@@ -14,6 +14,12 @@ Main feature is Docker layer/image caching, even from S3, Google Storage, etc. A
1414You configure the Docker clients (_ err... Kubernetes Nodes?_ ) once, and then all configuration is done on the proxy --
1515for this to work it requires inserting a root CA certificate into system trusted root certs.
1616
17+ ### master is unstable/beta
18+
19+ - ` master ` (and ` :latest ` Docker tag) is unstable
20+ - Currently stable version is ` 0.2.4 ` , see [ 0.2.4 tag on Github] ( https://github.com/rpardini/docker-registry-proxy/tree/0.2.4 )
21+
22+
1723### Usage
1824
1925- Run the proxy on a host close to the Docker clients
@@ -37,7 +43,7 @@ docker run --rm --name docker_registry_proxy -it \
3743 -v $( pwd) /docker_mirror_certs:/ca \
3844 -e REGISTRIES=" k8s.gcr.io gcr.io quay.io your.own.registry another.public.registry" \
3945 -e AUTH_REGISTRIES=" auth.docker.io:dockerhub_username:dockerhub_password your.own.registry:username:password" \
40- rpardini/docker-registry-proxy:0.2.4
46+ rpardini/docker-registry-proxy:0.3.0-beta1
4147```
4248
4349Example with GCR using credentials from a service account from a key file ` servicekey.json ` :
@@ -51,7 +57,7 @@ docker run --rm --name docker_registry_proxy -it \
5157 -e AUTH_REGISTRIES_DELIMITER=" ;;;" \
5258 -e AUTH_REGISTRY_DELIMITER=" :::" \
5359 -e AUTH_REGISTRIES=" gcr.io:::_json_key:::$( cat servicekey.json) ;;;auth.docker.io:::dockerhub_username:::dockerhub_password" \
54- rpardini/docker-registry-proxy:0.2.4
60+ rpardini/docker-registry-proxy:0.3.0-beta1
5561```
5662
5763Let's say you did this on host ` 192.168.66.72 ` , you can then ` curl http://192.168.66.72:3128/ca.crt ` and get the proxy CA certificate.
0 commit comments