You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Also, once the letsencrypt stuff is testable I'd be happy to let you use the dyndns service I run for daplie, or create a copy of it for caddyserver.com so that a person that wants to quickly share a file with a friend could get a dyndns address with a valid https certificate and privately share the file over the starbucks wifi.
None of the tutorials (except mine) are correct. They all have you serving a Root CA instead of a Server CRT, which leads to nasty problems with curl like UNABLE_TO_VERIFY_LEAF_SIGNATURE.
What if Caddy generated a self-signed cert (and key) when it started and kept it just in memory (no need to write it out to a file, since it's just for local dev). It doesn't solve the first issue of the browser security warnings, but it's still an excellent step forward. And it could even generate the cert properly to avoid that curl error you mentioned.
Thanks for the offer with Daplie; I'll take a look and consider it.
I'd like to suggest bundling HTTPS certs to use for local development.
Here are some free ones, but you could take the $12 plunge and make a similar setup just for caddy.
https://github.com/Daplie/localhost.daplie.com-certificates
Also, once the letsencrypt stuff is testable I'd be happy to let you use the dyndns service I run for daplie, or create a copy of it for caddyserver.com so that a person that wants to quickly share a file with a friend could get a dyndns address with a valid https certificate and privately share the file over the starbucks wifi.
Something like https://lucky-duck-42.dapliedns.com:2015/
The text was updated successfully, but these errors were encountered: