Skip to content

Conversation

@pierrecnalb
Copy link

In the opencloud documentation for both docker compose, and external-proxy the INSECURE_MODE is simply disabled and not set to false.
This makes both COLLABORATION_APP_INSECURE and COLLABORATION_CS3API_DATAGATEWAY_INSECURE set to true. I don't know enough about wopiserver and collabora to know if this is legitimate or not, but it feels wrong to me to use insecure mode for production servers...
If that's legitimate, maybe adding a comment would help understanding why insecure is fine.

In the [documentation](https://docs.opencloud.eu/docs/admin/getting-started/container/docker-compose/docker-compose-base#disable-insecure-mode) the INSECURE_MODE is simply disabled and not set to false.
This makes collabora using insecure connection, even when behind an external proxy.
@micbar
Copy link
Contributor

micbar commented Dec 15, 2025

Honestly, that needs to be tested. A lot of services in the opencloud internal service mesh are using TLS with a self signed certificate. That is what all that is about.

We want to use TLS internally too, but it is not so critical to have a self signed certificate. The "outside world" gets a valid certificate via the reverse proxy. Doing this also internally would make maintenance more complicated because we would need a offlie Root CA.

@butonic @rhafer what do you think?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants