Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
synapse
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Merge requests
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Releases
Container Registry
Model registry
Monitor
Service Desk
Analyze
Value stream analytics
Contributor analytics
CI/CD analytics
Repository analytics
Model experiments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
Maunium
synapse
Commits
cd6fee31
Commit
cd6fee31
authored
6 years ago
by
Andrew Morgan
Browse files
Options
Downloads
Patches
Plain Diff
Don't imply self-signed certs are required
parent
142b2cdd
No related branches found
No related tags found
No related merge requests found
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
UPGRADE.rst
+17
-16
17 additions, 16 deletions
UPGRADE.rst
with
17 additions
and
16 deletions
UPGRADE.rst
+
17
−
16
View file @
cd6fee31
...
...
@@ -51,34 +51,35 @@ returned by the Client-Server API:
Upgrading to v0.99.0
====================
In preparation for Synapse v1.0, you must
updat
e your
TLS c
erti
ficates from
self-signed ones to
verifiable
ones
signed by a trusted root CA.
In preparation for Synapse v1.0, you must
ensur
e your
fed
er
a
ti
on TLS
certificates are
verifiable
by
signed by a trusted root CA.
If you do not already have a certificate for your domain, the easiest
way to get
one is with Synapse's new ACME support, which will use the ACME
protocol to
provision a certificate automatically. By default, certificates
will be obtained
from the publicly trusted CA Let's Encrypt.
If you do not already have a
valid
certificate for your domain, the easiest
way to get
one is with Synapse's new ACME support, which will use the ACME
protocol to
provision a certificate automatically. By default, certificates
will be obtained
from the publicly trusted CA Let's Encrypt.
For a sample configuration, please inspect the new ACME section in the example
generated config by running the ``generate-config`` executable. For example::
~/synapse/env3/bin/generate-config
You will need to provide Let's Encrypt (or other ACME provider) access to
your
Synapse ACME challenge responder on port 80, at the domain of your
homeserver.
This requires you either change the port of the ACME listener
provided by
Synapse to a high port and reverse proxy to it, or use a tool
like authbind to
allow Synapse to listen on port 80 without root access.
(Do not run Synapse with
root permissions!)
You will need to provide Let's Encrypt (or
an
other ACME provider) access to
your
Synapse ACME challenge responder on port 80, at the domain of your
homeserver.
This requires you
to
either change the port of the ACME listener
provided by
Synapse to a high port and reverse proxy to it, or use a tool
like ``authbind`` to
allow Synapse to listen on port 80 without root access.
(Do not run Synapse with
root permissions!)
You will need to back up or delete your self signed TLS certificate
(``example.com.tls.crt`` and ``example.com.tls.key``), Synapse's ACME
implementation will not overwrite them.
If you are already using self-signed ceritifcates, you will need to back up
or delete them (files ``example.com.tls.crt`` and ``example.com.tls.key`` in
Synapse's root directory), Synapse's ACME implementation will not overwrite
them.
You may wish to use alternate methods such as Certbot to obtain a certificate
from Let's Encrypt, depending on your server configuration. Of course, if you
already have a valid certificate for your homeserver's domain, that can be
placed in Synapse's config directory without the need for
ACME
.
placed in Synapse's config directory without the need for
any ACME setup
.
Upgrading to v0.34.0
====================
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment