DockFlare v1.8.5: Enhanced TLS Control with Origin Server Name (SNI) Support #92
ChrispyBacon-dev
announced in
Announcements
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
DockFlare v1.8.5: Enhanced TLS Control with Origin Server Name (SNI) Support
This release introduces a key enhancement for configuring Cloudflare Tunnel ingress rules: support for Origin Server Name (SNI). This provides users with more granular control over TLS connections to their origin services.
✨ New Features
originServerNamefor an ingress rule. This allows DockFlare to instruct Cloudflare to use a specific Server Name Indication (SNI) during the TLS handshake with the origin service. This is particularly useful when the origin service is behind a reverse proxy, hosts multiple sites on one IP, or expects a specific hostname for its TLS certificate.cloudflare.tunnel.<index>.originsrvname=<value>(orcloudflare.tunnel.originsrvname=<value>for non-indexed default) label.labels: ["cloudflare.tunnel.0.originsrvname=internal.service.local"]🔧 Improvements & Internal Changes
managed_rules) now stores theorigin_server_namefor each rule configuration.originRequestobject in the Cloudflare tunnel configuration payload is now correctly constructed to includenoTLSVerifyandoriginServerNameas needed. Comparison logic for detecting changes has also been updated.docker_handler.py(for new containers) andreconciler.py(for existing containers during reconciliation) have been updated to parse and process the neworiginsrvnamelabel.ui_add_manual_rule_route) now processes and stores theorigin_server_namefrom the UI form.main.jshas been enhanced to dynamically show/hide the "Origin Server Name" input field in the manual rule modal based on the selected service type (HTTP/HTTPS).docker_handler.pyby removing a duplicate, simpler definition of theis_valid_servicefunction, ensuring the more robust regex-based validation is used.📝 Notes
originServerNamesetting is most effective forhttpandhttpsservice types. While it can be set for other types, Cloudflare may ignore it if a TLS handshake to the origin is not part of its standard proxying behavior for that protocol.dockflare:v1.8.5ordockflare:latestto use these new features.This discussion was created from the release DockFlare v1.8.5: Enhanced TLS Control with Origin Server Name (SNI) Support.
Beta Was this translation helpful? Give feedback.
All reactions