Toto je starší verze dokumentu!
Obsah
For Admin only
For Admin only
Nostovo
LDAP server
Synology Docker GUI can't start containers with option to propagate host's hostname inside docker network
--add-host=host.docker.internal:host-gateway
workaround is to add host's IP manually [ must be run from inside of container ]
# echo "172.17.0.1 nostovo.arnostdudek.cz" >> /etc/hosts
- login do DSM UI
- Centrum balicku → nainstalovat LDAP server
- v nastaveni LDAP serveru zvolime jako Provider
- FQDN je domenove jmeno [ je nutne platne kvuli platnosti certifikatu ]
- v Nastaveni pripojeni zakazeme anonymniho uzivatele a vynutime sifrovani [ nutne kvuli bezpecnosti, hesla jsou prenasena nesifrovane ]
- pridame pozadovane uzivatele
pro testovani nainstalujeme klienta pro prikazovou radku
$ sudo dnf install openldap-clients
a zkusime vypsat obsah adresare
$ ldapsearch -x -LLL -H "ldaps://nostovo.arnostdudek.cz" -D "uid=root,cn=users,dc=nostovo,dc=arnostdudek,dc=cz" -W -b"cn=users,dc=nostovo,dc=arnostdudek,dc=cz"
| param | description |
|---|---|
| -x | simple authentication |
| -LLL | extended format |
| -H | LDAP URI |
| -D | bind DN |
| -W | ask for password |
| -b | query |
Nexus
Volume: /volumes1/docker/volume-nexus/
https://nostovo.arnostdudek.cz:8081
http://nostovo.arnostdudek.cz:7981
Docker URL: https://nostovo.arnostdudek.cz:32769/repository/nostovo/
Docker client setup
- upravime / vytvorime /etc/docker/daemon.json
- daemon.json
{ "insecure-registries": ["nostovo.arnostdudek.cz:32769"] }
- otocime docker
$ systemctl restart docker
- a prihlasime se
$ docker login [-u <user>] [-p <pass>] <URL> $ docker login -u admin -p <pass> nostovo.arnostdudek.cz:32769
HTTPS reverzni proxy
z https://www.synoforum.com/resources/synology-reverse-proxy-under-the-hood.135/
- login do DSM UI
- Ovladaci panely → Prihlasovaci portal → tab Rozsirena nastaveni → Reverzni server proxy
- a prihlasime se
$ docker login [-u <user>] [-p <pass>] <URL> $ docker login -u admin -p <pass> nostovo.arnostdudek.cz:32769
LDAP prihlasovani
- login do nexusu
- Settings → LDAP → Create new
- LDAP server address: je ve tvaru
ldaps://<FQDN>:636
- Search base DN zkopirujeme Base DN z nastaveni LDAP serveru v DSM
- Authentication method zvolime Simple authentication
- Username or DN zkopirujeme Bind DN z nastaveni LDAP serveru v DSM
- Password opet z nastaveni LDAP serveru v DSM
- overime spojeni
- zvolime Configuration template Posix with Dynamic Groups
- User relative DN zvolime „cn=users“ jinak nemusime menit
- overime nacteni uzivatelu a skupin a take moznost jejich prihlaseni
- presuneme se do Roles → Create Role
- vybereme External role mapping, nasledne LDAP
- Mapped Role nastavime podle detekovanych
| Name | Mapped role | Contained roles | Description |
|---|---|---|---|
| LDAP operators | Directory Operators | ng-admin | allows access for LDAP AD operators |
| LDAP users | users | ng-authorized | allows access for LDAP users |
Jenkins
https://nostovo.arnostdudek.cz:8080
http://nostovo.arnostdudek.cz:7980
Volume: /volumes1/docker/volume-jenkins-home/
$ docker exec -it -u root jenkins-jenkins1 bash
Perzistence dat
„Svazek“ → „Pridat slozku“ → vybrat volume a potvrdit → „Cesta pro navazani“ = „/var/jenkins_home“
WiP: Docker-in-Docker - DIND
$ sudo ln -s /var/run/docker.sock /volume1/docker/docker.sock
<wrap fixme> „Svazek“ → „Pridat soubor“ → cil symlinku → „Cesta pro navazani“ = „/var/run/docker.sock“
Instalace Java 11
- „Manage Jenkins“ > „Global Tool Configuration“ > „Add JDK“
- Label: openjdk-11
- Subdirectory of extracted archive: jdk-11.0.1
- pouzit v buildu dle zadaneho labelu
Pro stable RedHat / Centos / Amazon Linux / … existuje repozitar:
$ sudo wget -O /etc/yum.repos.d/jenkins.repo https://pkg.jenkins.io/redhat-stable/jenkins.repo $ sudo rpm --import https://pkg.jenkins.io/redhat-stable/jenkins.io.key
uptime-kuma
https://nostovo.arnostdudek.cz:8082
http://nostovo.arnostdudek.cz:7982
https://github.com/louislam/uptime-kuma
Volume: /volumes1/docker/volume-uptime-kuma/


