Skip to content

Commit 0bf681e

Browse files
committed
move repo to org and change name
1 parent 0e1beeb commit 0bf681e

6 files changed

Lines changed: 18 additions & 18 deletions

File tree

.github/workflows/publish.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -9,7 +9,7 @@ on:
99
- main
1010

1111
env:
12-
REGISTRY_IMAGE: ghcr.io/munezaclovis/mkcert
12+
REGISTRY_IMAGE: ghcr.io/${{ github.repository }}
1313

1414
permissions:
1515
contents: read

README.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,12 +1,12 @@
1-
# Traefik mkcert
1+
# Prvious SSL
22

33
## Overview
44

5-
This is a Docker image designed for development purposes. It automatically generates SSL certificates for your local projects using mkcert. This setup is optimized for use with Traefik and serves as an alternative to Let's Encrypt, which does not support local domains such as `.test`, `.local`, `.docker`, etc.
5+
This is a Docker image designed for development purposes. It automatically generates SSL certificates for your local projects using node-forge. This setup is optimized for use with Traefik and serves as an alternative to Let's Encrypt, which does not support local domains such as `.test`, `.local`, `.docker`, etc.
66

77
## Docker Image
88

9-
The image: `ghcr.io/munezaclovis/mkcert`
9+
The image: `ghcr.io/prvious/ssl`
1010

1111
### Configuration example
1212

@@ -21,8 +21,8 @@ services:
2121
volumes:
2222
- './dynamic:/etc/traefik'
2323

24-
mkcert:
25-
image: ghcr.io/munezaclovis/mkcert
24+
ssl:
25+
image: ghcr.io/prvious/ssl
2626
volumes:
2727
- './dynamic/certs:/app/files/certs' # Location for generated certificates
2828
- './dynamic/ca:/app/files/ca' # Directory for rootCA files used to sign certificates
@@ -35,11 +35,11 @@ services:
3535
3636
## Usage
3737
38-
If you want to generate SSL certificates for a specific service or container, even if it resides in another folder or project, you can still use the mkcert container. Simply ensure that the appropriate directories are mounted and the `mkcert.domains` and `traefik.enable=true` label is configured correctly for the target service.
38+
If you want to generate SSL certificates for a specific service or container, even if it resides in another folder or project, you can still use the prvious/ssl container. Simply ensure that the appropriate directories are mounted and the `prvious.ssl.domains` and `prvious.ssl.enable=true` label is configured correctly for the target service.
3939

4040
```
41-
traefik.enable=true
42-
mkcert.domains=example.test,*.example.test
41+
prvious.ssl.enable=true
42+
prvious.ssl.domains=example.test,*.example.test
4343
```
4444
4545
#### Example:
@@ -52,7 +52,7 @@ myservice:
5252
- 'traefik.http.routers.myservice.rule=Host(`myservice.test`)'
5353
- 'traefik.http.routers.myservice.entrypoints=https'
5454
- 'traefik.http.routers.myservice.tls=true'
55-
- 'mkcert.domains=myservice.test,*.myservice.test'
55+
- 'prvious.ssl.domains=myservice.test,*.myservice.test'
5656
```
5757

5858
## Mounting Files
@@ -65,7 +65,7 @@ To access the generated files, mount the `/app/files/` directory. Within this di
6565

6666
## Environment Variables
6767

68-
Since the mkcert image doesn’t know where the certificates will be mounted in Traefik, you MUST provide the `CERT_DIR` variable. This variable is used to construct the full path when generating the `tls.yml` file, ensuring Traefik can locate and load the certificates.
68+
Since the prvious/ssl image doesn’t know where the certificates will be mounted in Traefik, you MUST provide the `CERT_DIR` variable. This variable is used to construct the full path when generating the `tls.yml` file, ensuring Traefik can locate and load the certificates.
6969

7070
## Auto Trust the Generated SSL Certificates
7171

docker-bake.hcl

Lines changed: 1 addition & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,4 @@
1-
variable "IMAGE_NAME" {
2-
default = "ghcr.io/munezaclovis/mkcert"
3-
}
1+
variable "IMAGE_NAME" {}
42

53
variable "VERSION" {
64
default = "dev"

docker-composer.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
services:
2-
mkcert:
2+
ssl:
33
build:
44
context: .
55
dockerfile: Dockerfile

index.js

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,7 @@ async function checkLabelChanges() {
136136
const containers = await docker.listContainers({
137137
filters: {
138138
status: ['running'],
139-
label: ['traefik.enable=true', 'mkcert.domains'],
139+
label: ['prvious.ssl.enable=true', 'prvious.ssl.domains'],
140140
},
141141
});
142142

@@ -183,7 +183,9 @@ async function checkLabelChanges() {
183183
};
184184

185185
if (containerIsInYml === undefined) {
186-
const domains = new Set(container.Labels['mkcert.domains'].split(',').map((domain) => domain.trim()));
186+
const domains = new Set(
187+
container.Labels['prvious.ssl.domains'].split(',').map((domain) => domain.trim())
188+
);
187189

188190
const certs = await generateCert([...domains.values()], ca);
189191

package.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"name": "mkcert",
2+
"name": "prvious.ssl",
33
"version": "1.0.0",
44
"type": "module",
55
"description": "",

0 commit comments

Comments
 (0)