indobase uses Let's Encrypt to auto-generate TLS certificates for your indobase instance to ensure your API traffic is appropriately encrypted. For indobase to properly generate certificates, a few conditions need to be met.
- You need to use a public-facing domain with a known TLD pointing to your indobase instance.
- Your
_APP_ENVenvironment variable should be set for production mode. The default Indobase setup comes with this predefined setting, so you should be OK unless you change it. - You need to ensure you have a valid email address set on
_APP_SYSTEM_SECURITY_EMAIL_ADDRESS. The default setup comes withcerts@appwrite.ioas the default value. While this address will work, it's recommended to change it to your own email. - Currently, indobase is using the ACME HTTP challenge to issue an TLS certificate. This forces us to generate certificates for port 443 when the challenge itself is performed on port 80. At this point, other ports will not work. To overcome this limit, you can set indobase on a separate sub-domain or use your own certificate or proxy server in front of indobase.
Debugging
If you're still struggling with your certificates, check the indobase certificates worker log. You can do that with the following command:
docker compose logs indobase-worker-certificates
Generation cycle
indobase auto-generates a certificate for your main domain when you first visit it. If your browser shows an insecure connection warning, you must proceed to trigger certificate generation. The domain in environment variable _APP_DOMAIN is considered your main domain. If you didn't set this variable, the first domain you visit would be marked as the main domain for your indobase instance. indobase follows this concept of the main domain to prevent generating certificates for domains you don't own. Keep in mind that you can always add additional domains as Custom Domains in your project settings to enable certificate generation for any domain.
Certificate renewal is done as a part of the indobase maintenance task. Unless modified with environment variable _APP_MAINTENANCE_INTERVAL, this task runs every 24 hours. During this task, indobase looks for certificates due for renewal and renews them. One maintenance cycle only attempts to renew up to 200 certificates to respect the Let's Encrypt API limit. Every Let's Encrypt certificate is valid for 90 days, but indobase starts to renew them 30 days before the expiration.
Manual generation
Since indobase generates and renews certificates automatically, a manual generation is seldom required. A manual generation can be useful when you hit the API limit and don't want to wait for the next maintenance cycle to renew the certificate. Use the following command to generate a certificate for your main domain:
docker compose exec indobase ssl
If you want to generate a certificate for a specific domain, pass it as a parameter into the command:
docker compose exec indobase ssl domain="api.myapp.com"
Development and localhost
You can't issue a signed certificate for localhost. This is because nobody uniquely owns that hostname and not an indobase specific limitation, just the way the internet works. By default, indobase will issue a self-signed certificate that is good enough for development.
When using a self-signed certificate, you should enable client.setSelfSigned() method in your SDK of choice. This will allow your application to trust and connect with your local indobase server.
Applying changes
After editing your docker-compose.yml or .env files, you will need to recreate your indobase stack by running the following compose command in your terminal.
docker compose up -d
You can verify if the changes have been successfully applied by running this command:
docker compose exec indobase vars