Tool to extract Let's Encrypt certificates from Traefik's ACME storage file.
 
 
Go to file
Marc Brückner 0f4cab45f2 docker-compose example 2018-11-11 21:13:01 +01:00
.gitignore Added flat certificates output 2017-06-27 15:56:54 +02:00
Dockerfile fix Dockerfile 2018-08-05 19:28:21 +02:00
LICENSE.md Create LICENSE.md 2018-06-25 01:02:08 +02:00
README.md docker-compose example 2018-11-11 21:13:01 +01:00
extractor.py Small fixes and readme clarification 2018-08-05 19:22:54 +02:00
requirements.txt fixes 2018-08-05 00:00:19 +02:00

README.md

Traefik Certificate Extractor

Forked from DanielHuisman/traefik-certificate-extractor

Tool to extract Let's Encrypt certificates from Traefik's ACME storage file. Can automatically restart containers using the docker API.

Installation

git clone https://github.com/snowmb/traefik-certificate-extractor
cd traefik-certificate-extractor

Usage

usage: extractor.py [-h] [-c CERTIFICATE] [-d DIRECTORY] [-f] [-r] [--dry-run]
                    [--include [INCLUDE [INCLUDE ...]] | --exclude
                    [EXCLUDE [EXCLUDE ...]]]

Extract traefik letsencrypt certificates.

optional arguments:
  -h, --help            show this help message and exit
  -c CERTIFICATE, --certificate CERTIFICATE
                        file that contains the traefik certificates (default
                        acme.json)
  -d DIRECTORY, --directory DIRECTORY
                        output folder
  -f, --flat            outputs all certificates into one folder
  -r, --restart_container
                        uses the docker API to restart containers that are
                        labeled accordingly
  --dry-run             Don't write files and do not start docker containers.
  --include [INCLUDE [INCLUDE ...]]
  --exclude [EXCLUDE [EXCLUDE ...]]

Default file is ./data/acme.json. The output directories are ./certs and ./certs_flat.

Docker

There is a Docker image available for this tool: snowmb/traefik-certificate-extractor. Example run:

docker run --name extractor -d \
  -v /opt/traefik:/app/data \
  -v ./certs:/app/certs \
  -v /var/run/docker.socket:/var/run/docker.sock \
  snowmb/traefik-certificate-extractor -r

Mount the whole folder containing the traefik certificate file (acme.json) as /app/data. The extracted certificates are going to be written to /app/certs. The docker socket is used to find any containers with this label: com.github.SnowMB.traefik-certificate-extractor.restart_domain=<DOMAIN>. If the domains of an extracted certificate and the restart domain matches, the container is restarted. Multiple domains can be given seperated by ,.

You can easily use docker-compose to integrate this container into your setup:

...
services:
  certs:
     image: snowmb/traefik-certificate-extractor
     volumes:
      - path/to/acme.json:/app/data/acme.json:ro
      - certs:/app/certs:rw
      - /var/run/docker.sock:/var/run/docker.sock
     command: -r --include example.com
     restart: always

Output

certs/
    example.com/
        cert.pem
        chain.pem
        fullchain.pem
        privkey.pem
    sub.example.nl/
        cert.pem
        chain.pem
        fullchain.pem
        privkey.pem
certs_flat/
    example.com.crt
    example.com.key
    example.com.chain.pem
    sub.example.nl.crt
    sub.example.nl.key
    sub.example.nl.chain.pem