2015-06-26 00:32:57 +00:00
<!-- [metadata]>
+++
2015-08-12 00:48:53 +00:00
title = "Authenticating proxy with nginx"
2015-08-26 18:08:13 +00:00
description = "Restricting access to your registry using a nginx proxy"
keywords = ["registry, on-prem, images, tags, repository, distribution, nginx, proxy, authentication, TLS, recipe, advanced"]
2015-06-26 00:32:57 +00:00
+++
<![end-metadata]-->
2015-06-01 03:09:59 +00:00
2015-06-12 08:10:03 +00:00
# Authenticating proxy with nginx
2015-06-01 03:09:59 +00:00
2015-12-12 00:39:51 +00:00
## Use-case
2015-06-01 03:09:59 +00:00
2015-08-19 02:51:57 +00:00
People already relying on a nginx proxy to authenticate their users to other services might want to leverage it and have Registry communications tunneled through the same pipeline.
2015-06-01 03:09:59 +00:00
2015-08-19 02:51:57 +00:00
Usually, that includes enterprise setups using LDAP/AD on the backend and a SSO mechanism fronting their internal http portal.
2015-06-01 03:09:59 +00:00
2015-12-12 00:39:51 +00:00
### Alternatives
2015-06-01 03:09:59 +00:00
2015-09-14 15:35:01 +00:00
If you just want authentication for your registry, and are happy maintaining users access separately, you should really consider sticking with the native [basic auth registry feature ](deploying.md#native-basic-auth ).
2015-06-01 03:09:59 +00:00
2015-12-12 00:39:51 +00:00
### Solution
2015-06-01 03:09:59 +00:00
2015-08-19 02:51:57 +00:00
With the method presented here, you implement basic authentication for docker engines in a reverse proxy that sits in front of your registry.
2015-06-01 03:09:59 +00:00
2015-10-14 22:15:21 +00:00
While we use a simple htpasswd file as an example, any other nginx authentication backend should be fairly easy to implement once you are done with the example.
2015-06-01 03:09:59 +00:00
2015-10-14 22:15:21 +00:00
We also implement push restriction (to a limited user group) for the sake of the example. Again, you should modify this to fit your mileage.
2015-08-19 02:51:57 +00:00
### Gotchas
While this model gives you the ability to use whatever authentication backend you want through the secondary authentication mechanism implemented inside your proxy, it also requires that you move TLS termination from the Registry to the proxy itself.
2015-09-14 15:35:01 +00:00
Furthermore, introducing an extra http layer in your communication pipeline will make it more complex to deploy, maintain, and debug, and will possibly create issues. Make sure the extra complexity is required.
For instance, Amazon's Elastic Load Balancer (ELB) in HTTPS mode already sets the following client header:
```
X-Real-IP
X-Forwarded-For
X-Forwarded-Proto
```
So if you have an nginx sitting behind it, should remove these lines from the example config below:
```
X-Real-IP $remote_addr; # pass on real client's IP
X-Forwarded-For $proxy_add_x_forwarded_for;
X-Forwarded-Proto $scheme;
```
2015-10-14 22:15:21 +00:00
Otherwise nginx will reset the ELB's values, and the requests will not be routed properly. For more information, see [#970 ](https://github.com/docker/distribution/issues/970 ).
2015-08-19 02:51:57 +00:00
## Setting things up
Read again [the requirements ](recipes.md#requirements ).
2015-06-01 03:09:59 +00:00
Ready?
2015-12-07 19:28:30 +00:00
--
Create the required directories
2015-06-01 03:09:59 +00:00
```
2015-06-12 08:10:03 +00:00
mkdir -p auth
mkdir -p data
2015-12-07 19:28:30 +00:00
```
Create the main nginx configuration you will use.
```
2015-06-01 03:09:59 +00:00
2015-08-19 02:51:57 +00:00
cat < < EOF > auth/nginx.conf
2015-10-02 07:36:36 +00:00
events {
worker_connections 1024;
2015-06-01 03:09:59 +00:00
}
2015-10-02 07:36:36 +00:00
http {
2016-05-04 20:52:21 +00:00
2015-10-02 07:36:36 +00:00
upstream docker-registry {
server registry:5000;
}
2015-06-01 03:09:59 +00:00
2015-10-02 07:36:36 +00:00
## Set a variable to help us decide if we need to add the
## 'Docker-Distribution-Api-Version' header.
## The registry always sets this header.
## In the case of nginx performing auth, the header will be unset
## since nginx is auth-ing before proxying.
map \$upstream_http_docker_distribution_api_version \$docker_distribution_api_version {
'registry/2.0' '';
default registry/2.0;
}
2015-06-01 03:09:59 +00:00
2015-10-02 07:36:36 +00:00
server {
listen 443 ssl;
server_name myregistrydomain.com;
# SSL
ssl_certificate /etc/nginx/conf.d/domain.crt;
ssl_certificate_key /etc/nginx/conf.d/domain.key;
2016-05-04 20:52:21 +00:00
2015-10-02 07:36:36 +00:00
# Recommendations from https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
ssl_protocols TLSv1.1 TLSv1.2;
ssl_ciphers 'EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH';
ssl_prefer_server_ciphers on;
ssl_session_cache shared:SSL:10m;
2016-05-04 20:52:21 +00:00
2015-10-02 07:36:36 +00:00
# disable any limits to avoid HTTP 413 for large image uploads
client_max_body_size 0;
2016-05-04 20:52:21 +00:00
2015-10-02 07:36:36 +00:00
# required to avoid HTTP 411: see Issue #1486 (https://github.com/docker/docker/issues/1486)
chunked_transfer_encoding on;
2016-05-04 20:52:21 +00:00
2015-10-02 07:36:36 +00:00
location /v2/ {
# Do not allow connections from docker 1.5 and earlier
# docker pre-1.6.0 did not properly set the user agent on ping, catch "Go *" user agents
if (\$http_user_agent ~ "^(docker\/1\.(3|4|5(?!\.[0-9]-dev))|Go ).*\$" ) {
return 404;
}
2016-05-04 20:52:21 +00:00
2015-10-02 07:36:36 +00:00
# To add basic authentication to v2 use auth_basic setting.
auth_basic "Registry realm";
auth_basic_user_file /etc/nginx/conf.d/nginx.htpasswd;
2016-05-04 20:52:21 +00:00
2015-10-02 07:36:36 +00:00
## If $docker_distribution_api_version is empty, the header will not be added.
## See the map directive above where this variable is defined.
add_header 'Docker-Distribution-Api-Version' \$docker_distribution_api_version always;
2016-05-04 20:52:21 +00:00
2015-10-02 07:36:36 +00:00
proxy_pass http://docker-registry;
proxy_set_header Host \$http_host; # required for docker client's sake
proxy_set_header X-Real-IP \$remote_addr; # pass on real client's IP
proxy_set_header X-Forwarded-For \$proxy_add_x_forwarded_for;
proxy_set_header X-Forwarded-Proto \$scheme;
proxy_read_timeout 900;
2015-06-01 03:09:59 +00:00
}
}
}
EOF
2015-12-07 19:28:30 +00:00
```
2015-10-02 07:36:36 +00:00
Now create a password file for "testuser" and "testpassword"
2015-06-01 03:09:59 +00:00
2015-12-07 19:28:30 +00:00
```
2015-10-02 07:36:36 +00:00
docker run --rm --entrypoint htpasswd registry:2 -bn testuser testpassword > auth/nginx.htpasswd
2015-12-07 19:28:30 +00:00
```
Copy over your certificate files
2015-06-01 03:09:59 +00:00
2015-12-07 19:28:30 +00:00
```
2015-06-01 03:09:59 +00:00
cp domain.crt auth
cp domain.key auth
2015-12-07 19:28:30 +00:00
```
2015-06-01 03:09:59 +00:00
2015-12-07 19:28:30 +00:00
Now create your compose file
2015-06-01 03:09:59 +00:00
2015-12-07 19:28:30 +00:00
```
2015-06-01 03:09:59 +00:00
cat < < EOF > docker-compose.yml
nginx:
image: "nginx:1.9"
ports:
- 5043:443
links:
- registry:registry
volumes:
2015-10-02 07:36:36 +00:00
- ./auth:/etc/nginx/conf.d
- ./auth/nginx.conf:/etc/nginx/nginx.conf:ro
2015-06-01 03:09:59 +00:00
registry:
image: registry:2
ports:
- 127.0.0.1:5000:5000
volumes:
2015-10-02 07:36:36 +00:00
- `pwd` ./data:/var/lib/registry
2015-06-01 03:09:59 +00:00
EOF
```
2015-08-19 02:51:57 +00:00
## Starting and stopping
Now, start your stack:
docker-compose up -d
2015-06-01 03:09:59 +00:00
2015-10-02 07:36:36 +00:00
Login with a "push" authorized user (using `testuser` and `testpassword` ), then tag and push your first image:
2015-06-01 03:09:59 +00:00
2016-05-04 20:52:21 +00:00
docker login -u=testuser -p=testpassword -e=root@example.ch myregistrydomain.com:5043
2015-08-19 02:51:57 +00:00
docker tag ubuntu myregistrydomain.com:5043/test
docker push myregistrydomain.com:5043/test
docker pull myregistrydomain.com:5043/test