this docker container provides haproxy and a small python script which will recreate its configuration from available docker container when a container gets started or gets stopped.
haproxy is listening on port 80 and will forward all requests to a specific docker-image. It uses the hostname to distinguish the containers.
How does haproxy know about the running docker-containers? There's a python script loosely based on work of Bastian Hoyer which rewrites the haproxy-configuration when a docker-container gets started or gets stopped. It will scan all running docker-containers and get the hostname and port from all running containers via environment-variables. The container set the environment-variable VHOST and (optionally) VPORT to their needs, the configuration utility parses this information and the internal IP of the docker-container and constructs a suitable haproxy-configuration file and restarts haproxy. It listens for docker events and will update the haproxy config on demand.
If the environment variable PROVIDE_DEFAULT_BACKEND
is set, then the python script will provide a basic status page listing all environments instead of showing a 503 error.
VHOST
orVIRTUAL_HOST
the hostnames to use for this docker-container (separate multiple hostnames with a space)VPORT
orVIRTUAL_PORT
the port to forward the http-traffic to, defaults to 80VPATH
the path to filter by requests; this allows you to serve multiple containers under the same domain, but with different url-prefixes. The prefixes get removed when passed to the containers, or whenVPATH_REPLACEMENT
is set, it gets replaced with the value fromVPATH_REPLACEMENT
.VPATH_REPLACEMENT
sets the replacement path for whenVPATH
is set. This allows you to rewrite the paths completely.HTTPS_ONLY
will forward traffic for port 80 to port 443 for that given VHOST.REDIRECT_FROM
redirect from a given hostname. (Separate multiple hostnames with a space)SSH
if a container exposes this environment variable, all ssh-traffic to 22 is forwarded to the container. This setting can be used only for one container.HTTP_AUTH_USER
andHTTP_AUTH_PASS
protect an instance via HTTP-Auth.
Example
running this docker-command will instruct haproxy to forward all https traffic for my.domain.tld
to port 8888
inside the container
docker run \
-e VHOST=my.domain.tld \
-e VPORT=8888 \
-e VPATH=/foo \
-e VPATH_REPLACEMENT=/bar \
-e HTTPS_ONLY=1 \
-e REDIRECT_FROM=old.domain.tld superold.domain.tld\
mydocker
This will instruct haproxy forward all http and https traffic for my.domain.tld/fooxxx
to port 8888
inside mydocker
-container and path /barxxx
. It will also redirect all traffic for old.domain.tld
to my.domain.tld
docker pull factorial/haproxy-config:<VERSION>
docker build --tag=factorial/haproxy-config .
docker run \
-v /var/run/docker.sock:/var/run/docker.sock \
-v /dev/log:/dev/log \
-e SSL_MODE=CUSTOM|LETS_ENCRYPT|NONE \
-e LETS_ENCRYPT_MAIL=<your-admin-email-address> \
-e PROVIDE_DEFAULT_BACKEND=1 \
-p 80:80 \
-p 443:443 \
-p 1936:1936 \
--privileged \
--name haproxy \
-d \
factorial/haproxy-config
The environment variables SSL_MODE
, LETS_ENCRYPT_MAIL
and PROVIDE_DEFAULT_BACKEND
are optional:
- if
SSL_MODE
is set toLETS_ENCRYPT
then for every domain a letsencrypt certificate will be created. If you want to use your own certificates, setSSL_MODE
toCUSTOM
and map your certificates via a volume-mount to/etc/haproxy/ssl
. Disable SSL by settingSSL_MODE
toNONE
. The default value isLETS_ENCRYPT
LETS_ENCRYPT_MAIL
is needed when you want to use SSL certificates from LetsEncrypt.- If you set
PROVIDE_DEFAULT_BACKEND
you'll get a nice and shiny overview page when haproxy can't serve your request. This is most useful if you use haproxy-config for local development. PLEASE DO NOT USE IN PRODUCTION
Note: if you want that haproxy handles SSL-traffic, you'll need to map the corresponding directory into the haproxy-container and listen also on port 443.
With version 1.1.0 docker networks are supported, Please make sure, that the haproxy container can connect to the networks of your docker-container:
docker network connect haproxy <your-network-name>
(Obsolote since 1.3.0, but might be necessary in certain environments)
- Rework SSL-handling and fix various bugs with it. haproxy-config can either handle SSL-connections with custom scertificates, or will use letsencrypt for certificate-handling. See the docs for the evironment variable
SSL_MODE
- Haproxy will leave private networks if it is the only container participating in that network
- letsencrypt certificates get renwed automatically now
- ssl, specifically letsencrypt is enabled by default
- various bug fixes
- Display
VPATH
also on the landing page.
- When using
VPATH
allow a different path to be used in the container usingVPATH_REPLACEMENT
- Use haproxy 2.2 wich supports HTTP/2 (now working correctly)
- haproxy will autojoin private networks if there's a container which wants to be exposed using the environment variables
- Add support for http-auth via
HTTP_AUTH_USER
andHTTP_AUTH_PASS
- supports SSL certificates from LetsEncrypt if environment variable
LETS_ENCRYPT
is set. - Provide a default backend listing all containers with their urls as a table (optional)
- Use haproxy 1.9 which supports HTTP/2
- support url-prefixe via
VPATH
- use
hdr(host)
instead ofhdr_dom(host)
to support domains and subdomains (e.g. example.com and docs.example.com)
- add
EXPOSED_NETWORK
to expose an IP of a specific network to the haproxy config
- rewrite core-logic, use docker events to update haproxy-configs when sth changes
- use ninja2 for creating a new configuration file from a template-file
- support for regex via VHOST_REGEX
- support for multiple VHOSTs, separate them with a space
- support for multiple redirects, separate them with a space
- support for docker networks
- support for
VIRTUAL_HOST
andVIRTUAL_PORT
- support for forwarding SSH-traffic to a specific container
- bind also to port 8080
- enhance documentation
- fix race condition of spawning multiple haproxy instances
- initial release