下载 证书


mkdir cert

cd cert

curl -u admin:brysjhhrhL356126155165352237656123165615 -o test_zk_cert.zip  http://192.168.63.100:50000/remote.php/webdav/Documents/cert/5900588_test.zk.limengkai.work_other.zip

apt  install  unzip  -y

unzip test_zk_cert.zip 

ls
# 5900588_test.zk.limengkai.work.key  5900588_test.zk.limengkai.work.pem

mkdir -p certs
cat 5900588_test.zk.limengkai.work.pem > certs/domain.crt
cat 5900588_test.zk.limengkai.work.key > certs/domain.key


#   -v "$(pwd)"/certs:/certs \

# /mnt/registry_certs:/certs

cp -a ./certs/ /work_continer_data/mnt/register_certs


# 在 compose 文件中添加 映射
# docker -v /work_continer_data/mnt/register_certs:/certs

docker run -d \
  --restart=always \
  --name registry \
  -v "$(pwd)"/certs:/certs \
  -e REGISTRY_HTTP_ADDR=0.0.0.0:443 \
  -e REGISTRY_HTTP_TLS_CERTIFICATE=/certs/domain.crt \
  -e REGISTRY_HTTP_TLS_KEY=/certs/domain.key \
  -p 443:443 \
  registry.cn-hangzhou.aliyuncs.com/mkmk/all:registry-latest


# docker compose
environment:
  - RACK_ENV=development
  - SHOW=true
  - SESSION_SECRET


openssl req -newkey rsa:2048 -new -nodes -x509 -days 3650 -keyout key.pem -out cert.pem

生成 自己的 证书


/etc/ssl
编辑openssl.cnf,在[v3_ca]下面添加:subjectAltName = IP:域名|IP地址

[ v3_ca ]
subjectAltName = IP:192.168.164.180


openssl req -newkey rsa:2048 -new -nodes -x509 -days 3650 -keyout my.key -out my.pem


openssl req -newkey rsa:2048 -new -nodes -x509 -days 3650 -keyout domain.key -out domain.crt


docker rm -f registry

docker run -d \
  --restart=always \
  --name registry \
  -v "$(pwd)"/certs:/certs \
  -e REGISTRY_HTTP_ADDR=0.0.0.0:443 \
  -e REGISTRY_HTTP_TLS_CERTIFICATE=/certs/domain.crt \
  -e REGISTRY_HTTP_TLS_KEY=/certs/domain.key \
  -p 443:443 \
  registry.cn-hangzhou.aliyuncs.com/mkmk/all:registry-latest

docker logs registry


生成 ca 证书

CA根证书的生成步骤
生成CA私钥(.key)-->生成CA证书请求(.csr)-->自签名得到根证书(.crt)(CA给自已颁发的证书)。

 

# Generate CA private key 
openssl genrsa -out ca.key 2048 

# Generate CSR 
openssl req -new -key ca.key -out ca.csr

# Generate Self Signed certificate(CA 根证书)

openssl x509 -req -days 365 -in ca.csr -signkey ca.key -out ca.crt

mkdir certs
cat ca.key > certs/domain.key
cat ca.crt > certs/domain.crt


Use self-signed certificates

Warning: Using this along with basic authentication requires to also trust the certificate into the OS cert store for some versions of docker (see below)

This is more secure than the insecure registry solution.

Generate your own certificate:


$ mkdir -p certs

$ openssl req \
  -newkey rsa:4096 -nodes -sha256 -keyout certs/domain.key \
  -addext "subjectAltName = DNS:myregistry.domain.com" \
  -x509 -days 365 -out certs/domain.crt


  # -addext "subjectAltName = IP:192.168.164.180" \


Be sure to use the name myregistrydomain.com as a CN.

Use the result to start your registry with TLS enabled.

Instruct every Docker daemon to trust that certificate. The way to do this depends on your OS.


# Linux: Copy the domain.crt file to

/etc/docker/certs.d/myregistrydomain.com:5000/ca.crt 
 
#  on every Docker host. You do not need to restart Docker.

Windows Server:

Open Windows Explorer, right-click the domain.crt file, and choose Install certificate. When prompted, select the following options:

Store location local machine
Place all certificates in the following store selected
Click Browser and select Trusted Root Certificate Authorities.

Click Finish. Restart Docker.

Docker Desktop for Mac: Follow the instructions in Adding custom CA certificates. Restart Docker.

Docker Desktop for Windows: Follow the instructions in Adding custom CA certificates. Restart Docker.
欢迎大家一起交流呀
qq群:3638803451
vx:wxid_sgdelhiwombj12