Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Prevent the Use of Let's Encrypt for Certificate Generation #1123

Open
siddjellali opened this issue Dec 4, 2024 · 1 comment
Open

Prevent the Use of Let's Encrypt for Certificate Generation #1123

siddjellali opened this issue Dec 4, 2024 · 1 comment
Labels
enhancement New feature or request

Comments

@siddjellali
Copy link

siddjellali commented Dec 4, 2024

Description:

I’m experiencing an issue with using Let's Encrypt as the certificate provider in my setup. I use Traefik as a reverse proxy to manage TLS certificates, but I’m getting a TLS error because Caddy starts without a valid certificate when deployed using the Helm Chart.

In my Docker Compose setup, a tls internal option was added to Caddy, which resolved the issue. Is it possible to add a similar tls internal option to the Helm Chart to ensure that Caddy can start properly without relying on Let's Encrypt? This would also prevent conflicts with Traefik.

Steps to Reproduce:

  • Deploy the application using the Helm Chart with Caddy.
  • Configure Traefik as the reverse proxy to handle TLS certificates.
  • Observe that Caddy starts without a valid certificate, resulting in a TLS error.

Expected Result:

Caddy should use an internal TLS configuration (tls internal) to avoid the error and integrate correctly with Traefik.

Environment:

  • Reverse Proxy: Traefik
  • Deployment: Helm Chart
  • Specific Configurations: TLS certificate management via Traefik

Proposed Solutions:

  1. Add an option to the Helm Chart to enable a tls internal setting for Caddy, similar to the Docker Compose configuration.
  2. Add an option to disable Caddy completely and expose the frontend service directly, allowing Traefik to manage reverse proxying and TLS certificates without conflicts.
@ab-smith ab-smith added the enhancement New feature or request label Dec 4, 2024
@siddjellali
Copy link
Author

Hi,

It's not exactly the same issue.
Can we propose something to disable caddy ?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants