HTTP and HTTPS
Variants of how to use fylr with and without TLS certificate
Automated HTTPS Certificate
fylr+:
externalURL: "https://database.example.com"
services+:
webapp+:
addr: ":443"
tls:
# forwardHttpAddr defines an address a http listener is started
# to forward requests to fylr.services.webapp.addr, the (port of the)
# webserver.
#forwardHttpAddr: "" # if letsencrypt: use port 443 for letsencrypt challenge_type=tls-alpn-01
forwardHttpAddr: ":80" # use port 80 (and if letsencrypt: for letsencrpyt challenge_type=http-01)
letsEncrypt:
# use your email address, example.com will we rejected by Letsencrypt
email: [email protected]
# Highly recommended: use useStagingCA: true until you successfully got a
# certificate. (Which means: no connection problems) Then set it to false
# and get a real certificate by restarting fylr.
# useStagingCA sets the staging server of Let's Encrypt which has a higher
# quota than the production server. However, these certificates are for
# testing purposes only. They are not signed for official use, so browser
# will recognise them as being insecure.
useStagingCA: false
# Optional: get additional certificates for the given domains.
additionalDomains:
- "www.database.example.com"
api+:
oauth2Server+:
clients+:
fylr-web-frontend+:
redirectURIs:
- https://database.example.com/oauth2/callbackYou provide the HTTPS certificate
You provide the service that does HTTPS
No HTTPS
No HTTPS and domain is localhost
Further reading
Last updated