Skip to content
Snippets Groups Projects
Commit bbc33028 authored by nimrod's avatar nimrod
Browse files

Web proxy: Matrix well-known info.

parent 08be0412
Branches master
No related tags found
No related merge requests found
...@@ -6,6 +6,7 @@ server { ...@@ -6,6 +6,7 @@ server {
include snippets/robots-allow-all.conf; include snippets/robots-allow-all.conf;
include snippets/ads-txt.conf; include snippets/ads-txt.conf;
include snippets/security-txt.conf; include snippets/security-txt.conf;
include snippets/matrix-well-known.conf;
include snippets/www-acme-challenge.conf; include snippets/www-acme-challenge.conf;
include snippets/redirect-www.conf; include snippets/redirect-www.conf;
} }
...@@ -19,6 +20,7 @@ server { ...@@ -19,6 +20,7 @@ server {
include snippets/security-txt.conf; include snippets/security-txt.conf;
include snippets/ssl-legacy.conf; include snippets/ssl-legacy.conf;
include snippets/nextcloud-well-known.conf; include snippets/nextcloud-well-known.conf;
include snippets/matrix-well-known.conf;
include snippets/activesync.conf; include snippets/activesync.conf;
include snippets/redirect-www.conf; include snippets/redirect-www.conf;
} }
...@@ -6,6 +6,7 @@ server { ...@@ -6,6 +6,7 @@ server {
include snippets/robots-allow-all.conf; include snippets/robots-allow-all.conf;
include snippets/ads-txt.conf; include snippets/ads-txt.conf;
include snippets/security-txt.conf; include snippets/security-txt.conf;
include snippets/matrix-well-known.conf;
include snippets/www-acme-challenge.conf; include snippets/www-acme-challenge.conf;
include snippets/redirect-www.conf; include snippets/redirect-www.conf;
} }
...@@ -18,6 +19,7 @@ server { ...@@ -18,6 +19,7 @@ server {
include snippets/ads-txt.conf; include snippets/ads-txt.conf;
include snippets/security-txt.conf; include snippets/security-txt.conf;
include snippets/ssl-legacy.conf; include snippets/ssl-legacy.conf;
include snippets/matrix-well-known.conf;
include snippets/nextcloud-well-known.conf; include snippets/nextcloud-well-known.conf;
include snippets/activesync.conf; include snippets/activesync.conf;
include snippets/redirect-www.conf; include snippets/redirect-www.conf;
......
...@@ -8,6 +8,7 @@ server { ...@@ -8,6 +8,7 @@ server {
include snippets/robots-allow-all.conf; include snippets/robots-allow-all.conf;
include snippets/ads-txt.conf; include snippets/ads-txt.conf;
include snippets/security-txt.conf; include snippets/security-txt.conf;
include snippets/matrix-well-known.conf;
include snippets/www-acme-challenge.conf; include snippets/www-acme-challenge.conf;
include snippets/redirect-www.conf; include snippets/redirect-www.conf;
...@@ -23,9 +24,9 @@ server { ...@@ -23,9 +24,9 @@ server {
include snippets/security-txt.conf; include snippets/security-txt.conf;
include snippets/ssl-legacy.conf; include snippets/ssl-legacy.conf;
include snippets/nextcloud-well-known.conf; include snippets/nextcloud-well-known.conf;
include snippets/matrix-well-known.conf;
include snippets/activesync.conf; include snippets/activesync.conf;
include snippets/redirect-www.conf; include snippets/redirect-www.conf;
include snippets/matrix-well-known.conf;
location = / { return 301 https://www.shore.co.il/blog/; } location = / { return 301 https://www.shore.co.il/blog/; }
} }
# vim: ft=nginx
location = /.well-known/matrix/server {
if ($scheme = http) {
return 301 https://$host$request_uri;
}
if ($scheme = https) {
add_header Content-Type "application/json; charset=utf-8";
return 200 "{\"m.server\": \"matrix.shore.co.il:443\"}";
}
}
location = /.well-known/matrix/client {
if ($scheme = http) {
return 301 https://$host$request_uri;
}
if ($scheme = https) {
add_header Content-Type "application/json; charset=utf-8";
add_header Access-Control-Allow-Origin *;
return 200 "{\"m.homeserver\": { \"base_url\": \"https://matrix.shore.co.il\" } }";
}
}
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Please register or to comment