
|
- each thread gets its own session namespace
|
|
- each user in a shared room gets their own session inside that room
|
|
|
|
This is controlled by `config.yaml`:
|
|
|
|
```yaml
|
|
group_sessions_per_user: true
|
|
```
|
|
|
|
Set it to `false` only if you explicitly want one shared conversation for the entire room:
|
|
|
|
```yaml
|
|
group_sessions_per_user: false
|
|
```
|
|
|
|
Shared sessions can be useful for a collaborative room, but they also mean:
|
|
|
|
- users share context growth and token costs
|
|
- one person's long tool-heavy task can bloat everyone else's context
|
|
- one person's in-flight run can interrupt another person's follow-up in the same room
|
|
|
|
### Mention and Threading Configuration
|
|
|
|
You can configure mention and auto-threading behavior via environment variables or `config.yaml`:
|
|
|
|
```yaml
|
|
matrix:
|
|
require_mention: true # Require @mention in rooms (default: true)
|
|
free_response_rooms: # Rooms exempt from mention requirement
|
|
- "!abc123:matrix.org"
|
|
auto_thread: true # Auto-create threads for responses (default: true)
|
|
dm_mention_threads: false # Create thread when @mentioned in DM (default: false)
|
|
```
|
|
|
|
Or via environment variables:
|
|
|
|
```bash
|
|
MATRIX_REQUIRE_MENTION=true
|
|
MATRIX_FREE_RESPONSE_ROOMS=!abc123:matrix.org,!def456:matrix.org
|
|
MATRIX_AUTO_THREAD=true
|
|
MATRIX_DM_MENTION_THREADS=false
|
|
```
|
|
|
|
:::note
|
|
If you are upgrading from a version that did not have `MATRIX_REQUIRE_MENTION`, the bot previously responded to all messages in rooms. To preserve that behavior, set `MATRIX_REQUIRE_MENTION=false`.
|
|
:::
|
|
|
|
This guide walks you through the full setup process — from creating your bot account to sending your first message.
|
|
|
|
## Step 1: Create a Bot Account
|
|
|
|
You need a Matrix user account for the bot. There are several ways to do this:
|
|
|
|
### Option A: Register on Your Homeserver (Recommended)
|
|
|
|
If you run your own homeserver (Synapse, Conduit, Dendrite):
|
|
|
|
1. Use the admin API or registration tool to create a new user:
|
|
|
|
```bash
|
|
# Synapse example
|
|
register_new_matrix_user -c /etc/synapse/homeserver.yaml http://localhost:8008
|
|
```
|
|
|
|
2. Choose a username like `hermes` — the full user ID will be `@hermes:your-server.org`.
|
|
|
|
### Option B: Use matrix.org or Another Public Homeserver
|
|
|
|
1. Go to [Element Web](https://app.element.io) and create a new account.
|
|
2. Pick a username for your bot (e.g., `hermes-bot`).
|
|
|
|
### Option C: Use Your Own Account
|
|
|
|
You can also run Hermes as your own user. This means the bot posts as you — useful for personal assistants.
|
|
|
|
## Step 2: Get an Access Token
|
|
|
|
Hermes needs an access token to authenticate with the homeserver. You have two options:
|
|
|
|
### Option A: Access Token (Recommended)
|
|
|
|
The most reliable way to get a token:
|
|
|
|
**Via Element:**
|
|
1. Log in to [Element](https://app.element.io) with the bot account.
|
|
2. Go to **Settings** → **Help & About**.
|
|
3. Scroll down and expand **Advanced** — the access token is displayed there.
|
|
4. **Copy it immediately.**
|
|
|
|
**Via the API:**
|
|
|
|
```bash
|
|
curl -X POST https://your-server/_matrix/client/v3/login \
|
|
-H "Content-Type: application/json" \
|
|
-d '{
|
|
"type": "m.login.password",
|
|
"user": "@hermes:your-server.org",
|
|
"password": "your-password"
|
|
}'
|
|
```
|
|
|
|
The response includes an `access_token` field — copy it.
|
|
|
|
:::warning[Keep your access token safe]
|
|
The access token gives full access to the bot's Matrix account. Never share it publicly or commit it to Git. If compromised, revoke it by logging out all sessions for that user.
|
|
:::
|
|
|
|
### Option B: Password Login
|
|
|
|
Instead of providing an access token, you can give Hermes the bot's user ID and password. Hermes will log in automatically on startup. This is simpler but means the password is stored in your `.env` file.
|
|
|
|
```bash
|
|
MATRIX_USER_ID=@hermes:your-server.org
|
|
MATRIX_PASSWORD=your-password
|
|
```
|
|
|
|
## Step 3: Find Your Matrix User ID
|
|
|
|
Hermes Agent uses your Matrix User ID to control who can interact with the bot. Matrix User IDs follow the format `@username:server`.
|
|
|
|
To find yours:
|
|
|
|
1. Open [Element](https://app.element.io) (or your preferred Matrix client).
|
|
2. Click your avatar → **Settings**.
|
|
3. Your User ID is displayed at the top of the profile (e.g., `@alice:matrix.org`).
|
|
|
|
:::tip
|
|
Matrix User IDs always start with `@` and contain a `:` followed by the server name. For example: `@alice:matrix.org`, `@bob:your-server.com`.
|
|
:::
|
|
|
|
## Step 4: Configure Hermes Agent
|
|
|
|
### Option A: Interactive Setup (Recommended)
|
|
|
|
Run the guided setup command:
|
|
|
|
```bash
|
|
hermes gateway setup
|
|
```
|
|
|
|
Select **Matrix** when prompted, then provide your homeserver URL, access token (or user ID + password), and allowed user IDs when asked.
|
|
|
|
### Option B: Manual Configuration
|
|
|
|
Add the following to your `~/.hermes/.env` file:
|
|
|
|
**Using an access token:**
|
|
|
|
```bash
|
|
# Required
|
|
MATRIX_HOMESERVER=https://matrix.example.org
|
|
MATRIX_ACCESS_TOKEN=***
|
|
|
|
# Optional: user ID (auto-detected from token if omitted)
|
|
# MATRIX_USER_ID=@hermes:matrix.example.org
|
|
|
|
# Security: restrict who can interact with the bot
|
|
MATRIX_ALLOWED_USERS=@alice:matrix.example.org
|
|
|
|
# Multiple allowed users (comma-separated)
|
|
# MATRIX_ALLOWED_USERS=@alice:matrix.example.org,@bob:matrix.example.org
|
|
```
|
|
|
|
**Using password login:**
|
|
|
|
```bash
|
|
# Required
|
|
MATRIX_HOMESERVER=https://matrix.example.org
|
|
MATRIX_USER_ID=@hermes:matrix.example.org
|
|
MATRIX_PASSWORD=***
|
|
|
|
# Security
|
|
MATRIX_ALLOWED_USERS=@alice:matrix.example.org
|
|
```
|
|
|
|
Optional behavior settings in `~/.hermes/config.yaml`:
|
|
|
|
```yaml
|
|
group_sessions_per_user: true
|
|
```
|
|
|
|
- `group_sessions_per_user: true` keeps each participant's context isolated inside shared rooms
|
|
|
|
### Start the Gateway
|
|
|
|
Once configured, start the Matrix gateway:
|
|
|
|
```bash
|
|
hermes gateway
|
|
```
|
|
|
|
The bot should connect to your homeserver and start syncing within a few seconds. Send it a message — either a DM or in a room it has joined — to test.
|
|
|
|
:::tip
|
|
You can run `hermes gateway` in the background or as a systemd service for persistent operation. See the deployment docs for details.
|
|
:::
|
|
|
|
## End-to-End Encryption (E2EE)
|
|
|
|
Hermes supports Matrix end-to-end encryption, so you can chat with your bot in encrypted rooms.
|
|
|
|
### Requirements
|
|
|
|
E2EE requires the `mautrix` library with encryption extras and the `libolm` C library:
|
|
|
|
```bash
|
|
# Install mautrix with E2EE support
|
|
pip install 'mautrix[encryption]'
|
|
|
|
# Or install with hermes extras
|
|
pip install 'hermes-agent[matrix]'
|
|
```
|
|
|
|
You also need `libolm` installed on your system:
|
|
|
|
```bash
|
|
# Debian/Ubuntu
|
|
sudo apt install libolm-dev
|
|
|
|
# macOS
|
|
brew install libolm
|
|
|
|
# Fedora
|
|
sudo dnf install libolm-devel
|
|
```
|
|
|
|
### Enable E2EE
|
|
|
|
Add to your `~/.hermes/.env`:
|
|
|
|
```bash
|
|
MATRIX_ENCRYPTION=true
|
|
```
|
|
|
|
When E2EE is enabled, Hermes:
|
|
|
|
- Stores encryption keys in `~/.hermes/platforms/matrix/store/` (legacy installs: `~/.hermes/matrix/store/`)
|
|
- Uploads device keys on first connection
|
|
- Decrypts incoming messages and encrypts outgoing messages automatically
|
|
- Auto-joins encrypted rooms when invited
|
|
|
|
### Cross-Signing Verification (Recommended)
|
|
|
|
If your Matrix account has cross-signing enabled (the default in Element), set the recovery key so the bot can self-sign its device on startup. Without this, other Matrix clients may refuse to share encryption sessions with the bot after a device key rotation.
|
|
|
|
```bash
|
|
MATRIX_RECOVERY_KEY=EsT... your recovery key here
|
|
```
|
|
|
|
**Where to find it:** In Element, go to **Settings** → **Security & Privacy** → **Encryption** → your recovery key (also called the "Security Key"). This is the key you were asked to save when you first set up cross-signing.
|
|
|
|
On each startup, if `MATRIX_RECOVERY_KEY` is set, Hermes imports cross-signing keys from the homeserver's secure secret storage and signs the current device. This is idempotent and safe to leave enabled permanently.
|
|
|
|
:::warning[Deleting the crypto store]
|
|
If you delete `~/.hermes/platforms/matrix/store/crypto.db`, the bot loses its encryption identity. Simply restarting with the same device ID will **not** fully recover — the homeserver still holds one-time keys signed with the old identity key, and peers cannot establish new Olm sessions.
|
|
|
|
Hermes detects this condition on startup and refuses to enable E2EE, logging: `device XXXX has stale one-time keys on the server signed with a previous identity key`.
|
|
|
|
**Easiest recovery: generate a new access token** (which gets a fresh device ID with no stale key history). See the "Upgrading from a previous version with E2EE" section below. This is the most reliable path and avoids touching the homeserver database.
|
|
|
|
**Manual recovery** (advanced — keeps the same device ID):
|
|
|
|
1. Stop Synapse and delete the old device from its database:
|
|
```bash
|
|
sudo systemctl stop matrix-synapse
|
|
sudo sqlite3 /var/lib/matrix-synapse/homeserver.db "
|
|
DELETE FROM e2e_device_keys_json WHERE device_id = 'DEVICE_ID' AND user_id = '@hermes:your-server';
|
|
DELETE FROM e2e_one_time_keys_json WHERE device_id = 'DEVICE_ID' AND user_id = '@hermes:your-server';
|
|
DELETE FROM e2e_fallback_keys_json WHERE device_id = 'DEVICE_ID' AND user_id = '@hermes:your-server';
|
|
DELETE FROM devices WHERE device_id = 'DEVICE_ID' AND user_id = '@hermes:your-server';
|
|
"
|
|
sudo systemctl start matrix-synapse
|
|
```
|
|
Or via the Synapse admin API (note the URL-encoded user ID):
|
|
```bash
|
|
curl -X DELETE -H "Authorization: Bearer ADMIN_TOKEN" \
|
|
'https://your-server/_synapse/admin/v2/users/%40hermes%3Ayour-server/devices/DEVICE_ID'
|
|
```
|
|
Note: deleting a device via the admin API may also invalidate the associated access token. You may need to generate a new token afterward.
|
|
|
|
2. Delete the local crypto store and restart Hermes:
|
|
```bash
|
|
rm -f ~/.hermes/platforms/matrix/store/crypto.db*
|
|
# restart hermes
|
|
```
|
|
|
|
Other Matrix clients (Element, matrix-commander) may cache the old device keys. After recovery, type `/discardsession` in Element to force a new encryption session with the bot.
|
|
:::
|
|
|
|
:::info
|
|
If `mautrix[encryption]` is not installed or `libolm` is missing, the bot falls back to a plain (unencrypted) client automatically. You'll see a warning in the logs.
|
|
:::
|
|
|
|
## Home Room
|
|
|
|
You can designate a "home room" where the bot sends proactive messages (such as cron job output, reminders, and notifications). There are two ways to set it:
|
|
|
|
### Using the Slash Command
|
|
|
|
Type `/sethome` in any Matrix room where the bot is present. That room becomes the home room.
|
|
|
|
### Manual Configuration
|
|
|
|
Add this to your `~/.hermes/.env`:
|
|
|
|
```bash
|
|
MATRIX_HOME_ROOM=!abc123def456:matrix.example.org
|
|
```
|
|
|
|
:::tip
|
|
To find a Room ID: in Element, go to the room → **Settings** → **Advanced** → the **Internal room ID** is shown there (starts with `!`).
|
|
:::
|
|
|
|
## Troubleshooting
|
|
|
|
### Bot is not responding to messages
|
|
|
|
**Cause**: The bot hasn't joined the room, or `MATRIX_ALLOWED_USERS` doesn't include your User ID.
|
|
|
|
**Fix**: Invite the bot to the room — it auto-joins on invite. Verify your User ID is in `MATRIX_ALLOWED_USERS` (use the full `@user:server` format). Restart the gateway.
|
|
|
|
### "Failed to authenticate" / "whoami failed" on startup
|
|
|
|
**Cause**: The access token or homeserver URL is incorrect.
|
|
|
|
**Fix**: Verify `MATRIX_HOMESERVER` points to your homeserver (include `https://`, no trailing slash). Check that `MATRIX_ACCESS_TOKEN` is valid — try it with curl:
|
|
|
|
```bash
|
|
curl -H "Authorization: Bearer YOUR_TOKEN" \
|
|
https://your-server/_matrix/client/v3/account/whoami
|
|
```
|
|
|
|
If this returns your user info, the token is valid. If it returns an error, generate a new token.
|
|
|
|
### "mautrix not installed" error
|
|
|
|
**Cause**: The `mautrix` Python package is not installed.
|
|
|
|
**Fix**: Install it:
|
|
|
|
```bash
|
|
pip install 'mautrix[encryption]'
|
|
```
|
|
|
|
Or with Hermes extras:
|
|
|
|
```bash
|
|
pip install 'hermes-agent[matrix]'
|
|
```
|
|
|
|
### Encryption errors / "could not decrypt event"
|
|
|
|
**Cause**: Missing encryption keys, `libolm` not installed, or the bot's device isn't trusted.
|
|
|
|
**Fix**:
|
|
1. Verify `libolm` is installed on your system (see the E2EE section above).
|
|
2. Make sure `MATRIX_ENCRYPTION=true` is set in your `.env`.
|
|
3. In your Matrix client (Element), go to the bot's profile -> Sessions -> verify/trust the bot's device.
|
|
4. If the bot just joined an encrypted room, it can only decrypt messages sent *after* it joined. Older messages are inaccessible.
|
|
|
|
### Upgrading from a previous version with E2EE
|
|
|
|
:::tip
|
|
If you also manually deleted `crypto.db`, see the "Deleting the crypto store" warning in the E2EE section above — there are additional steps to clear stale one-time keys from the homeserver.
|
|
:::
|
|
|
|
If you previously used Hermes with `MATRIX_ENCRYPTION=true` and are upgrading to
|
|
a version that uses the new SQLite-based crypto store, the bot's encryption
|
|
identity has changed. Your Matrix client (Element) may cache the old device keys
|
|
and refuse to share encryption sessions with the bot.
|
|
|
|
**Symptoms**: The bot connects and shows "E2EE enabled" in the logs, but all
|
|
messages show "could not decrypt event" and the bot never responds.
