|
|
|
@ -187,6 +187,30 @@ tls.crt |
|
|
|
tls.crt 100% 1822 1.6MB/s 00:00 |
|
|
|
tls.crt 100% 1822 2.1MB/s 00:00 |
|
|
|
root@master1:/# |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
NOTA: en containerd el directorio es |
|
|
|
|
|
|
|
|
|
|
|
/etc/containers/certs.d/$REGISTRY_NAME/ |
|
|
|
|
|
|
|
|
|
|
|
Por lo que lo mejor es: |
|
|
|
|
|
|
|
1) crear el directorio /etc/containers |
|
|
|
2) establecer un enlace simbólico a /etc/dockers/certs.d con |
|
|
|
|
|
|
|
|
|
|
|
sudo mkdir /etc/containers |
|
|
|
cd /etc/containers |
|
|
|
sudo ln -s /etc/docker/certs.d certs.d |
|
|
|
|
|
|
|
y luego |
|
|
|
|
|
|
|
sudo systemctl restart containerd |
|
|
|
|
|
|
|
|
|
|
|
The above step forces Docker to verify our self-signed certificate even though it is not signed by a known authority. |
|
|
|
Step 6: Testing our Private Docker Registry |
|
|
|
Now, let us try to login to the registry from the master node, using the same credentials we created earlier: |
|
|
|
|