1
0
Fork 0
docker-letsencrypt-nginx-pr.../docs/Standalone-certificates.md
Zvezdin ca1f5a4e69
docs: clarify configuration requirements for standalone certificates (#1045)
* fix(Standalone-certificates.md): Clarify configuration requirements

* fix(Standalone-certificates.md): remove extra space

* Update docs/Standalone-certificates.md

Co-authored-by: Nicolas Duchon <nicolas.duchon@gmail.com>
2023-08-01 21:43:50 +02:00

3.7 KiB

Standalone certificates

You can generate certificate that are not tied to containers environment variable by mounting a user configuration file inside the container at /app/letsencrypt_user_data. This feature also require sharing the /etc/nginx/conf.d folder between the nginx-proxy and acme-companion container (and the docker-gen container if you are running a three container setup):

$ docker run --detach \
    --name nginx-proxy \
    --publish 80:80 \
    --publish 443:443 \
    --volume certs:/etc/nginx/certs \
    --volume vhost:/etc/nginx/vhost.d \
    --volume conf:/etc/nginx/conf.d \
    --volume html:/usr/share/nginx/html \
    --volume /var/run/docker.sock:/tmp/docker.sock:ro \
    nginxproxy/nginx-proxy
$ docker run --detach \
    --name nginx-proxy-acme \
    --volumes-from nginx-proxy \
    --volume /var/run/docker.sock:/var/run/docker.sock:ro \
    --volume acme:/etc/acme.sh \
    --volume /path/to/your/config_file:/app/letsencrypt_user_data:ro \
    nginxproxy/acme-companion

The user configuration file is a collection of bash variables and array, and follows the syntax of the /app/letsencrypt_service_data file that get created by docker-gen.

Required configuration parameters:

LETSENCRYPT_STANDALONE_CERTS : a bash array containing identifier(s) for you standalone certificate(s). Each element in the array has to be unique. Those identifiers are internal to the container process and won't ever be visible to the outside world or appear on your certificate.

LETSENCRYPT_uniqueidentifier_HOST : a bash array containing domain(s) that will be covered by the certificate corresponding to uniqueidentifier.

Each identifier in LETSENCRYPT_STANDALONE_CERTS must have its own corresponding LETSENCRYPT_uniqueidentifier_HOST array, where the string uniqueidentifier has to be identical to that identifier.

Minimal example generating a single certificate for a single domain:

LETSENCRYPT_STANDALONE_CERTS=('uniqueidentifier')
LETSENCRYPT_uniqueidentifier_HOST=('yourdomain.tld')

Example with multiple certificates and domains:

LETSENCRYPT_STANDALONE_CERTS=('web' 'app' 'othersite')
LETSENCRYPT_web_HOST=('yourdomain.tld' 'www.yourdomain.tld')
LETSENCRYPT_app_HOST=('myapp.yourdomain.tld' 'myapp.yourotherdomain.tld' 'service.yourotherdomain.tld')
LETSENCRYPT_othersite_HOST=('yetanotherdomain.tld')

Optional configuration parameters:

Those are all single bash variables.

LETSENCRYPT_uniqueidentifier_EMAIL : must be a valid email and will be used by Let's Encrypt to warn you of impeding certificate expiration (should the automated renewal fail).

LETSENCRYPT_uniqueidentifier_KEYSIZE : determines the size of the requested private key. See private key size for accepted values.

LETSENCRYPT_uniqueidentifier_TEST : if set to true, the corresponding certificate will be a test certificates: it won't have the 5 certs/week/domain limits and will be signed by an untrusted intermediate (ie it won't be trusted by browsers).

Picking up changes to letsencrypt_user_data

The container does not actively watch the /app/letsencrypt_user_data file for changes.

Changes will either be picked up every hour when the service loop execute again, or by using docker exec your-le-container-name-or-id /app/signal_le_service to manually trigger the service loop execution.

Proxying to something else than a Docker container

Please see the nginx-proxy documentation.

No support will be provided on the acme-companion repo for proxying related issues or questions.