|
|
|
|
**What's happening**: The old encryption state (from the previous `matrix-nio` or
|
|
serialization-based `mautrix` backend) is incompatible with the new SQLite crypto
|
|
store. The bot creates a fresh encryption identity, but your Matrix client still
|
|
has the old keys cached and won't share the room's encryption session with a
|
|
device whose keys changed. This is a Matrix security feature -- clients treat
|
|
changed identity keys for the same device as suspicious.
|
|
|
|
**Fix** (one-time migration):
|
|
|
|
1. **Generate a new access token** to get a fresh device ID. The simplest way:
|
|
|
|
```bash
|
|
curl -X POST https://your-server/_matrix/client/v3/login \
|
|
-H "Content-Type: application/json" \
|
|
-d '{
|
|
"type": "m.login.password",
|
|
"identifier": {"type": "m.id.user", "user": "@hermes:your-server.org"},
|
|
"password": "***",
|
|
"initial_device_display_name": "Hermes Agent"
|
|
}'
|
|
```
|
|
|
|
Copy the new `access_token` and update `MATRIX_ACCESS_TOKEN` in `~/.hermes/.env`.
|
|
|
|
2. **Delete old encryption state**:
|
|
|
|
```bash
|
|
rm -f ~/.hermes/platforms/matrix/store/crypto.db
|
|
rm -f ~/.hermes/platforms/matrix/store/crypto_store.*
|
|
```
|
|
|
|
3. **Set your recovery key** (if you use cross-signing — most Element users do). Add to `~/.hermes/.env`:
|
|
|
|
```bash
|
|
MATRIX_RECOVERY_KEY=EsT... your recovery key here
|
|
```
|
|
|
|
This lets the bot self-sign with cross-signing keys on startup, so Element trusts the new device immediately. Without this, Element may see the new device as unverified and refuse to share encryption sessions. Find your recovery key in Element under **Settings** → **Security & Privacy** → **Encryption**.
|
|
|
|
4. **Force your Matrix client to rotate the encryption session**. In Element,
|
|
open the DM room with the bot and type `/discardsession`. This forces Element
|
|
to create a new encryption session and share it with the bot's new device.
|
|
|
|
5. **Restart the gateway**:
|
|
|
|
```bash
|
|
hermes gateway run
|
|
```
|
|
|
|
If `MATRIX_RECOVERY_KEY` is set, you should see `Matrix: cross-signing verified via recovery key` in the logs.
|
|
|
|
6. **Send a new message**. The bot should decrypt and respond normally.
|
|
|
|
:::note
|
|
After migration, messages sent *before* the upgrade cannot be decrypted -- the old
|
|
encryption keys are gone. This only affects the transition; new messages work
|
|
normally.
|
|
:::
|
|
|
|
:::tip
|
|
**New installations are not affected.** This migration is only needed if you had
|
|
a working E2EE setup with a previous version of Hermes and are upgrading.
|
|
|
|
**Why a new access token?** Each Matrix access token is bound to a specific device
|
|
ID. Reusing the same device ID with new encryption keys causes other Matrix
|
|
clients to distrust the device (they see changed identity keys as a potential
|
|
security breach). A new access token gets a new device ID with no stale key
|
|
history, so other clients trust it immediately.
|
|
:::
|
|
|
|
## Proxy Mode (E2EE on macOS)
|
|
|
|
Matrix E2EE requires `libolm`, which doesn't compile on macOS ARM64 (Apple Silicon). The `hermes-agent[matrix]` extra is gated to Linux only. If you're on macOS, proxy mode lets you run E2EE in a Docker container on a Linux VM while the actual agent runs natively on macOS with full access to your local files, memory, and skills.
|
|
|
|
### How It Works
|
|
|
|
```
|
|
macOS (Host):
|
|
└─ hermes gateway
|
|
├─ api_server adapter ← listens on 0.0.0.0:8642
|
|
├─ AIAgent ← single source of truth
|
|
├─ Sessions, memory, skills
|
|
└─ Local file access (Obsidian, projects, etc.)
