@@ -14,6 +14,12 @@ Main feature is Docker layer/image caching, even from S3, Google Storage, etc. A
14
14
You configure the Docker clients (_ err... Kubernetes Nodes?_ ) once, and then all configuration is done on the proxy --
15
15
for this to work it requires inserting a root CA certificate into system trusted root certs.
16
16
17
+ ### master is unstable/beta
18
+
19
+ - ` master ` (and ` :latest ` Docker tag) is unstable
20
+ - Currently stable version is ` 0.2.4 ` , see [ 0.2.4 tag on Github] ( https://github.com/rpardini/docker-registry-proxy/tree/0.2.4 )
21
+
22
+
17
23
### Usage
18
24
19
25
- Run the proxy on a host close to the Docker clients
@@ -37,7 +43,7 @@ docker run --rm --name docker_registry_proxy -it \
37
43
-v $( pwd) /docker_mirror_certs:/ca \
38
44
-e REGISTRIES=" k8s.gcr.io gcr.io quay.io your.own.registry another.public.registry" \
39
45
-e AUTH_REGISTRIES=" auth.docker.io:dockerhub_username:dockerhub_password your.own.registry:username:password" \
40
- rpardini/docker-registry-proxy:0.2.4
46
+ rpardini/docker-registry-proxy:0.3.0-beta1
41
47
```
42
48
43
49
Example with GCR using credentials from a service account from a key file ` servicekey.json ` :
@@ -51,7 +57,7 @@ docker run --rm --name docker_registry_proxy -it \
51
57
-e AUTH_REGISTRIES_DELIMITER=" ;;;" \
52
58
-e AUTH_REGISTRY_DELIMITER=" :::" \
53
59
-e AUTH_REGISTRIES=" gcr.io:::_json_key:::$( cat servicekey.json) ;;;auth.docker.io:::dockerhub_username:::dockerhub_password" \
54
- rpardini/docker-registry-proxy:0.2.4
60
+ rpardini/docker-registry-proxy:0.3.0-beta1
55
61
```
56
62
57
63
Let's say you did this on host ` 192.168.66.72 ` , you can then ` curl http://192.168.66.72:3128/ca.crt ` and get the proxy CA certificate.
0 commit comments