Back to bookshelf
1.
Introduction
Installation
2.
Setup
2.1.
with Docker
Configuration
3.
System configuration
3.1.
Reverse proxy configuration
3.2.
Blocking invites
3.3.
Report interception
4.
Creating bots
5.
Configuring bots