就是一个提供免费 SSL/TLS 证书的网站,由于其证书期限只有三个月,所以需要我们用自动化的方式去更新证书。本文将介绍如何为通过 docker 运行的 nginx 中的站点添加 https 支持,并自动完成证书的更新。本文的演示环境为:运行在 Azure 上的 Ubuntu 16.04 主机(此图来自互联网):
pid /var/run/<span style="color: #000000">nginx.pid;
events {
worker_connections <span style="color: #800080">2048<span style="color: #000000">;
}
http {
include /etc/nginx/<span style="color: #000000">mime.types;
default_type application/octet-<span style="color: #000000">stream;
sendfile on;
keepalive_timeout </span><span style="color: #800080">65</span><span style="color: #000000">;
client_max_body_size 10M;
include </span>/etc/nginx/conf.d<span style="color: #008000">/*</span><span style="color: #008000">.conf;
}
location </span>^~ /.well-known/acme-challenge/<span style="color: #000000"> {
default_type </span><span style="color: #800000">"</span><span style="color: #800000">text/plain</span><span style="color: #800000">"</span><span style="color: #000000">;
root </span>/usr/share/nginx/<span style="color: #000000">html;
}
location </span>= /.well-known/acme-challenge/<span style="color: #000000"> {
return </span><span style="color: #800080">404</span><span style="color: #000000">;
}
location </span>/<span style="color: #000000"> {
proxy_pass http:</span><span style="color: #008000">//</span><span style="color: #008000">web;</span>
<span style="color: #000000"> }
}
是一个提供免费 SSL/TLS 证书的网站,它为用户提供了 certbot 工具用来生成 SSL/TLS 证书。方便起见,我们把 certbot 简单的封装到容器中。在用户的家目录下创建 certbot 目录,进入 certbot 目录并把下面的内容保存到 Dockerfile 文件中:
<span style="color: #0000ff">echo <span style="color: #800000">'<span style="color: #800000">failed domain:<span style="color: #800000">'
<span style="color: #0000ff">for (( i=<span style="color: #800080">0; i<${#FAILED_LIST[@]}; i++<span style="color: #000000"> ));
<span style="color: #0000ff">do
<span style="color: #0000ff">echo<span style="color: #000000"> ${FAILED_LIST[$i]}
<span style="color: #0000ff">done
<span style="color: #0000ff">fi
listen <span style="color: #800080">80<span style="color: #000000">;
listen [::]:<span style="color: #800080">80<span style="color: #000000">;
server_name filterinto.com www.filterinto.com;
location </span>^~ /.well-known/acme-challenge/<span style="color: #000000"> {
default_type </span><span style="color: #800000">"</span><span style="color: #800000">text/plain</span><span style="color: #800000">"</span><span style="color: #000000">;
root </span>/usr/share/nginx/<span style="color: #000000">html;
}
location </span>= /.well-known/acme-challenge/<span style="color: #000000"> {
return </span><span style="color: #800080">404</span><span style="color: #000000">;
}
return </span><span style="color: #800080">301</span> https:<span style="color: #008000">//</span><span style="color: #008000">$server_name$request_uri;</span>
<span style="color: #000000">}
server {
listen <span style="color: #800080">443<span style="color: #000000">;
listen [::]:<span style="color: #800080">443<span style="color: #000000">;
server_name filterinto.com;
# enable ssl
ssl on;
ssl_protocols TLSv1 TLSv1.</span><span style="color: #800080">1</span> TLSv1.<span style="color: #800080">2</span><span style="color: #000000">;
ssl_prefer_server_ciphers on;
ssl_ciphers </span><span style="color: #800000">"</span><span style="color: #800000">EECDH+ECDSA+AESGCM EECDH+aRSA+AESGCM EECDH+ECDSA+SHA384 EECDH+ECDSA+SHA256 EECDH+aRSA+SHA384 EECDH+aRSA+SHA256 EECDH EDH+aRSA !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS !RC4</span><span style="color: #800000">"</span><span style="color: #000000">;
# config ssl certificate
<span style="color: #ff0000"> ssl_certificate conf.crt<span style="color: #ff0000">/live/filterinto.com/fullchain.pem;
ssl_certificate_key conf.crt/live/filterinto.com/<span style="color: #000000"><span style="color: #ff0000">privkey.pem;
location </span>^~ /.well-known/acme-challenge/<span style="color: #000000"> {
default_type </span><span style="color: #800000">"</span><span style="color: #800000">text/plain</span><span style="color: #800000">"</span><span style="color: #000000">;
root </span>/usr/share/nginx/<span style="color: #000000">html;
}
location </span>= /.well-known/acme-challenge/<span style="color: #000000"> {
return </span><span style="color: #800080">404</span><span style="color: #000000">;
}
location </span>/<span style="color: #000000"> {
proxy_pass http:</span><span style="color: #008000">//</span><span style="color: #008000">web;</span>
<span style="color: #000000"> }
}
server {
listen <span style="color: #800080">443<span style="color: #000000">;
listen [::]:<span style="color: #800080">443<span style="color: #000000">;
server_name www.filterinto.com;
# enable ssl
ssl on;
ssl_protocols TLSv1 TLSv1.</span><span style="color: #800080">1</span> TLSv1.<span style="color: #800080">2</span><span style="color: #000000">;
ssl_prefer_server_ciphers on;
ssl_ciphers </span><span style="color: #800000">"</span><span style="color: #800000">EECDH+ECDSA+AESGCM EECDH+aRSA+AESGCM EECDH+ECDSA+SHA384 EECDH+ECDSA+SHA256 EECDH+aRSA+SHA384 EECDH+aRSA+SHA256 EECDH EDH+aRSA !aNULL !eNULL !LOW !3DES !MD5 !EXP !PSK !SRP !DSS !RC4</span><span style="color: #800000">"</span><span style="color: #000000">;
# config ssl certificate
<span style="color: #ff0000"> ssl_certificate conf.crt<span style="color: #ff0000">/live/www.filterinto.com/fullchain.pem;
ssl_certificate_key conf.crt/live/www.filterinto.com/<span style="color: #000000"><span style="color: #ff0000">privkey.pem;
location </span>^~ /.well-known/acme-challenge/<span style="color: #000000"> {
default_type </span><span style="color: #800000">"</span><span style="color: #800000">text/plain</span><span style="color: #800000">"</span><span style="color: #000000">;
root </span>/usr/share/nginx/<span style="color: #000000">html;
}
location </span>= /.well-known/acme-challenge/<span style="color: #000000"> {
return </span><span style="color: #800080">404</span><span style="color: #000000">;
}
location </span>/<span style="color: #000000"> {
proxy_pass http:</span><span style="color: #008000">//</span><span style="color: #008000">web;</span>
<span style="color: #000000"> }
}