**NOTE:** Hotpocket is still a work in progress, the documentation and the script are not to be trusted.
![Hotpocket](docs/hotpocket.png) Daemon for automated room management

[Installation](docs/debian_11.md) | [Configuration](docs/configuration.md) | [Policy deployment](docs/policies.md) | [Tags](docs/tags.md) | [#loj:glowers.club](https://matrix.to/#/#loj:glowers.club)

Hotpocket is a room management daemon for matrix, which allows homeserver operators to more effectively deal with unwanted content. ### Todo - [x] Logo (very important) - [ ] Documentation. Everything changed needs lookover - [x] config.d - [x] Policy querying - [x] Basic Actions - [ ] Advanced Actions (archiving, audit log) - [ ] Audit log. This *was* implemented but everything got rewritten - [ ] Mjolnir forwarding ### Faq #### Why? Existing tools like Mjolnir do not implement `m.policy.rule.room`, meaning room management through Mjolnir is tedious and inefficient. Additionally, Mjolnir can only act on one homeserver at a time, meaning homeserver operators can't effectively crowd-source homeserver moderation. #### Why in bash? Hotpocket is intended to be easily deployable, with as few dependencies as possible. Shell scripts are not only highly portable, but easily auditable. #### Is this more complicated than Mjolnir? The only effective difference between Mjolnir's room management and Hotpocket, is that hotpocket requires all policies to be signed by a trusted public key. If you're running your own homeserver, the small jump in complexity shouldn't be an issue. #### Can I use this with my EMS homeserver? If you want to run hotpocket on a MaaS provider, you will need access to `/_synapse` and a server to install hotpocket to. As `/_synapse` will be exposed to the internet, this is not considered a secure configuration. If possible, you should migrate to hosting your matrix homeserver yourself.