Add @ArikaChen's tip for using HTTPS proxy to pull
| ... | ... |
@@ -377,6 +377,22 @@ flag to the Docker daemon as described above. |
| 377 | 377 |
Local registries, whose IP address falls in the 127.0.0.0/8 range, are automatically marked as insecure |
| 378 | 378 |
as of Docker 1.3.2. It is not recommended to rely on this, as it may change in the future. |
| 379 | 379 |
|
| 380 |
+### Running a Docker daemon behind a HTTPS_PROXY |
|
| 381 |
+ |
|
| 382 |
+When running inside a LAN that uses a `HTTPS` proxy, the Docker Hub certificates |
|
| 383 |
+will be replaced by the proxy's certificates. These certificates need to be added |
|
| 384 |
+to your Docker host's configuration: |
|
| 385 |
+ |
|
| 386 |
+1. Install the `ca-certificates` package for your distribution |
|
| 387 |
+2. Ask your network admin for the proxy's CA certificate and append them to |
|
| 388 |
+ `/etc/pki/tls/certs/ca-bundle.crt` |
|
| 389 |
+3. Then start your Docker daemon with `HTTPS_PROXY=http://username:password@proxy:port/ docker -d`. |
|
| 390 |
+ The `username:` and `password@` are optional - and are only needed if your proxy |
|
| 391 |
+ is set up to require authentication. |
|
| 392 |
+ |
|
| 393 |
+This will only add the proxy and authentication to the Docker daemon's requests - |
|
| 394 |
+your `docker build`s and running containers will need extra configuration to use |
|
| 395 |
+the proxy |
|
| 380 | 396 |
|
| 381 | 397 |
### Miscellaneous options |
| 382 | 398 |
|