-
Notifications
You must be signed in to change notification settings - Fork 316
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for Caddy-style Automatic HTTPS to pd
#1406
Comments
Rough notes on how we could combine
https://docs.rs/rustls-acme/0.5.1/rustls_acme/#high-level-api The result is a |
Removing from testnet milestone, in favor of #1886, which is the parent epic. Will continue to pull subtickets from that epic. |
Closed by #1406 |
Is your feature request related to a problem? Please describe.
Following #1405, we have a way for
pd
to serve TLS connections with HTTPS, using user-managed certificates. This is good to get started, and is useful for deployment environments that have some tooling for certificate management (e.g., cloud infrastructure with cert tooling), but doesn't help much for individual or development deployments.Describe the solution you'd like
pd
should have support for Caddy-style Automatic HTTPS, and it should always use HTTPS for all RPC endpoints, in the same way Caddy does: self-signed certs forlocalhost
, and Let's Encrypt for public DNS names.To support ACME, we can use a library like https://crates.io/crates/rustls-acme
Additional context
We'll also want to have TLS support for
pviewd
, but that could be done separately, because there's a different trust and threat model --pviewd
has secret data, so the transport security story should include authentication.The text was updated successfully, but these errors were encountered: