diff options
author | Richard van der Hoff <richard@matrix.org> | 2019-01-30 17:02:32 +0000 |
---|---|---|
committer | Richard van der Hoff <richard@matrix.org> | 2019-01-30 17:02:32 +0000 |
commit | 6fba9fd20c8f29f6034236f653893a3bda165be2 (patch) | |
tree | 1ce9b816637de72b36c8acfe03ac791d842b0905 /UPGRADE.rst | |
parent | by default include m.room.encryption on invites (#3902) (diff) | |
parent | v0.99.0rc2 (diff) | |
download | synapse-6fba9fd20c8f29f6034236f653893a3bda165be2.tar.xz |
Merge remote-tracking branch 'origin/release-v0.99.0' into develop
Diffstat (limited to 'UPGRADE.rst')
-rw-r--r-- | UPGRADE.rst | 32 |
1 files changed, 32 insertions, 0 deletions
diff --git a/UPGRADE.rst b/UPGRADE.rst index 47a8cb9c88..c46f70f699 100644 --- a/UPGRADE.rst +++ b/UPGRADE.rst @@ -48,6 +48,38 @@ returned by the Client-Server API: # configured on port 443. curl -kv https://<host.name>/_matrix/client/versions 2>&1 | grep "Server:" +Upgrading to v0.99.0 +==================== + +In preparation for Synapse v1.0, you must update your TLS certificates from +self-signed ones to verifiable ones signed by a trusted root CA. + +If you do not already have a certificate for your domain, the easiest way to get +one is with Synapse's new ACME support, which will use the ACME protocol to +provision a certificate automatically. By default, certificates will be obtained +from the publicly trusted CA Let's Encrypt. + +For a sample configuration, please inspect the new ACME section in the example +generated config by running the ``generate-config`` executable. For example:: + + ~/synapse/env3/bin/generate-config + +You will need to provide Let's Encrypt (or other ACME provider) access to your +Synapse ACME challenge responder on port 80, at the domain of your homeserver. +This requires you either change the port of the ACME listener provided by +Synapse to a high port and reverse proxy to it, or use a tool like authbind to +allow Synapse to listen on port 80 without root access. (Do not run Synapse with +root permissions!) + +You will need to back up or delete your self signed TLS certificate +(``example.com.tls.crt`` and ``example.com.tls.key``), Synapse's ACME +implementation will not overwrite them. + +You may wish to use alternate methods such as Certbot to obtain a certificate +from Let's Encrypt, depending on your server configuration. Of course, if you +already have a valid certificate for your homeserver's domain, that can be +placed in Synapse's config directory without the need for ACME. + Upgrading to v0.34.0 ==================== |