Running Your Flask Application Over HTTPS

Posted by
on under

While you work on your Flask application, you normally run the development web server, which provides a basic, yet functional WSGI complaint HTTP server. But eventually you will want to deploy your application for production use, and at that time, one of the many things you will need to decide is if you should require clients to use encrypted connections for added security.

People ask me all the time about this, in particular how to expose a Flask server on HTTPS. In this article I'm going to present several options for adding encryption to a Flask application, going from an extremely simple one that you can implement in just five seconds, to a robust solution that should give you an A+ rating like my site gets from this exhaustive SSL analysis service.

SSL

How Does HTTPS Work?

The encryption and security functionality for HTTP is implemented through the Transport Layer Security (TLS) protocol. Basically put, TLS defines a standard way to make any network communication channel secure. Since I'm not a security expert, I don't think I can do a great job if I try to give you a detailed description of the TLS protocol, so I will just give you some of the details that are of interest for our purpose of setting up a secure and encrypted Flask server.

The general idea is that when the client establishes a connection with the server and requests an encrypted connection, the server responds with its SSL Certificate. The certificate acts as identification for the server, as it includes the server name and domain. To ensure that the information provided by the server is correct, the certificate is cryptographically signed by a certificate authority, or CA. If the client knows and trusts the CA, it can confirm that the certificate signature indeed comes from this entity, and with this the client can be certain that the server it connected to is legitimate.

After the client verifies the certificate, it creates an encryption key to use for the communication with the server. To make sure that this key is sent securely to the server, it encrypts it using a public key that is included with the server certificate. The server is in possession of the private key that goes with that public key in the certificate, so it is the only party that is able to decrypt the package. From the point when the server receives the encryption key all traffic is encrypted with this key that only the client and server know.

From this summary you can probably guess that to implement TLS encryption we need two items: a server certificate, which includes a public key and is signed by a CA, and a private key that goes with the public key included in the certificate.

The Simplest Way To Do It

Flask, and more specifically Werkzeug, support the use of on-the-fly certificates, which are useful to quickly serve an application over HTTPS without having to mess with certificates. All you need to do, is add ssl_context='adhoc' to your app.run() call. As an example, below you can see the "Hello, World" Flask application from the official documentation, with TLS encryption added:

from flask import Flask
app = Flask(__name__)

@app.route("/")
def hello():
    return "Hello World!"

if __name__ == "__main__":
    app.run(ssl_context='adhoc')

This option is also available through the Flask CLI if you are using a Flask 1.x release:

$ flask run --cert=adhoc

To use ad hoc certificates with Flask, you need to install an additional dependency in your virtual environment:

$ pip install pyopenssl

When you run the script (or start with flask run if you prefer), you will notice that Flask indicates that it is running an https:// server:

$ python hello.py
 * Running on https://127.0.0.1:5000/ (Press CTRL+C to quit)

Simple, right? The problem is that browsers do not like this type of certificate, so they show a big and scary warning that you need to dismiss before you can access the application. Once you allow the browser to connect, you will have an encrypted connection, just like what you get from a server with a valid certificate, which make these ad hoc certificates convenient for quick & dirty tests, but not for any real use.

Self-Signed Certificates

A so called self-signed certificate is one where the signature is generated using the private key that is associated with that same certificate. I mentioned above that the client needs to "know and trust" the CA that signed a certificate, because that trust relationship is what allows the client to validate a server certificate. Web browsers and other HTTP clients come pre-configured with a list of known and trusted CAs, but obviously if you use a self-signed certificate the CA is not going to be known and validation will fail. That is exactly what happened with the ad hoc certificate we used in the previous section. If the web browser is unable to validate a server certificate, it will let you proceed and visit the site in question, but it will make sure you understand that you are doing it at your own risk.

SSL

But what is the risk, really? With the Flask server from the previous section you obviously trust yourself, so there is no risk to you. The problem is when users are presented with this warning when connecting to a site they do not directly know or control. In those cases, it is impossible for the user to know if the server is authentic or not, because anyone can generate certificates for any domain, as you will see below.

While self-signed certificates can be useful sometimes, the ad hoc certificates from Flask are not that great, because each time the server runs, a different certificate is generated on the fly through pyOpenSSL. When you are working with a self-signed certificate, it is better to have the same certificate used every time you launch your server, because that allows you to configure your browser to trust it, and that eliminates the security warnings.

You can generate self-signed certificates easily from the command line. All you need is to have openssl installed:

openssl req -x509 -newkey rsa:4096 -nodes -out cert.pem -keyout key.pem -days 365

This command writes a new certificate in cert.pem with its corresponding private key in key.pem, with a validity period of 365 days. When you run this command, you will be asked a few questions. Below you can see in red how I answered them to generate a certificate for localhost:

Generating a 4096 bit RSA private key
......................++
.............++
writing new private key to 'key.pem'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:US
State or Province Name (full name) [Some-State]:Oregon
Locality Name (eg, city) []:Portland
Organization Name (eg, company) [Internet Widgits Pty Ltd]:Miguel Grinberg Blog
Organizational Unit Name (eg, section) []:
Common Name (e.g. server FQDN or YOUR name) []:localhost
Email Address []:

We can now use this new self-signed certificate in our Flask application by setting the ssl_context argument in app.run() to a tuple with the filenames of the certificate and private key files:

from flask import Flask
app = Flask(__name__)

@app.route("/")
def hello():
    return "Hello World!"

if __name__ == "__main__":
    app.run(ssl_context=('cert.pem', 'key.pem'))

Alternatively, you can add the --cert and --key options to the flask run command if you are using Flask 1.x or newer:

$ flask run --cert=cert.pem --key=key.pem

The browser will continue to complain about this certificate, but if you inspect it, you will see the information that you entered when you created it:

SSL

Using Production Web Servers

Of course we all know that the Flask development server is only good for development and testing. So how do we install an SSL certificate on a production server?

If you are using gunicorn, you can do this with command line arguments:

$ gunicorn --certfile cert.pem --keyfile key.pem -b 0.0.0.0:8000 hello:app

If you use nginx as a reverse proxy, then you can configure the certificate with nginx, and then nginx can "terminate" the encrypted connection, meaning that it will accept encrypted connections from the outside, but then use regular unencrypted connections to talk to your Flask backend. This is a very useful set up, as it frees your application from having to deal with certificates and encryption. The configuration items for nginx are as follows:

server {
    listen 443 ssl http2;
    server_name example.com;
    ssl_certificate /path/to/cert.pem;
    ssl_certificate_key /path/to/key.pem;
    # ...
}

Another important item you need to consider is how are clients that connect through regular HTTP going to be handled. The best solution, in my opinion, is to respond to unencrypted requests with a redirect to the same URL but on HTTPS. For a Flask application, you can achieve that using the Flask-SSLify extension. With nginx, you can include another server block in your configuration:

server {
    listen 80;
    server_name example.com;
    location / {
        return 301 https://$host$request_uri;
    }
}

If you are using a different web server, check their documentation and you will likely find similar ways to create the configurations shown above.

Using "Real" Certificates

We have now explored all the options we have for self-signed certificates, but in all those cases, the limitation remains that web browsers are not going to trust those certificates unless you tell them to, so the best option for server certificates for a production site is to obtain them from one of these CAs that are well known and automatically trusted by all the web browsers.

When you request a certificate from a CA, this entity is going to verify that you are in control of your server and domain, but how this verification is done depends on the CA. If the server passes this verification then the CA will issue a certificate for it with its own signature and give it to you to install. The certificate is going to be good for a period of time that is usually not longer than a year. Most CAs charge money for these certificates, but there are a couple that offer them for free. The most popular free CA is called Let's Encrypt.

