You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
My nginx-proxy implementation are having issues with certificate creation. In my observations I do not see the crt and key files inside certs folder. Can anyone give a hint of what I did wrong?
2023/07/24 20:43:34 [warn] 43#43: the "listen ... http2" directive is deprecated, use the "http2" directive instead in /etc/nginx/conf.d/default.conf:88
nginx: [warn] the"listen ... http2" directive is deprecated, use the "http2" directive instead in /etc/nginx/conf.d/default.conf:88
2023/07/24 20:43:34 [warn] 43#43: the "listen ... http2" directive is deprecated, use the "http2" directive instead in /etc/nginx/conf.d/default.conf:111
nginx: [warn] the"listen ... http2" directive is deprecated, use the "http2" directive instead in /etc/nginx/conf.d/default.conf:111
2023/07/24 20:43:34 [warn] 43#43: the "listen ... http2" directive is deprecated, use the "http2" directive instead in /etc/nginx/conf.d/default.conf:140
nginx: [warn] the"listen ... http2" directive is deprecated, use the "http2" directive instead in /etc/nginx/conf.d/default.conf:140
2023/07/24 20:43:34 [warn] 43#43: the "listen ... http2" directive is deprecated, use the "http2" directive instead in /etc/nginx/conf.d/default.conf:169
nginx: [warn] the"listen ... http2" directive is deprecated, use the "http2" directive instead in /etc/nginx/conf.d/default.conf:169
2023/07/24 20:43:34 [warn] 43#43: the "listen ... http2" directive is deprecated, use the "http2" directive instead in /etc/nginx/conf.d/default.conf:198
nginx: [warn] the"listen ... http2" directive is deprecated, use the "http2" directive instead in /etc/nginx/conf.d/default.conf:198
nginx: the configuration file /etc/nginx/nginx.conf syntax is ok
# configuration file /etc/nginx/nginx.conf:user nginx;
worker_processes auto;
error_log /var/log/nginx/error.log notice;
pid /var/run/nginx.pid;
events {
worker_connections1024;
}
http {
include /etc/nginx/mime.types;
default_type application/octet-stream;
log_format main'$remote_addr - $remote_user [$time_local] "$request" ''$status$body_bytes_sent "$http_referer" ''"$http_user_agent" "$http_x_forwarded_for"';
access_log /var/log/nginx/access.log main;
sendfile on;
#tcp_nopush on;keepalive_timeout65;
#gzip on;include /etc/nginx/conf.d/*.conf;
}
# configuration file /etc/nginx/mime.types:types {
text/html html htm shtml;
text/css css;
text/xml xml;
image/gif gif;
image/jpeg jpeg jpg;
application/javascript js;
application/atom+xml atom;
application/rss+xml rss;
text/mathml mml;
text/plain txt;
text/vnd.sun.j2me.app-descriptor jad;
text/vnd.wap.wml wml;
text/x-component htc;
image/avif avif;
image/png png;
image/svg+xml svg svgz;
image/tiff tif tiff;
image/vnd.wap.wbmp wbmp;
image/webp webp;
image/x-icon ico;
image/x-jng jng;
image/x-ms-bmp bmp;
font/woff woff;
font/woff2 woff2;
application/java-archive jar war ear;
application/json json;
application/mac-binhex40 hqx;
application/msword doc;
application/pdf pdf;
application/postscript ps eps ai;
application/rtf rtf;
application/vnd.apple.mpegurl m3u8;
application/vnd.google-earth.kml+xml kml;
application/vnd.google-earth.kmz kmz;
application/vnd.ms-excel xls;
application/vnd.ms-fontobject eot;
application/vnd.ms-powerpoint ppt;
application/vnd.oasis.opendocument.graphics odg;
application/vnd.oasis.opendocument.presentation odp;
application/vnd.oasis.opendocument.spreadsheet ods;
application/vnd.oasis.opendocument.text odt;
application/vnd.openxmlformats-officedocument.presentationml.presentation
pptx;
application/vnd.openxmlformats-officedocument.spreadsheetml.sheet
xlsx;
application/vnd.openxmlformats-officedocument.wordprocessingml.document
docx;
application/vnd.wap.wmlc wmlc;
application/wasm wasm;
application/x-7z-compressed 7z;
application/x-cocoa cco;
application/x-java-archive-diff jardiff;
application/x-java-jnlp-file jnlp;
application/x-makeself run;
application/x-perl pl pm;
application/x-pilot prc pdb;
application/x-rar-compressed rar;
application/x-redhat-package-manager rpm;
application/x-sea sea;
application/x-shockwave-flash swf;
application/x-stuffit sit;
application/x-tcl tcl tk;
application/x-x509-ca-cert der pem crt;
application/x-xpinstall xpi;
application/xhtml+xml xhtml;
application/xspf+xml xspf;
application/zip zip;
application/octet-stream bin exe dll;
application/octet-streamdeb;
application/octet-stream dmg;
application/octet-stream iso img;
application/octet-stream msi msp msm;
audio/midi mid midi kar;
audio/mpeg mp3;
audio/ogg ogg;
audio/x-m4a m4a;
audio/x-realaudio ra;
video/3gpp 3gpp 3gp;
video/mp2t ts;
video/mp4 mp4;
video/mpeg mpeg mpg;
video/quicktime mov;
video/webm webm;
video/x-flv flv;
video/x-m4v m4v;
video/x-mng mng;
video/x-ms-asf asx asf;
video/x-ms-wmv wmv;
video/x-msvideo avi;
}
# configuration file /etc/nginx/conf.d/default.conf:# nginx-proxy# Networks available to the container running docker-gen (which are assumed to# match the networks available to the container running nginx):# nginx-proxy# If we receive X-Forwarded-Proto, pass it through; otherwise, pass along the# scheme used to connect to this servermap$http_x_forwarded_proto$proxy_x_forwarded_proto {
default$http_x_forwarded_proto;
''$scheme;
}
map$http_x_forwarded_host$proxy_x_forwarded_host {
default$http_x_forwarded_host;
''$http_host;
}
# If we receive X-Forwarded-Port, pass it through; otherwise, pass along the# server port the client connected tomap$http_x_forwarded_port$proxy_x_forwarded_port {
default$http_x_forwarded_port;
''$server_port;
}
# If the request from the downstream client has an "Upgrade:" header (set to any# non-empty value), pass "Connection: upgrade" to the upstream (backend) server.# Otherwise, the value for the "Connection" header depends on whether the user# has enabled keepalive to the upstream server.map$http_upgrade$proxy_connection {
default upgrade;
''$proxy_connection_noupgrade;
}
map$upstream_keepalive$proxy_connection_noupgrade {
# Preserve nginx's default behavior (send "Connection: close"). default close;
# Use an empty string to cancel nginx's default behavior. true'';
}
# Abuse the map directive (see <https://stackoverflow.com/q/14433309>) to ensure# that $upstream_keepalive is always defined. This is necessary because:# - The $proxy_connection variable is indirectly derived from# $upstream_keepalive, so $upstream_keepalive must be defined whenever# $proxy_connection is resolved.# - The $proxy_connection variable is used in a proxy_set_header directive in# the http block, so it is always fully resolved for every request -- even# those where proxy_pass is not used (e.g., unknown virtual host).map""$upstream_keepalive {
# The value here should not matter because it should always be overridden in# a location block (see the "location" template) for all requests where the# value actually matters.default false;
}
# Apply fix for very long server namesserver_names_hash_bucket_size128;
# Default dhparam# Set appropriate X-Forwarded-Ssl header based on $proxy_x_forwarded_protomap$proxy_x_forwarded_proto$proxy_x_forwarded_ssl {
default off;
https on;
}
gzip_types text/plain text/css application/javascript application/json application/x-javascript text/xml application/xml application/xml+rss text/javascript;
log_format vhost '$host$remote_addr - $remote_user [$time_local] "$request" $status$body_bytes_sent "$http_referer" "$http_user_agent" "$upstream_addr"';
access_log off;
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers'ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES256-GCM-SHA384:DHE-RSA-CHACHA20-POLY1305';
ssl_prefer_server_ciphers off;
error_log /dev/stderr;
# HTTP 1.1 supportproxy_http_version1.1;
proxy_buffering off;
proxy_set_header Host $http_host;
proxy_set_header Upgrade $http_upgrade;
proxy_set_header Connection $proxy_connection;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Host $proxy_x_forwarded_host;
proxy_set_header X-Forwarded-Proto $proxy_x_forwarded_proto;
proxy_set_header X-Forwarded-Ssl $proxy_x_forwarded_ssl;
proxy_set_header X-Forwarded-Port $proxy_x_forwarded_port;
proxy_set_header X-Original-URI $request_uri;
# Mitigate httpoxy attack (see README for details)proxy_set_header Proxy "";
# START DEBUG HERE# akasha.fullertonhealth.co.idakasha.fullertonhealth.co.idfalseredirect# asa-i.fullertonhealth.co.idasa-i.fullertonhealth.co.idfalseredirect# darsana-i.fullertonhealth.co.iddarsana-i.fullertonhealth.co.idfalseredirect# darsana-ii.fullertonhealth.co.iddarsana-ii.fullertonhealth.co.idfalseredirectserver {
server_name _; # This is just an invalid value which will never trigger on a real hostname.server_tokens off;
listen80;
listen443 ssl http2;
ssl_session_cache shared:SSL:50m;
ssl_session_tickets off;
access_log /var/log/nginx/access.log vhost;
ssl_certificate /etc/nginx/certs/default.crt;
ssl_certificate_key /etc/nginx/certs/default.key;
return503;
}
# akasha.fullertonhealth.co.id/upstreamakasha.fullertonhealth.co.id {
# Container: portainer_web_1# networks:# nginx-proxy (reachable)# IP address: 172.28.0.3# exposed ports: 25/tcp 8000/tcp 9000/tcp 9443/tcp# default port: 80# using port: 9000server 172.28.0.3:9000;
}
server {
server_name akasha.fullertonhealth.co.id;
access_log /var/log/nginx/access.log vhost;
listen80 ;
listen443 ssl http2 ;
# No certificate found for this vhost, so use the default certificate and# return an error code if the user connects via https.ssl_certificate /etc/nginx/certs/default.crt;
ssl_certificate_key /etc/nginx/certs/default.key;
if ($https) {
return500;
}
include /etc/nginx/vhost.d/default;
location/ {
proxy_pass http://akasha.fullertonhealth.co.id;
set$upstream_keepalive false;
}
}
# asa-i.fullertonhealth.co.id/upstreamasa-i.fullertonhealth.co.id {
# Container: asa_i_web_1# networks:# nginx-proxy (reachable)# IP address: 172.28.0.8# exposed ports: 8069/tcp 8071/tcp 8072/tcp# default port: 80# using port: 8069server 172.28.0.8:8069;
}
server {
server_name asa-i.fullertonhealth.co.id;
access_log /var/log/nginx/access.log vhost;
listen80 ;
listen443 ssl http2 ;
# No certificate found for this vhost, so use the default certificate and# return an error code if the user connects via https.ssl_certificate /etc/nginx/certs/default.crt;
ssl_certificate_key /etc/nginx/certs/default.key;
if ($https) {
return500;
}
include /etc/nginx/vhost.d/default;
location/ {
proxy_pass http://asa-i.fullertonhealth.co.id;
set$upstream_keepalive false;
}
}
# darsana-i.fullertonhealth.co.id/upstreamdarsana-i.fullertonhealth.co.id {
# Container: darsana_i_web_1# networks:# nginx-proxy (reachable)# IP address: 172.28.0.11# exposed ports: 8069/tcp 8072/tcp# default port: 80# using port: 8069server 172.28.0.11:8069;
}
server {
server_name darsana-i.fullertonhealth.co.id;
access_log /var/log/nginx/access.log vhost;
listen80 ;
listen443 ssl http2 ;
# No certificate found for this vhost, so use the default certificate and# return an error code if the user connects via https.ssl_certificate /etc/nginx/certs/default.crt;
ssl_certificate_key /etc/nginx/certs/default.key;
if ($https) {
return500;
}
include /etc/nginx/vhost.d/default;
location/ {
proxy_pass http://darsana-i.fullertonhealth.co.id;
set$upstream_keepalive false;
}
}
# darsana-ii.fullertonhealth.co.id/upstreamdarsana-ii.fullertonhealth.co.id {
# Container: darsana_ii_web_1# networks:# nginx-proxy (reachable)# IP address: 172.28.0.2# exposed ports: 80/tcp# default port: 80# using port: 80server 172.28.0.2:80;
}
server {
server_name darsana-ii.fullertonhealth.co.id;
access_log /var/log/nginx/access.log vhost;
listen80 ;
listen443 ssl http2 ;
# No certificate found for this vhost, so use the default certificate and# return an error code if the user connects via https.ssl_certificate /etc/nginx/certs/default.crt;
ssl_certificate_key /etc/nginx/certs/default.key;
if ($https) {
return500;
}
include /etc/nginx/vhost.d/default;
location/ {
proxy_pass http://darsana-ii.fullertonhealth.co.id;
set$upstream_keepalive false;
}
}
# configuration file /etc/nginx/vhost.d/default:## Start of configuration add by letsencrypt containerlocation ^~ /.well-known/acme-challenge/ {
auth_basic off;
auth_request off;
allow all;
root /usr/share/nginx/html;
try_files$uri=404;
break;
}
## End of configuration add by letsencrypt container# configuration file /etc/nginx/conf.d/proxy-settings.conf:proxy_connect_timeout300;
proxy_send_timeout300;
proxy_read_timeout90m;
send_timeout300;
client_max_body_size5000m;
nginx: configuration file /etc/nginx/nginx.conf test is successful
Bug description
My nginx-proxy implementation are having issues with certificate creation. In my observations I do not see the crt and key files inside certs folder. Can anyone give a hint of what I did wrong?
acme-companion image version
v2.2.8-10-g347e3ef
nginx-proxy's Docker configuration
rendered nginx configuration
Containers logs
docker-gen.txt
nginx.txt
acme-companion.txt
Docker host
The text was updated successfully, but these errors were encountered: