You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+14-10Lines changed: 14 additions & 10 deletions
Original file line number
Diff line number
Diff line change
@@ -181,8 +181,12 @@ Finally, start your containers with `VIRTUAL_HOST` environment variables.
181
181
$ docker run -e VIRTUAL_HOST=foo.bar.com ...
182
182
### SSL Support using letsencrypt
183
183
184
-
[letsencrypt-nginx-proxy-companion](https://github.com/JrCs/docker-letsencrypt-nginx-proxy-companion) is a lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically.
184
+
[letsencrypt-nginx-proxy-companion](https://github.com/JrCs/docker-letsencrypt-nginx-proxy-companion) is a lightweight companion container for the nginx-proxy. It allow the creation/renewal of Let's Encrypt certificates automatically.
185
185
186
+
Set `DHPARAM_GENERATION` environment variable to `false` to disabled Diffie-Hellman parameters completely. This will also ignore auto-generation made by `nginx-proxy`.
187
+
The default value is `true`
188
+
189
+
$ docker run -e DHPARAM_GENERATION=false ....
186
190
### SSL Support
187
191
188
192
SSL is supported using single host, wildcard and SNI certificates using naming conventions for
@@ -214,7 +218,7 @@ at startup. Since it can take minutes to generate a new `dhparam.pem`, it is do
214
218
background. Once generation is complete, the `dhparam.pem` is saved on a persistent volume and nginx
215
219
is reloaded. This generation process only occurs the first time you start `nginx-proxy`.
216
220
217
-
> COMPATIBILITY WARNING: The default generated `dhparam.pem` key is 2048 bits for A+ security. Some
221
+
> COMPATIBILITY WARNING: The default generated `dhparam.pem` key is 2048 bits for A+ security. Some
218
222
> older clients (like Java 6 and 7) do not support DH keys with over 1024 bits. In order to support these
219
223
> clients, you must either provide your own `dhparam.pem`, or tell `nginx-proxy` to generate a 1024-bit
220
224
> key on startup by passing `-e DHPARAM_BITS=1024`.
@@ -282,12 +286,12 @@ a 500.
282
286
283
287
To serve traffic in both SSL and non-SSL modes without redirecting to SSL, you can include the
284
288
environment variable `HTTPS_METHOD=noredirect` (the default is `HTTPS_METHOD=redirect`). You can also
285
-
disable the non-SSL site entirely with `HTTPS_METHOD=nohttp`, or disable the HTTPS site with
286
-
`HTTPS_METHOD=nohttps`. `HTTPS_METHOD` must be specified on each container for which you want to
287
-
override the default behavior. If `HTTPS_METHOD=noredirect` is used, Strict Transport Security (HSTS)
288
-
is disabled to prevent HTTPS users from being redirected by the client. If you cannot get to the HTTP
289
-
site after changing this setting, your browser has probably cached the HSTS policy and is automatically
290
-
redirecting you back to HTTPS. You will need to clear your browser's HSTS cache or use an incognito
289
+
disable the non-SSL site entirely with `HTTPS_METHOD=nohttp`, or disable the HTTPS site with
290
+
`HTTPS_METHOD=nohttps`. `HTTPS_METHOD` must be specified on each container for which you want to
291
+
override the default behavior. If `HTTPS_METHOD=noredirect` is used, Strict Transport Security (HSTS)
292
+
is disabled to prevent HTTPS users from being redirected by the client. If you cannot get to the HTTP
293
+
site after changing this setting, your browser has probably cached the HSTS policy and is automatically
294
+
redirecting you back to HTTPS. You will need to clear your browser's HSTS cache or use an incognito
291
295
window / different browser.
292
296
293
297
By default, [HTTP Strict Transport Security (HSTS)](https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/Strict-Transport-Security)
@@ -410,7 +414,7 @@ Before submitting pull requests or issues, please check github to make sure an e
410
414
To run tests, you need to prepare the docker image to test which must be tagged `jwilder/nginx-proxy:test`:
0 commit comments