| Nginx Version | Tag | Dockerfile |
|---|---|---|
| latest | latest | Dockerfile |
| 1.10.3-r0 | 2.2 | Dockerfile |
| undefined | development | Dockerfile |
Recommended: Use tagged versioned image. Read the release notes. Always jump from one version to the next, rollback when necessary.
- Supports configuration of multiple servers with environment variables.
- Supports an arbitrary amount of reverse proxies for every server.
- Supports https and ad-hoc self-signed certificates
- Supports ssl certificate specification for every server.
- Supports letsencrypt certificates.
Leave a message and ask questions on Hipchat: blacklabelops/hipchat
$ docker run -d \
-p 80:80 \
--name nginx \
blacklabelops/nginx
Default server installation will be available on port 80.
You can use your own configuration file which will override the auto-configuration feature of this image.
Example:
$ docker run -d \
-v your_local_config_file.conf:/etc/nginx/nginx.conf \
-p 80:80 \
--name nginx \
blacklabelops/nginx
$ docker run -d \
-p 80:80 \
--name nginx \
-e "SERVER1REVERSE_PROXY_LOCATION1=/" \
-e "SERVER1REVERSE_PROXY_PASS1=http://www.heise.de" \
blacklabelops/nginx
Reverse proxy will pass to site http://www.heise.de.
It is possible to define an arbitrary amount of server definitions with environment variables. Each variable must be precede by the string "SERVER" and the number of the server.
Example:
Server 1 Reverse Proxy 1:
- Location: /
- Proxy Pass: http://www.heise.de
Server 2 Reverse Proxy 1:
- Server name: dummy.example.com
- Location: /
- Proxy Pass: http://www.alternate.de
$ docker run -d \
-p 80:80 \
--name nginx \
-e "SERVER1REVERSE_PROXY_LOCATION1=/" \
-e "SERVER1REVERSE_PROXY_PASS1=http://www.heise.de" \
-e "SERVER2SERVER_NAME=dummy.example.com" \
-e "SERVER2REVERSE_PROXY_LOCATION1=/alternate" \
-e "SERVER2REVERSE_PROXY_PASS1=http://www.alternate.de" \
blacklabelops/nginx
Now try accessing http://localhost (When using docker tools replace localhost with the respective ip) in order to invoke the second proxy you will have to use a dns server for requests originating from dummy.example.com
It is possible to define an arbitrary amount of reverse proxies for every server. Just precede each environment variable with the String "SERVER" and the number of the server and add a number behind each environment variable.
Example:
Reverse Proxy 1:
- Location: /
- Proxy Pass: http://www.heise.de
Reverse Proxy 2:
- Location: /alternate
- Proxy Pass: http://www.alternate.de
$ docker run -d \
-p 80:80 \
--name nginx \
-e "SERVER1REVERSE_PROXY_LOCATION1=/" \
-e "SERVER1REVERSE_PROXY_PASS1=http://www.heise.de" \
-e "SERVER1REVERSE_PROXY_LOCATION2=/alternate" \
-e "SERVER1REVERSE_PROXY_PASS2=http://www.alternate.de" \
blacklabelops/nginx
Now try accessing http://localhost and https://localhost/alternate (When using docker tools replace localhost with the respective ip)
This container supports HTTPS. Just enter a DName with the environment variable CERTIFICATE_DNAME and the container creates a self-signed certificate. You have to pass Distinguished Name (DN). The certificate is generated with the Distinguished Name. This is a DN-Example:
/CN=SBleul/OU=Blacklabelops/O=blacklabelops.net/L=Munich/C=DE
- CN = Your name
- OU = Your organizational unit.
- O = Organisation name.
- L = Location, e.g. town name.
- C = Locale of your county.
$ docker run -d \
-p 80:80 \
-p 443:443 \
-e "SERVER1REVERSE_PROXY_LOCATION1=/" \
-e "SERVER1REVERSE_PROXY_PASS1=http://www.heise.de" \
-e "SERVER1CERTIFICATE_DNAME=/CN=SBleul/OU=Blacklabelops/O=blacklabelops.com/L=Munich/C=DE" \
-e "SERVER1HTTPS_ENABLED=true" \
--name nginx \
blacklabelops/nginx
Note: Webserver will use same port for HTTPS!
Using your own certificates: Mount them inside the container define their location with the environment-variables CERTIFICATE_FILE and CERTIFICATE_KEY.
$ docker run -d \
-p 80:80 \
-p 443:443 \
-v /mycertificatepath/mycertificates:/opt/nginx/keys \
-e "SERVER1REVERSE_PROXY_LOCATION1=/" \
-e "SERVER1REVERSE_PROXY_PASS1=http://www.heise.de" \
-e "SERVER1HTTPS_ENABLED=true" \
-e "SERVER1CERTIFICATE_FILE=/opt/nginx/keys/server.csr" \
-e "SERVER1CERTIFICATE_KEY=/opt/nginx/keys/server.key" \
--name nginx \
blacklabelops/nginx
HTTP should be disabled when using HTTPS. Just disable the port and disable HTTP inside the config using the environment-variable HTTP_ENABLED.
Example:
$ docker run -d \
-p 443:443 \
-e "SERVER1REVERSE_PROXY_LOCATION1=/" \
-e "SERVER1REVERSE_PROXY_PASS1=http://www.heise.de" \
-e "SERVER1HTTPS_ENABLED=true" \
-e "SERVER1CERTIFICATE_DNAME=/CN=SBleul/OU=Blacklabelops/O=blacklabelops.com/L=Munich/C=DE" \
-e "SERVER1HTTP_ENABLED=false" \
--name nginx \
blacklabelops/nginx
The reverse proxy will now only offer HTTPS communication!
Applications, like Jira and Jenkins, usually need proxy header fields when you use nginx as a reverse proxy. You can set custom header fields when you use an application that is not directly supported by this image.
As an example Jira reqires the following proxy header fields:
X-Forwarded-Host $hostX-Forwarded-Server $hostX-Forwarded-For $proxy_add_x_forwarded_for
This image supports an arbitrary amount of header fields, the environment variables must enumerated, starting with index 1.
Syntax environment variable: SERVER<server-number>REVERSE_PROXY_HEADER<proxy-number>FIELD<field-number>
You can also provide custom Nginx directives using a similar pattern: SERVER<server-number>REVERSE_PROXY_DIRECTIVE<proxy-number>FIELD<field-number>
Note: You must set
SERVER1PROXY_APPLICATION=customtocustomotherwise the container will add default header fields by itself.
Note: Inside docker and docker-compose the environment variable has to be quoted with
''rather with"". Alternatively a$symbol can be substituted with$$when not using single quotes. This is also platform dependent, e.g. Mac and Linux. Please try and report how this behaves under Windows.
Example with 1 server and 1 reverse proxy:
$ docker run -d \
-p 80:80 \
--name nginx \
-e "SERVER1REVERSE_PROXY_LOCATION1=/" \
-e 'SERVER1PROXY_APPLICATION=custom' \
-e "SERVER1REVERSE_PROXY_PASS1=http://jira.example.com" \
-e 'SERVER1REVERSE_PROXY_HEADER1FIELD1=X-Forwarded-Host $host' \
-e 'SERVER1REVERSE_PROXY_HEADER1FIELD2=X-Forwarded-Server $host' \
-e 'SERVER1REVERSE_PROXY_HEADER1FIELD3=X-Forwarded-For $proxy_add_x_forwarded_for' \
-e 'SERVER1REVERSE_PROXY_DIRECTIVE1FIELD1=proxy_read_timeout 300' \
blacklabelops/nginx
Use
'',$$, or quotes otherwise variables like$hostwill be interpreted!
Means that a call on the http adress will be redirected to https. Useful when users enter the http adress in browser and then will be redirected to the secured entry page.
Example:
- Enter the URL
http://www.example.com - Your browser will be redirected to
https://www.example.com
This setting will be activated for all servers and all servers must deactivate http.
Example:
NGINX_REDIRECT_PORT80=trueactivates https port redirection for all servers.SERVER1HTTP_ENABLED=falsemust be set for all servers.
Example:
$ docker run -d \
-p 443:443 \
-p 80:80 \
-e "NGINX_REDIRECT_PORT80=true" \
-e "SERVER1REVERSE_PROXY_LOCATION1=/" \
-e "SERVER1SERVER_NAME=localhost" \
-e "SERVER1REVERSE_PROXY_PASS1=http://www.heise.de" \
-e "SERVER1HTTPS_ENABLED=true" \
-e "SERVER1CERTIFICATE_DNAME=/CN=SBleul/OU=Blacklabelops/O=blacklabelops.com/L=Munich/C=DE" \
-e "SERVER1HTTP_ENABLED=false" \
--name nginx \
blacklabelops/nginx
You can now access http://localhost and https://localhost and http will be redirected to https.
You can get and use free green certificates by Letsencrypt. Here I will provide a manual way to generate and retrieve the certificate manually and use it inside the container. The full detailed letsencrypt documentation can be found here: Documentation
Note: This will not work inside boot2docker on your local comp. You will have to do this inside your target environment.
First create a data volume where the certificate will be stored.
$ docker volume create --name letsencrypt_certs
Needs at least Docker 1.10 volumes.
Then start the letsencrypt container and create the certificate.
$ docker run --rm \
-p 80:80 \
-p 443:443 \
--name letsencrypt \
-v letsencrypt_certs:/etc/letsencrypt \
-e "LETSENCRYPT_EMAIL=dummy@example.com" \
-e "LETSENCRYPT_DOMAIN1=example.com" \
blacklabelops/letsencrypt install
This container will handshake with letsencrypt.org and install an account and the certificate when successful. Letsencrypt stores the certificates inside the folder /etc/letsencrypt.
Now you can use the certificate for your reverse proxy!
$ docker run -d \
-p 443:443 \
-p 80:80 \
-v letsencrypt_certs:/etc/letsencrypt \
-e "NGINX_REDIRECT_PORT80=true" \
-e "SERVER1REVERSE_PROXY_LOCATION1=/" \
-e "SERVER1REVERSE_PROXY_PASS1=http://www.heise.de" \
-e "SERVER1HTTPS_ENABLED=true" \
-e "SERVER1HTTP_ENABLED=false" \
-e "SERVER1LETSENCRYPT_CERTIFICATES=true" \
-e "SERVER1CERTIFICATE_FILE=/etc/letsencrypt/live/example.com/cert.pem" \
-e "SERVER1CERTIFICATE_KEY=/etc/letsencrypt/live/example.com/privkey.pem" \
-e "SERVER1CERTIFICATE_TRUSTED=/etc/letsencrypt/live/example.com/fullchain.pem" \
--name nginx \
blacklabelops/nginx
LETSENCRYPT_CERTIFICATES switches on special configuration for their certificates.
This image supports automatic monthly letsencrypt certificate renewal with side-containers. Ports 80 and 443 are used by Nginx, therefore we use webroot challenging for certificate renewal.
After each renewal Nginx configuration and certificates are loaded without restarting Nginx itself and disturb the availability of the system.
- Create a challenge volume between your Letsencrypt and Nginx containers.
- Start Nginx container with the challenge volume.
- Start Letsencrypt container with challenge volume and webroot mode.
- Finally start a Cron container in order to reload your Nginx configuration after certificates changed.
Create additional volume for acme handshakes:
$ docker volume create letsencrypt_challenges
This is where acme challenges from letsencrypt are stored and handled by Nginx.
Then start Nginx with your SSL settings and the challenge volume:
$ docker run -d \
-p 443:443 \
-p 80:80 \
-v letsencrypt_certs:/etc/letsencrypt \
-v letsencrypt_challenges:/var/www/letsencrypt \
-e "NGINX_REDIRECT_PORT80=true" \
-e "SERVER1REVERSE_PROXY_LOCATION1=/" \
-e "SERVER1REVERSE_PROXY_PASS1=http://www.heise.de" \
-e "SERVER1HTTPS_ENABLED=true" \
-e "SERVER1HTTP_ENABLED=false" \
-e "SERVER1LETSENCRYPT_CERTIFICATES=true" \
-e "SERVER1CERTIFICATE_FILE=/etc/letsencrypt/live/example.com/cert.pem" \
-e "SERVER1CERTIFICATE_KEY=/etc/letsencrypt/live/example.com/privkey.pem" \
-e "SERVER1CERTIFICATE_TRUSTED=/etc/letsencrypt/live/example.com/fullchain.pem" \
--name nginx \
blacklabelops/nginx
Nginx can now handle acme challenge tokens over the volume.
