本站支持搜索的镜像仓库:Docker Hub、gcr.io、ghcr.io、quay.io、k8s.gcr.io、registry.gcr.io、elastic.co、mcr.microsoft.com

GITHUB
Tools collection
All Images are Multiarch (AMD64, ARM64 and ARM) builds and in the following Container Registries:
ghcr.io/tob1as/docker-tools:<TAG>tobi312/tools:<TAG>quay.io/tobi312/tools:<TAG>Tools/Tags:
adminerautosshazcopyc-mqtt-forwarderdnsmasqeasy-rsafiglethtpasswdkeepalivedkiwiircmqtt-boardmqtt-clientmqtt-forwarderpostgres-exporterprometheus-***-exporterprometheus-mqtt-transportproxyscotch***static-curlstatic-jqstatic-xqstatic-yqstatic-kubectlstatic-helmstatic-nginxstatic-nginx-unprivilegedstatic-ssh-tools
toolboxtoolbox-extendedadminerevo - Use adminer!pgadmin4 - Use now offical Docker build!irc-exporter - Use now offical Docker build!vwmetrics - Use now offical Docker build!FIGlet is a computer program that generates text banners.
This Docker Image is based on latest AlpineLinux, see Dockerfile for more details.
docker run --rm --name figlet -it tobi312/tools:figlet 'Hello :D'
Output:
_ _ _ _ ____ | | | | ___| | | ___ _| _ \ | |_| |/ _ \ | |/ _ \ (_) | | | | _ | __/ | | (_) | _| |_| | |_| |_|\___|_|_|\___/ (_)____/
htpasswd create username password information of a web server.
This Docker Image is based on latest AlpineLinux, see Dockerfile for more details.
docker run --rm -it tobi312/tools:htpasswd -bn username passw0rd
Output:
username:$apr1$Sk1pFYwB$ivgO9asJe4WkalyC7L5TV0
Toolbox with git, wget, curl, nano, netcat and more.
This Docker Image is based on latest AlpineLinux, see Dockerfile and Dockerfile (extended) for more details.
# start docker run --rm --name toolbox -d tobi312/tools:toolbox # exec docker exec -it toolbox sh # use (example: check port is open) nc -zv -w 3 <HOST> <PORT>
version: '2.4' services: toolbox: image: tobi312/tools:toolbox #image: tobi312/tools:toolbox-extended container_name: toolbox restart: unless-stopped #user: "1000:1000" # format: "${UID}:${GID}" #entrypoint: [ "/bin/sh", "-c", "--" ] #command: [ "while true; do sleep 60; done;" ]
and then:
# start docker-compose -f toolbox.yml up -d # exec (you can use sh or bash) docker-compose -f toolbox.yml exec toolbox sh # or docker exec -it toolbox sh # use (example: check port is open) nc -zv -w 3 <HOST> <PORT>
apiVersion: v1 kind: Pod metadata: name: toolbox namespace: default spec: containers: - name: toolbox image: tobi312/tools:toolbox resources: requests: memory: "128Mi" cpu: "0.1" limits: memory: "512Mi" cpu: "0.5"
and then:
# start kubectl apply -f toolbox.yaml # exec kubectl exec -it pod/toolbox -- sh # use (example: check port is open) nc -zv -w 3 <HOST> <PORT>
Or example for Deployment.
dnsmasq is a lightweight dns and dhcp server.
version: "2.4" services: dnsmasq: image: tobi312/tools:dnsmasq container_name: dnsmasq restart: unless-stopped ports: - 53:53/tcp # DNS - 53:53/udp # DNS - 67:67/udp # DHCP Server #- 68:68/udp # DHCP Client #- 69:69/udp # TFTP volumes: - ./dnsmasq/:/etc/dnsmasq.d/:rw # add your config files in this folder #network_mode: host cap_add: - 'NET_ADMIN'
easy-rsa is a CLI utility to build and manage a PKI CA.
# help docker run --rm --name easy-rsa -it tobi312/tools:easy-rsa-3.1.7 help
# Preparation mkdir ~/data_easyrsa # IMPORANT: Execute all Command from this/next Folder !! cd ~/data_easyrsa # root-ca # init pki docker run --rm --name easy-rsa -v ${PWD}:/easyrsa:rw -it tobi312/tools:easy-rsa-3.1.7 init-pki # download "vars"-File curl -sL [***] -o ./pki/vars # now EDIT "vars"-File in ./pki # and then build ca: docker run --rm --name easy-rsa -v ${PWD}:/easyrsa:rw -it tobi312/tools:easy-rsa-3.1.7 build-ca # Server Cert (repeat this steps for other domains) # create server cert request docker run --rm --name easy-rsa -v ${PWD}:/easyrsa:rw -it tobi312/tools:easy-rsa-3.1.7 --subject-alt-name="DNS:example.com,DNS:*.example.com,IP:192.168.1.100" gen-req example-com nopass # sign server cert docker run --rm --name easy-rsa -v ${PWD}:/easyrsa:rw -it tobi312/tools:easy-rsa-3.1.7 sign-req server example-com # check cert openssl verify -verbose -CAfile ${PWD}/pki/ca.crt ${PWD}/pki/issued/example-com.crt openssl x509 -noout -text -in ${PWD}/pki/issued/example-com.crt
Preparation:
mkdir ~/data_easyrsa # IMPORANT: Execute all Command from this/next Folder !! cd ~/data_easyrsa
root-ca:
# init pki (need "soft" to write in mounted volume subpath "/easyrsa/root-ca" instead "/easyrsa/pki") docker run --rm --name easy-rsa -e EASYRSA_PKI="/easyrsa/root-ca" -v ${PWD}/root-ca/:/easyrsa/root-ca:rw -it tobi312/tools:easy-rsa-3.1.7 init-pki soft # ASK: Confirm removal: yes # download "vars"-File curl -sL [***] -o ${PWD}/root-ca/vars # now EDIT "vars"-File in ./root-ca # and then build ca: docker run --rm --name easy-rsa -e EASYRSA_PKI="/easyrsa/root-ca" -v ${PWD}/root-ca/:/easyrsa/root-ca:rw -it tobi312/tools:easy-rsa-3.1.7 build-ca # ASK: Enter New CA Key Passphrase: # ASK: Common Name (eg: your user, host, or server name) [Easy-RSA CA]: My Organization CA # check/show content of root-ca "ca.crt" file openssl x509 -noout -text -in ${PWD}/root-ca/ca.crt
intermediate-ca = subca:
# init pki (need "soft" to write in mounted volume subpath "/easyrsa/intermediate-ca" instead "/easyrsa/pki") docker run --rm --name easy-rsa -e EASYRSA_PKI="/easyrsa/intermediate-ca" -v ${PWD}/intermediate-ca/:/easyrsa/intermediate-ca:rw -it tobi312/tools:easy-rsa-3.1.7 init-pki soft # ASK: Confirm removal: yes # download "vars"-File curl -sL [***] -o ${PWD}/intermediate-ca/vars # now EDIT "vars"-File in ./intermediate-ca # and then build subca: docker run --rm --name easy-rsa -e EASYRSA_PKI="/easyrsa/intermediate-ca" -v ${PWD}/intermediate-ca/:/easyrsa/intermediate-ca:rw -it tobi312/tools:easy-rsa-3.1.7 build-ca subca # ASK: Enter New CA Key Passphrase: # ASK: Common Name (eg: your user, host, or server name) [Easy-RSA CA]: My Organization Sub-CA # import subca in ca (Note: switch to root-ca): docker run --rm --name easy-rsa -e EASYRSA_PKI="/easyrsa/root-ca" -v ${PWD}/root-ca/:/easyrsa/root-ca:rw -v ${PWD}/intermediate-ca/:/easyrsa/intermediate-ca:rw -it tobi312/tools:easy-rsa-3.1.7 import-req /easyrsa/intermediate-ca/reqs/ca.req intermediate-ca # sign subca with ca (Note: switch to root-ca) docker run --rm --name easy-rsa -e EASYRSA_PKI="/easyrsa/root-ca" -v ${PWD}/root-ca/:/easyrsa/root-ca:rw -it tobi312/tools:easy-rsa-3.1.7 sign-req ca intermediate-ca # ASK: Confirm request details: yes # ASK: Enter pass phrase for /easyrsa/root-ca/private/ca.key: # copy sign subca from root-ca to intermediate-ca folder docker run --rm --name easy-rsa --entrypoint="" -v ${PWD}/root-ca/:/easyrsa/root-ca:rw -v ${PWD}/intermediate-ca/:/easyrsa/intermediate-ca:rw -it tobi312/tools:easy-rsa-3.1.7 cp /easyrsa/root-ca/issued/intermediate-ca.crt /easyrsa/intermediate-ca/ca.crt # or cp ${PWD}/root-ca/issued/intermediate-ca.crt ${PWD}/intermediate-ca/ca.crt # verify subca from ca openssl verify -verbose -CAfile ${PWD}/root-ca/ca.crt ${PWD}/intermediate-ca/ca.crt # check/show content of intermediate-ca "ca.crt" file openssl x509 -noout -text -in ${PWD}/intermediate-ca/ca.crt # copy subca and ca in one file called fullca.crt cat ${PWD}/intermediate-ca/ca.crt ${PWD}/root-ca/ca.crt > ${PWD}/fullca.crt
Server Cert ... for Domain example.com:
# create server cert request docker run --rm --name easy-rsa -e EASYRSA_PKI="/easyrsa/intermediate-ca" -v ${PWD}/intermediate-ca/:/easyrsa/intermediate-ca:rw -it tobi312/tools:easy-rsa-3.1.7 --subject-alt-name="DNS:example.com,DNS:*.example.com,IP:192.168.1.100" gen-req example-com nopass # ASK: Common Name (eg: your user, host, or server name) [example-com]:example.com # sign server cert docker run --rm --name easy-rsa -e EASYRSA_PKI="/easyrsa/intermediate-ca" -v ${PWD}/intermediate-ca/:/easyrsa/intermediate-ca:rw -it tobi312/tools:easy-rsa-3.1.7 sign-req server example-com # ASK: Confirm request details: yes # ASK: Enter pass phrase for /easyrsa/intermediate-ca/private/ca.key: # verify cert from subca and ca openssl verify -verbose -CAfile ${PWD}/fullca.crt ${PWD}/intermediate-ca/issued/example-com.crt # check/show content of cert file openssl x509 -noout -text -in ${PWD}/intermediate-ca/issued/example-com.crt # repeat this steps for other domains
-e EASYRSA_PKI="/easyrsa/root-ca" you can use in command --pki-dir=/easyrsa/root-catar cvpzf backup_easyrsa_$(date '+%Y%m%d-%H%M').tar.gz . in data_easyrsa-Folder!docker run --rm --name easy-rsa --entrypoint="" -it tobi312/tools:easy-rsa-3.1.7 bash/usr/local/share/ca-certificates/ and execute dpkg-reconfigure -f noninteractive ca-certificates免费版仅支持 Docker Hub 加速,不承诺可用性和速度;专业版支持更多镜像源,保证可用性和稳定速度,提供优先客服响应。
免费版仅支持 docker.io;专业版支持 docker.io、gcr.io、ghcr.io、registry.k8s.io、nvcr.io、quay.io、mcr.microsoft.com、docker.elastic.co 等。
当返回 402 Payment Required 错误时,表示流量已耗尽,需要充值流量包以恢复服务。
通常由 Docker 版本过低导致,需要升级到 20.x 或更高版本以支持 V2 协议。
先检查 Docker 版本,版本过低则升级;版本正常则验证镜像信息是否正确。
使用 docker tag 命令为镜像打上新标签,去掉域名前缀,使镜像名称更简洁。
探索更多轩辕镜像的使用方法,找到最适合您系统的配置方式
通过 Docker 登录方式配置轩辕镜像加速服务,包含7个详细步骤
在 Linux 系统上配置轩辕镜像源,支持主流发行版
在 Docker Desktop 中配置轩辕镜像加速,适用于桌面系统
在 Docker Compose 中使用轩辕镜像加速,支持容器编排
在 k8s 中配置 containerd 使用轩辕镜像加速
在宝塔面板中配置轩辕镜像加速,提升服务器管理效率
在 Synology 群晖NAS系统中配置轩辕镜像加速
在飞牛fnOS系统中配置轩辕镜像加速
在极空间NAS中配置轩辕镜像加速
在爱快ikuai系统中配置轩辕镜像加速
在绿联NAS系统中配置轩辕镜像加速
在威联通NAS系统中配置轩辕镜像加速
在 Podman 中配置轩辕镜像加速,支持多系统
配置轩辕镜像加速9大主流镜像仓库,包含详细配置步骤
无需登录即可使用轩辕镜像加速服务,更加便捷高效
需要其他帮助?请查看我们的 常见问题 或 官方QQ群: 13763429