知乎专栏 |
登录
$ sudo docker login Username: netkiller Password: Email: netkiller@msn.com Login Succeeded
搭建私有仓库只需两步
docker pull registry docker run -d -p 5000:5000 -v /opt/registry:/var/lib/registry --name registry registry
操作演示
neo@ubuntu:~$ docker pull registry Using default tag: latest latest: Pulling from library/registry 169185f82c45: Pull complete 046e2d030894: Pull complete 188836fddeeb: Pull complete 832744537747: Pull complete 7ceea07e80be: Pull complete Digest: sha256:870474507964d8e7d8c3b53bcfa738e3356d2747a42adad26d0d81ef4479eb1b Status: Downloaded newer image for registry:latest neo@ubuntu:~$ docker run -d -p 5000:5000 -v /opt/registry:/tmp/registry registry 38a6d3b5e18e378b7765fa00374426db3a06c64f4b9219a1f85dc42a6a66ef28 neo@ubuntu:~$ docker ps | grep registry 38a6d3b5e18e registry "/entrypoint.sh /etc…" 35 seconds ago Up 33 seconds 0.0.0.0:5000->5000/tcp
设置允许http协议访问,有两种方式,一种是修改 /etc/docker/daemon.json并添加 “insecure-registries” 项
{ "registry-mirrors": ["https://registry.docker-cn.com"], "insecure-registries": ["127.0.0.1:5000"] }
另一种方式是修改 /etc/default/docker 中加入下面内容
neo@ubuntu:~$ sudo vim /etc/default/docker DOCKER_OPTS="--insecure-registry 0.0.0.0:5000"
修改 /lib/systemd/system/docker.service
# 加入 EnvironmentFile=/etc/default/docker # 尾部加入 $DOCKER_OPTS ExecStart=/usr/bin/dockerd -H fd:// -H unix:///var/run/docker.sock -H tcp://0.0.0.0:2375 $DOCKER_OPTS
完整的例子
neo@ubuntu:~$ sudo vim /lib/systemd/system/docker.service [Unit] Description=Docker Application Container Engine Documentation=https://docs.docker.com After=network-online.target docker.socket firewalld.service Wants=network-online.target Requires=docker.socket [Service] Type=notify # the default is not to use systemd for cgroups because the delegate issues still # exists and systemd currently does not support the cgroup feature set required EnvironmentFile=/etc/default/docker # for containers run by docker ExecStart=/usr/bin/dockerd -H fd:// -H unix:///var/run/docker.sock -H tcp://0.0.0.0:2375 $DOCKER_OPTS ExecReload=/bin/kill -s HUP $MAINPID LimitNOFILE=1048576 # Having non-zero Limit*s causes performance problems due to accounting overhead # in the kernel. We recommend using cgroups to do container-local accounting. LimitNPROC=infinity LimitCORE=infinity # Uncomment TasksMax if your systemd version supports it. # Only systemd 226 and above support this version. TasksMax=infinity TimeoutStartSec=0 # set delegate yes so that systemd does not reset the cgroups of docker containers Delegate=yes # kill only the docker process, not all processes in the cgroup KillMode=process # restart the docker process if it exits prematurely Restart=on-failure StartLimitBurst=3 StartLimitInterval=60s [Install] WantedBy=multi-user.target
重启 Docker
neo@ubuntu:~$ sudo systemctl daemon-reload neo@ubuntu:~$ sudo systemctl restart docker neo@ubuntu:~$ ps ax | grep docker 19548 ? Ssl 0:00 /usr/bin/dockerd -H fd:// -H unix:///var/run/docker.sock -H tcp://0.0.0.0:2375 --insecure-registry 0.0.0.0:5000
验证 5000 端口可以访问
neo@ubuntu:~$ curl -XGET http://localhost:5000/v2/_catalog {"repositories":[]}
本地镜像推送到远程私有仓库
docker pull busybox docker tag busybox docker.netkiller.cn:5000/busybox docker push docker.netkiller.cn:5000/busybox
操作演示
[root@localhost ~]# docker pull busybox Using default tag: latest latest: Pulling from library/busybox 697743189b6d: Pull complete Digest: sha256:061ca9704a714ee3e8b80523ec720c64f6209ad3f97c0ff7cb9ec7d19f15149f Status: Downloaded newer image for busybox:latest [root@localhost ~]# docker tag busybox docker.netkiller.cn:5000/busybox [root@localhost ~]# docker push docker.netkiller.cn:5000/busybox The push refers to repository [docker.netkiller.cn:5000/busybox] adab5d09ba79: Pushed latest: digest: sha256:4415a904b1aca178c2450fd54928ab362825e863c0ad5452fd020e92f7a6a47e size: 527
查看远程私有仓库
[root@localhost ~]# curl -XGET http://docker.netkiller.cn:5000/v2/_catalog {"repositories":["busybox"]} [root@localhost ~]# curl -XGET http://docker.netkiller.cn:5000/v2/busybox/tags/list {"name":"busybox","tags":["latest"]}
从私有仓库拉镜像
docker pull docker.netkiller.cn:5000/busybox
如果我们想要查询私有仓库中的所有镜像,使用docker search命令:
docker search registry_ipaddr:5000/
如果要查询仓库中指定账户下的镜像,则使用如下命令:
docker search registry_ipaddr:5000/account/
操作演示
[root@localhost ~]# curl -XGET http://docker.netkiller.cn:5000/v2/_catalog {"repositories":["busybox"]} [root@localhost ~]# curl -XGET http://docker.netkiller.cn:5000/v2/busybox/tags/list {"name":"busybox","tags":["latest"]}
/etc/docker/registry/config.yml
cat config.yml version: 0.1 log: fields: service: registry storage: delete: enabled: true cache: blobdescriptor: inmemory filesystem: rootdirectory: /var/lib/registry http: addr: :5000 headers: X-Content-Type-Options: [nosniff] health: storagedriver: enabled: true interval: 10s threshold: 3
创建密码文件
docker run --entrypoint htpasswd registry -Bbn testuser testpassword > auth/htpasswd
启动 docker
docker run -d -p 5000:5000 --restart=always --name docker-hub \ -v /opt/registry:/var/lib/registry \ -v /opt/auth:/auth \ -e "REGISTRY_AUTH=htpasswd" \ -e "REGISTRY_AUTH_HTPASSWD_REALM=Registry Realm" \ -e REGISTRY_AUTH_HTPASSWD_PATH=/auth/htpasswd \ registry
登录
docker login -u testuser -p testpassword docker.netkiller.cn:5000
退出
docker logout docker.netkiller.cn:5000
查看仓库 http://registry:5000/v2/_catalog
curl -XGET http://registry:5000/v2/_catalog
查看镜像
curl -XGET http://registry:5000/v2/image_name/tags/list
删除镜像
DELETE /v2/<name>/manifests/<reference> name:镜像名称 reference: 镜像对应sha256值
处理器测试
curl -I -X DELETE http://registry:5000/v2/netkiller/manifests/sha256:6a67ba482a8dd4f8143ac96b1dcffa5e45af95b8d3e37aeba72401a5afd7ab8e
Harbor 是 Vmware 公司开源的 企业级的 Docker Registry 管理项目,它提供 Dcoker Registry 管理 WebUI,可基于角色访问控制, AD/LDAP 集成,日志审核等功能,完全的支持中文。