unix:///var/run/docker.sock harbor等会找此unix域文件
将生成的公钥证书置于/etc/docker下,重启docker,另一种方式,
# mkdir –p /etc/docker/certs.d/serverip
# cp ca.crt /etc/docker/certs.d/serverip/ca.crt
# systemc restart docker.service
harbor采用postgresql,默认目录/data/database
1.linux 访问 https 证书问题
[root@boss-test-dev001-jydx ~]# curl -v https://mobile.mycard520.com.tw
* About to connect() to mobile.mycard520.com.tw port 443 (#0)
* Trying 220.130.127.122... connected
* Connected to mobile.mycard520.com.tw (220.130.127.122) port 443 (#0)
* Initializing NSS with certpath: sql:/etc/pki/nssdb
* CAfile: /etc/pki/tls/certs/ca-bundle.crt
CApath: none
* Certificate is signed by an untrusted issuer: 'CN=TWCA Secure SSL Certification Authority,OU=Secure SSL Sub-CA,O=TAIWAN-CA,C=TW'
* NSS error -8172
* Closing connection #0
* Peer certificate cannot be authenticated with known CA certificates
curl: (60) Peer certificate cannot be authenticated with known CA certificates
More details here: http://curl.haxx.se/docs/sslcerts.html
curl performs SSL certificate verification by default, using a "bundle"
of Certificate Authority (CA) public keys (CA certs). If the default
bundle file isn't adequate, you can specify an alternate file
using the --cacert option.
If this HTTPS server uses a certificate signed by a CA represented in
the bundle, the certificate verification probably failed due to a
problem with the certificate (it might be expired, or the name might
not match the domain name in the URL).
If you'd like to turn off curl's verification of the certificate, use
the -k (or --insecure) option.
2.现有 证书twca.cer 需要添加到 linux 证书信任列表
相关证书转换参见:http://netkiller.github.io/cryptography/openssl/format.html
#转换格式 .cer 到 .pem
openssl x509 -inform der -in twca.cer -out twca.pem
#追加到信任列表
cat twca.pem >> /etc/pki/tls/certs/ca-bundle.crt