Skip to content
GitLab
Explore
Sign in
Primary navigation
Search or go to…
Project
Matrix
Manage
Activity
Members
Labels
Plan
Issues
Issue boards
Milestones
Code
Repository
Branches
Commits
Tags
Repository graph
Compare revisions
Build
Pipelines
Jobs
Pipeline schedules
Artifacts
Deploy
Container Registry
Model registry
Operate
Environments
Help
Help
Support
GitLab documentation
Compare GitLab plans
Community forum
Contribute to GitLab
Provide feedback
Terms and privacy
Keyboard shortcuts
?
Snippets
Groups
Projects
Show more breadcrumbs
TeDomum
Matrix
Commits
7998ca3a
Unverified
Commit
7998ca3a
authored
6 years ago
by
Andrew Morgan
Committed by
GitHub
6 years ago
Browse files
Options
Downloads
Patches
Plain Diff
Document using a certificate with a full chain (#4849)
parent
332b60ec
No related branches found
Branches containing commit
No related tags found
Tags containing commit
No related merge requests found
Changes
4
Hide whitespace changes
Inline
Side-by-side
Showing
4 changed files
INSTALL.md
+6
-2
6 additions, 2 deletions
INSTALL.md
changelog.d/4849.misc
+1
-0
1 addition, 0 deletions
changelog.d/4849.misc
docs/sample_config.yaml
+5
-0
5 additions, 0 deletions
docs/sample_config.yaml
synapse/config/tls.py
+5
-0
5 additions, 0 deletions
synapse/config/tls.py
with
17 additions
and
2 deletions
INSTALL.md
+
6
−
2
View file @
7998ca3a
...
...
@@ -375,9 +375,13 @@ To configure Synapse to expose an HTTPS port, you will need to edit
*
You will also need to uncomment the
`tls_certificate_path`
and
`tls_private_key_path`
lines under the
`TLS`
section. You can either
point these settings at an existing certificate and key, or you can
enable Synapse's built-in ACME (Let's Encrypt) support.
Instructions
enable Synapse's built-in ACME (Let's Encrypt) support. Instructions
for having Synapse automatically provision and renew federation
certificates through ACME can be found at
[
ACME.md
](
docs/ACME.md
)
.
certificates through ACME can be found at
[
ACME.md
](
docs/ACME.md
)
. If you
are using your own certificate, be sure to use a
`.pem`
file that includes
the full certificate chain including any intermediate certificates (for
instance, if using certbot, use
`fullchain.pem`
as your certificate, not
`cert.pem`
).
For those of you upgrading your TLS certificate in readiness for Synapse 1.0,
please take a look at
`our guide <docs/MSC1711_certificates_FAQ.md#configuring-certificates-for-compatibility-with-synapse-100>`
_.
...
...
This diff is collapsed.
Click to expand it.
changelog.d/4849.misc
0 → 100644
+
1
−
0
View file @
7998ca3a
Update install docs to explicitly state a full-chain (not just the top-level) TLS certificate must be provided to Synapse. This caused some people's Synapse ports to appear correct in a browser but still (rightfully so) upset the federation tester.
\ No newline at end of file
This diff is collapsed.
Click to expand it.
docs/sample_config.yaml
+
5
−
0
View file @
7998ca3a
...
...
@@ -246,6 +246,11 @@ listeners:
# See 'ACME support' below to enable auto-provisioning this certificate via
# Let's Encrypt.
#
# If supplying your own, be sure to use a `.pem` file that includes the
# full certificate chain including any intermediate certificates (for
# instance, if using certbot, use `fullchain.pem` as your certificate,
# not `cert.pem`).
#
#tls_certificate_path: "CONFDIR/SERVERNAME.tls.crt"
# PEM-encoded private key for TLS
...
...
This diff is collapsed.
Click to expand it.
synapse/config/tls.py
+
5
−
0
View file @
7998ca3a
...
...
@@ -181,6 +181,11 @@ class TlsConfig(Config):
# See
'
ACME support
'
below to enable auto-provisioning this certificate via
# Let
'
s Encrypt.
#
# If supplying your own, be sure to use a `.pem` file that includes the
# full certificate chain including any intermediate certificates (for
# instance, if using certbot, use `fullchain.pem` as your certificate,
# not `cert.pem`).
#
#tls_certificate_path:
"
%(tls_certificate_path)s
"
# PEM-encoded private key for TLS
...
...
This diff is collapsed.
Click to expand it.
Preview
0%
Loading
Try again
or
attach a new file
.
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Save comment
Cancel
Please
register
or
sign in
to comment