| @@ -1,7 +1,4 @@ | |||||
| matrix.DOMAIN.tld { | matrix.DOMAIN.tld { | ||||
| tls {$CADDY_TLS} | |||||
| @identity { | @identity { | ||||
| path /_matrix/identity/* | path /_matrix/identity/* | ||||
| } | } | ||||
| @@ -97,10 +94,7 @@ matrix.DOMAIN.tld:8448 { | |||||
| } | } | ||||
| dimension.DOMAIN.tld { | dimension.DOMAIN.tld { | ||||
| tls {$CADDY_TLS} | |||||
| header { | |||||
| header { | |||||
| # Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS | # Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS | ||||
| Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" | Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" | ||||
| # Enable cross-site filter (XSS) and tell browser to block detected attacks | # Enable cross-site filter (XSS) and tell browser to block detected attacks | ||||
| @@ -127,9 +121,6 @@ dimension.DOMAIN.tld { | |||||
| } | } | ||||
| element.DOMAIN.tld { | element.DOMAIN.tld { | ||||
| tls {$CADDY_TLS} | |||||
| header { | header { | ||||
| # Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS | # Enable HTTP Strict Transport Security (HSTS) to force clients to always connect via HTTPS | ||||
| Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" | Strict-Transport-Security "max-age=31536000; includeSubDomains; preload" | ||||
| @@ -153,4 +144,4 @@ element.DOMAIN.tld { | |||||
| header_up X-Forwarded-TlsCipher {tls_cipher} | header_up X-Forwarded-TlsCipher {tls_cipher} | ||||
| header_up X-Forwarded-HttpsProto {proto} | header_up X-Forwarded-HttpsProto {proto} | ||||
| } | } | ||||
| } | |||||
| } | |||||