• https_registry


    下载 证书

    
    mkdir cert
    
    cd cert
    
    curl -u admin:brysjhhrhL356126155165352237656123165615 -o test_zk_cert.zip  http://192.168.63.100:50000/remote.php/webdav/Documents/cert/5900588_test.zk.limengkai.work_other.zip
    
    apt  install  unzip  -y
    
    unzip test_zk_cert.zip 
    
    ls
    # 5900588_test.zk.limengkai.work.key  5900588_test.zk.limengkai.work.pem
    
    mkdir -p certs
    cat 5900588_test.zk.limengkai.work.pem > certs/domain.crt
    cat 5900588_test.zk.limengkai.work.key > certs/domain.key
    
    
    #   -v "$(pwd)"/certs:/certs \
    
    # /mnt/registry_certs:/certs
    
    cp -a ./certs/ /work_continer_data/mnt/register_certs
    
    
    # 在 compose 文件中添加 映射
    # docker -v /work_continer_data/mnt/register_certs:/certs
    
    docker run -d \
      --restart=always \
      --name registry \
      -v "$(pwd)"/certs:/certs \
      -e REGISTRY_HTTP_ADDR=0.0.0.0:443 \
      -e REGISTRY_HTTP_TLS_CERTIFICATE=/certs/domain.crt \
      -e REGISTRY_HTTP_TLS_KEY=/certs/domain.key \
      -p 443:443 \
      registry.cn-hangzhou.aliyuncs.com/mkmk/all:registry-latest
    
    
    # docker compose
    environment:
      - RACK_ENV=development
      - SHOW=true
      - SESSION_SECRET
    
    
    openssl req -newkey rsa:2048 -new -nodes -x509 -days 3650 -keyout key.pem -out cert.pem
    
    
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • 23
    • 24
    • 25
    • 26
    • 27
    • 28
    • 29
    • 30
    • 31
    • 32
    • 33
    • 34
    • 35
    • 36
    • 37
    • 38
    • 39
    • 40
    • 41
    • 42
    • 43
    • 44
    • 45
    • 46
    • 47
    • 48
    • 49

    生成 自己的 证书

    
    /etc/ssl
    编辑openssl.cnf,在[v3_ca]下面添加:subjectAltName = IP:域名|IP地址
    
    [ v3_ca ]
    subjectAltName = IP:192.168.164.180
    
    
    openssl req -newkey rsa:2048 -new -nodes -x509 -days 3650 -keyout my.key -out my.pem
    
    
    openssl req -newkey rsa:2048 -new -nodes -x509 -days 3650 -keyout domain.key -out domain.crt
    
    
    docker rm -f registry
    
    docker run -d \
      --restart=always \
      --name registry \
      -v "$(pwd)"/certs:/certs \
      -e REGISTRY_HTTP_ADDR=0.0.0.0:443 \
      -e REGISTRY_HTTP_TLS_CERTIFICATE=/certs/domain.crt \
      -e REGISTRY_HTTP_TLS_KEY=/certs/domain.key \
      -p 443:443 \
      registry.cn-hangzhou.aliyuncs.com/mkmk/all:registry-latest
    
    docker logs registry
    
    
    
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20
    • 21
    • 22
    • 23
    • 24
    • 25
    • 26
    • 27
    • 28
    • 29

    生成 ca 证书

    CA根证书的生成步骤
    生成CA私钥(.key)-->生成CA证书请求(.csr)-->自签名得到根证书(.crt)(CA给自已颁发的证书)。
    
     
    
    # Generate CA private key 
    openssl genrsa -out ca.key 2048 
    
    # Generate CSR 
    openssl req -new -key ca.key -out ca.csr
    
    # Generate Self Signed certificate(CA 根证书)
    
    openssl x509 -req -days 365 -in ca.csr -signkey ca.key -out ca.crt
    
    mkdir certs
    cat ca.key > certs/domain.key
    cat ca.crt > certs/domain.crt
    
    
    
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12
    • 13
    • 14
    • 15
    • 16
    • 17
    • 18
    • 19
    • 20

    Use self-signed certificates

    Warning: Using this along with basic authentication requires to also trust the certificate into the OS cert store for some versions of docker (see below)

    This is more secure than the insecure registry solution.

    Generate your own certificate:

    
    $ mkdir -p certs
    
    $ openssl req \
      -newkey rsa:4096 -nodes -sha256 -keyout certs/domain.key \
      -addext "subjectAltName = DNS:myregistry.domain.com" \
      -x509 -days 365 -out certs/domain.crt
    
    
      # -addext "subjectAltName = IP:192.168.164.180" \
    
    
    
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7
    • 8
    • 9
    • 10
    • 11
    • 12

    Be sure to use the name myregistrydomain.com as a CN.

    Use the result to start your registry with TLS enabled.

    Instruct every Docker daemon to trust that certificate. The way to do this depends on your OS.

    
    # Linux: Copy the domain.crt file to
    
    /etc/docker/certs.d/myregistrydomain.com:5000/ca.crt 
     
    #  on every Docker host. You do not need to restart Docker.
    
    
    • 1
    • 2
    • 3
    • 4
    • 5
    • 6
    • 7

    Windows Server:

    Open Windows Explorer, right-click the domain.crt file, and choose Install certificate. When prompted, select the following options:

    Store location local machine
    Place all certificates in the following store selected
    Click Browser and select Trusted Root Certificate Authorities.

    Click Finish. Restart Docker.

    Docker Desktop for Mac: Follow the instructions in Adding custom CA certificates. Restart Docker.

    Docker Desktop for Windows: Follow the instructions in Adding custom CA certificates. Restart Docker.
    欢迎大家一起交流呀
    qq群:3638803451
    vx:wxid_sgdelhiwombj12

  • 相关阅读:
    MySQL-事务隔离机制的实现
    python超详细安装
    第3章-指标体系与数据可视化-3.1.1-Matplotlib绘图库
    Mac M1运行、连接 Docker MongoDB7。导出、恢复数据库
    鸿蒙语言基础类库:【@system.fetch (数据请求)】
    线性判别分析(Linear Discriminant Analysis,LDA)
    案例赏析 | 土耳其开赛利:闲置屋顶坐享“阳光收益”,助力企业实现绿色低碳转型
    我在风口 有事想聊——隐私计算
    Charles如何抓取https请求-移动端+PC端,学完不要去做坏事哦
    MBTI是什么意思
  • 原文地址:https://blog.csdn.net/LeMark2333/article/details/127931877