Certbot makes securing websites easier, offering a straightforward solution to obtain SSL/TLS certificates from Let's Encrypt. This has become the go-to method for many to make their websites more secure and trustworthy by encrypting HTTP traffic. However, when working in a dockerized environment, the process becomes a bit more complicated.

In a standalone environment, Certbot handles entire process automatically. However, in a containerized setup, the issue is that Docker containers are isolated from each other and running Certbot image won't configure everything automatically. While EFF's Certbot docs suggest to generate certificates manually and place them into Nginx volume, another option is a two-phase Docker Compose deployment. The first time we run our dockerized application, we generate a certificate that will be used for further deployments. In order to run nginx without the certificate during the first run, we will need a dedicated configuration file that will run only a HTTP server on port 80.
First deployment - obtaining the certificate
In this phase we will create a temporary Nginx server to handle acme-challenges during certificate generation.
./nginx/templates-gencert/default.conf.template
server {
listen [::]:80;
listen 80;
server_name $DOMAIN_NAME;
location ~/.well-known/acme-challenge {
allow all;
root /var/www/certbot;
}
}
./docker-compose-gencert.yml
services:
nginx:
container_name: nginx
image: nginx:latest
environment:
- DOMAIN_NAME
ports:
- 80:80
volumes:
- ./nginx/templates-gencert:/etc/nginx/templates:ro
- ./certbot/letsencrypt:/etc/letsencrypt:ro
- ./certbot/data:/var/www/certbot:ro
certbot:
container_name: certbot
image: certbot/certbot:latest
depends_on:
- nginx
command: >
certonly --reinstall --webroot --webroot-path=/var/www/certbot
--email ${EMAIL} --agree-tos --no-eff-email
-d ${DOMAIN_NAME}
volumes:
- ./certbot/letsencrypt:/etc/letsencrypt:rw
- ./certbot/data:/var/www/certbot:rw
By running docker compose up we can generate a certificate for a domain specified as DOMAIN_NAME environment variable (environment variables can be set using .env file). After successful certificate generation, we can proceed to the normal deployment scripts.
/nginx/templates/default.conf.template
server {
listen [::]:80;
listen 80;
server_name $DOMAIN_NAME;
return 301 https://$host$request_uri;
}
server {
listen [::]:443 ssl;
listen 443 ssl;
server_name $DOMAIN_NAME;
ssl_certificate /etc/letsencrypt/live/$DOMAIN_NAME/fullchain.pem;
ssl_certificate_key /etc/letsencrypt/live/$DOMAIN_NAME/privkey.pem;
location ~ /.well-known/acme-challenge {
allow all;
root /var/www/certbot;
}
location / {
proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
proxy_set_header X-Real-IP $remote_addr;
proxy_set_header X-Forwarded-Host $host;
proxy_set_header X-Forwarded-Proto https;
proxy_pass http://backend:3000;
}
}
./docker-compose.yml
services:
nginx:
container_name: nginx
image: nginx:latest
restart: always
environment:
- DOMAIN_NAME
ports:
- 80:80
- 443:443
volumes:
- ./nginx/templates:/etc/nginx/templates:ro
- ./certbot/letsencrypt:/etc/letsencrypt:ro
- ./certbot/data:/var/www/certbot:ro
backend:
build: ./backend
restart: always
container_name: backend
env_file: .env
certbot:
container_name: certbot
image: certbot/certbot:latest
depends_on:
- nginx
command: >
certonly --reinstall --webroot --webroot-path=/var/www/certbot
--email ${EMAIL} --agree-tos --no-eff-email
-d ${DOMAIN_NAME}
volumes:
- ./certbot/letsencrypt:/etc/letsencrypt:rw
- ./certbot/data:/var/www/certbot:rw
The file tree of the entire deployment code, both for certificate generation and normal deployment, with a sample Node.js app.
├── backend
│ ├── Dockerfile
│ ├── package.json
│ └── server.js
├── docker-compose-gencert.yml
├── docker-compose.yml
└── nginx
├── templates
│ └── default.conf.template
└── templates-gencert
└── default.conf.template
To renew certificates you can use the commands below. They can be placed at crontab to periodically check for renewal:
docker-compose -f docker-compose.yml run --rm certbot
docker-compose -f docker-compose.yml exec nginx nginx -s reload