065bda79bb
- apache recipe - streamline nginx recipe - recipes file Signed-off-by: Olivier Gambier <olivier@docker.com>
156 lines
5 KiB
Markdown
156 lines
5 KiB
Markdown
<!--[metadata]>
|
||
+++
|
||
title = "Authenticating proxy with nginx"
|
||
description = "Restricting access to your registry using a proxy"
|
||
keywords = ["registry, service, images, repository, authentication"]
|
||
+++
|
||
<![end-metadata]-->
|
||
|
||
# Authenticating proxy with nginx
|
||
|
||
|
||
## Use-case
|
||
|
||
People already relying on a nginx proxy to authenticate their users to other services might want to leverage it and have Registry communications tunneled through the same pipeline.
|
||
|
||
Usually, that includes enterprise setups using LDAP/AD on the backend and a SSO mechanism fronting their internal http portal.
|
||
|
||
### Alternatives
|
||
|
||
If you just want authentication for your registry, and are happy maintaining users access separately, you should really consider sticking with the native [basic auth registry feature](deploying.md#native-basic-auth).
|
||
|
||
### Solution
|
||
|
||
With the method presented here, you implement basic authentication for docker engines in a reverse proxy that sits in front of your registry.
|
||
|
||
While we use a simple htpasswd file as an example, any other nginx authentication backend should be fairly easy to implement once you are done with the exemple.
|
||
|
||
We also implement push restriction (to a limited user group) for the sake of the exemple. Again, you should modify this to fit your mileage.
|
||
|
||
### Gotchas
|
||
|
||
While this model gives you the ability to use whatever authentication backend you want through the secondary authentication mechanism implemented inside your proxy, it also requires that you move TLS termination from the Registry to the proxy itself.
|
||
|
||
Furthermore, introducing an extra http layer in your communication pipeline will make it more complex to deploy, maintain, and debug, and will possibly create issues.
|
||
|
||
## Setting things up
|
||
|
||
Read again [the requirements](recipes.md#requirements).
|
||
|
||
Ready?
|
||
|
||
Run the following:
|
||
|
||
```
|
||
mkdir -p auth
|
||
mkdir -p data
|
||
|
||
# This is the main nginx configuration you will use
|
||
cat <<EOF > auth/nginx.conf
|
||
upstream docker-registry {
|
||
server registry:5000;
|
||
}
|
||
|
||
server {
|
||
listen 443 ssl;
|
||
server_name myregistrydomain.com;
|
||
|
||
# SSL
|
||
ssl_certificate /etc/nginx/conf.d/domain.crt;
|
||
ssl_certificate_key /etc/nginx/conf.d/domain.key;
|
||
|
||
# Recommandations from https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
|
||
ssl_protocols TLSv1.1 TLSv1.2;
|
||
ssl_ciphers 'EECDH+AESGCM:EDH+AESGCM:AES256+EECDH:AES256+EDH';
|
||
ssl_prefer_server_ciphers on;
|
||
ssl_session_cache shared:SSL:10m;
|
||
|
||
# disable any limits to avoid HTTP 413 for large image uploads
|
||
client_max_body_size 0;
|
||
|
||
# required to avoid HTTP 411: see Issue #1486 (https://github.com/docker/docker/issues/1486)
|
||
chunked_transfer_encoding on;
|
||
|
||
location /v2/ {
|
||
# Do not allow connections from docker 1.5 and earlier
|
||
# docker pre-1.6.0 did not properly set the user agent on ping, catch "Go *" user agents
|
||
if (\$http_user_agent ~ "^(docker\/1\.(3|4|5(?!\.[0-9]-dev))|Go ).*\$" ) {
|
||
return 404;
|
||
}
|
||
|
||
# To add basic authentication to v2 use auth_basic setting plus add_header
|
||
auth_basic "Registry realm";
|
||
auth_basic_user_file /etc/nginx/conf.d/nginx.htpasswd;
|
||
add_header 'Docker-Distribution-Api-Version' 'registry/2.0' always;
|
||
|
||
proxy_pass http://docker-registry;
|
||
proxy_set_header Host \$http_host; # required for docker client's sake
|
||
proxy_set_header X-Real-IP \$remote_addr; # pass on real client's IP
|
||
proxy_set_header X-Forwarded-For \$proxy_add_x_forwarded_for;
|
||
proxy_set_header X-Forwarded-Proto \$scheme;
|
||
proxy_read_timeout 900;
|
||
}
|
||
}
|
||
EOF
|
||
|
||
# Now, create a password file for "testuser" and "testpassword"
|
||
docker run --entrypoint htpasswd httpd:2.4 -bn testuser testpassword > auth/nginx.htpasswd
|
||
|
||
# Copy over your certificate files
|
||
cp domain.crt auth
|
||
cp domain.key auth
|
||
|
||
# Now create your compose file
|
||
|
||
cat <<EOF > docker-compose.yml
|
||
nginx:
|
||
image: "nginx:1.9"
|
||
ports:
|
||
- 5043:443
|
||
links:
|
||
- registry:registry
|
||
volumes:
|
||
- `pwd`/auth/:/etc/nginx/conf.d
|
||
|
||
registry:
|
||
image: registry:2
|
||
ports:
|
||
- 127.0.0.1:5000:5000
|
||
volumes:
|
||
- `pwd`/data:/var/lib/registry
|
||
EOF
|
||
```
|
||
|
||
## Starting and stopping
|
||
|
||
Now, start your stack:
|
||
|
||
docker-compose up -d
|
||
|
||
Login with a "push" authorized user (using `testuserpush` and `testpasswordpush`), then tag and push your first image:
|
||
|
||
docker login myregistrydomain.com:5043
|
||
docker tag ubuntu myregistrydomain.com:5043/test
|
||
docker push myregistrydomain.com:5043/test
|
||
docker pull myregistrydomain.com:5043/test
|
||
|
||
## Docker still complains about the certificate?
|
||
|
||
That's certainly because you are using a self-signed certificate, despite the warnings.
|
||
|
||
If you really insist on using these, you have to trust it at the OS level.
|
||
|
||
Usually, on Ubuntu this is done with:
|
||
|
||
cp auth/domain.crt /usr/local/share/ca-certificates/myregistrydomain.com.crt
|
||
update-ca-certificates
|
||
|
||
... and on RedHat with:
|
||
|
||
cp auth/domain.crt /etc/pki/ca-trust/source/anchors/myregistrydomain.com.crt
|
||
update-ca-trust
|
||
|
||
Now:
|
||
|
||
* `service docker stop && service docker start` (or any other way you use to restart docker)
|
||
* `docker-compose up -d` to bring your registry up
|