亚洲国产日韩欧美一区二区三区,精品亚洲国产成人av在线,国产99视频精品免视看7,99国产精品久久久久久久成人热,欧美日韩亚洲国产综合乱

directory search
Compose About versions and upgrading (Compose) ASP.NET Core + SQL Server on Linux (Compose) CLI environment variables (Compose) Command-line completion (Compose) Compose(組成) Compose command-line reference(組合命令行參考) Control startup order (Compose) Django and PostgreSQL (Compose) Docker stacks and distributed application bundles (Compose) docker-compose build(docker-compose構(gòu)建) docker-compose bundle docker-compose config docker-compose create docker-compose down docker-compose events docker-compose exec docker-compose help docker-compose images docker-compose kill docker-compose logs docker-compose pause docker-compose port docker-compose ps docker-compose pull docker-compose push docker-compose restart docker-compose rm docker-compose run docker-compose scale docker-compose start docker-compose stop docker-compose top docker-compose unpause docker-compose up Environment file (Compose) Environment variables in Compose Extend services in Compose Frequently asked questions (Compose) Getting started (Compose) Install Compose Link environment variables (deprecated) (Compose) Networking in Compose Overview of Docker Compose Overview of docker-compose CLI Quickstart: Compose and WordPress Rails and PostgreSQL (Compose) Sample apps with Compose Using Compose in production Using Compose with Swarm Engine .NET Core application (Engine) About images, containers, and storage drivers (Engine) Add nodes to the swarm (Engine) Apply custom metadata (Engine) Apply rolling updates (Engine) apt-cacher-ng Best practices for writing Dockerfiles (Engine) Binaries (Engine) Bind container ports to the host (Engine) Breaking changes (Engine) Build your own bridge (Engine) Configure container DNS (Engine) Configure container DNS in user-defined networks (Engine) CouchDB (Engine) Create a base image (Engine) Create a swarm (Engine) Customize the docker0 bridge (Engine) Debian (Engine) Default bridge network Delete the service (Engine) Deploy a service (Engine) Deploy services to a swarm (Engine) Deprecated Engine features Docker container networking (Engine) Docker overview (Engine) Docker run reference (Engine) Dockerfile reference (Engine) Dockerize an application Drain a node (Engine) Engine FAQ (Engine) Fedora (Engine) Get started (Engine) Get started with macvlan network driver (Engine) Get started with multi-host networking (Engine) How nodes work (Engine) How services work (Engine) Image management (Engine) Inspect the service (Engine) Install Docker (Engine) IPv6 with Docker (Engine) Join nodes to a swarm (Engine) Legacy container links (Engine) Lock your swarm (Engine) Manage nodes in a swarm (Engine) Manage sensitive data with Docker secrets (Engine) Manage swarm security with PKI (Engine) Manage swarm service networks (Engine) Migrate to Engine 1.10 Optional Linux post-installation steps (Engine) Overview (Engine) PostgreSQL (Engine) Raft consensus in swarm mode (Engine) Riak (Engine) Run Docker Engine in swarm mode Scale the service (Engine) SDKs (Engine) Select a storage driver (Engine) Set up for the tutorial (Engine) SSHd (Engine) Storage driver overview (Engine) Store service configuration data (Engine) Swarm administration guide (Engine) Swarm mode key concepts (Engine) Swarm mode overlay network security model (Engine) Swarm mode overview (Engine) Understand container communication (Engine) Use multi-stage builds (Engine) Use swarm mode routing mesh (Engine) Use the AUFS storage driver (Engine) Use the Btrfs storage driver (Engine) Use the Device mapper storage driver (Engine) Use the OverlayFS storage driver (Engine) Use the VFS storage driver (Engine) Use the ZFS storage driver (Engine) Engine: Admin Guide Amazon CloudWatch logs logging driver (Engine) Bind mounts (Engine) Collect Docker metrics with Prometheus (Engine) Configuring and running Docker (Engine) Configuring logging drivers (Engine) Control and configure Docker with systemd (Engine) ETW logging driver (Engine) Fluentd logging driver (Engine) Format command and log output (Engine) Google Cloud logging driver (Engine) Graylog Extended Format (GELF) logging driver (Engine) Journald logging driver (Engine) JSON File logging driver (Engine) Keep containers alive during daemon downtime (Engine) Limit a container's resources (Engine) Link via an ambassador container (Engine) Log tags for logging driver (Engine) Logentries logging driver (Engine) PowerShell DSC usage (Engine) Prune unused Docker objects (Engine) Run multiple services in a container (Engine) Runtime metrics (Engine) Splunk logging driver (Engine) Start containers automatically (Engine) Storage overview (Engine) Syslog logging driver (Engine) tmpfs mounts Troubleshoot volume problems (Engine) Use a logging driver plugin (Engine) Using Ansible (Engine) Using Chef (Engine) Using Puppet (Engine) View a container's logs (Engine) Volumes (Engine) Engine: CLI Daemon CLI reference (dockerd) (Engine) docker docker attach docker build docker checkpoint docker checkpoint create docker checkpoint ls docker checkpoint rm docker commit docker config docker config create docker config inspect docker config ls docker config rm docker container docker container attach docker container commit docker container cp docker container create docker container diff docker container exec docker container export docker container inspect docker container kill docker container logs docker container ls docker container pause docker container port docker container prune docker container rename docker container restart docker container rm docker container run docker container start docker container stats docker container stop docker container top docker container unpause docker container update docker container wait docker cp docker create docker deploy docker diff docker events docker exec docker export docker history docker image docker image build docker image history docker image import docker image inspect docker image load docker image ls docker image prune docker image pull docker image push docker image rm docker image save docker image tag docker images docker import docker info docker inspect docker kill docker load docker login docker logout docker logs docker network docker network connect docker network create docker network disconnect docker network inspect docker network ls docker network prune docker network rm docker node docker node demote docker node inspect docker node ls docker node promote docker node ps docker node rm docker node update docker pause docker plugin docker plugin create docker plugin disable docker plugin enable docker plugin inspect docker plugin install docker plugin ls docker plugin push docker plugin rm docker plugin set docker plugin upgrade docker port docker ps docker pull docker push docker rename docker restart docker rm docker rmi docker run docker save docker search docker secret docker secret create docker secret inspect docker secret ls docker secret rm docker service docker service create docker service inspect docker service logs docker service ls docker service ps docker service rm docker service scale docker service update docker stack docker stack deploy docker stack ls docker stack ps docker stack rm docker stack services docker start docker stats docker stop docker swarm docker swarm ca docker swarm init docker swarm join docker swarm join-token docker swarm leave docker swarm unlock docker swarm unlock-key docker swarm update docker system docker system df docker system events docker system info docker system prune docker tag docker top docker unpause docker update docker version docker volume docker volume create docker volume inspect docker volume ls docker volume prune docker volume rm docker wait Use the Docker command line (Engine) Engine: Extend Access authorization plugin (Engine) Docker log driver plugins Docker network driver plugins (Engine) Extending Engine with plugins Managed plugin system (Engine) Plugin configuration (Engine) Plugins API (Engine) Volume plugins (Engine) Engine: Security AppArmor security profiles for Docker (Engine) Automation with content trust (Engine) Content trust in Docker (Engine) Delegations for content trust (Engine) Deploying Notary (Engine) Docker security (Engine) Docker security non-events (Engine) Isolate containers with a user namespace (Engine) Manage keys for content trust (Engine) Play in a content trust sandbox (Engine) Protect the Docker daemon socket (Engine) Seccomp security profiles for Docker (Engine) Secure Engine Use trusted images Using certificates for repository client verification (Engine) Engine: Tutorials Engine tutorials Network containers (Engine) Get Started Part 1: Orientation Part 2: Containers Part 3: Services Part 4: Swarms Part 5: Stacks Part 6: Deploy your app Machine Amazon Web Services (Machine) Digital Ocean (Machine) docker-machine active docker-machine config docker-machine create docker-machine env docker-machine help docker-machine inspect docker-machine ip docker-machine kill docker-machine ls docker-machine provision docker-machine regenerate-certs docker-machine restart docker-machine rm docker-machine scp docker-machine ssh docker-machine start docker-machine status docker-machine stop docker-machine upgrade docker-machine url Driver options and operating system defaults (Machine) Drivers overview (Machine) Exoscale (Machine) Generic (Machine) Get started with a local VM (Machine) Google Compute Engine (Machine) IBM Softlayer (Machine) Install Machine Machine Machine CLI overview Machine command-line completion Machine concepts and help Machine overview Microsoft Azure (Machine) Microsoft Hyper-V (Machine) Migrate from Boot2Docker to Machine OpenStack (Machine) Oracle VirtualBox (Machine) Provision AWS EC2 instances (Machine) Provision Digital Ocean Droplets (Machine) Provision hosts in the cloud (Machine) Rackspace (Machine) VMware Fusion (Machine) VMware vCloud Air (Machine) VMware vSphere (Machine) Notary Client configuration (Notary) Common Server and signer configurations (Notary) Getting started with Notary Notary changelog Notary configuration files Running a Notary service Server configuration (Notary) Signer configuration (Notary) Understand the service architecture (Notary) Use the Notary client
characters

本文檔適用于希望促進(jìn) CLI 交互或指定自定義選項的公證人客戶端的高級用戶。

公證客戶端的配置文件通常駐留在~/.notary/config.json,但可以使用-c--configFile命令行標(biāo)志指定不同配置文件的路徑。

該文件的概述

除了配置文件格式之外,請查看公證人客戶端可以使用的可選密碼環(huán)境變量以便使用。

這是一個完整的客戶端配置文件示例; 請點擊頂層的 JSON 鍵以了解更多關(guān)于與該鍵相對應(yīng)的配置部分:

{  "trust_dir" : "~/.docker/trust",  "remote_server": {    
    "url": "https://my-notary-server.my-private-registry.com",    
    "root_ca": "./fixtures/root-ca.crt",    
    "tls_client_cert": "./fixtures/secure.example.com.crt",    
    "tls_client_key": "./fixtures/secure.example.com.crt"  
    },  
    "trust_pinning": {    "certs": {      "docker.com/notary": ["49cf5c6404a35fa41d5a5aa2ce539dfee0d7a2176d0da488914a38603b1f4292"]    }  }}

trust_dir 部分(可選)

trust_dir其中的元數(shù)據(jù) TUF 和私有密鑰將被存儲指定的位置(為絕對路徑或相對于配置文件的目錄的路徑)。

這通常是默認(rèn)的~/.notary,但是指定~/.docker/trust促進(jìn)與內(nèi)容信任的互操作性。

請注意,該選項可以用命令行標(biāo)志覆蓋--trustDir。

remote_server 部分(可選)

remote_server指定如何連接到公證服務(wù)器下載元數(shù)據(jù)更新和發(fā)布元數(shù)據(jù)的變化。

遠(yuǎn)程服務(wù)器示例:

"remote_server": {  
    "url": "https://my-notary-server.my-private-registry.com",  
    "root_ca": "./fixtures/root-ca.crt",  
    "tls_client_cert": "./fixtures/secure.example.com.crt",  
    "tls_client_key": "./fixtures/secure.example.com.crt"
    }

參數(shù)

需要

描述

網(wǎng)址(url)

沒有

公證服務(wù)器的URL:默認(rèn)為該配置選項可以用命令行標(biāo)志-s或--server。

root_ca

沒有

包含根CA的文件的路徑,用于驗證公證服務(wù)器的TLS證書(例如,是否為自簽名)。該路徑相對于配置文件的目錄。該配置選項可以用命令行標(biāo)志覆蓋,該標(biāo)志--tlscacert將指定相對于公證客戶端被調(diào)用的當(dāng)前工作目錄的路徑。

tls_client_cert

沒有

客戶端證書的路徑,用于與公證服務(wù)器進(jìn)行相互TLS。必須與tls_client_key一起提供或根本不提供。該路徑相對于配置文件的目錄。該配置選項可以用命令行標(biāo)志覆蓋,該標(biāo)志--tlscert將指定相對于公證客戶端被調(diào)用的當(dāng)前工作目錄的路徑。

tls_client_key

沒有

客戶端密鑰用于與公證服務(wù)器進(jìn)行相互TLS的路徑。必須與tls_client_cert一起提供或根本不提供。該路徑相對于配置文件的目錄。該配置選項可以用命令行標(biāo)志覆蓋,該標(biāo)志--tlskey將指定相對于公證客戶端被調(diào)用的當(dāng)前工作目錄的路徑。

trust_pinning 部分(可選)

trust_pinning指定如何引導(dǎo)信任的公證客戶的信任集的根目錄。

此部分是可選的,默認(rèn)情況下,公證人將通過 HTTPS 使用 TOFU,并在所下載的根文件中信任證書。

在本節(jié)中,可以提供特定的證書以供引腳連接,或者 CA 可以將其作為 GUN 的信任根。可以指定多個部分,但固定證書將以最高優(yōu)先級進(jìn)行驗證,然后是固定 CA,然后是 TOFUS(通過 HTTPS 的 TOFU)。下圖描述了此驗證流程:

</img>

即使指定了多個部分,也只會使用一個信任釘住選項來驗證 GUN,任何驗證失敗都會導(dǎo)致回購的引導(dǎo)失敗。

參數(shù)

需要

描述

certs

沒有

將GUN映射到要插入的證書ID。兩者都是JSON對象中的字符串。

ca

沒有

將GUN前綴映射到包含根CA文件的文件路徑,用于驗證根文件中的證書。該文件可以包含多個根證書,捆綁在單獨的PEM塊中。該路徑相對于配置文件的目錄。

disable_tofu

沒有

在對集合的根文件進(jìn)行引導(dǎo)驗證時,確定是否在首次使用時使用信任的布爾值。這會默認(rèn)保持TOFU。

環(huán)境變量(可選)

包含簽名密鑰密碼的以下環(huán)境變量可以用于幫助公證客戶端 CLI 交互。如果提供,這些密碼將最初用于簽署 TUF 元數(shù)據(jù)。如果密碼不正確,系統(tǒng)將提示您輸入正確的密碼。

環(huán)境變量

描述

NOTARY_ROOT_PASSPHRASE

root / offline密鑰短語

NOTARY_TARGETS_PASSPHRASE

目標(biāo)(在線)密鑰密碼

NOTARY_SNAPSHOT_PASSPHRASE

快照(在線)密鑰密碼

NOTARY_DELEGATION_PASSPHRASE

代表團(tuán)(在線)密鑰密碼

請注意,如果提供,NOTARY_DELEGATION_PASSPHRASE將嘗試為公證人嘗試簽署的所有代表團(tuán)角色輸入密碼。

Previous article: Next article: