Awesome Open Source
Awesome Open Source

Keywhiz Docker Container

GitHub ImageLayers Size Docker Repository on Circle CI

A Docker image with Keywhiz.

Supported Tags and Respective Dockerfile Links

What Is Keywhiz?

From its own website:

Keywhiz is a system for managing and distributing secrets. It can fit well with a service oriented architecture (SOA). [...]

Keywhiz makes managing secrets easier and more secure. Keywhiz servers in a cluster centrally store secrets encrypted in a database. Clients use mutually authenticated TLS (mTLS) to retrieve secrets they have access to. Authenticated users administer Keywhiz via CLI or web app UI. To enable workflows, Keywhiz has automation APIs over mTLS and support for simple secret generation plugins.

Keywhiz should be considered alpha at this point. Upcoming changes may break API backward compatibility. See our roadmap.

How to Use This Image

Download the Image
$ docker pull zuazo/keywhiz
Run a Keywhiz Server With Development Data
$ docker run -d -p 4444:4444 zuazo/keywhiz

You can now open to navigate the Keywhiz server. The development data provides a keywhizAdmin:adminPass account.

See the examples/ directory for more examples.


This image starts Keywhiz with the development data by default. All the CMD calls will have the Keywhiz JAR file as entrypoint (java -jar [...]/keywhiz-server-shaded.jar).

If you don't want to use development data, you should generate at least the following data:

  • A new CA (and the truststore.p12 file).
  • Client certificates.
  • A server certificate (and the keystore.p12 file).

The following image generates the following data in the entrypoint script:

  • A base derivation key using gen-aes in derivation.jceks.
  • Random cookie key in server/target/classes/cookiekey.base64.

You can use them directly from your YAML configuration file or generate your own.

See how to generate all this data in the Keywhiz development key material generation documentation.

Build from Sources

Instead of installing the image from Docker Hub, you can build the image from sources if you prefer:

$ git clone keywhiz
$ cd keywhiz
$ docker build -t zuazo/keywhiz .

Exposed TCP/IP Ports

  • 4444: Keywhiz application HTTPS port.

Environment Variables Used at Runtime by the Entrypoint Script

  • COOKIEKEY_PATH: Randomly generated cookie key path (server/target/classes/cookiekey.base64).
  • KEYSTORE_PASS: Password used to generate the derivation key (randomly generated).
  • JAVA_ARGS: Some java arguments.

You can change them using docker run -e [...] or in your Dockerfile, using the ENV instruction.

Read-only Environment Variables Used at Build Time

  • KEYWHIZ_VERSION: Keywhiz version to install (0.7.6).
  • KEYWHIZ_PREFIX: Keywhiz parent directory (/opt).
  • JAR: Keywhiz JAR file path (server/target/keywhiz-server-shaded.jar).
  • ENTRYPOINT: Entrypoint, used to run the Keywhiz binary (java -jar server/target/keywhiz-server-shaded.jar). You can use it to call the Keywhiz application with some arguments: RUN $ENTRYPOINT check, RUN $ENTRYPOINT migrate, RUN $ENTRYPOINT db-seed, ...

The docker working directory is set to the main Keywhiz directory (/opt/keywhiz-VERSION).

License and Author

Author: Xabier de Zuazo ([email protected])
Copyright: Copyright (c) 2015
License: Apache License, Version 2.0
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
See the License for the specific language governing permissions and
limitations under the License.

Get A Weekly Email With Trending Projects For These Topics
No Spam. Unsubscribe easily at any time.
Shell (232,274
Docker (33,819
Devops (3,858
Password (1,639
Secrets (582
Credentials (190
Secret Management (149
Related Projects