-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Certificate order in proxy #16
Comments
I think you could achieve this with the newly added |
I don't think that Instead:
it could be:
The logic could be to split a domain by colon ( I haven't explored the code in detail so I'm not sure whether that's doable or, to be more precise, a lot of work. |
The @vfarcic: My feature request is when there are multiple certificates, in I hope you understand. |
Ahh, got it! Thanks for the explanation. |
Sorry for neglecting this project so long. Some family and health issues... I will try to add this in the next days. To be honest I do not expect that you are still using this companion (Issue was created 6 months ago) but the idea is still great. I am also eagerly waiting for the acme v2 certbot release, which will add wildcard certificates https://letsencrypt.org/2017/07/06/wildcard-certificates-coming-jan-2018.html |
@morsik If you are still interesting, you could try hamburml/docker-flow-letsencrypt:testing. The certificate of
|
Hi.
I configured 4 certificates in docker-flow-letsencrypt env variable. Everything went fine, certs were created, proxy was reconfigured. Nice.
But when I enter my site which doesn't have certificate HAproxy returns first certificate from it's list, and it's list is generated alphabetically.
Like that (of course
cert-di
is real domain):Problem is: my very simple infrastructure is hosted under domain
cert-op
so I want to expose this certificate (even it'll fail in every browser) as default and not leakcert-di
which is one site from some user.This could be achieved in easy mapping (order of domains like I have in this example):
DOMAIN_1
→/certs/01-cert-op.combined.pem
DOMAIN_2
→/certs/02-cert-di.combined.pem
DOMAIN_3
→/certs/03-cert-os.combined.pem
DOMAIN_4
→/certs/04-cert-dr.combined.pem
With this, docker-flow-proxy will generate config in different order, and
cert-op
will be exposed as default certificate.The text was updated successfully, but these errors were encountered: