-
-
Notifications
You must be signed in to change notification settings - Fork 3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Subdomain Gateway #6498
Labels
topic/gateway
Topic gateway
Comments
This was referenced Jul 11, 2019
Notes from 1:1 with @Stebalien:
Update: I proposed some solutions in #6096 (comment) |
First step: libp2p/go-libp2p-core#41 |
9 tasks
This was referenced Dec 6, 2019
This was referenced Jan 9, 2020
4 tasks
20 tasks
This was referenced Feb 7, 2022
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Context
Base32-encoded CIDv1 can be used in DNS as a subdomain label:
It provides unique Origin per CID and enables websites to get a valid origin-based security perimeter for free.
Examples of "Subdomain Gateways" in production:
How it works today? What is missing?
Right now HTTP Gateway exposed by go-ipfs does not support HTTP requests for hostnames that match
<cidv1b32>.ipfs.*
– all existing subdomain gateways implement CID conversion and path redirect in Nginx (config example) or other reverse proxy running in front of go-ipfs.Support requests with
Host: <cidv1b32>.ipfs.*
go-ipfs already supports DNSLink. We need it to also support HTTP requests for hostnames that match
<cidv1b32>.ipfs.*
. It would enable people to run subdomain gateways without the need for running reverse proxy.Assuming go-ipfs is running a gateway on
localhost:8080
, below should work:Related
http://<cidv1b32>.ipfs.localhost
: Act as HTTP PROXY for http://<cidv1b32>.ipfs.localhost #5982The text was updated successfully, but these errors were encountered: