hub.docker.com Open in urlscan Pro
2600:1f18:2148:bc01:2822:9e2a:c82a:af0  Public Scan

Submitted URL: https://smnrp.net/
Effective URL: https://hub.docker.com/r/ethnexus/smnrp
Submission: On June 15 via api from US — Scanned from CH

Form analysis 1 forms found in the DOM

GET /search

<form class="MuiBox-root css-11qjisw" method="get" action="/search">
  <div class="MuiAutocomplete-root MuiAutocomplete-fullWidth css-16j59pc">
    <div class="MuiFormControl-root MuiFormControl-marginDense MuiFormControl-fullWidth MuiTextField-root  css-1he97fj" data-testid="autocompleteInput">
      <div class="MuiInputBase-root MuiOutlinedInput-root MuiInputBase-colorPrimary MuiInputBase-fullWidth MuiInputBase-formControl MuiInputBase-sizeSmall MuiInputBase-adornedStart MuiInputBase-adornedEnd MuiAutocomplete-inputRoot css-17nw5z4">
        <div class="MuiInputAdornment-root MuiInputAdornment-positionStart MuiInputAdornment-outlined MuiInputAdornment-sizeSmall css-1fm2mod"><span class="notranslate">​</span><svg class="MuiSvgIcon-root MuiSvgIcon-fontSizeMedium css-14yq2cq"
            focusable="false" aria-hidden="true" viewBox="0 0 24 24" data-testid="SearchIcon">
            <path d="M15.5 14h-.79l-.28-.27C15.41 12.59 16 11.11 16 9.5 16 5.91 13.09 3 9.5 3S3 5.91 3 9.5 5.91 16 9.5 16c1.61 0 3.09-.59 4.23-1.57l.27.28v.79l5 4.99L20.49 19zm-6 0C7.01 14 5 11.99 5 9.5S7.01 5 9.5 5 14 7.01 14 9.5 11.99 14 9.5 14">
            </path>
          </svg></div><input aria-invalid="false" autocomplete="off" id=":r3:" name="q" placeholder="Search Docker Hub" type="text"
          class="MuiInputBase-input MuiOutlinedInput-input MuiInputBase-inputSizeSmall MuiInputBase-inputAdornedStart MuiInputBase-inputAdornedEnd MuiAutocomplete-input MuiAutocomplete-inputFocused css-1xn85km _ar_hide_" aria-autocomplete="list"
          aria-expanded="false" autocapitalize="none" spellcheck="false" role="combobox" value="" _ar_hide_="width:351.609px;height:20.125px;margin:0px;position:static;display:block;">
        <div class="MuiInputAdornment-root MuiInputAdornment-positionEnd MuiInputAdornment-outlined MuiInputAdornment-sizeSmall css-1yidp04">
          <div class="MuiBox-root css-j3iiqs" id="search-keyboard-shortcuts-hint">ctrl+K</div>
        </div>
        <fieldset aria-hidden="true" class="MuiOutlinedInput-notchedOutline css-16zz1in">
          <legend class="css-ihdtdm"><span class="notranslate">​</span></legend>
        </fieldset>
      </div>
    </div>
  </div>
  <div role="presentation" class="base-Popper-root MuiAutocomplete-popper css-1le80r3" style="position: fixed; top: 0px; left: 0px; display: none; width: 461px;">
    <div class="MuiPaper-root MuiPaper-elevation MuiPaper-rounded MuiPaper-elevation4 MuiAutocomplete-paper css-1sd661p"></div>
  </div>
</form>

Text Content

docker
Hub

ctrl+K

Help

Sign InSign up
 1. Explore
 2. /

 3. ethnexus/smnrp


ETHNEXUS/SMNRP

0

By ethnexus

•Updated 3 days ago

Secure Multifunctional Nginx Reverse Proxy

Image
Integration & Delivery
Web Servers
Web Analytics
Pulls

1.2K

OverviewTags


SECURE MULTIFUNCTIONAL NGINX REVERSE PROXY

The Secure Multifuctional Nginx Reverse Proxy (SMNRP) is a reverse proxy based
on nginx.



FEATURES

HTTPS CERTIFICATES

 * Automatic generation and renewal of https certificates (using Let's Encrypt⁠)
 * Automatic generation of a self signed certificate
 * Usage of custom certificates

USAGE OPTIONS

 * Load balancer to different locations
 * Reverse proxy to a web application
 * Virtual host support (new since version 2)

SECURITY FEATURES

 * High baseline security
 * Customized Content-Security-Policy
 * OCSP stapling :information_source:⁠
 * Basic authentication to specific locations

ADDITIONAL FEATURES

 * Analytics website with traffic analytics
 * Maintenance mode

GETTING STARTED

SMNRP can be configured using only environment variables, what makes it ideal to
implement into a configurable container. All possible configuration environment
variables are described in this readme.

To integrate the SMNRP into your web application you just need to configure the
environment variables (in the .env file).

Let's start with some examples.

EXAMPLES

SIMPLE REVERSE PROXY

To start with the most basic configuration to use SMNRP as a reverse proxy to a
web application while requesting the certificates automatically from Let's
Encrypt.



SMNRP_DOMAINS=dom.org,www.dom.org
SMNRP_UPSTREAMS=api:5000
SMNRP_LOCATIONS=/api/!http://targets/api/,/api/static!/usr/share/static


In this example the domain names (SMNRP_DOMAINS) are provided. The first name in
the comma separated list is used as the common name (cn) in the certificate. The
additional ones are configured as Subject Alternative Names (SAN).

Only a single upstream (SMNRP_UPSTREAMS) needs to be configured. This anonymous
upstream can be referenced as target in the locations (SMNRP_LOCATIONS) section.

The locations (SMNRP_LOCATIONS) can be configured in a comma separated list
where the parts are separated by !. In this example the /api/ location will be
proxied (nginx: proxy_pass) to http://targets/api/ and /api/static will be
aliased (nginx: alias) to /usr/share/static.

SIMPLE LOAD BALANCING

The following example shows the load balancing mode.



SMNRP_DOMAINS=dom.org,www.dom.org
SMNRP_UPSTREAMS=srv1.dom.org:443,srv2.dom.org:443
SMNRP_LOCATIONS=/api/!https://targets/api/,/api/static!/usr/share/static


In this scenario the certificates are requested from Let's Encrypt as in the
first example. The traffic is then load balanced to two servers srv1.dom.org and
srv2.dom.org. The load balancing is internally configured as:

upstream targets {
  server srv1.dom.org:443 max_fails=3 fail_timeout=10s;
  keepalive 32;
  server srv2.dom.org:443 max_fails=3 fail_timeout=10s;
  keepalive 32;
}


The requests are equally distributed to the different targets. If one fails only
the others are used. This mechanism can only be used for high availability
scenarios without shared storage or shared state.

ADD VIRTUAL HOST SUPPORT



To enable virtual hosts you need to use the | separator in the config variables:

SMNRP_DOMAINS=dom.org,www.dom.org|otherdom.org
SMNRP_UPSTREAMS=|postman-echo.com:443
SMNRP_LOCATIONS=/!/web_root/dom.org/!t:a,/api/!https://postman-echo.com/get/|/api/!https://targets/get/


The configuration will take the order into account. First section is the first
vhost (dom.org), second the second (otherdom.org) and so on. If you add vhost
support for one config variable you need to add it for every other config
variable as well except for SMNRP_ENABLE_ANALYTICS (this is a global setting).

In this example two vhosts are configured. vhost1 does not have any upstream
configured, where the upstream of vhost2 is configured to be
postman-echo.com:443. The first location for vhost1 are configured as / to be
aliased (nginx: alias) to /web_root/dom.org as this is the directory inside
SMNRP that is created to hold the files to be served for the vhost named
dom.org. Additionally there are two flags configured for this location t and a.
Those are described in details under the Flags⁠ section. The /api/ location is
proxied (nginx: proxy_pass) to https://postman-echo.com/get/. The second vhost
only proxies the /api/ location to https://targets/get/, what is basically the
same as in vhost1 because the upstream of vhost 2

CONFIGURATION

SMNRP_DOMAINS

(required) Define a comma separated list of domains you want to have included in
the https certificate. The fist entry is used as the common name (cn) and the
domain name in general, the subsequent names are used as Subject Alternative
Names (SAN). If virtual hosts are configured the first entry is used as the
folder name in the /web_root/<fist entry> directory.

SMNRP_UPSTREAMS

(optional) Define the upstream servers in a comma separated list. Unnamed
upstreams can be referenced in the SMNRP_LOCATIONS as targets. You can also name
targets by prefixing them with target_name!. If you use named targets you can
reference them in SMNRP_LOCATIONS by its target_name. If this setting is not
given the /web_root or /web_root/<vhost> is served.

SMNRP_UPSTREAMS=api:5000,notebook!notebook:8888


SMNRP_LOCATIONS

(optional) Define additional locations you want to support. This is essential if
you use SMNRP as a simple proxy for your web application. The definitions are
comma separated and consists of two mandatory and an optional part separated by
!.

SMNRP_LOCATIONS=path!alias|proxy_url[!flags]


The path is the url location that should be directed. A path need to be
configured as the tail of the uri (e.g. /api/).

The alias is a local directory inside SMNRP, normally bind mounted. An alias
need to be configured as a path (e.g. /usr/share/static or /web_root/<vhost>).

The proxy_url defines a target outside of the SMNRP context. It could be an
external web application or another container. A proxy_url need to be configured
as a url (e.g. https://target_name/api/ where target_name of the unnamed
upstreams is targets).

Additionally, flags can be configured using a : separated string.

The three parts are separated by a !.

Flags

 * t: Adds a try_files clause to an alias location. This must be used if the
   files in the target need to be served.
 * a: Adds a auth_basic clause to the location so that only SMNRP_USERS have
   access to it. SMNRP_USERS must be configured in order to make this working.
 * c: Sets the headers to disables the browser cache.
 * r: Returns a permanent redirect (301) to the alias or proxy_url. This flag
   can not be mixed with other flags.

Example

SMNRP_LOCATIONS=/!/web_root/dom.org/!t:a,/api/!https://postman-echo.com/get/,/redirect/!/new-destination/!r


This example aliases (nginx: alias) the / path to /web_root/dom.org/, adds a
try_files clause as well as a auth_basic clause to the location section. The
/api/ path is proxied (nginx: proxy_pass) to https://postman-echo.com/get/

Translation to nginx config

Basically the translation inside the nginx config is

 * for an alias:

location <path> {
  alias <alias>;
  try_files $uri $uri/ /index.html;      <--[Only if flag 't' is set]
}


 * for a proxy_url:

location <path> {
  proxy_pass <proxy_url>;
}


 * for auth_basic, only if flag a is set:

location <path> {
  auth_basic "Authorization Required";
  auth_basic_user_file <path_to_user_pw_list>;   <--[Derived from 'SMNRP_USERS']
}


 * for permanent redirect, only if flag r is set:

location <path> {
  return 301 <alias|proxy_url>;
}


If you want to redirect to the configured unnamed upstream(s) you can use
targets as the server name.

If you want to redirect to another container you need to use the service name of
the particular application.

If you only want to proxy to the configured upstreams (SMNRP_UPSTREAMS), just
leave SMNRP_LOCATIONS empty.

SMNRP_REQUEST_ON_BOOT

If set to true SMNRP requests a new certificate from Let's Encrypt on every
boot. Do not force this - it leads to problems getting a certificate because of
too many requests. This is meant to be used in case of troubleshooting.

SMNRP_SELF_SIGNED

If set to true SMNRP is generating self signed certificates instead of gathering
it from Let's Encrypt.

SMNRP_SELF_SIGNED_RENEW

If set to true SMNRP will regenerate the self signed certificate on each start.

SMNRP_OWN_CERT

If set to true SMNRP will not create any certificate but it requires the
following two files to be mapped into the container (i.e. as docker read-only
volume):

 * /etc/letsencrypt/live/${domain}/fullchain.pem
 * /etc/letsencrypt/live/${domain}/privkey.pem

Here is an example:

  ...
  ws:
    image: ethnexus/SMNRP
    volumes:
      ...
      - /path/to/dom.org.fullchain.pem:/etc/letsencrypt/live/dom.org/fullchain.pem:ro
      - /path/to/dom.org.key.pem:/etc/letsencrypt/live/dom.org/privkey.pem:ro


> Replace the ${domain} with the first domain name in SMNRP_DOMAINS comma
> separated list.

SMNRP_CSP

You can define the Content-Security-Policy header. If this is not defined, the
default (most secure) header is used:

default-src 'self' http: https: data: blob: 'unsafe-inline'


If you want to completely disable the Content-Security-Policy header set
SMNRP_CSP to none:

SMNRP_CSP=none


It's often a good idea to set this to none to avoid unexprected access problems.
It should only be set if you need to extensively secure your web application.

SMNRP_DISABLE_OCSP_STAPLING

If true ocsp-stapling is disabled.

SMNRP_DISABLE_HTTPS

If set to true SMNRP will completely ignore https for communication and only
listen on port 80 to serve the resources.

SMNRP_USE_BUYPASS

If true smnrp uses Buypass certificate service in case of Let's Encrypt

SMNRP_USE_BUYPASS=false


SMNRP_USERS

A comma separated list of user:password combinations to be allowed to do basic
authentication on targets with the a flag.

SMNRP_USERS=admin:admin,user:pass


SMNRP_ENABLE_ANALYTICS

If true SMNRP is generating an analytics dashboard page based on goaccess⁠ at
analytics/dashboard.html. To enable this feature set SMNRP_ENABLE_ANALYTICS to
true, default is false.

VIRTUAL HOST CONFIGURATION

To enable virtual hosts you need to use the | separator in the config variables:

SMNRP_DOMAINS=dom.org,www.dom.org|otherdom.org
SMNRP_UPSTREAMS=|postman-echo.com:443
SMNRP_LOCATIONS=/!/web_root/localhost/!t:a,/api/!https://postman-echo.com/get/|/api/!https://targets/get/
SMNRP_SELF_SIGNED=true|true
SMNRP_USERS=admin:secret,user1:xzy|user2:pass


The configuration will take the order into account. First section is vhost1, the
second is vhost2 and so on. If you add vhost support for one config variable you
must add it for every other config variable as well except for
SMNRP_ENABLE_ANALYTICS which is a global setting.

A vhost configuration may contain all configuration entries as a configuration
without vhost support. The configuration that will be taken into account is
selected by the url that is accessing SMNRP (default vhost behavior).

APPLY CUSTOM CONFIGURATIONS

SMNRP also loads *.nginx files in the directory
/etc/nginx/conf.d/custom/*.nginx. You can bind mount or copy a local directory
including your custom configs to /etc/nginx/conf.d/custom/.

INTEGRATION INTO DOCKER-COMPOSE

To integrate SMNRP into docker compose to setup a reverse proxy to the
application, you need to add the following part into you docker-compose.yml:

volumes:
  web_root:
  smnrp_data:
services:
  ws:
    image: ethnexus/smnrp
    volumes: 
      - web_root:/web_root
      - smnrp_data:/etc/letsencrypt
      # - "./custom/configs:/etc/nginx/conf.d/custom"
    ports:
      - 80:80
      - 443:443
    env_file: .env
    restart: unless-stopped
    depends_on:
      - ui
      - api
  ui:
    ...
    volumes:
      - "web_root:/path/to/webapp"
    ...
  api:
    ...


Your web application files need to be generated into the docker volume web_root
that needs to be mapped to /web_root. In case of vhosts it should be bind
mounted to /web_root/<vhost>

Essential is the smnrp_data volume. It should always bind mounted to
/etc/letsencrypt, otherwise SMNRP may create too many requests to Let's Encrypt
and gets blocked for about 24h to request certificates. If you are using a local
directory to bind mount /etc/letsencrypt (i.e. ./ssl:/etc/letsencrypt) you must
create the ssl-dhparams.pem in the root of this directory (i.e. ./ssl) by using:

openssl dhparam -out ssl-dhparams.pem 4096 


MAINTENANCE MODE

To enable the maintenance mode you need to touch the file .maintenance into the
folder /web_root or /web_root/<vhost>. As long as the file exists SMNRP will
return 503 Service unavailable and displays a nice maintenance page.

CHANGE THE MAINTENANCE PAGE

To add a custom maintenance page you need to overwrite the file
/usr/share/nginx/html/error/maintenance.html.

...
  volumes:
    - ./my-maintenance.html:/usr/share/nginx/html/error/maintenance.html


SCRIPT TO ENABLE, DISABLE THE MAINTENANCE MODE

Here is a script that you could use to enable, disable the maintenance mode with
one command (maint.sh):

#!/usr/bin/env bash

DC_EXEC="docker-compose -f docker-compose.yml -f docker-compose.prod.yml exec ws"

if [[ "$1" == "on" ]]; then
    ${DC_EXEC} sh -c 'touch /web_root/.maintenance'
elif [[ "$1" == "off" ]]; then
    ${DC_EXEC} sh -c 'rm -f /web_root/.maintenance'
else
    echo "Please specify 'on' or 'off'"
    exit 1
fi


RESTRICT ACCESS

To enable basic authentication on selected targets you need to flag the
locations with the a flag and define the users and passwords using the
SMNRP_USERS environment variable.

SMNRP_LOCATIONS=/!/web_root/!t:a
SMNRP_USERS=admin:admin,user:pass


This example restricts the access to the / location to the users admin with the
password admin and the user user with the password pass using Basic
Authentication.

CHANGE THE AUTHORIZATION REQUIRED PAGE

To add a custom Authorization Required page you need to overwrite the file
/usr/share/nginx/html/error/auth_required.html.

...
  volumes:
    - ./my-auth_required.html:/usr/share/nginx/html/error/auth_required.html


DETECT AND HANDLE CERTIFICATE RENEWALS ON HOST

SMNRP is adding a file called like the domain for which the certificate update
happened into the directory /signal. You can bind mount this directory and run a
cronjob on your host os to detect changes. An example script:

#!/usr/bin/env bash

SIGNAL_DIR="/path/to/signal"
DOMAIN="domain.of.interest"

if [ -f "${SIGNAL_DIR}/${DOMAIN}" ]; then
    echo "##############"
    echo `date`
    rm -f "${SIGNAL_DIR}/${DOMAIN}"
    ### EXAMPLE to reload postfix
    postfix reload
    service dovecot reload
    ### you can add your own logic here
fi


The following entry can be added to the repository's owners crontab:

* * * * * (sudo /path/to/scripts/certRenew.sh 2>&1) >> /path/to/logs/certRenew.log


CONFIGURE HARDENING PARAMETERS

SMNRP_CLIENT_MAX_BODY_SIZE

Set the client_max_body_size, default is 1m. This must be set to support large
file uploads through SMNRP.

SMNRP_CLIENT_MAX_BODY_SIZE=1m


SMNRP_SERVER_TOKENS

Set the server_tokens parameter for this server, default is off.

SMNRP_SERVER_TOKENS=off


SMNRP_CLIENT_BODY_BUFFER_SIZE

Set the client_body_buffer_size parameter for this server, default is 1k. Nginx
default would be 8k|16k

SMNRP_CLIENT_BODY_BUFFER_SIZE=1k


SMNRP_LARGE_CLIENT_HEADER_BUFFERS

Set the large_client_header_buffers parameter for this server, default is 2 1k.
Nginx default would be 4 8k

SMNRP_LARGE_CLIENT_HEADER_BUFFERS=2 1k


RESET SMNRP

If you went into troubles because of too many different configuration changes,
you may want to reset smnrp:

docker exec <smnrp-container> /smnrp_reset



DOCKER PULL COMMAND

docker pull ethnexus/smnrp

Copy

WHY

OverviewWhat is a Container

PRODUCTS

Product Overview

PRODUCT OFFERINGS

Docker DesktopDocker Hub

FEATURES

Container RuntimeDeveloper ToolsDocker AppKubernetes

DEVELOPERS

Getting StartedPlay with DockerCommunityOpen SourceDocumentation

COMPANY

About UsResourcesBlogCustomersPartnersNewsroomEvents and WebinarsCareersContact
UsSystem Status⁠

--------------------------------------------------------------------------------

© 2024 Docker, Inc. All rights reserved. | Terms of Service | Subscription
Service Agreement | Privacy | Legal


Cookies Settings

Back

Documentation
⁠
Forums
⁠
Contact Support
System Status
⁠


Back




Back

Help

Docker Suite


Back

Documentation
⁠
Forums
⁠
Contact Support
System Status
⁠


Back

Admin Console
New
Manage users, control access, & set policies.

Docker Scout
New
Secure your supply chain at every level.

Docker Desktop
Local development, simplified.


Docker Build Cloud
New
Speed up your Docker Builds.

--------------------------------------------------------------------------------


Docs
Learn how to use Docker.


Community Forums
Get help from the community.


System Status
Check the status of Docker services.


By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts.
Cookies Settings Reject All Accept All Cookies



PRIVACY PREFERENCE CENTER

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information
Allow All


MANAGE CONSENT PREFERENCES

FUNCTIONAL COOKIES

Functional Cookies

These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. They are usually only set in response to actions made by you
which amount to a request for services, such as setting your privacy
preferences, logging in or filling in forms. You can set your browser to block
or alert you about these cookies, but some parts of the site will not then work.
These cookies do not store any personally identifiable information.

PERFORMANCE COOKIES

Performance Cookies

These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collect is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

TARGETING COOKIES

Targeting Cookies

These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Back Button


COOKIE LIST



Search Icon
Filter Icon

Clear
checkbox label label
Apply Cancel
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Reject All Confirm My Choices