标签:orm usr mkdir nat private tables for rbo nod
1、安装依赖 yum install ebtables ethtool iproute iptables socat util-linux wget openssl-devel -y
2、安装 docker-compose yum install epel-release -y yum install python-pip -y pip install --upgrade pip curl -L "https://github.com/docker/compose/releases/download/1.24.1/docker-compose-$(uname -s)-$(uname -m)" -o /usr/local/bin/docker-compose ln -s /usr/local/bin/docker-compose /usr/bin/docker-compose chmod a+x /usr/local/bin/docker-compose docker-compose --version 修改hosts文件 笔者以下使用的域名hub.domain.com,并不是实际注册的域名,而是通过修改Hosts文件指向了这个Harbor服务器的地址,你可以修改为自己需要的域名。 [root@harbor ~]# cat /etc/hosts 127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4 ::1 localhost localhost.localdomain localhost6 localhost6.localdomain6 192.168.1.43 hub.domain.com 创建为Harbor使用Https的CA证书 创建证书存放目录 [root@harbor ~]# mkdir -p /data/cert [root@harbor ~]# cd /data/cert/ 获得证书授权 [root@harbor cert]# openssl genrsa -out ca.key 4096 [root@harbor cert]# openssl req -x509 -new -nodes -sha512 -days 3650 -subj "/C=CN/ST=Guangzhou/L=Guangzhou/O=example/CN=hub.domain.com" -key ca.key -out ca.crt 获得证书服务器 # 创建私钥 [root@harbor cert]# openssl genrsa -out hub.domain.com.key 4096 # 生成证书签名 [root@harbor cert]# openssl req -sha512 -new -subj "/C=CN/ST=Guangzhou/L=Guangzhou/O=example/CN=hub.domain.com" -key hub.domain.com.key -out hub.domain.com.csr # 生成注册表主机的证书 [root@harbor cert]# cat > v3.ext <<-EOF authorityKeyIdentifier=keyid,issuer basicConstraints=CA:FALSE keyUsage = digitalSignature, nonRepudiation, keyEncipherment, dataEncipherment extendedKeyUsage = serverAuth subjectAltName = @alt_names [alt_names] DNS.1=hub.domain.com DNS.2=hub.domain EOF [root@harbor cert]# openssl x509 -req -sha512 -days 3650 -extfile v3.ext -CA ca.crt -CAkey ca.key -CAcreateserial -in hub.domain.com.csr -out hub.domain.com.crt # 转换证书 [root@harbor cert]# openssl x509 -inform PEM -in hub.domain.com.crt -out hub.domain.com.cert 生成完之后的证书目录结构 [root@harbor cert]# tree . . ├── ca.crt ├── ca.key ├── ca.srl ├── hub.domain.com.cert ├── hub.domain.com.crt ├── hub.domain.com.csr ├── hub.domain.com.key └── v3.ext 0 directories, 8 files 安装及配置Harbor私有仓库 下载加解压离线安装版Harbor安装文件 [root@harbor cert]# cd .. [root@harbor data]# wget https://storage.googleapis.com/harbor-releases/release-1.7.0/harbor-offline-installer-v1.7.1.tgz [root@harbor data]# tar -xf harbor-offline-installer-v1.7.1.tgz [root@harbor data]# ls cert harbor harbor-offline-installer-v1.7.1.tgz 编辑harbor.cfg配置文件 [root@harbor data]# cd harbor.yml Edit the file harbor.yml, update the hostname and uncomment the https block, and update the attributes certificate and private_key: #set hostname hostname: yourdomain.com http: port: 80 https: # https port for harbor, default is 443 port: 443 # The path of cert and key files for nginx certificate: /data/cert/yourdomain.com.crt private_key: /data/cert/yourdomain.com.key 为Harbor生成配置文件 [root@harbor harbor]# ./prepare 1 为Docker配置服务器证书,密钥和CA [root@harbor harbor]# mkdir -p /etc/docker/certs.d/hub.demian.com [root@harbor harbor]# cp hub.domain.com.cert /etc/docker/certs.d/hub.domain.com/ [root@harbor harbor]# cp hub.domain.com.key /etc/docker/certs.d/hub.domain.com/ [root@harbor harbor]# cp ca.crt /etc/docker/certs.d/hub.domain.com/ Edit the file harbor.yml, update the hostname and uncomment the https block, and update the attributes certificate and private_key: #set hostname hostname: yourdomain.com http: port: 80 https: # https port for harbor, default is 443 port: 443 # The path of cert and key files for nginx certificate: /data/cert/yourdomain.com.crt private_key: /data/cert/yourdomain.com.key
标签:orm usr mkdir nat private tables for rbo nod
原文地址:https://www.cnblogs.com/hao-guo/p/12164942.html