Skip to content

Handles HTTPS proxying with automatic self-signed certs for SSL termination and AltName support for Chrome

Notifications You must be signed in to change notification settings

RTC1/docker-https-proxy

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

15 Commits
 
 
 
 
 
 
 
 

Repository files navigation

HTTPS Proxy based on Outrigger

Handles HTTPS proxying with automatic self-signed serts for SSL termination, and adds AltName to ensure validity in Chrome.

GitHub tag Docker Stars Docker Pulls

This HTTPS proxy container is intended primarily for use with APIs (headless web services).

While many languages in which you write such services have a strong HTTP library, they are not full-featured, production-grade HTTP servers covering all the standard needs out-of-box, and it is easier to configure nginx and rely on it's maturity than build many of these features in custom code.

Usage

Docker Run

docker run --rm -it \
  -e "UPSTREAM_DOMAIN=api.projectname.vm" \
  -e "UPSTREAM_PORT=3773" \
  -e "PROXY_DOMAIN=proxy.projectname.vm" \
  -l "com.dnsdock.name=proxy" \
  -l "com.dnsdock.image=projectname" \
  outrigger/https-proxy:1.0

Docker Compose

  # docker-compose run --rm proxy
  # The UPSTREAM service must be running.
  # https://proxy.projectname.vm
  proxy:
    build: robcook91/https-proxy:latest
    container_name: projectname_http_proxy
    depends_on:
      - api
    labels:
      com.dnsdock.name: proxy
      com.dnsdock.image: projectname
    environment:
      UPSTREAM_DOMAIN: api.projectname.vm
      UPSTREAM_PORT: 3773
      PROXY_DOMAIN: proxy.projectname.vm
    network_mode: bridge
    volumes:
          - ./ca:/etc/nginx/ca

Features

SSL Termination

This image was created after finding https://github.com/fsouza/docker-ssl-proxy was very difficult to customize, but the simple untrusted SSL for local development was still valuable.

In the future steps might be taken to facilitate more of a trust mechanism.

Certificates and CA location

The SSL certificate is generated using a own-ROOT-ca that is available in the directory /etc/nginx/ca. If made available to other containers or the local system this will serve as the basis to trust the application certificate

Trusting CA

If the ca folder is mounted, as shown in the docker-compose example, and doesn't contain root CA keys they will be generated. On MacOS you can add the rootCA.crt to your System keychain to trust the CA.

Using Existing Certificate

You can use existing SSL certificates for your proxy domain by mounting a volume to /etc/nginx/certs with following files inside:

  • key.pem: Private key file
  • cert.pem: Certificate file

The certificate generator will abort if it finds an existing key.pem file.

gzip Compression

Responses of at least 1000 bytes will be subject to gzip compression at level 6.

Rate Limiting

Rate Limits are more common with API-based services than other webapps. It is a request throttle to ensure no one system monopolizes the available server resources.

This is defaulted to enabled (at 20 requests per second) but can be disabled by setting the RATE_LIMIT environment variable to "0".

In the event the limit is reached, nginx will respond with a 429 Too Many Requests response.

IP-based Access Example

There is a configuration file to impose IP-based Whitelisting and Blacklisting rules. These are best handled in the nginx layer rather than in your application, as your application is unlikely to handle it as efficiently as nginx can.

Follow the instructions in ./root/etc/nginx/conf.d/10-ip-access.conf to use it in your project.

Environment Variables

Outrigger images use Environment Variables and confd to templatize a number of Docker environment configurations. These templates are processed on startup with environment variables passed in via the docker run command-line or via your docker-compose.yml manifest file.

  • CLIENT_MAX_BODY_SIZE: [20M] Maximium size of client uploads.
  • GZIP_APPROVED_MIME_TYPES: [``] Additional MIME types to include in gzip compression.
  • PROXY_DOMAIN: [www.example.com] The domain in the SSL certificate. Relayed via X-Forwarded-Host HTTP header.
  • RATE_LIMIT: [20] Throttled requests per second per client IP address.
  • RATE_LIMIT_BURST_QUEUE: [10] Number of requests to delay before enforcing the limit.
  • UPSTREAM_DOMAIN: [proxied.example.com] The target host for the reverse proxy. Relayed via Host HTTP header.
  • UPSTREAM_PORT: [80] The target port for the proxied service.

Maintainers

Phase2 Logo

About

Handles HTTPS proxying with automatic self-signed certs for SSL termination and AltName support for Chrome

Resources

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Dockerfile 96.1%
  • Shell 3.9%