Replies: 4 comments 4 replies
-
Yes it's possible, we still lack any documentation about this at the moment. events {
worker_connections 1024;
}
http {
server {
server_name your_public_hostname;
listen 443 ssl;
http2 on;
ssl_certificate /etc/certs/server.crt;
ssl_certificate_key /etc/certs/server.key;
location ~ ^/protobuf.+ {
client_max_body_size 0;
grpc_read_timeout 30s;
grpc_send_timeout 30s;
grpc_socket_keepalive on;
grpc_pass grpc://127.0.0.1:8010;
break;
}
location / {
proxy_pass http://127.0.0.1:8009;
}
}
} |
Beta Was this translation helpful? Give feedback.
-
Thx It works perfectly. |
Beta Was this translation helpful? Give feedback.
-
Hi Sandro So by default port 8010 remains unencrypted and the encryption layer it's a job for an external layer ( in our case nginx). grpc_url = "https://hoop.foobar.it:443", and i've seen on the config.toml i've also this: InsecureGRPC = false So I assume agent traffic it's going encrypted. So afaik to recap:
Thx for your support. |
Beta Was this translation helpful? Give feedback.
-
Thx. To reduce the overlays i've disabled the docker-proxy in order to let nginx connect directly to the hoop.dev services. Thx again |
Beta Was this translation helpful? Give feedback.
-
Hi
I've seen by default the web ui (8009 port) have not ssl enabled.
How to enable it ? or even more is it possible to put a reverse proxy in front of hoop gateway in order to terminate ssl on it ?
Thx
Beta Was this translation helpful? Give feedback.
All reactions