-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathmy-little-book-of-docker-repo
104 lines (85 loc) · 3.05 KB
/
my-little-book-of-docker-repo
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
+My Little Book of Creating a Docker Repo +++
sudo -i
sudo apt-get update
sudo apt install docker docker.io
shutdown now
sudo -i
mkdir -p certs
openssl req -newkey rsa:4096 -nodes -sha256 -keyout certs/domain.key -x509 -days 365 -out certs/domain.crt
ls
sudo docker run -d -p 5000:5000 --restart=always --name registry -v certs:/certs -e REGISTRY_HTTP_TLS_CERTIFICATE=certs/domain.crt -e REGISTRY_HTTP_TLS_KEY=certs/domain.key registry:2
sudo docker ps
sudo docker pull busybox
sudo docker images
ip a
sudo docker tag latest 172.24.78.111:5000/busybox
sudo docker push 172.24.78.111:5000/busybox
mkdir -p /etc/docker/certs.d/172.24.78.111:5000
sudo mkdir -p /etc/docker/certs.d/172.24.78.111:5000
cd certs/
cd ..
ls
sudo cp * certs/domain /etc/docker/certs.d/172.24.78.111:5000/
cd certs/
ls
sudo cp * /etc/docker/certs.d/172.24.78.111:5000/
cd /etc/docker/certs.d/172.24.78.111:5000/
ls
Follow these steps
1. On your Host Machine and Client Machine install Docker Engine
sudo apt-get install \
apt-transport-https \
ca-certificates \
curl \
software-properties-common
curl -fsSL https://download.docker.com/linux/ubuntu/gpg | sudo apt-key add -
sudo apt-key fingerprint 0EBFCD88
sudo apt-get update
sudo apt-get install docker.io docker
2. Get a self signed certificate for your docker registry
sudo vi /etc/ssl/openssl.cnf
# Add this line
#subjectAltName=IP:172.24.78.112
mkdir -p certs/
openssl req \
-newkey rsa:4096 -nodes -sha256 -keyout certs/domain.key \
-x509 -days 365 -out certs/domain.crt
3. Create your docker registry
sudo docker run -d -p 5000:5000 --restart=always --name registry \
-v /certs:/certs \
-e REGISTRY_HTTP_TLS_CERTIFICATE=certs/domain.crt \
-e REGISTRY_HTTP_TLS_KEY=certs/domain.key \
registry:2
sudo docker ps
# Should display
CONTAINER ID IMAGE COMMAND ... 4b6bcbadf307 registry:2 entrypoint...
# now get the container id
sudo docker logs <container-id>
# if you didn't see any obvious error messages then you are good to go
4. Test the docker registry
# get busybox image from public dockerhub
sudo docker pull busybox
# check the busybox image id
sudo docker images
# tag the image for pushing
sudo docker tag <image-id> 192.168.0.2:5000/busybox
# test pushing the image
sudo docker push 192.168.0.2:5000/busybox
#! ERROR
The push refers to a repository [192.168.0.2:5000/busybox]
Get https://192.168.0.2:5000/v1/_ping: x509: certificate signed by unknown authority
How do we make docker engine trust our x509 certicate?
mkdir -p /etc/docker/certs.d/192.168.0.2:5000
cd /certs
cp /certs/domain /etc/docker/certs.d/192.168.0.2:5000/
cd /etc/docker/certs.d/192.168.0.2:5000/
mv domains.crt ca.crt
#reload docker daemon to use the certificate
sudo service docker reload
sudo mkdir -p /etc/docker/certs.d/172.24.78.112:5000
cd certs/
sudo cp * /etc/docker/certs.d/172.24.78.112:5000/
sudo cd /etc/docker/certs.d/172.24.78.112:5000/
sudo mv domain.crt ca.crt
#reload docker daemon to use the certificate
sudo service docker reload