9.5 KiB
Sygnal with Caddy & Cloudflare on Vultr
This document walks you through setting up a Sygnal push gateway for Matrix, running in a Docker container. We will use Caddy as a reverse proxy, also in Docker, to handle HTTPS automatically using DNS challenges with Cloudflare.
Now Cloudflare and Vultr have a deal in place where traffic from Cloudflare to Vultr and vice versa does not incur bandwidth usage. So you can pass endless amounts through without any extra billing. This is why the docs utilize Vultr, but you're free to use whatever cloud provider you want and not use Cloudflare if you so choose.
Prerequisites
- Vultr Server: A running server instance. This guide assumes a fresh server running a common Linux distribution like Debian, Ubuntu, or Alpine.
- Domain Name: A domain name managed through Cloudflare.
- Cloudflare Account: Your domain must be using Cloudflare's DNS.
- Docker & Docker Compose: Docker and
docker-compose
must be installed on your Vultr server. - A Matrix Client: A client like Cinny that you want to point to your new push gateway.
Step 1: Cloudflare Configuration
Before touching the server, we need to configure Cloudflare.
1.1. DNS Record
In your Cloudflare dashboard, create an A (for IPv4) or AAAA (for IPv6) record for the subdomain you'll use for Sygnal. Point it to your Vultr server's IP address.
- Type:
A
orAAAA
- Name:
sygnal.your-domain.com
(or your chosen subdomain) - Content: Your Vultr server's IP address
- Proxy status: Proxied (Orange Cloud). This is important for Caddy's setup.
1.2. API Token
Caddy needs an API token to prove to Cloudflare that you own the domain so it can create the necessary DNS records for issuing an SSL certificate.
- Go to My Profile > API Tokens in Cloudflare.
- Click Create Token.
- Use the Edit zone DNS template.
- Under Permissions, ensure
Zone:DNS:Edit
is selected. - Under Zone Resources, select the specific zone for
your-domain.com
. - Continue to summary and create the token.
- Copy the generated token immediately. You will not be able to see it again. We will use this as your
CLOUDFLARE_API_TOKEN
.
Step 2: Server Preparation
2.1. Connect to your Server (SSH)
If your Vultr instance uses an IPv6 address, connecting via SSH can sometimes be tricky. You can create an alias in your local ~/.ssh/config
file to make it easier.
Open or create ~/.ssh/config
on your local machine and add:
Host vultr-sygnal
# Replace with your server's IPv6 or IPv4 address
Hostname 2001:19f0:5400:1532:5400:05ff:fe78:fb25
User root
# For IPv6, uncomment the line below
# AddressFamily inet6
Now you can connect simply by typing ssh vultr-sygnal
.
2.2. Install Docker and Docker Compose
Follow the official Docker documentation to install the Docker Engine and Docker Compose for your server's operating system.
2.3. Configure Firewall
We need to allow HTTP and HTTPS traffic so Caddy can obtain certificates and serve requests. If you are using ufw
:
sudo ufw allow 80/tcp
sudo ufw allow 443/tcp
sudo ufw enable
sudo ufw status
Step 3: Project Structure and Configuration
On your Vultr server, let's create a directory to hold all our configuration files.
mkdir -p /opt/matrix-sygnal
cd /opt/matrix-sygnal
We will create all subsequent files inside this /opt/matrix-sygnal
directory.
3.1. Sygnal VAPID Keys
WebPush requires a VAPID key pair. The private key stays on your server, and the public key is given to clients.
-
Generate the Private Key: Use
openssl
to generate an EC private key.# This command needs to be run in the /opt/matrix-sygnal directory openssl ecparam -name prime256v1 -genkey -noout -out sygnal_private_key.pem
-
Extract the Public Key: Extract the corresponding public key from the private key. You will need this for your client configuration later.
# This command extracts the public key in the correct format openssl ec -in sygnal_private_key.pem -pubout -outform DER | tail -c 65 | base64 | tr '/+' '_-' | tr -d '='
Save the output of this command. This is your
vapidPublicKey
. It should look similar to the one from thecinny.cc
example.
3.2. Sygnal Configuration (sygnal.yaml
)
Create a file named sygnal.yaml
. This file tells Sygnal how to run.
# /opt/matrix-sygnal/sygnal.yaml
http:
bind_addresses: ['0.0.0.0']
port: 5000
# This is where we configure our push gateway app
apps:
# This app_id must match the one used in your client's configuration
cc.cinny.web:
type: webpush
# This path is *inside the container*. We will map our generated key to it.
vapid_private_key: /data/private_key.pem
# An email for VAPID contact details
vapid_contact_email: mailto:your-email@your-domain.com
3.3. Caddy Configuration (Caddyfile
)
Create a file named Caddyfile
. This tells Caddy how to proxy requests.
Replace sygnal.your-domain.com
with the domain you configured in Step 1.
# /opt/matrix-sygnal/Caddyfile
# Reusable snippet for Cloudflare TLS
(tls_cloudflare) {
tls {
dns cloudflare {env.CLOUDFLARE_API_TOKEN}
}
}
# Your public-facing URL
sygnal.your-domain.com {
# Get an SSL certificate from Let's Encrypt using the Cloudflare DNS challenge
import tls_cloudflare
# Log requests to standard output
log
# Reverse proxy requests to the sygnal container on port 5000
# 'sygnal' is the service name we will define in docker-compose.yml
reverse_proxy sygnal:5000
}
3.4. Caddy Dockerfile
While you can use the standard caddy:latest
image, you need one with the Cloudflare DNS provider plugin. Create a file named Dockerfile
for Caddy.
# /opt/matrix-sygnal/Dockerfile
FROM caddy:builder AS builder
RUN xcaddy build \
--with github.com/caddy-dns/cloudflare
FROM caddy:latest
COPY --from=builder /usr/bin/caddy /usr/bin/caddy
3.5. Environment File (.env
)
Create a file named .env
to securely store your Cloudflare API Token.
# /opt/matrix-sygnal/.env
CLOUDFLARE_API_TOKEN=your-cloudflare-api-token-from-step-1
Step 4: Docker Compose
Using docker-compose
simplifies managing our multi-container application. Create a docker-compose.yml
file.
# /opt/matrix-sygnal/docker-compose.yml
version: '3.7'
services:
caddy:
# Build the Caddy image from our Dockerfile in the current directory
build: .
container_name: caddy
hostname: caddy
restart: unless-stopped
networks:
- matrix
ports:
# Expose standard web ports to the host
- '80:80'
- '443:443'
volumes:
# Mount the Caddyfile into the container
- ./Caddyfile:/etc/caddy/Caddyfile
# Create a volume for Caddy's data (certs, etc.)
- caddy_data:/data
# Load the Cloudflare token from the .env file
env_file:
- ./.env
sygnal:
# Use the official Sygnal image
image: matrixdotorg/sygnal:latest
container_name: sygnal
hostname: sygnal
restart: unless-stopped
networks:
- matrix
volumes:
# Mount the Sygnal config file
- ./sygnal.yaml:/sygnal.yaml
# Mount the generated private key to the path specified in sygnal.yaml
- ./sygnal_private_key.pem:/data/private_key.pem
# Create a volume for any other data Sygnal might store
- sygnal_data:/data
command: ['--config-path=/sygnal.yaml']
volumes:
caddy_data:
sygnal_data:
networks:
matrix:
driver: bridge
Step 5: Launch the Services
Your directory /opt/matrix-sygnal
should now look like this:
/opt/matrix-sygnal/
├── Caddyfile
├── docker-compose.yml
├── Dockerfile
├── .env
├── sygnal.yaml
└── sygnal_private_key.pem
Now, you can build and run everything with a single command:
cd /opt/matrix-sygnal
sudo docker-compose up --build -d
--build
tells Docker Compose to build the Caddy image from yourDockerfile
.-d
runs the containers in detached mode (in the background).
To check the status and logs:
# See if containers are running
sudo docker-compose ps
# View the live logs for both services
sudo docker-compose logs -f
# View logs for a specific service (e.g., caddy)
sudo docker-compose logs -f caddy
Caddy will automatically start, obtain an SSL certificate for sygnal.your-domain.com
, and begin proxying requests to the Sygnal container.
Step 6: Client Configuration
The final step is to configure your Matrix client to use your new push gateway. In Cinny, for example, you would modify its config.json
or use a homeserver that advertises these settings.
Update the pushNotificationDetails
section with the information from your server:
"pushNotificationDetails": {
"pushNotifyUrl": "https://sygnal.your-domain.com/_matrix/push/v1/notify",
"vapidPublicKey": "YOUR_VAPID_PUBLIC_KEY_FROM_STEP_3.1",
"webPushAppID": "cc.cinny.web"
}
pushNotifyUrl
: The public URL of your new Sygnal instance.vapidPublicKey
: The public key you generated in step 3.1.webPushAppID
: The application ID you defined in yoursygnal.yaml
. This must match exactly.
After configuring your client, it will register for push notifications with your Sygnal instance, which will then handle delivering them.