|
|
|
|
Linux VM (Docker):
|
|
└─ hermes gateway (proxy mode)
|
|
├─ Matrix adapter ← E2EE decryption/encryption
|
|
└─ HTTP forward → macOS:8642/v1/chat/completions
|
|
(no LLM API keys, no agent, no inference)
|
|
```
|
|
|
|
The Docker container only handles Matrix protocol + E2EE. When a message arrives, it decrypts it and forwards the text to the host via a standard HTTP request. The host runs the agent, calls tools, generates a response, and streams it back. The container encrypts and sends the response to Matrix. All sessions are unified — CLI, Matrix, Telegram, and any other platform share the same memory and conversation history.
|
|
|
|
### Step 1: Configure the Host (macOS)
|
|
|
|
Enable the API server so the host accepts incoming requests from the Docker container.
|
|
|
|
Add to `~/.hermes/.env`:
|
|
|
|
```bash
|
|
API_SERVER_ENABLED=true
|
|
API_SERVER_KEY=your-secret-key-here
|
|
API_SERVER_HOST=0.0.0.0
|
|
```
|
|
|
|
- `API_SERVER_HOST=0.0.0.0` binds to all interfaces so the Docker container can reach it.
|
|
- `API_SERVER_KEY` is required for non-loopback binding. Pick a strong random string.
|
|
- The API server runs on port 8642 by default (change with `API_SERVER_PORT` if needed).
|
|
|
|
Start the gateway:
|
|
|
|
```bash
|
|
hermes gateway
|
|
```
|
|
|
|
You should see the API server start alongside any other platforms you have configured. Verify it's reachable from the VM:
|
|
|
|
```bash
|
|
# From the Linux VM
|
|
curl http://<mac-ip>:8642/health
|
|
```
|
|
|
|
### Step 2: Configure the Docker Container (Linux VM)
|
|
|
|
The container needs Matrix credentials and the proxy URL. It does NOT need LLM API keys.
|
|
|
|
**`docker-compose.yml`:**
|
|
|
|
```yaml
|
|
services:
|
|
hermes-matrix:
|
|
build: .
|
|
environment:
|
|
# Matrix credentials
|
|
MATRIX_HOMESERVER: "https://matrix.example.org"
|
|
MATRIX_ACCESS_TOKEN: "syt_..."
|
|
MATRIX_ALLOWED_USERS: "@you:matrix.example.org"
|
|
MATRIX_ENCRYPTION: "true"
|
|
MATRIX_DEVICE_ID: "HERMES_BOT"
|
|
|
|
# Proxy mode — forward to host agent
|
|
GATEWAY_PROXY_URL: "http://192.168.1.100:8642"
|
|
GATEWAY_PROXY_KEY: "your-secret-key-here"
|
|
volumes:
|
|
- ./matrix-store:/root/.hermes/platforms/matrix/store
|
|
```
|
|
|
|
**`Dockerfile`:**
|
|
|
|
```dockerfile
|
|
FROM python:3.11-slim
|
|
|
|
RUN apt-get update && apt-get install -y libolm-dev && rm -rf /var/lib/apt/lists/*
|
|
RUN pip install 'hermes-agent[matrix]'
|
|
|
|
CMD ["hermes", "gateway"]
|
|
```
|
|
|
|
That's the entire container. No API keys for OpenRouter, Anthropic, or any inference provider.
|
|
|
|
### Step 3: Start Both
|
|
|
|
1. Start the host gateway first:
|
|
```bash
|
|
hermes gateway
|
|
```
|
|
|
|
2. Start the Docker container:
|
|
```bash
|
|
docker compose up -d
|
|
```
|
|
|
|
3. Send a message in an encrypted Matrix room. The container decrypts it, forwards it to the host, and streams the response back.
|
|
|
|
### Configuration Reference
|
|
|
|
Proxy mode is configured on the **container side** (the thin gateway):
|
|
|
|
| Setting | Description |
|
|
|---------|-------------|
|
|
| `GATEWAY_PROXY_URL` | URL of the remote Hermes API server (e.g., `http://192.168.1.100:8642`) |
|
|
| `GATEWAY_PROXY_KEY` | Bearer token for authentication (must match `API_SERVER_KEY` on the host) |
|
|
| `gateway.proxy_url` | Same as `GATEWAY_PROXY_URL` but in `config.yaml` |
|
|
|
|
The host side needs:
|
|
|
|
| Setting | Description |
|
|
|---------|-------------|
|
|
| `API_SERVER_ENABLED` | Set to `true` |
|
|
| `API_SERVER_KEY` | Bearer token (shared with the container) |
|
|
| `API_SERVER_HOST` | Set to `0.0.0.0` for network access |
|
|
| `API_SERVER_PORT` | Port number (default: `8642`) |
|
|
|
|
### Works for Any Platform
|
|
|
|
Proxy mode is not limited to Matrix. Any platform adapter can use it — set `GATEWAY_PROXY_URL` on any gateway instance and it will forward to the remote agent instead of running one locally. This is useful for any deployment where the platform adapter needs to run in a different environment from the agent (network isolation, E2EE requirements, resource constraints).
|
|
|
|
:::tip
|
|
Session continuity is maintained via the `X-Hermes-Session-Id` header. The host's API server tracks sessions by this ID, so conversations persist across messages just like they would with a local agent.
|
|
:::
|
|
|
|
:::note
|
|
**Limitations (v1):** Tool progress messages from the remote agent are not relayed back — the user sees the streamed final response only, not individual tool calls. Dangerous command approval prompts are handled on the host side, not relayed to the Matrix user. These can be addressed in future updates.
|
|
:::
|
|
|
|
### Sync issues / bot falls behind
|
|
|
|
**Cause**: Long-running tool executions can delay the sync loop, or the homeserver is slow.
|
|
|
|
**Fix**: The sync loop automatically retries every 5 seconds on error. Check the Hermes logs for sync-related warnings. If the bot consistently falls behind, ensure your homeserver has adequate resources.
|
|
|
|
### Bot is offline
|
|
|
|
**Cause**: The Hermes gateway isn't running, or it failed to connect.
|
|
|
|
**Fix**: Check that `hermes gateway` is running. Look at the terminal output for error messages. Common issues: wrong homeserver URL, expired access token, homeserver unreachable.
|
|
|
|
### "User not allowed" / Bot ignores you
|
|
|
|
**Cause**: Your User ID isn't in `MATRIX_ALLOWED_USERS`.
|
|
|
|
**Fix**: Add your User ID to `MATRIX_ALLOWED_USERS` in `~/.hermes/.env` and restart the gateway. Use the full `@user:server` format.
|
|
|
|
## Security
|
|
|
|
:::warning
|
|
Always set `MATRIX_ALLOWED_USERS` to restrict who can interact with the bot. Without it, the gateway denies all users by default as a safety measure. Only add User IDs of people you trust — authorized users have full access to the agent's capabilities, including tool use and system access.
|
|
:::
|
|
|
|
For more information on securing your Hermes Agent deployment, see the [Security Guide](../security.md).
|
|
|
|
## Notes
|
|
|
|
- **Any homeserver**: Works with Synapse, Conduit, Dendrite, matrix.org, or any spec-compliant Matrix homeserver. No specific homeserver software required.
|
|
- **Federation**: If you're on a federated homeserver, the bot can communicate with users from other servers — just add their full `@user:server` IDs to `MATRIX_ALLOWED_USERS`.
|
|
- **Auto-join**: The bot automatically accepts room invites and joins. It starts responding immediately after joining.
|
|
- **Media support**: Hermes can send and receive images, audio, video, and file attachments. Media is uploaded to your homeserver using the Matrix content repository API.
|
|
- **Native voice messages (MSC3245)**: The Matrix adapter automatically tags outgoing voice messages with the `org.matrix.msc3245.voice` flag. This means TTS responses and voice audio are rendered as **native voice bubbles** in Element and other clients that support MSC3245, rather than as generic audio file attachments. Incoming voice messages with the MSC3245 flag are also correctly identified and routed to speech-to-text transcription. No configuration is needed — this works automatically.
|