Thank you all for your time to answer. Basically what I'm trying to do is to proxy the outgoing/originated traffic of the 2nd container (NOTE: I'm NOT trying to proxy the incoming traffic, so cannot use the Apache mod_proxy or Nginx proxy_pass. These modules works for incoming traffic). 1st container runs a proxy service on port 8080.
As Thierno suggested I can use http_proxy and https_proxy ENV variables to proxy the outgoing traffic, but unfortunately NOT all the applications/services running in your operating system respects these http_proxy and https_proxy ENV variables. There are applications that force skip the proxy settings. That is the reason why I wanted to use iptables to enforce the traffic rules. Thus none of the application/service can skip the proxy.
The mistake I did in the previous settings on the question is, I was trying to route the incoming traffic to port 80 to 8080 of proxy server. Since the 1st container doesn't have any incoming traffic it won't work and it is logically wrong to PREROUTE/POSTROUTE the traffic to achieve what I was looking for. To route the originated/outgoing traffic, we need to use OUTPUT chain of the iptables.
My Solution:
I have used RedSocks with iptables combination to enforce the proxy for the complete outgoing traffic from the server. Here is the iptables configuration I've used:
# Create new chain for RedSocks
root# iptables -t nat -N REDSOCKS
# Ignore LANs and some other reserved addresses
root# iptables -t nat -A REDSOCKS -d 0.0.0.0/8 -j RETURN
root# iptables -t nat -A REDSOCKS -d 10.0.0.0/8 -j RETURN
root# iptables -t nat -A REDSOCKS -d 127.0.0.0/8 -j RETURN
root# iptables -t nat -A REDSOCKS -d 169.254.0.0/16 -j RETURN
root# iptables -t nat -A REDSOCKS -d 172.16.0.0/12 -j RETURN
root# iptables -t nat -A REDSOCKS -d 192.168.0.0/16 -j RETURN
root# iptables -t nat -A REDSOCKS -d 224.0.0.0/4 -j RETURN
root# iptables -t nat -A REDSOCKS -d 240.0.0.0/4 -j RETURN
# Redirect all the http to redsocks local port
root# sudo iptables -t nat -A REDSOCKS -p tcp --dport 80 -j REDIRECT --to-ports 12345
# for https traffic just replace port 80 with 443
# Use all REDSOCKS chain for all the outgoing traffic at eth0
root# sudo iptables -t nat -A OUTPUT -p tcp -o eth0 -j REDSOCKS
Now, configure redsocks to listen to the local port 12345 for the incoming traffic and forward it to the proxy server's IP and port. To do this edit redsocks.conf as like this,
redsocks {
local_ip = 127.0.0.1;
local_port = 12345;
ip = 172.17.0.4;
port = 8080;
type = http-relay;
}
just save the conf and restart the redsocks service. Now all the outgoing traffic originated from the 1st container will be enforced to use the proxy. (NOTE: I've used iptables-persistent to persist the rules over server reboots) Actually I have implemented the same for both http and https traffic by adding another line to the iptables configuration. Although it's not a transparent proxy, it does the job for me.
If anyone have any other alternative solutions to this please suggest.
Best Answer
This setup is working for me:
This will serve your sub-domain through HTTPS and your Let's Encrypt certificate, while proxying requests to port 80 of your container so you don't have to bother about passing the certificate to GitLab from outside the container.
From my understanding this is safe, since un-encrypted traffic is confined in the server (if your Docker daemon is on the same server as Plesk) and unaccessible from the outside.
--
For your last point
that's a whole question by itself.
To run builds you'll need to install GitLab Runner. GitLab docs suggests to install it on a different host, but you may try using their Docker image on the same host.
For building and deploying your applications, see GitLab Runner docs. You will need to setup "pipelines" for what is called "Continuous Deployment".
To create a sub-domain for every app you could either:
These are just pointers, I suggest you to search and read more on the subject of CI/CD.