Getting a certificate from Let's Encrypt is fairly easy, since the whole process is automated. Assuming you are using an Ubuntu based server, you have to begin by installing their open source certbot tool on your server:

$ sudo apt-get install software-properties-common
$ sudo add-apt-repository ppa:certbot/certbot
$ sudo apt-get update
$ sudo apt-get install certbot

And now you are ready to request the certificate using this utility. There are a few ways that certbot uses to verify your site. The "webroot" method is, in general, the easiest to implement. With this method, certbot adds some files in a directory that your web server exposes as static files, and then tries to access these files over HTTP, using the domain you are trying to generate a certificate for. If this test is successful, certbot knows that the server in which it is running it is associated with the correct domain, and with that it is satisfied and issues the certificate. The command to request a certificate with this method is as follows:

$ sudo certbot certonly --webroot -w /var/www/example -d example.com

In this example, we are trying to generate a certificate for a example.com domain, which uses the directory in /var/www/example as a static file root. Unfortunately a Flask based website does not have a static file root directory, all static files from the application are accessed with the /static prefix, at least when you use the default configuration, so more planning is necessary.

What certbot does to the static root directory is add a .well-known subdirectory, and then store some files in it. Then it uses a HTTP client to retrieve those files as http://example.com/.well-known/.... If it can retrieve the files, then that is confirmation that your server is in full control of the domain name. For Flask and other applications that don't have a static file root directory, it is necessary to define one.

If you are using nginx as reverse proxy, you can take advantage of the powerful mappings that you can create in the configuration to give certbot a private directory where it can write its verification files. In the following example, I extended the HTTP server block shown in the previous section to send all Let's Encrypt related requests (which always begin with /.well-known/...) to a specific directory of your choice:

server {
    listen 80;
    server_name example.com;
    location ~ /.well-known {
        root /path/to/letsencrypt/verification/directory;
    }
    location / {
        return 301 https://$host$request_uri;
    }
}

Then you can give this director to certbot:

$ sudo certbot certonly --webroot -w /path/to/letsencrypt/verification/directory -d example.com

If certbot is able to verify the domain, it will write the certificate file as /etc/letsencrypt/live/example.com/fullchain.pem and the private key as /etc/letsencrypt/live/example.com/privkey.pem, and these are going to be valid for a period of 90 days.

To use this newly acquired certificate, you can enter the two filenames mentioned above in place of the self-signed files we used before, and this should work with any of the configurations described above. And of course you will also need to make your application available through the domain name that you registered, as that is the only way the browser will accept the certificate as valid.

Certbot is also used when you need to renew the certificates. To do that, you simply issue the following command:

$ sudo certbot renew

If there are any certificates in your system that are close to expire, the above command renews them, leaving new certificates in the same locations. You will likely need to restart your web server if you want the renewed certificates to be picked up.

Achieving an SSL A+ Grade

If you use a certificate from Let's Encrypt or another known CA for your production site and you are running a recent and maintained operating system on this server, you are likely very close to have a top-rated server in terms of SSL security. You can head over to the Qualys SSL Labs site and get a report to see where you stand.

Chances are you will still have some minor things to do. The report will indicate what areas you need to improve, but in general, I expect you'll be told that the options the server exposes for the encrypted communication are too wide, or too weak, leaving you open to known vulnerabilities.

One of the areas in which it is easy to make an improvement is in how the coefficients that are used during the encryption key exchange are generated, which usually have defaults that are fairly weak. In particular, the Diffie-Hellman coefficients take a considerable amount of time to be generated, so servers by default use smaller numbers to save time. But we can pre-generate strong coefficients and store them in a file, which then nginx can use. Using the openssl tool, you can run the following command:

openssl dhparam -out /path/to/dhparam.pem 2048

You can change the 2048 above for a 4096 if you want even stronger coefficients. This command is going to take some time to run, specially if your server does not have a lot of CPU power, but when it's done, you will have a dhparam.pem file with strong coefficients that you can plug into the ssl server block in nginx:

    ssl_dhparam /path/to/dhparam.pem;

Next, you will probably need to configure which ciphers the server allows for the encrypted communication. This is the list that I have on my server:

    ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:!DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA';

In this list, disabled ciphers are prefixed with a !. The SSL report will tell you if there are any ciphers that are not recommended. You will have to check from time to time to find out if new vulnerabilities have been discovered that require modifications to this list.

Below you can find my current nginx SSL configuration, which includes the above settings, plus a few more that I added to address warnings from the SSL report:

server {
    listen 443 ssl http2;
    server_name example.com;
    ssl_certificate /path/to/cert.pem;
    ssl_certificate_key /path/to/key.pem;
    ssl_dhparam /path/to/dhparam.pem;
    ssl_ciphers 'ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES256-GCM-SHA384:DHE-RSA-AES128-GCM-SHA256:DHE-DSS-AES128-GCM-SHA256:kEDH+AESGCM:ECDHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES256-SHA384:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA:ECDHE-ECDSA-AES256-SHA:DHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA:DHE-DSS-AES128-SHA256:DHE-RSA-AES256-SHA256:DHE-DSS-AES256-SHA:DHE-RSA-AES256-SHA:AES128-GCM-SHA256:AES256-GCM-SHA384:AES128-SHA256:AES256-SHA256:AES128-SHA:AES256-SHA:AES:CAMELLIA:!DES-CBC3-SHA:!aNULL:!eNULL:!EXPORT:!DES:!RC4:!MD5:!PSK:!aECDH:!EDH-DSS-DES-CBC3-SHA:!EDH-RSA-DES-CBC3-SHA:!KRB5-DES-CBC3-SHA';
    ssl_protocols TLSv1.2;
    ssl_session_timeout 1d;
    ssl_session_cache shared:SSL:50m;
    ssl_stapling on;
    ssl_stapling_verify on;
    add_header Strict-Transport-Security max-age=15768000;
    # ...
}

You can see the results that I obtained for my site at the top of this article. If you are after 100% marks in all categories, you will have to add additional restrictions to your configuration, but this is going to limit the number of clients that can connect to your site. In general, older browsers and HTTP clients use ciphers that are not considered to be the strongest, but if you disable those, then these clients will not be able to connect. So you will basically need to compromise, and also routinely review the security reports and make updates as things change over time.

Unfortunately for the level of sophistication on these last SSL improvements you will need to use a professional grade web server, so if you don't want to go with nginx, you will need to find one that supports these settings, and the list is pretty small. I know Apache does, but besides that, I don't know any other.

Conclusion

So there you go, this is how you can implement top-of-the-line SSL security for your Flask application. Is there anything that I left out? Do you do things differently? Let me know below in the comments!

Become a Patron!

Hello, and thank you for visiting my blog! If you enjoyed this article, please consider supporting my work on this blog on Patreon!

99 comments
  • #26 Florent said

    The public key is used to decrypt the server response. Since the public key is openly available, an attacker could listen for server responses and decrypt the responses using that key?

  • #27 Miguel Grinberg said

    @Florent: you got it wrong. Public keys can only be used to verify signatures that are generated with the corresponding private key. The client uses it to verify the server's certificate, which has a signature.

  • #28 Mubarak shan said

    Hi, Miguel, I can' access my admin panel via http://dms.gbooksite.in/dms. While I trying to open via HTTPS ie: https://dms.gbooksite.in/dms. It showing errors like invalid username and password. I am using Flask. Can I change any configuration in python code? Please help me out this.

    Thank you

  • #29 Miguel Grinberg said

    @Mubarak: you haven't provided enough information. You may want to write a question in Stack Overflow and provide all the details there.

  • #30 Martin said

    Dear Miguel,

    is it possible to get flask to use the system root-CAs provided in ca-certificates ?
    I'm running a Flask REST Api in a docker container, access via nginx. Using a custom certificate I can bind the crt and key file to flask and https requests are working.
    BUT: Nginx already provides my custom certificate. It would be logical to include the corresponding root-CA into the docker container's ca-certificates and have flask use that for verification.
    This is the way it works with my C# microservice.
    I just have to add the root-CA to the system certs, run "update-ca-certificates" and https requests are running perfectly fine without the need of the crt and key file.

    Is this also possible with flask ? It really would help a lot.

    Best Regards
    Martin

  • #31 Miguel Grinberg said

    Martin: Flask is your web framework, the SSL configuration applies to your web server, not to Flask. So you need to look at the options provided by the web server that you are using.

  • #32 Karol said

    I have a quick question. I have a domain name from Ionos and I can generate the SSL certificate there, but the server is on Digital Ocean. Does anyone know if I could I use this certificate within my Flask application?

  • #33 Miguel Grinberg said

    @Karol: Yes. you can install your certificate on any server, it's just files that you need to copy there.

  • #34 Akshay said

    Your article is simple , clear , to the point . I liked it .Great job

  • #35 berlin said

    it does not work for me. the request still goes to HTTP.

    i used:
    @app.route("/")
    def hello():
    return "Hello World!"

    if name == "main":
    app.run(ssl_context=('cert.pem', 'key.pem'))

  • #36 Miguel Grinberg said

    @berlin: Are you sure your certificate and key files are valid?

  • #37 Carlos Antonio Pinzón said

    Thank you, I understood the whole thing and my site has now https with an A+ grade.

    Your SSL settings gave me a B grade (april 2019). To achieve the A+ grade, I ended up mixing them with these ones: https://gist.github.com/gavinhungry/7a67174c18085f4a23eb.

  • #38 Miguel Grinberg said

    @Carlos: that's odd, because I just retested here and I'm still getting A+. Do you recall what was the problem when you saw a B grade for my site?

  • #39 Mian said

    Hello Miguel.
    This is the most useful flask tutorial ever. Thanks for that.

    I have been following your flask mega tutorial - microblog tutorial series. I am stuck getting the "Lets Encrypt" certificate for for my website. My command is:
    sudo certbot certonly --webroot -w /home/home_care_ez/webapp/static -d homecareez.xyz

    [The following errors were reported by the server:
    Domain: homecareez.xyz
    Type: unauthorized
    Detail: Invalid response from http://homecareez.xyz/.well-known/acme-challenge/XU-_1WTTJmXNb8DN0tKVE3iDyUuzZ-85kEaRyq7wF6U [50.63.202.58]: 404

    To fix these errors, please make sure that your domain name was entered correctly and the DNS A/AAAA record(s) for that domain contain(s) the right IP address.]

    I tested my web-server configuration by putting a test folder and file in my static folder, and it is accessible perfectly on "https://homecareez.xyz/static/.hiddir/test.txt"

    Any help would be appreciated.

  • #40 Miguel Grinberg said

    @Mian: certboot does not know anything about your static folder, it expects the .well-known directory to be a top-level directory, cannot be in the static folder. Are you using nginx or other load balancer? You can map the top-level /.well-known URL to /static/well-known there.

  • #41 doe said

    Miguel, not sure when you update old articles, but you now have an outdated piece of information in the article:
    Where you say that unfortunately the 'adhoc' ssl_context is not available through the Flask CLI - this is no longer relevant. You can now use it by doing:
    flask --cert adhoc
    from the command line

  • #42 Miguel Grinberg said

    @doe: Ah, yes, thanks, I'll update the article.

  • #43 Chris said

    Hello again Miguel...
    Thanks for another helpful guide.
    I'm trying to combine this with the chapter 17 deployment in the flask mega tutorial. I'm testing it on a microblog subdomain to my personal domain which I'll call domain.net (as I don't want it public).

    My nginx configuration in /etc/nginx/sites-enabled/microblog looks like this:

    server {
    listen 80;
    server_name microblog.domain.net;
    location ~ /.well-known {
    root /etc/letsencrypt/verification/microblog;
    }
    location / {
    return 301 https://$host$request_uri;
    }
    }
    server {
    listen 443 ssl;
    server_name microblog.domain.net;
    ssl_certificate /etc/letsencrypt/live/microblog.domain.net/fullchain.pem;
    ssl_certificate_key /etc/letsencrypt/live/microblog.domain.net/privkey.pem;
    location / {
    proxy_pass http://localhost:8000;
    proxy_redirect off;
    proxy_set_header Host $host;
    proxy_set_header X-Real-IP $remote_addr;
    proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
    }
    location /static {
    alias /home/chris/microblog/app/static;
    expires 1d;
    }
    }

    The 301 redirect on http works. But any connections through https just time out. Even to https://microblog.domain.net/static/loading.gif.

    Any ideas? Creating the certificates seemed to work fine and when I run $ sudo certbot certificates

    I get the following which makes me think the certificates are correctly set up...

    <hr />

    Found the following certs:
    Certificate Name: microblog.domain.net
    Domains: microblog.domain.net
    Expiry Date: 2019-10-12 17:42:12+00:00 (VALID: 89 days)
    Certificate Path: /etc/letsencrypt/live/microblog.domain.net/fullchain.pem
    Private Key Path: /etc/letsencrypt/live/microblog.domain.net/privkey.pem

    <hr />

    I would really appreciate any hints on where to start with trying to debug this...

    Chris

  • #44 Miguel Grinberg said

    @Chris: Maybe you need to open port 443 on your firewall?

  • #45 Chris said

    Yep I did check that.
    $ sudo ufw status gives:
    sudo ufw status
    Status: active

    To Action From
    -- ------ ----
    OpenSSH ALLOW Anywhere
    80/tcp ALLOW Anywhere
    443/tcp ALLOW Anywhere
    OpenSSH (v6) ALLOW Anywhere (v6)
    80/tcp (v6) ALLOW Anywhere (v6)
    443/tcp (v6) ALLOW Anywhere (v6)

    Any other ideas? It's driving me a bit mad.

  • #46 Miguel Grinberg said

    @Chris what kind of host is this? Any chance you have another firewall preventing port 443 connections? On AWS you would need to open the port in your security group, for example.

  • #47 Chris said

    Thanks Miguel. You are spot on!
    I am using AWS Lightsail. I was completely unaware that Amazon also has another firewall in between the Lightsail instance and the internet. It's configured in the AWS web interface.
    By default for an Ubuntu image it has port 80 and port 22 open. More info here if you're interested: https://lightsail.aws.amazon.com/ls/docs/en_us/articles/understanding-firewall-and-port-mappings-in-amazon-lightsail
    I've opened port 443, https works and I've managed to get an A+ on SSL labs.
    Thanks again for the helpful guide and your troubleshooting.

  • #48 Orestis Zekai said

    Hello Miguel,

    this is a really nice tutorial with solid explanation and nice flow. I have one question thought. I have a flask server with a public IP, but I do not have assigned a domain name on it. When trying to get a certificate using certbot, I get an error message stating that IP addresses are not supported. Do you have any alternatives for that?

    Regards,
    Orestis

  • #49 Miguel Grinberg said

    @Orestis: I do not know which certificate providers accept IP addresses, it might be possible, but not idea where to get one. Also no idea how is browser support for IP based certificates. I recommend you get a domain name and go with the mainstream on this one.

  • #50 Leon Tian said

    Hello, Miguel. I've studied your articles and books for two years. I just graduated from my university(Beijing University of Technology) and became a real software engineer and researcher. Now I'm working in ISCAS(Institute of Software, Chinese Academy of Sciences). Thank you a lot, your articles are very helpful.

    Based on the development of Cloud Computing, the research group I'm working in decided to use Kubernetes and Istio( a microservice management framework above K8s ) to develop our test software. I found that the 'Gateway' of Istio also support https connections and it's very convenient to use( just write a yaml ). Here is the Gateway of Istio document link: https://istio.io/docs/reference/config/networking/v1alpha3/gateway/ .I think it's a new solution to support https with Flask. Hope you enjoy it!

    Finally, I must thank you again. In my opinion, your articles are better than our textbook. Hope your articles can benefit more people.

    Sincerely, Leon

Leave a Comment