|
@@ -1,23 +1,23 @@
|
|
|
-#!/bin/bash
|
|
|
-
|
|
|
+#!/bin/sh
|
|
|
openssl genrsa -aes256 -out ca-key.pem 2048
|
|
|
-
|
|
|
-echo "enter your Docker daemon's hostname as the 'Common Name'= ($HOST)"
|
|
|
-
|
|
|
-#TODO add this as an ENV to docker run?
|
|
|
openssl req -new -x509 -days 365 -key ca-key.pem -sha256 -out ca.pem
|
|
|
-
|
|
|
-
|
|
|
-# server cert
|
|
|
openssl genrsa -out server-key.pem 2048
|
|
|
openssl req -subj "/CN=$HOST" -new -key server-key.pem -out server.csr
|
|
|
-openssl x509 -req -days 365 -in server.csr -CA ca.pem -CAkey ca-key.pem \
|
|
|
- -CAcreateserial -out server-cert.pem
|
|
|
-
|
|
|
-#client cert
|
|
|
+echo subjectAltName = IP:$YOUR_PUBLIC_IP > extfile.cnf
|
|
|
+openssl x509 -req -days 365 -in server.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out server-cert.pem -extfile extfile.cnf
|
|
|
openssl genrsa -out key.pem 2048
|
|
|
openssl req -subj '/CN=client' -new -key key.pem -out client.csr
|
|
|
-
|
|
|
echo extendedKeyUsage = clientAuth > extfile.cnf
|
|
|
-openssl x509 -req -days 365 -in client.csr -CA ca.pem -CAkey ca-key.pem \
|
|
|
- -CAcreateserial -out cert.pem -extfile extfile.cnf
|
|
|
+openssl x509 -req -days 365 -in client.csr -CA ca.pem -CAkey ca-key.pem -CAcreateserial -out cert.pem -extfile extfile.cnf
|
|
|
+rm -v client.csr server.csr
|
|
|
+chmod -v 0400 ca-key.pem key.pem server-key.pem
|
|
|
+chmod -v 0444 ca.pem server-cert.pem cert.pem
|
|
|
+# docker -d --tlsverify --tlscacert=ca.pem --tlscert=server-cert.pem --tlskey=server-key.pem -H=0.0.0.0:7778
|
|
|
+# docker --tlsverify --tlscacert=ca.pem --tlscert=cert.pem --tlskey=key.pem -H=$HOST:7778 version
|
|
|
+mkdir -pv ~/.docker
|
|
|
+cp -v {ca,cert,key}.pem ~/.docker
|
|
|
+export DOCKER_HOST=tcp://$HOST:7778 DOCKER_TLS_VERIFY=1
|
|
|
+# docker ps
|
|
|
+export DOCKER_CERT_PATH=~/.docker/zone1/
|
|
|
+# docker --tlsverify ps
|
|
|
+# curl https://$HOST:7778/images/json --cert ~/.docker/cert.pem --key ~/.docker/key.pem --cacert ~/.docker/ca.pem
|