@@ -52,18 +52,23 @@ When hosting a **public instance** that others will use, please follow these ess
5252
5353### HTTPS
5454
55- Setting up HTTPS is crucial for any public instance. Follow these steps:
56-
57- 1 . ** Obtain SSL certificates** using [ Let's Encrypt] ( https://letsencrypt.org/ ) with [ Certbot] ( https://certbot.eff.org/ )
58- 2 . ** Configure your reverse proxy** to handle SSL termination
59- 3 . ** Redirect all HTTP traffic** to HTTPS automatically
60- 4 . ** Test your setup** using tools like [ SSL Labs] ( https://www.ssllabs.com/ssltest/ )
61-
62- For detailed implementation guides, see:
63-
64- - [ Nginx SSL configuration] ( https://docs.nginx.com/nginx/admin-guide/security-controls/terminating-ssl-http/ )
65- - [ Apache SSL setup] ( https://httpd.apache.org/docs/2.4/ssl/ssl_howto.html )
66- - [ Cloudflare SSL/TLS settings] ( https://developers.cloudflare.com/ssl/ )
55+ For most deployments we recommend ** Caddy** as the default reverse proxy. Its
56+ [ Automatic HTTPS] ( https://caddyserver.com/docs/automatic-https ) feature handles
57+ certificate issuance, renewal, and HTTP→HTTPS redirects with almost zero
58+ configuration, making it ideal for quickly hardening html2rss-web instances.
59+
60+ If you need tighter integration with container orchestration, ** Traefik** is an
61+ excellent alternative. Follow the official
62+ [ Traefik ACME guide] ( https://doc.traefik.io/traefik/https/acme/ ) to enable
63+ automatic certificates using Let's Encrypt while keeping dynamic routing and
64+ Docker auto-discovery.
65+
66+ > ** Other options:** Prefer nginx, Cloudflare, or another edge provider? Stick to
67+ > their upstream tutorials such as the
68+ > [ nginx TLS termination guide] ( https://docs.nginx.com/nginx/admin-guide/security-controls/terminating-ssl-http/ )
69+ > and [ Cloudflare SSL/TLS docs] ( https://developers.cloudflare.com/ssl/ ) . These
70+ > tools offer robust HTTPS setups when configured per their official
71+ > documentation.
6772
6873## Quick Docker Setup
6974
0 commit comments