mirror of
https://github.com/mmatczuk/go-http-tunnel.git
synced 2026-05-15 14:16:17 -06:00
[GH-ISSUE #107] Using Wildcard Let's Encrypt certificates with go-http-tunnel #58
Labels
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: github-starred/go-http-tunnel#58
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @1ubuntuuser on GitHub (Nov 5, 2019).
Original GitHub issue: https://github.com/mmatczuk/go-http-tunnel/issues/107
HTTP/2 from end to end is AMAZING. Although having my own self-signed certificates is fine for setting up, don't really want to tell those visiting my webui they have to accept a dodgy-looking certificate.
My next move was to use a certbot with the "certonly" flag to create some nice wildcard certificates authenticated with my domain. Done!
Only issue is, I know let's encrypt certificates expire. Will I have to recreate all my client certificates every time I renew the wildcard certificate?
In an ideal world, I would use my own self signed certificate from client to server and use the officially signed certificate from server to web browser. Not sure if that's possible though.
Any help would be much appreciated!