-
Notifications
You must be signed in to change notification settings - Fork 160
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
nginx: separate cert paths from server_name #814
Conversation
Working on getodk#809 I noticed that the location of SSL certs is based either on the domain name, or on the method of supply of SSL certs. Cert provision approach should probably not affect the nginx "server_name" setting. Also, the old variable name `CNAME` (short for "certificate name?") is easily confused with the DNS concept of CNAME records ("canonical names").
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Makes sense!
I, for one, was confused by seeing the term CNAME.
at the time, I cursorily concluded "they probably call it cname as it's maybe DNS CNAMEs with which they do vanity domains for cloud ODK or somesuch so at some point it made sense to call this variable cname as it's where the cname record's label happened to go" 😆 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't know why I called it CNAME. The change looks good to me.
You didn't introduce the original |
Working on #809 I noticed that the location of SSL certs is based either on the domain name, or on the method of supply of SSL certs.
Cert provision approach should probably not affect the nginx "server_name" setting.
Also, the old variable name
CNAME
(short for "certificate name?") is easily confused with the DNS concept of CNAME records ("canonical names") (https://en.wikipedia.org/wiki/CNAME_record).What has been done to verify that this works as intended?
Ran tests.
Why is this the best possible solution? Were any other approaches considered?
It may not be - there may be a subtle reason for the current use and/or naming of
CNAME
.How does this change affect users? Describe intentional changes to behavior and behavior that could have accidentally been affected by code changes. In other words, what are the regression risks?
Behaviour that may have accidentally been affected:
Servers with
SSL_TYPE
="customssl"
may have their nginxserver_name
changed. This is probably a positive change - currently it has no effect, but will do once #809 is merged.Does this change require updates to documentation? If so, please file an issue here and include the link below.
It should not.
Before submitting this PR, please make sure you have:
next
branch OR only changed documentation/infrastructure (master
is stable and used in production)