Configuring a reverse proxy

Although the service can be exposed directly to the internet, including handling the TLS termination, many deployments will want to run a reverse proxy in front of the service.

In those configuration, the service should be configured to listen on localhost or Unix domain socket.

Example configuration

http: public_base: https://auth.example.com/ listeners: - name: web resources: - name: discovery - name: human - name: oauth - name: compat - name: graphql - name: assets binds: # Bind on a local port - host: localhost port: 8080 # OR bind on a Unix domain socket #- socket: /var/run/mas.sock # OR bind on a systemd socket #- fd: 0 # kind: tcp # or unix # Optional: use the PROXY protocol #proxy_protocol: true

Base nginx configuration

A basic configuration for nginx, which proxies traffic to the service would look like this:

server { listen 443 ssl http2; listen [::]:443 ssl http2; server_name auth.example.com; ssl_certificate path/to/fullchain.pem; ssl_certificate_key path/to/privkey.pem; location / { proxy_http_version 1.1; proxy_pass http://localhost:8080; # OR via the Unix domain socket #proxy_pass http://unix:/var/run/mas.sock; # Forward the client IP address proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; # or, using the PROXY protocol #proxy_protocol on; } }

Compatibility layer

For the compatibility layer, the following endpoints need to be proxied to the service:

  • /_matrix/client/*/login
  • /_matrix/client/*/logout
  • /_matrix/client/*/refresh

For example, a nginx configuration could look like:

server { listen 443 ssl http2; listen [::]:443 ssl http2; server_name matrix.example.com; # Forward to the auth service location ~ ^/_matrix/client/(.*)/(login|logout|refresh) { proxy_http_version 1.1; proxy_pass http://localhost:8080; # OR via the Unix domain socket #proxy_pass http://unix:/var/run/mas.sock; # Forward the client IP address proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; # or, using the PROXY protocol #proxy_protocol on; } # Forward to Synapse # as per https://element-hq.github.io/synapse/latest/reverse_proxy.html#nginx location ~ ^(/_matrix|/_synapse/client) { proxy_pass http://localhost:8008; proxy_set_header X-Forwarded-For $remote_addr; proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header Host $host; client_max_body_size 50M; proxy_http_version 1.1; } }

Preserve the client IP

For rate-limiting and logging purposes, MAS needs to know the client IP address, which can be lost when using a reverse proxy. There are two ways to preserve the client IP address

X-Forwarded-For header

MAS can infer the client IP address from the X-Forwarded-For header. It will trust the value for this header only if the request comes from a trusted reverse proxy.

The range of IPs that can be trusted is configured using the trusted_proxies configuration option, which has the default private IP ranges.

http: trusted_proxies: - 192.168.0.0/16 - 172.16.0.0/12 - 10.0.0.0/10 - 127.0.0.1/8 - fd00::/8 - ::1/128

With nginx, this can be achieved by setting the proxy_set_header directive to X-Forwarded-For $proxy_add_x_forwarded_for.

Proxy protocol

MAS supports the PROXY protocol to preserve the client IP address. To enable it, enable the proxy_protocol option on the listener:

http: listeners: - name: web resources: - name: discovery - name: human - name: oauth - name: compat - name: graphql - name: assets binds: - address: "[::]:8080" proxy_protocol: true

With nginx, this can be achieved by setting the proxy_protocol directive to on in the location block.

Serve assets directly

To avoid unnecessary round-trips, the assets can be served directly by nginx, and the assets resource can be removed from the service configuration.

http: listeners: - name: web resources: - name: discovery - name: human - name: oauth - name: compat - name: graphql # MAS doesn't need to serve the assets anymore #- name: assets binds: - address: "[::]:8080" proxy_protocol: true

Make sure the assets directory served by nginx is up to date.

server { # --- SNIP --- location / { # --- SNIP --- } # Make nginx serve the assets directly location /assets/ { root /path/to/share/assets/; # Serve pre-compressed assets gzip_static on; # With the ngx_brotli module installed # https://github.com/google/ngx_brotli #brotli_static on; # Cache assets for a year expires 365d; } }