From b66f149e6b30051821c51e7c86c54b32ca654bfb Mon Sep 17 00:00:00 2001
From: babolivier In this case, your The easiest way to do that is with Synapse's built-in ACME (Let's Encrypt)
-support. Full details are in ACME.md but, in a nutshell: If you are using an SRV record, your matrix domain ( In this situation, you have three choices for how to proceed: Synapse 1.0 will expect your server to present a TLS certificate for your
- Acquire a certificate for the Use Synapse's ACME support, and forward port 80 on the
-server_name
points to the host where your Synapse is
running. There is no need to create a .well-known
URI or an SRV record, but
you will need to give Synapse a valid, signed, certificate.
-
authbind
, or forward it from a
-reverse proxy.homeserver.yaml
.If you do have an SRV record currently
server_name
) may not
point to the same host that your Synapse is running on (the 'target
@@ -296,19 +287,9 @@ an SRV record which looks like:Option 1: give Synapse a certificate for your matrix domain
server_name
(example.com
in the above example). You can achieve this by
-doing one of the following:
-
+server_name
yourself (for example, using
-certbot
), and give it and the key to Synapse via tls_certificate_path
-and tls_private_key_path
, or:server_name
domain to your Synapse instance.server_name
(example.com
in the above example). You can achieve this by acquiring a
+certificate for the server_name
yourself (for example, using certbot
), and giving it
+and the key to Synapse via tls_certificate_path
and tls_private_key_path
.
If you have an existing reverse proxy set up with correct TLS certificates for your domain, you can simply route all traffic through the reverse proxy by @@ -327,10 +308,9 @@ with Synapse 0.34 and earlier.
Give Synapse a certificate corresponding to the target domain
-(customer.example.net
in the above example). You can either use Synapse's
-built-in ACME support for this (via the domain
parameter in
-the acme
section), or acquire a certificate yourself and give it to
-Synapse via tls_certificate_path
and tls_private_key_path
.
customer.example.net
in the above example). You can do this by acquire a
+certificate for the target domain and giving it to Synapse via tls_certificate_path
+and tls_private_key_path
.
Restart Synapse to ensure the new certificate is loaded.
-- cgit 1.5.1