关于java:docker-安装Harbor

38次阅读

共计 6648 个字符,预计需要花费 17 分钟才能阅读完成。

docker 装置 harbor

1. 下载镜像依赖

docker pull vmware/harbor-jobservice:v1.1.2
docker pull vmware/harbor-ui:v1.1.2
docker pull vmware/harbor-adminserver:v1.1.2
docker pull vmware/harbor-db:v1.1.2
docker pull vmware/registry:2.6.1-photon
docker pull vmware/harbor-notary-db:mariadb-10.1.10
docker pull vmware/nginx:1.11.5-patched
docker pull vmware/notary-photon:signer-0.5.0
docker pull vmware/notary-photon:server-0.5.0
docker pull vmware/harbor-log:v1.1.2
docker pull photon:1.0

2.Docker-compose 装置

装置形式一
#1、下载指定版本的 docker-compose
$ curl -L https://github.com/docker/compose/releases/download/1.13.0/docker-compose-`uname -s`-`uname -m` > /usr/local/bin/docker-compose

#2、对二进制文件赋可执行权限
$ sudo chmod +x /usr/local/bin/docker-compose

#3、测试下 docker-compose 是否装置胜利
$ docker-compose --version
docker-compose version 1.13.0, build 1719ceb
装置形式二:

举荐应用 pip 装置 docker-compose

# 装置 pip
yum -y install epel-release
yum -y install python-pip

#确认版本
pip --version

#更新 pip
pip install --upgrade pip

#装置 docker-compose
pip install docker-compose
docker-compose version

3. 下载 Harbor 安装文件

1、在线安装包

$ wget https://github.com/vmware/harbor/releases/download/v1.1.2/harbor-online-installer-v1.1.2.tgz
$ tar xvf harbor-online-installer-v1.1.2.tgz

2、离线安装包

$ wget https://github.com/vmware/harbor/releases/download/v1.1.2/harbor-offline-installer-v1.1.2.tgz
$ tar xvf harbor-offline-installer-v1.1.2.tgz

咱们这里抉择离线安装包进行装置,因为 github 下载地址速度较慢,也可通过上面百度云下载

链接:https://pan.baidu.com/s/1qiln… 明码:py93

4. 批改 Harbor 配置

habor 域名设置为 harbor.demo.com

cd harbor
vi harbor.cfg

## Configuration file of Harbor

#The IP address or hostname to access admin UI and registry service.
#DO NOT use localhost or 127.0.0.1, because Harbor needs to be accessed by external clients.
hostname = harbor.demo.com

#The protocol for accessing the UI and token/notification service, by default it is http.
#It can be set to https if ssl is enabled on nginx.
ui_url_protocol = http

#The password for the root user of mysql db, change this before any production use.
db_password = root123

#Maximum number of job workers in job service  
max_job_workers = 3 

#Determine whether or not to generate certificate for the registry's token.
#If the value is on, the prepare script creates new root cert and private key 
#for generating token to access the registry. If the value is off the default key/cert will be used.
#This flag also controls the creation of the notary signer's cert.
customize_crt = on

#The path of cert and key files for nginx, they are applied only the protocol is set to https
ssl_cert = /data/cert/server.crt
ssl_cert_key = /data/cert/server.key

#The path of secretkey storage
secretkey_path = /data

#Admiral's url, comment this attribute, or set its value to NA when Harbor is standalone
admiral_url = NA

#NOTES: The properties between BEGIN INITIAL PROPERTIES and END INITIAL PROPERTIES
#only take effect in the first boot, the subsequent changes of these properties 
#should be performed on web ui

#************************BEGIN INITIAL PROPERTIES************************

#Email account settings for sending out password resetting emails.

#Email server uses the given username and password to authenticate on TLS connections to host and act as identity.
#Identity left blank to act as username.
email_identity = 

email_server = smtp.mxhichina.com
email_server_port = 25
email_username = harbor@demo.com
email_password = 123456
email_from = harbor <harbor@demo.com>
email_ssl = false

##The initial password of Harbor admin, only works for the first time when Harbor starts. 
#It has no effect after the first launch of Harbor.
#Change the admin password from UI after launching Harbor.
harbor_admin_password = Harbor12345

##By default the auth mode is db_auth, i.e. the credentials are stored in a local database.
#Set it to ldap_auth if you want to verify a user's credentials against an LDAP server.
auth_mode = db_auth

#The url for an ldap endpoint.
ldap_url = ldaps://ldap.mydomain.com

#A user's DN who has the permission to search the LDAP/AD server. 
#If your LDAP/AD server does not support anonymous search, you should configure this DN and ldap_search_pwd.
ldap_searchdn = uid=searchuser,ou=people,dc=mydomain,dc=com

#the password of the ldap_searchdn
ldap_search_pwd = password

#The base DN from which to look up a user in LDAP/AD
ldap_basedn = ou=people,dc=mydomain,dc=com

#Search filter for LDAP/AD, make sure the syntax of the filter is correct.
ldap_filter = (objectClass=person)

# The attribute used in a search to match a user, it could be uid, cn, email, sAMAccountName or other attributes depending on your LDAP/AD  
ldap_uid = uid 

#the scope to search for users, 1-LDAP_SCOPE_BASE, 2-LDAP_SCOPE_ONELEVEL, 3-LDAP_SCOPE_SUBTREE
ldap_scope = 3 

#Timeout (in seconds)  when connecting to an LDAP Server. The default value (and most reasonable) is 5 seconds.
ldap_timeout = 5

#Turn on or off the self-registration feature
self_registration = on

#The expiration time (in minute) of token created by token service, default is 30 minutes
token_expiration = 30

#The flag to control what users have permission to create projects
#The default value "everyone" allows everyone to creates a project. 
#Set to "adminonly" so that only admin user can create project.
project_creation_restriction = everyone

#Determine whether the job service should verify the ssl cert when it connects to a remote registry.
#Set this flag to off when the remote registry uses a self-signed or untrusted certificate.
verify_remote_cert = on
#************************END INITIAL PROPERTIES************************
#############

默认是 80 端口,如果端口占用,咱们能够去批改 docker-compose.yml 文件中,对应服务映射本地的端口 9999。

docker-compose.yml

proxy:
    image: vmware/nginx:1.11.5-patched
    container_name: nginx
    restart: always
    volumes:
      - ./common/config/nginx:/etc/nginx:z
    networks:
      - harbor
    ports:
      - 9999:80
      - 443:443
      - 4443:4443
    depends_on:
      - mysql
      - registry
      - ui
      - log
    logging:
      driver: "syslog"
      options:  

启动 Harbor
批改完配置文件后,在的当前目录执行 ./install.sh

5. 配置 NGINX
cd /etc/nginx/
vi nginx.conf

server {
        listen          80;
        server_name     harbor.demo.com;
        root            /usr/share/nginx/html;

        include /etc/nginx/default.d/*.conf;

        location / {
            # 设置最大容许上传单个的文件大小
            client_max_body_size 1024m;
            proxy_redirect off;
            proxy_set_header Host $host;
            proxy_set_header X-Real-IP $remote_addr;
            proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
            proxy_pass http://localhost:9999;
            index index.html index.htm;
        }

        error_page 404 /404.html;
            location = /40x.html { }

        error_page 500 502 503 504 /50x.html;
            location = /50x.html {}}

# 查看配置是否正确
nginx -t

#重启服务
sudo systemctl restart nginx
6. 拜访 harbor 并提交镜像

拜访刚设置的 hostname 即可 http://harbor.demo.com/

这是因为 docker1.3.2 版本开始默认 docker registry 应用的是 https,咱们设置 Harbor 默认 http 形式,所以当执行用 docker login、pull、push 等命令操作非 https 的 docker regsitry 的时就会报错。

docker login harbor.demo.com
Username: admin
Password: 
Error response from daemon: Get https://harbor.demo.com/v2/: dial tcp 10.220.107.52:443: connect: connection refused

解决办法:

# 批改 docker 启动配置
vi  /lib/systemd/system/docker.service
#批改前
ExecStart=/usr/bin/dockerd -H fd:// --containerd=/run/containerd/containerd.sock
#批改后
ExecStart=/usr/bin/dockerd --insecure-registry harbor.demo.com -H fd:// --containerd=/run/containerd/containerd.sock
7.harbor 重启
cd /usr/local/harbor

1、进行 Harbor
$ docker-compose down -v
Stopping nginx ... done
Stopping harbor-jobservice ... done
......
Removing harbor-log ... done
Removing network harbor_harbor

2、启动 Harbor
$ docker-compose up -d
Creating network "harbor_harbor" with the default driver
Creating harbor-log ... 
......
Creating nginx
Creating harbor-jobservice ... done
8. 日志查看

日志存储地位 /var/log/harbor/

本文由博客群发一文多发等经营工具平台 OpenWrite 公布

正文完
 0