mirror of
https://github.com/NginxProxyManager/nginx-proxy-manager.git
synced 2026-04-25 17:35:52 +03:00
[GH-ISSUE #24] New option to support upstream self signed ssl connections #23
Labels
No labels
awaiting feedback
bug
cannot reproduce
dns provider request
duplicate
enhancement
enhancement
enhancement
good first issue
help wanted
invalid
need more info
no certbot plugin available
product-support
pull-request
question
stale
troll
upstream issue
v2
v2
v2
v3
wontfix
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/nginx-proxy-manager-NginxProxyManager#23
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @jc21 on GitHub (Nov 4, 2018).
Original GitHub issue: https://github.com/NginxProxyManager/nginx-proxy-manager/issues/24
Some upstream hosts only provide a SSL connection and they are sometimes using self signed certificates (EdgeOS is one such example).
Would be nice to have an option to specify that the upstream is SSL and the nginx proxy would ignore certificate errors because the server should be in control of the user who's creating the reverse proxy.
In most cases this means that the Proxy Host setup requires SSL as well and the added benefit here is that the edge host will be using a certified certificate at all times, regardless of what the upstream host has.
@sh4444dow commented on GitHub (Dec 12, 2018):
That feature is definetely needed in a bunch of situations. I even considered to produce a pull request concerning this feature. Did you start to implement it ?
Sincerely,
@sh4444dow
@jc21 commented on GitHub (Dec 12, 2018):
No not yet. I left this note for myself to get to later. Give me a couple of days and I'll see if I have time to put it in quickly.
@sh4444dow commented on GitHub (Dec 13, 2018):
Okay =) If I'm not mistaken, this enhancement note is strongly related to #34 issue. I link it just for reminder.
Sincerely,
@sh4444dow
@jc21 commented on GitHub (Jan 3, 2019):
Added in v2.0.7