ansible-base/roles/synapse-and-nginx/templates/conf.j2

45 lines
1 KiB
Text
Raw Normal View History

2024-07-03 22:31:49 +02:00
{% macro synapse_common() %}
location ~ ^(/_matrix|/_synapse/client) {
proxy_pass http://localhost:8008;
proxy_set_header X-Forwarded-For $remote_addr;
proxy_set_header X-Forwarded-Proto $scheme;
proxy_set_header Host $host;
client_max_body_size 50M;
proxy_http_version 1.1;
}
2024-07-09 09:11:53 +02:00
{% endmacro %}
2024-07-03 22:31:49 +02:00
2023-11-20 02:07:08 +01:00
server {
2024-07-03 22:31:49 +02:00
server_name {{var_synapse_and_nginx_domain}};
2023-11-20 02:07:08 +01:00
listen 80;
listen [::]:80;
2024-07-03 22:31:49 +02:00
{% if (var_synapse_and_nginx_tls_mode == 'force') %}
2024-07-03 22:31:49 +02:00
return 301 https://$http_host$request_uri;
{% else %}
{{ synapse_common() }}
2024-07-03 22:31:49 +02:00
{% endif %}
}
2024-07-09 11:14:19 +02:00
{% if (var_synapse_and_nginx_tls_mode != 'disable') %}
2024-07-03 22:31:49 +02:00
server {
server_name {{var_synapse_and_nginx_domain}};
listen 443 ssl http2;
listen [::]:443 ssl http2;
2024-06-01 18:14:21 +02:00
2023-11-20 02:07:08 +01:00
## For the federation port
listen 8448 ssl http2 default_server;
listen [::]:8448 ssl http2 default_server;
2024-06-01 18:14:21 +02:00
ssl_certificate_key /etc/ssl/private/{{var_synapse_and_nginx_domain}}.pem;
2024-07-03 22:31:49 +02:00
ssl_certificate /etc/ssl/fullchains/{{var_synapse_and_nginx_domain}}.pem;
include /etc/nginx/ssl-hardening.conf;
2024-06-01 18:14:21 +02:00
{{ synapse_common() }}
2023-11-20 02:07:08 +01:00
}
2024-07-03 22:31:49 +02:00
{% endif %}