Now start letsencrypt in renewal mode, this will renew certificates each month!
$ docker run -d \
-v letsencrypt_certs:/etc/letsencrypt \
-v letsencrypt_challenges:/var/www/letsencrypt \
-e "LETSENCRYPT_WEBROOT_MODE=true" \
-e "LETSENCRYPT_EMAIL=dummy@example.com" \
-e "LETSENCRYPT_DOMAIN1=example.com" \
--name letsencrypt \
blacklabelops/letsencrypt
This container will handshake with letsencrypt.org each month on the 15th and renewal the certificate when successful.
Finally start a cron container that will reload the Nginx configuration after the certificates have been renewed!
$ docker run -d \
-v /var/run/docker.sock:/var/run/docker.sock \
-e "JOB_NAME1=ReloadNginx" \
-e "JOB_COMMAND1=docker exec nginx nginx -s reload" \
-e "JOB_TIME1=0 0 2 15 * *" \
-e "JOB_ON_ERROR1=Continue" \
blacklabelops/jobber:docker
Reloads Nginx configuration each month on the 15th over Docker without restarting Nginx! In order to achieve high availability!
You can password protect any reverse proxy. Additionally you can specify an arbitrary amount of users.
Example of specifying a user admin with password admin for the first reverse proxy:
docker run -d \
-p 80:80 \
--name nginx \
-e "SERVER1REVERSE_PROXY_LOCATION1=/" \
-e "SERVER1REVERSE_PROXY_PASS1=http://www.heise.de" \
-e "SERVER1REVERSE_PROXY_BASIC_AUTH_REALM1=Secure Location" \
-e "SERVER1REVERSE_PROXY_BASIC_AUTH1USER1=admin" \
-e "SERVER1REVERSE_PROXY_BASIC_AUTH1PASSWORD1=admin" \
blacklabelops/nginx
Access to http://localhost will be now password protected with user
adminand passwordadmin.
Multiple users:
docker run -d \
-p 80:80 \
--name nginx \
-e "SERVER1REVERSE_PROXY_LOCATION1=/" \
-e "SERVER1REVERSE_PROXY_PASS1=http://www.heise.de" \
-e "SERVER1REVERSE_PROXY_BASIC_AUTH_REALM1=Secure Location" \
-e "SERVER1REVERSE_PROXY_BASIC_AUTH1USER1=admin1" \
-e "SERVER1REVERSE_PROXY_BASIC_AUTH1PASSWORD1=admin1" \
-e "SERVER1REVERSE_PROXY_BASIC_AUTH1USER2=admin2" \
-e "SERVER1REVERSE_PROXY_BASIC_AUTH1PASSWORD2=admin2" \
blacklabelops/nginx
Access to http://localhost are both enabled for user
admin1and useradmin2.
The build process can take the following argument:
- NGINX_VERSION: Takes keyword
latestor specific NGINX version number. Default islatest.
Examples:
Build image with the latest Jenkins release:
$ docker build -t blacklabelops/nginx .
Note: Dockerfile must be inside the current directory!
Build image with a specific NGINX release:
$ docker build --build-arg NGINX_VERSION=1.8.1-r0 -t blacklabelops/nginx .
Note: Dockerfile must be inside the current directory!
The build configuration are specified inside the following area:
jenkins:
build:
context: .
dockerfile: Dockerfile
args:
NGINX_VERSION: latest
Adjust NGINX_VERSION for your personal needs.
Build the latest release with docker-compose:
$ docker-compose build
Minimal working example:
FROM blacklabelops/nginx
RUN echo "Install Your Tools"
# Optional: Your config file
COPY nginx.conf /etc/nginx/nginx.conf
Example with custom entrypoint:
FROM blacklabelops/nginx
USER root
RUN echo "Install Your Tools"
# Optional: Your config file
COPY nginx.conf /etc/nginx/nginx.conf
# Optional: Your entrypoint:
COPY entrypoint.sh /opt/nginx/
ENTRYPOINT ["/opt/nginx/entrypoint.sh"]
Minimal working example entrypoint entrypoint.sh:
#!/bin/bash
# Your code
echo "My script code"
# Then call image entrypoint
exec /opt/nginx/docker-entrypoint.sh