
Acted on Greg's comments Patch 1: Deleted duplicated docs and corrected references to fix build failure Patch 2: Acted on Greg's and Ron's comments. Patch 3: Acted on Greg's comment. Patch 4: Acted on Mary's comments. Patch 5: Solved merge conflict. Patch 6: Worked on Mary's comments. Patch 7: Fixed build conflict. Patch 8: Worked on Mary's comments. https://review.opendev.org/c/starlingx/docs/+/792461 Signed-off-by: egoncalv <elisamaraaoki.goncalves@windriver.com> Change-Id: I647711ac35f45bc9c79cc490269831770e98e2f4
2.9 KiB
Local Docker Registry Certificate
The local Docker registry provides secure HTTPS access using the registry API.
By default a self-signed certificate is generated at installation time for the registry API. For more secure access, an intermediate or Root -signed certificate is strongly recommended.
The intermediate or Root -signed certificate for the registry must
have at least the following : DNS:registry.local, DNS:registry.central, IP
Address:<oam-floating-ip-address>, IP
Address:<mgmt-floating-ip-address>. Use the system addrpool-list
command to get the floating IP Address and management floating IP
Address for your system. You can add any additional DNS entry(s) that
you have set up for your floating IP Address.
Use the following procedure to install an intermediate or Root -signed certificate to either replace the default self-signed certificate or to replace an expired or soon to expire certificate.
Obtain an intermediate or Root -signed certificate and key from a trusted intermediate or Root . Refer to the documentation for the external Root that you are using, on how to create public certificate and private key pairs, signed by an intermediate or Root , for HTTPS.
For lab purposes, see Create Certificates Locally using openssl
<create-certificates-locally-using-openssl>
for how to
create a test intermediate or Root certificate and key, and use it to
sign test certificates.
Put the encoded versions of the certificate and key in a single file, and copy the file to the controller host.
Also, obtain the certificate of the intermediate or Root that signed the above certificate.
In order to enable internal use of the Docker registry certificate, update the trusted list for this system with the Root associated with the Docker registry certificate.
~(keystone_admin)]$ system certificate-install --mode ssl_ca <pathTocertificate>
where:
<pathTocertificate>
-
is the path to the intermediate or Root certificate associated with the Docker registry's intermediate or Root -signed certificate.
Update the Docker registry certificate using the
certificate-install
command.Set the
mode (-m or --mode)
parameter todocker_registry
.~(keystone_admin)]$ system certificate-install --mode docker_registry <pathTocertificateAndKey>
where:
<pathTocertificateAndKey>
-
is the path to the file containing both the Docker registry's intermediate or Root CA-signed certificate and private key to install.