Do not use Let's Encrypt certificate for Synapse's federation port
As described here ( https://github.com/matrix-org/synapse/issues/2438#issuecomment-327424711 ), using own SSL certificates for the federation port is more fragile, as renewing them could cause federation outages. The recommended setup is to use the self-signed certificates generated by Synapse. On the 443 port (matrix-nginx-proxy) side, we still use the Let's Encrypt certificates, which ensures API consumers work without having to trust "our own CA". Having done this, we also don't need to ever restart Synapse anymore, as no new SSL certificates need to be applied there. It's just matrix-nginx-proxy that needs to be restarted, and it doesn't even need a full restart as an "nginx reload" does the job of swithing to the new SSL certificates.
This commit is contained in:
@ -43,10 +43,6 @@ docker_nginx_image: "nginx:1.13.5-alpine"
|
||||
docker_riot_image: "silviof/matrix-riot-docker:latest"
|
||||
docker_s3fs_image: "xueshanf/s3fs:latest"
|
||||
|
||||
# Specifies when to restart the Matrix services so that
|
||||
# a new SSL certificate could go into effect (UTC time).
|
||||
matrix_services_restart_cron_time_definition: "15 4 3 * *"
|
||||
|
||||
# UDP port-range to use for TURN
|
||||
matrix_coturn_turn_udp_min_port: 49152
|
||||
matrix_coturn_turn_udp_max_port: 49172
|
||||
@ -72,3 +68,7 @@ matrix_riot_web_enabled: true
|
||||
# But in case that's not the case, you may wish to prevent that
|
||||
# and take care of proxying by yourself.
|
||||
matrix_nginx_proxy_enabled: true
|
||||
|
||||
# Specifies when to reload the matrix-nginx-proxy service so that
|
||||
# a new SSL certificate could go into effect (UTC time).
|
||||
matrix_nginx_proxy_reload_cron_time_definition: "15 4 3 * *"
|
Reference in New Issue
Block a user