f125a8b892
This change addresses a long-standing issue in rST documentation imported from XML. That import process added backslash escapes in front of various characters. The three most common being '(', ')', and '_'. These instances are removed. Signed-off-by: Ron Stone <ronald.stone@windriver.com> Change-Id: Id43a9337ffcd505ccbdf072d7b29afdb5d2c997e
119 lines
4.4 KiB
ReStructuredText
119 lines
4.4 KiB
ReStructuredText
|
||
.. idr1582032622279
|
||
.. _installing-updating-the-docker-registry-certificate:
|
||
|
||
==========================================
|
||
Install/Update Local Registry Certificates
|
||
==========================================
|
||
|
||
.. warning::
|
||
|
||
By default a self-signed certificate is generated at installation time for
|
||
the registry API. This applies to standalone system, central cloud and
|
||
subclouds of |DC| system. For more secure access, it is strongly recommended
|
||
to update the default self-signed certificate with an intermediate or Root
|
||
|CA|-signed certificate.
|
||
|
||
|
||
The local Docker registry provides secure HTTPS access using the registry API.
|
||
|
||
.. rubric:: |context|
|
||
|
||
The intermediate or Root |CA|-signed certificate for the registry must have at
|
||
least the following |SANs|: ``DNS:registry.local``, ``DNS:registry.central``,
|
||
IP Address:<oam-floating-ip-address>, IP Address:<mgmt-floating-ip-address>.
|
||
Use the :command:`system addrpool-list` command to get the |OAM| floating IP
|
||
Address and management floating IP Address for your system. You can add any
|
||
additional |DNS| entry\(s) that you have set up for your |OAM| floating IP
|
||
Address.
|
||
|
||
.. note::
|
||
|
||
The ``DNS:registry.central`` can be omitted from |SANs| for
|
||
standalone system and subcloud of |DC| system.
|
||
|
||
The update procedure for any type of system (standalone, central cloud and
|
||
subcloud of |DC| system) is the same.
|
||
|
||
Use the following procedure to install an intermediate or Root |CA|-signed
|
||
certificate to either replace the default self-signed certificate or to replace
|
||
an expired or soon to expire certificate.
|
||
|
||
.. rubric:: |prereq|
|
||
|
||
Obtain an intermediate or Root |CA|-signed certificate and key from a trusted
|
||
intermediate or Root Certificate Authority (|CA|). Refer to the documentation
|
||
for the external Root |CA| that you are using, on how to create public
|
||
certificate and private key pairs, signed by an intermediate or Root |CA|, for
|
||
HTTPS.
|
||
|
||
.. xreflink
|
||
|
||
For lab purposes, see |sec-doc|: :ref:`Create Certificates Locally
|
||
using openssl <create-certificates-locally-using-openssl>` to create an
|
||
Intermediate or test Root |CA| certificate and key, and use it to sign test
|
||
certificates.
|
||
|
||
Put the Privacy Enhanced Mail (PEM) encoded versions of the certificate and
|
||
key in a single file, and copy the file to the controller host.
|
||
|
||
Also obtain the certificate of the intermediate or Root CA that signed the
|
||
above certificate.
|
||
|
||
Ensure all certificates are valid before starting an upgrade. Run the
|
||
:command:`show-certs.sh` script to display an overview of the various
|
||
certificates that exist in the system along with their expiry date. For more
|
||
information, see, :ref:`Display Certificates Installed on a System <utility-script-to-display-certificates>`.
|
||
|
||
.. rubric:: |proc|
|
||
|
||
.. _installing-updating-the-docker-registry-certificate-d271e71:
|
||
|
||
#. In order to enable internal use of the Docker registry certificate, update
|
||
the trusted |CA| list for this system with the Root |CA| associated with the
|
||
Docker registry certificate.
|
||
|
||
.. code-block:: none
|
||
|
||
~(keystone_admin)]$ system certificate-install --mode ssl_ca <pathTocertificate>
|
||
|
||
where:
|
||
|
||
**<pathTocertificate>**
|
||
|
||
is the path to the intermediate or Root |CA| certificate associated with the
|
||
Docker registry's intermediate or Root |CA|-signed certificate.
|
||
|
||
#. Update the Docker registry certificate using the
|
||
:command:`certificate-install` command.
|
||
|
||
Set the mode (``-m`` or ``--mode``) parameter to docker_registry.
|
||
|
||
.. code-block:: none
|
||
|
||
~(keystone_admin)]$ system certificate-install --mode docker_registry <pathTocertificateAndKey>
|
||
|
||
where:
|
||
|
||
**<pathTocertificateAndKey>**
|
||
|
||
is the path to the file containing both the Docker registry's Intermediate
|
||
or Root |CA|-signed certificate and private key to install.
|
||
|
||
In |DC| system, the server certificate of central registry and the server
|
||
certificate of subcloud’s local registry can be arranged to be generated from
|
||
the same root |CA| certificate.
|
||
|
||
In this case, the generated server certificates need to be installed on the
|
||
central cloud and each of the subclouds.
|
||
|
||
The root |CA| certificate only needs to install on central cloud, the |DC|
|
||
orchestration will sync the root |CA| certificate to all the subclouds.
|
||
|
||
---------------------------------
|
||
Renew local registry certificates
|
||
---------------------------------
|
||
|
||
The local registry certificate is not automatically renewed, user MUST renew
|
||
the certificate prior to expiry, otherwise a variety of system operations will
|
||
fail. |