This lets you specify custom client TLS certificates and CA root for a
specific registry hostname. Docker will then verify the registry
against the CA and present the client cert when talking to that
registry. This allows the registry to verify that the client has a
proper key, indicating that the client is allowed to access the
images.
A custom cert is configured by creating a directory in
/etc/docker/certs.d with the same name as the registry hostname. Inside
this directory all *.crt files are added as CA Roots (if none exists,
the system default is used) and pair of files <filename>.key and
<filename>.cert indicate a custom certificate to present to the registry.
If there are multiple certificates each one will be tried in
alphabetical order, proceeding to the next if we get a 403 of 5xx
response.
So, an example setup would be:
/etc/docker/certs.d/
└── localhost
├── client.cert
├── client.key
└── localhost.crt
A simple way to test this setup is to use an apache server to host a
registry. Just copy a registry tree into the apache root, here is an
example one containing the busybox image:
http://people.gnome.org/~alexl/v1.tar.gz
Then add this conf file as /etc/httpd/conf.d/registry.conf:
# This must be in the root context, otherwise it causes a re-negotiation
# which is not supported by the tls implementation in go
SSLVerifyClient optional_no_ca
<Location /v1>
Action cert-protected /cgi-bin/cert.cgi
SetHandler cert-protected
Header set x-docker-registry-version "0.6.2"
SetEnvIf Host (.*) custom_host=$1
Header set X-Docker-Endpoints "%{custom_host}e"
</Location>
And this as /var/www/cgi-bin/cert.cgi
#!/bin/bash
if [ "$HTTPS" != "on" ]; then
echo "Status: 403 Not using SSL"
echo "x-docker-registry-version: 0.6.2"
echo
exit 0
fi
if [ "$SSL_CLIENT_VERIFY" == "NONE" ]; then
echo "Status: 403 Client certificate invalid"
echo "x-docker-registry-version: 0.6.2"
echo
exit 0
fi
echo "Content-length: $(stat --printf='%s' $PATH_TRANSLATED)"
echo "x-docker-registry-version: 0.6.2"
echo "X-Docker-Endpoints: $SERVER_NAME"
echo "X-Docker-Size: 0"
echo
cat $PATH_TRANSLATED
This will return 403 for all accessed to /v1 unless *any* client cert
is presented. Obviously a real implementation would verify more details
about the certificate.
Example client certs can be generated with:
openssl genrsa -out client.key 1024
openssl req -new -x509 -text -key client.key -out client.cert
Docker-DCO-1.1-Signed-off-by: Alexander Larsson <alexl@redhat.com> (github: alexlarsson)
Upstream-commit: 05243104fc0a0ef9537766cf5bd920824665eb78
Component: engine
Docker Documentation
The source for Docker documentation is here under sources/ and uses extended
Markdown, as implemented by MkDocs.
The HTML files are built and hosted on https://docs.docker.io, and update
automatically after each change to the master or release branch of Docker on
GitHub thanks to post-commit hooks. The
docs branch maps to the "latest" documentation and the master (unreleased
development) branch maps to the "master" documentation.
Branches
There are two branches related to editing docs: master and a docs
branch. You should always edit documentation on a local branch of the master
branch, and send a PR against master.
That way your fixes will automatically get included in later releases, and docs
maintainers can easily cherry-pick your changes into the docs release branch.
In the rare case where your change is not forward-compatible, you may need to
base your changes on the docs branch.
Also, now that we have a docs branch, we can keep the
http://docs.docker.io docs up to date with any bugs
found between Docker code releases.
Warning: When reading the docs, the
http://beta-docs.docker.io documentation may
include features not yet part of any official Docker release. The beta-docs
site should be used only for understanding bleeding-edge development and
docs.docker.io (which points to the docs branch`) should be used for the
latest official release.
Contributing
- Follow the contribution guidelines (see
../CONTRIBUTING.md). - Remember to sign your work!
Getting Started
Docker documentation builds are done in a Docker container, which installs all
the required tools, adds the local docs/ directory and builds the HTML docs.
It then starts a HTTP server on port 8000 so that you can connect and see your
changes.
In the root of the docker source directory:
make docs
If you have any issues you need to debug, you can use make docs-shell and then
run mkdocs serve
Style guide
The documentation is written with paragraphs wrapped at 80 colum lines to make it easier for terminal use.
Examples
When writing examples give the user hints by making them resemble what they see in their shell:
- Indent shell examples by 4 spaces so they get rendered as code.
- Start typed commands with
$(dollar space), so that they are easily differentiated from program output. - Program output has no prefix.
- Comments begin with
#(hash space). - In-container shell commands begin with
$$(dollar dollar space).
Images
When you need to add images, try to make them as small as possible (e.g. as
gifs). Usually images should go in the same directory as the .md file which
references them, or in a subdirectory if one already exists.
Working using GitHub's file editor
Alternatively, for small changes and typos you might want to use GitHub's built in file editor. It allows you to preview your changes right on-line (though there can be some differences between GitHub Markdown and MkDocs Markdown). Just be careful not to create many commits. And you must still sign your work!
Publishing Documentation
To publish a copy of the documentation you need a docs/awsconfig To make life
easier for file containing AWS settings to deploy to. The release script will
create an s3 if needed, and will then push the files to it.
[profile dowideit-docs] aws_access_key_id = IHOIUAHSIDH234rwf....
aws_secret_access_key = OIUYSADJHLKUHQWIUHE...... region = ap-southeast-2
The profile name must be the same as the name of the bucket you are deploying
to - which you call from the docker directory:
make AWS_S3_BUCKET=dowideit-docs docs-release