-
Notifications
You must be signed in to change notification settings - Fork 28
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unable to get authorized/self-signed certificate using registry 2.0 / 2.0.1 #5
Comments
did you try to install the certificate on the client docker daemon?
|
did you add
to the daemon's arguments? |
I indeed did put the setting in the daemon arguments... at least i think i did it in the correct place..
restarted the docker daemon by executing: |
I followed your tutorial on generating the certificate using: |
Could you elaborate on how i can get a ca.crt file? This needs to be added to the client docker daemon? |
Hey mpas, this is basic ssl understanding - you should check the concept behind the whole ssl and tls stuff in my tutorial you generate a self signed cert without the need of a CA. This is an easy way to get it running quickly but you give up many ssl features like checking the authenticity without knowing the guy who created the cert (which is you if it's selfsigned so docker won't trust this certificate without extra work) in your case the ca.crt file is similiar to your certificate because there is no ca which signed it did you restart your docker service after editing the config file? |
Yep i restarted the docker service and exactly followed the provided tutorial and somehow hitting a wall. I am going to try to generate a .crt file from a .pem file and use the .crt on the client. |
did you try to copy your cert.pem to /etc/docker/certs.d/ec2-52-17-207-222.eu-west-1.compute.amazonaws.com:443/ca.crt ? |
That is indeed what i am going to try! Thanks for pointing me out.I was not aware that a .pem just can be used as a .crt file. Will provide an update on the status. |
I also meet this issue with registry 2.1, when i follow all the steps of this tutorial. It really works with the link(https://myregistry.com:443/v2/) in browser, and ask for login, and then show the empty registry. But when when i use docker command to longin, it showes like bellow. Also i have tried to add [root@iZ23njashoyZ nginx_registry_external]# docker login https://myregistry.com:443 |
hi , my problem is Error response from daemon: no successful auth challenge for https://registry.xxx.com/v2/ - errors: [basic auth attempt to https://registry.xxx.com/v2/ realm "Registry realm" failed with status: 404 Not Found] |
I have the same problem as @stigmergy-xx |
@jrosadohp https://github.com/vTNT/ansible-docker-registry-v2/blob/master/nginx/templates/nginx.j2 u can try this |
no successful auth challenge for https://registry.xxx.com/v2/ - errors: [basic auth attempt to https://registry.xxx.com/v2/ realm "Registry realm" failed with status: 404 Not Found] Is there a way to solve this problem |
When using the container i am unable to authorize even when setting the --insecure-registry option inside the /etc/default/docker file.
Authentication via browser when using https works ok, but when i try to authorize via the docker client i get an error message pointing to v1
The following error is the result when i try to authorize:
FATA[0004] Error response from daemon: v1 ping attempt failed with error: Get https://ec2-52-17-207-222.eu-west-1.compute.amazonaws.com:443/v1/_ping: x509: certificate signed by unknown authority. If this private registry supports only HTTP or HTTPS with an unknown CA certificate, please add
--insecure-registry ec2-52-17-207-222.eu-west-1.compute.amazonaws.com:443
to the daemon's arguments. In the case of HTTPS, if you have access to the registry's CA certificate, no need for the flag; simply place the CA certificate at /etc/docker/certs.d/ec2-52-17-207-222.eu-west-1.compute.amazonaws.com:443/ca.crtThe text was updated successfully, but these errors were encountered: