[轉] 使用HTTPS在Nexus Repository Manager 3.0上搭建私有Docker倉庫

FROM: https://www.hifreud.com/2018/06/06/03-nexus-docker-repository-with-ssl/php

 

 

搭建方式

搭建SSL的Nexus官方提供兩種方式html

  • 第一種是反向代理服務器,Nexus Repository Manager使用HTTP對外提供服務,而後使用Nginx之類的反向代理服務器對外提供HTTPS服務,可是反向代理服務器與Nexus Repository Manager之間依舊使用HTTP交互。
  • 第二種就是比較正常的,在Nexus Repository Manager上作一些配置,使得Nexus Repository Manager直接對外提供HTTPS服務。

本文主要描述的就是第二種方式linux

配置HTTPS

生成keystore文件

在項目的$install-dir/etc/ssl/目錄下,執行命令web

#{NEXUS_DOMAIN} = nexus爲服務器域名 #{NEXUS_IP} = 192.168.59.1 爲服務器IP $ cd $install-dir/etc/ssl/ $ keytool -genkeypair -keystore keystore.jks -storepass nexus3 -keypass nexus3 -alias jetty -keyalg RSA -keysize 2048 -validity 5000 -dname "CN=*.{NEXUS_DOMAIN}, OU=Example, O=Sonatype, L=Unspecified, ST=Unspecified, C=US" -ext "SAN=DNS:{NEXUS_DOMAIN},IP:{NEXUS_IP}" -ext "BC=ca:true"

添加SSL端口

修改$data-dir/etc/nexus.properties文件,在第一行添加application-port-ssl=8443docker

添加HTTPS支持配置文件

修改$data-dir/etc/nexus.properties文件,修改Key爲nexus-args所在行的值,在後面添加,${jetty.etc}/jetty-https.xml,${jetty.etc}/jetty-http-redirect-to-https.xmljson

nexus-args=${jetty.etc}/jetty.xml,${jetty.etc}/jetty-http.xml,${jetty.etc}/jetty-requestlog.xml,${jetty.etc}/jetty-https.xml,${jetty.etc}/jetty-http-redirect-to-https.xml

修改HTTPS配置文件

修改${jetty.etc}/jetty-https.xml文件中keystore和truststore的配置部分centos

<Set name="KeyStorePath"><Property name="ssl.etc"/>/keystore.jks</Set> <Set name="KeyStorePassword">nexus3</Set> <Set name="KeyManagerPassword">nexus3</Set> <Set name="TrustStorePath"><Property name="ssl.etc"/>/keystore.jks</Set> <Set name="TrustStorePassword">nexus3</Set>

驗證

從新啓動服務

$nexus.exe /run

Web訪問

能夠訪問http://localhost:8081/或者https://localhost:8443/來查看,若是可以正常打開網頁則配置成功。此處因爲配置了jetty-http-redirect-to-https.xml,因此在訪問http的時候會自動redirect到https地址。bash

docker配置

登陸報錯

[root@localhost docker]# docker login -u admin -p admin123 192.168.59.1:8551 Error response from daemon: Get https://192.168.59.1:8551/v1/users/: x509: certificate signed by unknown authority

此處有個小插曲就是以前是報錯以下Error response from daemon: Get https://192.168.59.1:8551/v1/users/: x509: cannot validate certificate for 192.168.59.1 because it doesn't contain any IP SANs這是由於在生成keystore的時候沒有指定IP服務器

此處有兩種方式解決上述問題,第一種是添加insecure-registries,不對SSL進行認證校驗,第二種是安裝簽名證書,進行校驗。app

1-修改daemon.json文件

[root@localhost docker]# vi /etc/docker/daemon.json { "insecure-registries": [ "192.168.59.1:8551" ], "disable-legacy-registry": true } [root@localhost docker]# service docker restart [root@localhost docker]# docker login -u admin -p admin123 192.168.59.1:8551 Login Succeeded

2-配置ca-trust(centos)

[root@localhost docker]# docker login -u admin -p admin123 192.168.59.1:8551 Error response from daemon: Get https://192.168.59.1:8551/v2/: x509: certificate has expired or is not yet valid

出現上述問題,搜索以後大多數人說是服務器時間不一樣步問題,解決以下:

# 先解決時區問題 [root@localhost ~]# ls -l /etc/localtime lrwxrwxrwx. 1 root root 38 Apr 25 07:09 /etc/localtime -> ../usr/share/zoneinfo/America/New_York [root@localhost ~]# rm -f /etc/localtime [root@localhost ~]# ln -s /usr/share/zoneinfo/Asia/Shanghai /etc/localtime # 在解決時間問題 [root@localhost docker]# yum install ntp.x86_64 # 可用的ntp服務器列表 http://www.ntp.org.cn/pool.php [root@localhost docker]# ntpdate cn.ntp.org.cn 6 Jun 17:50:20 ntpdate[18252]: no server suitable for synchronization found # 因爲公司代理服務器問題,鏈接不上NTP服務器,因此手動設置 [root@localhost ~]# date -s 20180606 Wed Jun 6 00:00:00 CST 2018 [root@localhost ~]# date -s 17:53:35 Wed Jun 6 17:53:35 CST 2018

基於centos7.0版本,生成和導入cert文件

#生成cert文件 [root@localhost ~]# keytool -printcert -sslserver 192.168.59.1:8443 -rfc >nexus.crt [root@localhost ~]# yum install ca-certificates [root@localhost ~]# update-ca-trust force-enable # 還能夠放在/etc/docker/certs.d/192.168.59.1:8443目錄下 [root@localhost ~]# mv nexus.crt /etc/pki/ca-trust/source/anchors/nexus.crt [root@localhost ~]# update-ca-trust [root@localhost ~]# service docker restart [root@localhost ~]# docker login -u admin -p admin123 192.168.59.1:8551 Error response from daemon: Get https://192.168.59.1:8551/v2/: x509: certificate signed by unknown authority

Pekkle: 親測,在centos 7.2中,把證書文件放入 /etc/pki/ca-trust/source/anchors ,而後執行 update-ca-trust , 再重啓docker服務,以後docker成功連接nexus https。

對於Ubuntu系統來講certificate的存放路徑是/usr/local/share/ca-certificates

#生成cert文件 [root@localhost ~]# keytool -printcert -sslserver 192.168.59.1:8443 -rfc >nexus.crt # 還能夠放在/etc/docker/certs.d/192.168.59.1:8443目錄下 [root@localhost ~]# mv nexus.crt /usr/local/share/ca-certificates/nexus.crt [root@localhost ~]# update-ca-certificates [root@localhost ~]# service docker restart [root@localhost ~]# docker login -u admin -p admin123 192.168.59.1:8551

依然報錯如上,說是Unkonw authority,搜索以後發現 通常狀況下,證書只支持域名訪問,要使其支持IP地址訪問,須要修改配置文件openssl.cnf。

在Redhat7系統中,文件所在位置是/etc/pki/tls/openssl.cnf。在其中的[ v3_ca]部分,添加subjectAltName選項:

[ v3_ca ] subjectAltName = IP:192.168.59.1

再次執行docker login

[root@localhost ~]# service docker restart [root@localhost ~]# docker login -u admin -p admin123 192.168.59.1:8551 Login Succeeded

至此,大功告成!

參考資料

SSL and Repository Connector Configuration : https://help.sonatype.com/repomanager3/private-registry-for-docker/ssl-and-repository-connector-configuration

Inbound SSL - Configuring to Serve Content via HTTPS : https://help.sonatype.com/repomanager3/security/configuring-ssl#ConfiguringSSL-InboundSSL-ConfiguringtoServeContentviaHTTPS

Using Self-Signed Certificates with Nexus Repository Manager and Docker Daemon https://support.sonatype.com/hc/en-us/articles/217542177-Using-Self-Signed-Certificates-with-Nexus-Repository-Manager-and-Docker-Daemon

ca證書校驗用戶證書 : http://www.javashuo.com/article/p-nvqrskxp-hr.html

03搭建docker私有倉庫 : http://www.javashuo.com/article/p-ybvrmcux-dh.html

docker 報錯:x509 : certificate has expired or is not yet valid: http://www.javashuo.com/article/p-vpfkwomt-cr.html

linux設置系統時間 : https://www.cnblogs.com/boshen-hzb/p/6269378.html

相關文章
相關標籤/搜索