Docker i2pd daemon on Alpine Linux with auto config using env vars
Allows to specify i2p tunnels (client/server) providing key in env (or generating it automatically)
Available on hub.docker.com as: darktool/i2p
CLIENT: client tunnels definition, default undefined80:nginx:8080:KEY80:nginx:8080: new key creatednginx:80: new key created
HIDDEN_I2P: server tunnels definition, default undefinedTYPE:HOST:PORT:KEY
BANDWIDTH:X(unlimited): good for servers or fast clients (default)P(2048): good for slower clientO(256)L(32)
SHARE: forwarding traffic share limit, default 25%LENGTH: tunnels length, default 3CONNECTIONS: connections count, default 12LOGLEVEL: defaulterror
client: for accessing remote as local docker via i2pserver: to provide server tcp tunnel via i2p (similar to Tor Hidden Service)http:server+ Host: HTTP headersocks+httpproxyudpclient+udpserverirc
4444/tcp: http server4447/tcp: socks server7070/tcp: http control connection
These tools are available in docker
keygen: generate and output key- usage:
docker run --rm darktool/i2p keygen: make key and write to stdout, default key type 7 ==ED25519-SHA512(EDDSA-SHA512-ED25519)
- usage:
keyinfo: output key info- usage:
echo $KEY | docker run --rm darktool/i2p keyinfo: key info for base64-encoded i2p key
- usage:
DSA-SHA1: 0ECDSA-SHA256-P256: 1ECDSA-SHA384-P384: 2ECDSA-SHA512-P521: 3RSA-SHA256-2048: 4RSA-SHA384-3072: 5RSA-SHA512-4096: 6EDDSA-SHA512-ED25519: 7GOSTR3410_CRYPTO_PRO_A-GOSTR3411-256: 9GOSTR3410_TC26_A_512-GOSTR3411-512: 10RED25519-SHA512: 11- default:
ED25519-SHA512