-
-
Notifications
You must be signed in to change notification settings - Fork 3.6k
Support HTTPS for custom domains #2652
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Here's SquareSpace's write up of how they did it: https://engineering.squarespace.com/blog/2016/implementing-ssl-tls-for-all-squarespace-sites |
And one more for good measure :-) https://www.digitalgov.gov/2016/09/07/lets-encrypt-those-cnames-shall-we/ |
Just occurred to me that Caddy (https://caddyserver.com/) can be used as an automatically-adding-tls-reverse-proxy. |
We've been wanting to add letsencrypt support for a while. We have an idea of how it would all come together, and this is on our list of features we'll implement as soon as it makes sense financially. We're hoping sometime in the first half of this year perhaps? This will probably be an equal amount of effort on the code and on the operations side. We have too much logic built in to nginx currently, we wouldn't swap that out, but perhaps running a secondary service for This all goes back to #328, but I think letsencrypt is the best way we have of solving this problem. |
Awesome! Hopefully some of the links I dropped in here proved useful.
…On Mon, Feb 20, 2017 at 12:38 PM, Anthony ***@***.***> wrote:
We've been wanting to add letsencrypt support for a while. We have an idea
of how it would all come together, and this is on our list of features
we'll implement as soon as it makes sense financially. We're hoping
sometime in the first half of this year perhaps?
This will probably be an equal amount of effort on the code and on the
operations side. We have too much logic built in to nginx currently, we
wouldn't swap that out, but perhaps running a secondary service for
/.well-known/ serving would be fine. There are a number of issues that
we'd have to overcome operationally, such as how to keep our web cluster
certs in sync, how nginx handles the certs, etc. These all have solutions,
but the changes are still significant.
This all goes back to #328
<#328>, but I think
letsencrypt is the best way we have of solving this problem.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#2652 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AAADBIqN4m2LUcdCz40O_bqMxzwSxBBLks5rec-cgaJpZM4MFUIF>
.
--
"I disapprove of what you say, but I will defend to the death your right to
say it." -- Evelyn Beatrice Hall (summarizing Voltaire)
"The people's good is the highest law." -- Cicero
GPG Key fingerprint: D1B3 ADC0 E023 8CA6
|
GitHub seems to be slowly rolling out HTTPS support for GitHub Pages, also using Let's Encrypt. See isaacs/github#156 (comment) and the rest of that thread. Would love to see HTTPS support for RTD custom domains as well! |
(GitHub just announced official support for HTTPS for GitHub Pages served at custom domains. See https://twitter.com/github/status/991366832421523456) |
@rmzelle, this is on our roadmap. I see a 5 step roadmap toward HTTPS everywhere on docs sites on RTD. Here's an outline: #3282 (comment). Here's a PR for step 1: #3987. If you are interested in getting involved, you can start by reviewing the PRs in this area starting with #3987 or if you want to work on this part (step 3 as I see it), that's fantastic! I am specifically very interested and actively working toward HTTPS everywhere on RTD but I will take all the help I can get. |
To give a small update here, I'm working with Cloudflare to make this a reality. If all goes well, I'd say it's 2 weeks out. |
I wouldn't quite call this "done" but as of today Cloudflare is issuing SSL certificates for custom domains hosted by us. Our CNAME support has been around a long time so there are still a lot of domains pointing to There are also folks hosting docs at top level domains (eg. cryptography.io) and I haven't quite worked through how that will work. |
FWIW, cryptography.io's DNS points at a reverse proxy we run, so that's may
be a distinct case. (Let us know if we can be helpful!)
…On Tue, Jul 17, 2018 at 4:46 PM David Fischer ***@***.***> wrote:
I wouldn't quite call this "done" but as of today Cloudflare is issuing
SSL certificates for custom domains hosted by us.
Our CNAME support
<https://docs.readthedocs.io/en/latest/alternate_domains.html#cname-support>
has been around a long time so there are still a lot of domains pointing to
readthedocs.org instead of readthedocs.io. I'm working through some
issues but eventually I hope that I can issue certificates for domains with
the old setup. In the meantime, pointing the CNAME to readthedocs.io
should do it.
There are also folks hosting docs at top level domains (eg.
cryptography.io) and I haven't quite worked through how that will work.
—
You are receiving this because you authored the thread.
Reply to this email directly, view it on GitHub
<#2652 (comment)>,
or mute the thread
<https://github.com/notifications/unsubscribe-auth/AAADBISQ-ujiLnpH3JrS7o57aJ14R0FHks5uHlsvgaJpZM4MFUIF>
.
--
All that is necessary for evil to succeed is for good people to do nothing.
|
True. I used it as an example and it wasn't an ideal example. |
Apparently having a CNAME to readthedocs.io now results in a Error 1014: CNAME Cross-User Banned if the user itself uses cloudflare too. I've been using cloudflare to http proxy to readthedocs.io to have custom domain with HTTPS, and because apparently it's now user cloudflare too, my domain is banned. |
@desertkun please see #4395 |
Do you have a rough estimate for when http->https redirection will be enabled? |
It looks like this is the case for our site:
However, Firefox reports for https://docs.citationstyles.org/en/stable/:
|
Also it might be worth mentioning in the docs is need to adjust CAA if domain has one, see https://support.cloudflare.com/hc/en-us/articles/115000310832-Certification-Authority-Authorization-CAA-FAQ |
Good idea. |
Do we have any options to make We can inject JS redirect but it's not good for search engines. |
@ivankravets, I am going to start with 302s but redirects are coming. |
@davidfischer Thank you so much for the fast response. Do you have any ETA? Will we have some checkbox in UI/Admin part? |
I don't have an ETA right now. There will be a checkbox in the admin. That's actually merged already and will go live at the next deploy. See #4483. |
There is a checkbox in the admin now. |
@davidfischer do you have any ideas why it does not redirect from http://docs.platformio.org to https://docs.platformio.org? However, it redirects from "nested" pages. P.S: I enabled HTTPS for docs.platformio.org |
There are no redirects in place for custom domains. Right now, all that checkbox does is make all the "view docs" links anywhere on Read the Docs an HTTPS link. The plan is to use that checkbox to do HTTPS redirects but that is not in place today. |
Hi, Cloudflare: rtd: But still this address http://omidraha.com is not automatically forced to https://omidraha.com |
@omidraha please see #2652 (comment) |
I'm going to close up this issue, as we do now support custom domains through Cloudflare now. If you are hitting any issues with custom domains, be sure to open up a new ticket! |
Is there an issue that's tracking work toward automatic HTTPS redirects? Sorry if I missed it, but did a search and didn't turn up something specific. Thanks again for enabling HTTPS support for custom-domain projects, I'm excited to be able to push all traffic that direction for our stuff! |
@stsewd ohhhhhhh. Haha, thank you! Apparently "https" isn't a particularly useful search term across GitHub issues. |
It'd be great if RTD supported HTTPS when using a custom domain. Once upon a time this would have been difficult and expensive, however nowadays with SNI and Lets Encrypt I think this is possible -- providers like SquareSpace and Wordpress have demonstrated this.
Here's how it could work:
/.well-known/*
from all RTD sites to a special validation serverfoo.com
, look up that cert and server it if it's a RTD siteHopefully that makes sense!
The text was updated successfully, but these errors were encountered: