/traefik-certs-dumper

Dumps Let's Encrypt certificates of a specified domain which Traefik stores in acme.json.

Primary LanguageShellApache License 2.0Apache-2.0

traefik-certs-dumper

Docker Pulls Docker Image Version (latest semver) GitHub license Codacy Badge

Docker Image Size (docker latest) Docker Image Size (alpine latest)

Docker Image Size (arm32v7 latest) Docker Image Size (arm32v7-alpine latest)

Docker Image Size (arm64v8) Docker Image Size (arm64v8-alpine latest)

Dumps Let's Encrypt certificates of a specified domain to .pem and .key files which Traefik stores in acme.json.

This image uses:

Special thanks to them!

IMPORTANT: It's supposed to work with Traefik v2 or higher! If you want to use this certificate dumper with v1, you can simply change the image to mailu/traefik-certdumper.


Table of Contents


Usage

Image choice

We ship various flavors of this image - multi-arch, Docker (default) and Alpine. The versioning follows SemVer.

amd64 (normal) arm32v7 arm64v8
Docker (normal) latest, x.x.x, x.x, x arm32v7, x.x.x-arm32v7, x.x-arm32v7, x-arm32v7 arm64v8,x.x.x-arm64v8, x.x-arm64v8, x-arm64v8
Alpine alpine, x.x.x-alpine, x.x-alpine, x-alpine arm32v7-alpine, x.x.x-arm32v7-alpine, x.x-arm32v7-alpine, x-arm32v7-alpine arm64v8-alpine,x.x.x-arm64v8-alpine, x.x-arm64v8-alpine, x-arm64v8-alpine

|

alpine notes!

Please note that when using the alpine variant, using the container restart functionality won't work due to missing Docker installation and will be skipped.

Environment Variables

There are some environment variables if you want to customize various things inside the Docker container:

Variable Default Value Description
ACME_FILE_PATH /traefik/acme.json <filepath> Full file path to Traefik's certificates storage.
CERTIFICATE_FILE_NAME cert <filename> The file name (without extension) of the generated certificates.
CERTIFICATE_FILE_EXT .pem <extension> The file extension of the generated certificates.
COMBINE_PKCS12 unset yes If set to yes, an additional combined PKCS12 file is created.
CONVERT_KEYS_TO_RSA unset yes If set to yes, keys are created in RSA format also.
DOMAIN unset <extension> Extract only for specified domains (comma-separated list) - instead of all.
OVERRIDE_UID unset <number> Change ownership of certificate and key to given UID.
OVERRIDE_GID unset <number> Change ownership of certificate and key to given GID.
PKCS12_PASSWORD unset <password> Password for the combined PKCS12, see also COMBINE_PKCS12.
PRIVATE_KEY_FILE_NAME key <filename> The file name (without extension) of the generated private keys.
PRIVATE_KEY_FILE_EXT .pem <extension> The file extension of the generated private keys.
RSA_KEY_FILE_NAME rsakey <filename> The file name (without extension) of the generated private keys in RSA format, see also CONVERT_KEYS_TO_RSA.
RSA_KEY_FILE_EXT .pem <extension> The file extension of the generated private keys in RSA format, see also CONVERT_KEYS_TO_RSA.

See below examples for usage.

Basic setup

Mount your ACME folder into /traefik and output folder to /output. Here's an example for docker-compose:

version: '3.7'

services:
  certdumper:
    image: humenius/traefik-certs-dumper:latest
    volumes:
    - ./traefik/acme:/traefik:ro
    - ./output:/output:rw
    environment:
    - DOMAIN=example.org

Dump all certificates

The environment variable DOMAIN can be left out if you want to dump all available certificates.

version: '3.7'

services:
  certdumper:
    image: humenius/traefik-certs-dumper:latest
    volumes:
    - ./traefik/acme:/traefik:ro
    - ./output:/output:rw
    # Don't set DOMAIN
    # environment:
    # - DOMAIN=example.org

Custom ACME file name

Use environment variable ACME_FILE_PATH if you don't want to use the default path or if your ACME JSON file has a different name.

version: '3.7'

services:
  certdumper:
    image: humenius/traefik-certs-dumper:latest
    volumes:
      - ./traefik/acme:/my/custom/path:ro
      - ./output:/output:rw
    environment:
      - ACME_FILE: /my/custom/path/acme_the_second.json

Automatic container restart

If you want to have containers restarted after dumping certificates into your output folder, you can specify their names as comma-separated value and pass them through via optional parameter -r | --restart-containers. In this case, you must pass the Docker socket (or override $DOCKER_HOST if you use a Docker socket proxy). For instance:

version: '3.7'

services:
  certdumper:
    image: humenius/traefik-certs-dumper:latest
    command: --restart-containers container1,container2,container3
    volumes:
    - ./traefik/acme:/traefik:ro
    - ./output:/output:rw
    - /var/run/docker.sock:/var/run/docker.sock:ro
    environment:
    - DOMAIN=example.org

It is also possible to restart Docker services. You can specify their names exactly like the containers via the optional parameter --restart-services. The services are updated with the command docker service update --force <service_name> which restarts all tasks in the service.

Change ownership of certificate and key files

If you want to change the onwership of the certificate and key files because your container runs on different permissions than root, you can specify the UID and GID as an environment variable. These environment variables are OVERRIDE_UID and OVERRIDE_GID. These can only be integers and must both be set for the override to work. For instance:

version: '3.7'

services:
  certdumper:
    image: humenius/traefik-certs-dumper:latest
    command: --restart-containers container1,container2,container3
    volumes:
    - ./traefik/acme:/traefik:ro
    - ./output:/output:rw
    - /var/run/docker.sock:/var/run/docker.sock:ro
    environment:
    - DOMAIN=example.org
    - OVERRIDE_UID=1000
    - OVERRIDE_GID=1000

Extract multiple domains

This Docker image is able to extract multiple domains as well. Use environment variable DOMAIN and add you domains as a comma-separated list. After certificate dumping, the certificates can be found in the domains' subdirectories respectively. (/output/DOMAIN[i]/...) If you specify a single domain, the output folder remains the same as in previous versions (< v1.3 - /output).

version: '3.7'

services:
  certdumper:
    image: humenius/traefik-certs-dumper:latest
    volumes:
    - ./traefik/acme:/traefik:ro
    - ./output:/output:rw
    - /var/run/docker.sock:/var/run/docker.sock:ro
    environment:
      DOMAIN: example.com,example.org,example.net,hello.example.in

Health Check

This Docker image does reports its health status. The process which monitors run.sh reports back 1 when it malfunctions and 0 when it is running inside Docker container. Normally, it's embedded in the Dockerfile which means without further ado, this works out of the box. However, if you want to specify more than one health check, you can set them via docker-compose.

version: '3.7'

services:
  certdumper:
    image: humenius/traefik-certs-dumper:latest
    volumes:
    - ./traefik/acme:/traefik:ro
    - ./output:/output:rw
    - /var/run/docker.sock:/var/run/docker.sock:ro
    environment:
      DOMAIN: example.com,example.org,example.net,sub.domain.ext
    healthcheck:
      test: ["CMD", "/usr/bin/healthcheck"]
      interval: 30s
      timeout: 10s
      retries: 5

Merging private key and public certificate in one .pem

Load balancers like HAProxy need both private key and public certificate to be concatenated to one file. In this case, you can set the environment variable COMBINED_PEM to a desired file name ending with file extension *.pem. Each time traefik-certs-dumper dumps the certificates for specified DOMAIN, this script will create a *.pem file named after COMBINED_PEM in each domain's folder respectively.

version: '3.7'

services:
  certdumper:
    image: humenius/traefik-certs-dumper:latest
    volumes:
    - ./traefik/acme:/traefik:ro
    - ./output:/output:rw
    - /var/run/docker.sock:/var/run/docker.sock:ro
    environment:
      DOMAIN: example.com,example.org,example.net,hello.example.in
      COMBINED_PEM: my_concatted_file.pem

Merging private key and public certificate in one PKCS12 file

Some applications like Plex need both private key and public certificate to be concatenated to one PKCS12 file. In this case, you can set the environment variable COMBINE_PKCS12=yes. Each time traefik-certs-dumper dumps the certificates for specified DOMAIN, this script will create a file named cert.p12 in each domain's folder respectively. The password can be set with the environment variable PKCS12_PASSWORD. If you want to use Docker Secrets instead, use the environment variable PKCS12_PASSWORD_FILE. Note that PKCS12_PASSWORD has higher priority. If none of those are set, the password will be empty.

version: '3.7'

services:
  certdumper:
    image: humenius/traefik-certs-dumper:latest
    container_name: traefik_certdumper
    network_mode: none
    volumes:
      - ./traefik/acme:/traefik:ro
      - ./output:/output:rw
      - /var/run/docker.sock:/var/run/docker.sock:ro
    secrets:
      - pkcs12_password
    environment:
      DOMAIN: example.com
      PKCS12_PASSWORD_FILE: /run/secrets/pkcs12_password
      COMBINE_PKCS12: "yes"
      OVERRIDE_UID: 1000
      OVERRIDE_GID: 1000

secrets:
  pkcs12_password:
    file: /path/to/secret/PKCS12_PASSWORD

Convert keys in RSA format

Some applications like MySQL or mariaDB need their keys in RSA format. In this case, you can set the environment variable CONVERT_KEYS_TO_RSA. Each time traefik-certs-dumper dumps the certificates, this script will create a file named rsakey.pem in each domain's folder respectively. If required, this file name can be configured using the environment variables RSA_KEY_FILE_NAME and RSA_KEY_FILE_EXT.

version: '3.7'

services:
  certdumper:
    image: humenius/traefik-certs-dumper:latest
    container_name: traefik_certdumper
    network_mode: none
    volumes:
      - ./traefik/acme:/traefik:ro
      - ./output:/output:rw
      - /var/run/docker.sock:/var/run/docker.sock:ro
    environment:
      CONVERT_KEYS_TO_RSA: "yes"
      RSA_KEY_FILE_NAME: "myrsa"
      RSA_KEY_FILE_EXT: ".ext"

Help!

If you need help using this image, have suggestions or want to report a problem, feel free to open an issue on GitHub!