DockFlare v1.8.5: Enhanced TLS Control with Origin Server Name (SNI) Support #92
ChrispyBacon-dev
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
DockFlare v1.8.5: Enhanced TLS Control with Origin Server Name (SNI) Support
This release introduces a key enhancement for configuring Cloudflare Tunnel ingress rules: support for Origin Server Name (SNI). This provides users with more granular control over TLS connections to their origin services.
✨ New Features
originServerName
for an ingress rule. This allows DockFlare to instruct Cloudflare to use a specific Server Name Indication (SNI) during the TLS handshake with the origin service. This is particularly useful when the origin service is behind a reverse proxy, hosts multiple sites on one IP, or expects a specific hostname for its TLS certificate.cloudflare.tunnel.<index>.originsrvname=<value>
(orcloudflare.tunnel.originsrvname=<value>
for non-indexed default) label.labels: ["cloudflare.tunnel.0.originsrvname=internal.service.local"]
🔧 Improvements & Internal Changes
managed_rules
) now stores theorigin_server_name
for each rule configuration.originRequest
object in the Cloudflare tunnel configuration payload is now correctly constructed to includenoTLSVerify
andoriginServerName
as needed. Comparison logic for detecting changes has also been updated.docker_handler.py
(for new containers) andreconciler.py
(for existing containers during reconciliation) have been updated to parse and process the neworiginsrvname
label.ui_add_manual_rule_route
) now processes and stores theorigin_server_name
from the UI form.main.js
has been enhanced to dynamically show/hide the "Origin Server Name" input field in the manual rule modal based on the selected service type (HTTP/HTTPS).docker_handler.py
by removing a duplicate, simpler definition of theis_valid_service
function, ensuring the more robust regex-based validation is used.📝 Notes
originServerName
setting is most effective forhttp
andhttps
service types. While it can be set for other types, Cloudflare may ignore it if a TLS handshake to the origin is not part of its standard proxying behavior for that protocol.dockflare:v1.8.5
ordockflare:latest
to use these new features.This discussion was created from the release DockFlare v1.8.5: Enhanced TLS Control with Origin Server Name (SNI) Support.
Beta Was this translation helpful? Give feedback.
All reactions