在docker映像docker守护进程中的docker中设置不安全的注册表

在docker映像docker守护进程中的docker中设置不安全的注册表,docker,docker-compose,concourse,Docker,Docker Compose,Concourse,正在尝试将插入式docker注册表添加到我在concourse任务中运行的dind映像中: 我尝试通过运行以下命令开始我的任务: export DOCKER_OPTS="$DOCKER_OPTS --insecure-registry=${INSECURE_REG}" 尝试启动守护进程并编写: docker daemon --insecure-registry=${INSECURE_REG} & docker-compose up 但是任务错误:服务器向https客户端提供了http

正在尝试将插入式docker注册表添加到我在concourse任务中运行的dind映像中:

我尝试通过运行以下命令开始我的任务:

export DOCKER_OPTS="$DOCKER_OPTS --insecure-registry=${INSECURE_REG}"
尝试启动守护进程并编写:

docker daemon --insecure-registry=${INSECURE_REG} &
docker-compose up
但是任务错误:服务器向https客户端提供了http响应,并且没有这样的映像

整个任务如下所示(基本上是在dind容器中执行的shell脚本,以docker compose结尾):

#连接到不安全的docker注册表:
export DOCKER_OPTS=“$DOCKER_OPTS--unsecure registry=${unsecure_REG}”
#安装docker compose:
apk add—无缓存py pip curl
pip安装docker compose
#验证docker注册表:
curl http://${unsecure_REG}/v2/_catalog}curl确实返回预期的json
清理组(){
mkdir-p/sys/fs/cgroup
挂载点-q/sys/fs/cgroup |\
mount-t tmpfs-o uid=0,gid=0,mode=0755 cgroup/sys/fs/cgroup
挂载-o重新挂载,rw/sys/fs/cgroup
sed-e 1d/proc/cgroups |而read sys hierarchy num已启用;do
如果[“$enabled”!=“1”];则
#子系统已禁用;跳过
持续
fi
分组=“$(cat/proc/self/cgroup | cut-d:-f2 | grep“\\”)
如果[-z“$grouping”];则
#子系统未安装在任何位置;自行安装
分组=“$sys”
fi
mountpoint=“/sys/fs/cgroup/$grouping”
mkdir-p“$mountpoint”
#清除现有的挂载,以确保新挂载是读写的
如果mountpoint-q“$mountpoint”;则
umount“$mountpoint”
fi
mount-n-t cgroup-o“$grouping”cgroup“$mountpoint”
如果[“$grouping”!=“$sys”];则
如果[-L”/sys/fs/cgroup/$sys”];则
rm“/sys/fs/cgroup/$sys”
fi
ln-s“$mountpoint”“/sys/fs/cgroup/$sys”
fi
完成
}
# https://github.com/concourse/concourse/issues/324
清理组
#按照docker compose中的说明旋转堆栈:
docker守护进程--不安全注册表=${unsecure_REG}&
码头工人整理
是使用不安全的注册表启动docker守护程序的正确方法,即使它报告了错误,但它获得了映像并成功启动了它们

是使用不安全的注册表启动docker守护程序的正确方法,即使它报告了错误,但它获得了映像并成功启动了它们

# Connect to insecure docker registry:
export DOCKER_OPTS="$DOCKER_OPTS --insecure-registry=${INSECURE_REG}"

# Install docker-compose:
apk add --no-cache py-pip curl
pip install docker-compose

# Verify docker registry:
curl http://${INSECURE_REG}/v2/_catalog #curl does return the expected json

sanitize_cgroups() {
  mkdir -p /sys/fs/cgroup
  mountpoint -q /sys/fs/cgroup || \
    mount -t tmpfs -o uid=0,gid=0,mode=0755 cgroup /sys/fs/cgroup

  mount -o remount,rw /sys/fs/cgroup

  sed -e 1d /proc/cgroups | while read sys hierarchy num enabled; do
    if [ "$enabled" != "1" ]; then
      # subsystem disabled; skip
      continue
    fi

    grouping="$(cat /proc/self/cgroup | cut -d: -f2 | grep "\\<$sys\\>")"
    if [ -z "$grouping" ]; then
      # subsystem not mounted anywhere; mount it on its own
      grouping="$sys"
    fi

    mountpoint="/sys/fs/cgroup/$grouping"

    mkdir -p "$mountpoint"

    # clear out existing mount to make sure new one is read-write
    if mountpoint -q "$mountpoint"; then
      umount "$mountpoint"
    fi

    mount -n -t cgroup -o "$grouping" cgroup "$mountpoint"

    if [ "$grouping" != "$sys" ]; then
      if [ -L "/sys/fs/cgroup/$sys" ]; then
        rm "/sys/fs/cgroup/$sys"
      fi

      ln -s "$mountpoint" "/sys/fs/cgroup/$sys"
    fi
  done
}

# https://github.com/concourse/concourse/issues/324
sanitize_cgroups


# Spin up the stack as described in docker-compose:
docker daemon --insecure-registry=${INSECURE_REG} &
docker-compose up
dockerd --insecure-registry=${INSECURE_REG}