Docker私有仓库

一、建立本地普通私有仓库

拉取官网最新镜像

docker pull daocloud.io/library/registry:latest

通过端口转发连接宿主机和新建容器的5000端口 (-p 端口转发) 

docker run -d -p 5000:5000 daocloud.io/library/registry <name or id>

测试

curl -I 172.16.170.10


curl http://172.16.170.10:5000/v2/search
curl http://172.16.170.10:5000/v2/_catalog
{"repositories":[]

上传本地镜像到本地仓库

docker tag 030a4b68e 172.16.170.10:5000/registry:v2
docker push 172.16.170.10:5000/registry:v2

二、建立带认证功能的仓库

创建用户和密码

mkdir –p /opt/data/registry
mkdir /opt/data/auth/ 
docker run --entrypoint htpasswd registry:latest -Bbn dockerUser dockerPwd  > /opt/data/auth/htpasswd

生成证书

mkdir /opt/data/cents
cd /opt/data/cents
#ca key:
openssl genrsa -aes256 -out ca-key.pem 4096
passwd  passwd

ca: openssl req -new -x509 -days 365 -key ca-key.pem -sha256 -out ca.pem
passwd
Country Name (2 letter code) [XX]:
CN
State or Province Name (full name) []:
BJ
Locality Name (eg, city) [Default City]:
HD
Organization Name (eg, company) [Default Company Ltd]:
BXY
Organizational Unit Name (eg, section) []:
YW
Common Name (eg, your name or your server's hostname) []:
172.16.170.10
Email Address []:
1065265865@qq.com
#server key: 
openssl genrsa
-out server-key.pem 4096
#生成server 证书:
openssl req
-subj "/CN=172.16.8.72" -sha256 -new -key server-key.pem -out server.csr
openssl req
-subj "/CN=app.linkdood.cn" -sha256 -new -key server-key.pem -out server.csr
echo subjectAltName = IP:172.16.170.10,IP:10.10.10.20,IP:127.0.0.1 > extfile.cnf
echo extendedKeyUsage = serverAuth >> extfile.cnf
openssl x509
-req -days 365 -sha256 -in server.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out server-cert.pem -extfile extfile.cnf dood
#生成client证书
openssl genrsa
-out key.pem 409
openssl req
-subj '/CN=client' -new -key key.pem -out client.csr
openssl x509
-req -days 365 -sha256 -in client.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out cert.pem -extfile extfile.cnf
passwd
cp server-*.pem  /etc/docker/
cp ca.pem /etc/docker/

修改docker配置

vim /lib/systemd/system/docker.service
ExecStart=/usr/bin/dockerd
替换
ExecStart=/usr/bin/dockerd --tlsverify --tlscacert=/etc/docker/ca.pem --tlscert=/etc/docker/server-cert.pem --tlskey=/etc/docker/server-key.pem -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock
systemctl restart docker

centos 6

vim /etc/sysconfig/docker
OPTIONS='--selinux-enabled --tlsverify --tlscacert=/etc/docker/ca.pem --tlscert=/etc/docker/server-cert.pem --tlskey=/etc/docker/server-key.pem -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock'

iptables 开端口

iptables -I INPUT -p tcp --dport 2376 -j ACCEPT
iptables -L -n
/etc/init.d/iptables save

重起docker

service docker restart

使用bash文件

#!/bin/sh
docker -H 192.168.1.144:2376 --tlsverify --tlscacert=/Users/jiangtao/myapp/192.168.1.144/ca.pem --tlscert=/Users/jiangtao/myapp/192.168.1.144/cert.pem  --tlskey=/Users/jiangtao/myapp/192.168.1.144/key.pem $@

出现 
Error response from daemon: client is newer than server (client API version: 1.24, server API version: 1.19)

export DOCKER_API_VERSION=1.19

重新创建本地仓库

docker run -d -p 5000:5000 
--restart=always --name registry 
-v /opt/data/auth:/auth 
-v /opt/data/cents:/certs 
-v /opt/data/registry:/var/lib/registry 
-e "REGISTRY_AUTH=htpasswd" 
-e "REGISTRY_AUTH_HTPASSWD_REALM=Registry Realm" 
-e "REGISTRY_AUTH_HTPASSWD_PATH=/auth/htpasswd" 
 registry:latest

三、docker配置文件

docker配置文件/etc/sysconfig/docker 
重要参数解释:
OPTIONS 用来控制Docker Daemon进程参数
-H 表示Docker Daemon绑定的地址, -H=unix:///var/run/docker.sock -H=tcp://0.0.0.0:2376
--registry-mirror表示Docker Registry的镜像地址--registry-mirror=http://4bc5abeb.m.daocloud.io
--insecure-registry表示(本地)私有Docker Registry的地址, --insecure-registry ${pivateRegistyHost}:5000
--selinux-enabled是否开启SELinux,默认开启 --selinux-enabled=true
-b 表示采用已经创建好的网桥, -b=xxx

OPTIONS=-H=unix:///var/run/docker.sock -H=tcp://0.0.0.0:2376 --registry-mirror=http://4bc5abeb.m.daocloud.io--selinux-enabled=true
下面是代理的设置
http_proxy=xxxxx:8080
https_proxy=xxxxxx:8080

vi /usr/lib/systemd/system/docker.service
ExecStart=/usr/bin/docker daemon -H fd:// -H=unix:///var/run/docker.sock -H=tcp://0.0.0.0:2376 --registry-mirror=http://4bc5abeb.m.daocloud.io --selinux-enabled=true
[Service]
Environment="HTTP_PROXY=..."
Environment="HTTPS_PROXY=..."
Type=notify
ExecStart=/usr/bin/docker daemo

Docker有自动化的需求时,你可以将containerID输出到指定的文件中(PIDfile): --cidfile=""
Docker的容器是没有特权的,例如不能在容器中再启动一个容器。这是因为默认情况下容器是不能访问任何其它设备的。但是通过"privileged",容器就拥有了访问任何其它设备的权限。

OPTIONS='--selinux-enabled --tlsverify --tlscacert=/etc/docker/ca.pem --tlscert=/etc/docker/server-cert.pem 
--tlskey=/etc/docker/server-key.pem -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock' other_args="--selinux-enabled --insecure-registry 172.16.170.10:5000"
ADD_REGISTRY='--insecure-registry 172.16.8.72:15000'
vim /etc/docker/daemon.json
{
"registry-mirrors": [ "https://registry.docker-cn.com" ],
 "insecure-registries": [ "http://172.16.170.10:5000" ]
}
mkdir ~/.docker
cp -cv {ca,cert,key}.pem ~/.docker/
vim /etc/profile
export DOCKER_HOST=tcp://$YOURIP:2376
export DOCKER_TLS_VERIFY=1
export DOCKER_CERT_PATH=/home/ubuntu/.docker/

  

 

原文地址:https://www.cnblogs.com/ling-yu-amen/p/10095166.html