{"id":33679,"date":"2024-06-16T01:05:00","date_gmt":"2024-06-15T23:05:00","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/?p=33679"},"modified":"2026-02-25T21:25:51","modified_gmt":"2026-02-25T20:25:51","slug":"pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/","title":{"rendered":"Push images to a Self-Signed Cert registry with Rancher Desktop"},"content":{"rendered":"\n<p>I recently had to work on creating some custom images for OpenText Documentum 23.4 that will run on Kubernetes but I faced some trouble while trying to push images with &#8220;dockerd&#8221; and &#8220;nerdctl&#8221;. Before I start talking about that, I clearly don&#8217;t consider myself as a Docker expert, of course I worked with it a bit in the past years but that&#8217;s pretty much it. Regarding my setup, I&#8217;m on Mac, I have Rancher Desktop on it, and I use that for its embedded container engine, which is (and was for me) &#8220;dockerd&#8221; (mobyd) by default.<\/p>\n\n\n\n<p>OpenText provide images for their Documentum software since a few years already (2019?) but at the beginning it wasn&#8217;t very usable (difficult to customize, lack of security controls, missing components, etc.). Therefore, for a few customers, we developed our own containers that are using the silent installations of Documentum and that worked pretty well, since there are ~80\/100 Documentum environments at customers running and using our images. If you want to know more about the silent installation, I wrote a <a href=\"https:\/\/www.dbi-services.com\/blog\/documentum-silent-install-xplore-indexagent\/\" target=\"_blank\" rel=\"noreferrer noopener\">series of blogs<\/a> back in 2018, it&#8217;s pretty old but still quite accurate. Despite the evolutions and improvements of OpenText Documentum images over the year, I still think there are a few pain points. Therefore, my goal here was to check\/adapt our images for the recent version Documentum 23.4. A colleague from our DevOps team setup an internal Kubernetes environment with a private registry for me to start working on the build of the images.<\/p>\n\n\n\n<p>For quick development\/testing, I created a small shell script that simply trigger a build and a push of the image to the registry. The first image I needed to create is a base OS image that includes all the OS packages required to install and run a Documentum environment (common base image with some packages used by all containers of all Documentum components). I used Red Hat as the underlying OS as this is the one used mainly at our customers for support and compatibility reasons. The shell script is rather simple:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: bash; highlight: [15,16,17,18,20]; title: ; notranslate\" title=\"\">\n#!\/bin\/bash\n\n# Build Arguments\nexport NAME=&quot;linux-ot:8.10-901&quot;\nexport OWNER=&quot;dbi_dctm&quot;\nexport REGISTRY=&quot;registry-sbx.it.dbi-services.com&quot;\nexport BASE_IMAGE=&quot;registry.access.redhat.com\/ubi8:8.10-901.1716482497&quot;\nexport ENV=&quot;DEV&quot;\n\n# Build the image\necho &quot;**********************************************&quot;\necho &quot;*** Building the image &#039;${NAME}&#039; ***&quot;\necho &quot;**********************************************&quot;\necho\ndocker build --no-cache --rm=true --force-rm=true --squash \\\n  --tag=&quot;${REGISTRY}\/${OWNER}\/${NAME}&quot; \\\n  --build-arg ARG_BASE_IMAGE=&quot;${BASE_IMAGE}&quot; \\\n  --build-arg ARG_ENV=&quot;${ENV}&quot; .\necho\ndocker push ${REGISTRY}\/${OWNER}\/${NAME}\necho\necho &quot;*********************************************************&quot;\necho &quot;*** Script completed for &#039;${OWNER}\/${NAME}&#039; ***&quot;\necho &quot;*********************************************************&quot;\n<\/pre><\/div>\n\n\n<p>The build part was a success but unfortunately for me, the push failed due to the Private Registry being setup on port 443 with a Self-Signed SSL Certificate\u2026 Therefore, I started looking all over google for ways to configure Docker properly to allow that but without much success. I found a few resources such as this one from <a href=\"https:\/\/rancher.com\/docs\/rancher\/v1.6\/en\/environments\/registries\/\" target=\"_blank\" rel=\"noreferrer noopener\">Rancher<\/a> directly, that is supposed to trust the Self-Signed SSL Certificate or <a href=\"https:\/\/docs.rancherdesktop.io\/1.9\/ui\/preferences\/container-engine\/allowed-images\/\" target=\"_blank\" rel=\"noreferrer noopener\">this one<\/a> to allow some registries or a few other ones that would suggest to add &#8220;insecure-registries&#8221; to the Docker configuration. I tried them all but none were sufficient. First of all, I tried to trust the Self-Signed SSL Certificate as indicated in the Rancher documentation:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: bash; title: ; notranslate\" title=\"\">\nMac:linux-ot$ DOMAIN=registry-sbx.it.dbi-services.com\nMac:linux-ot$ PORT=443\nMac:linux-ot$\nMac:linux-ot$ cat \/etc\/default\/docker\nDOCKER_OPTS=&quot;$DOCKER_OPTS --insecure-registry=registry-sbx.it.dbi-services.com&quot;\nMac:linux-ot$\nMac:linux-ot$ openssl s_client -showcerts -connect ${DOMAIN}:${PORT} &lt; \/dev\/null 2&gt; \/dev\/null | openssl x509 -outform PEM &gt; ca.crt\nMac:linux-ot$\nMac:linux-ot$ sudo mkdir -p \/etc\/docker\/certs.d\/${DOMAIN}\/\nMac:linux-ot$ sudo cp ca.crt \/etc\/docker\/certs.d\/${DOMAIN}\/ca.crt\nMac:linux-ot$\nMac:linux-ot$ cat ca.crt | sudo tee -a \/etc\/ssl\/certs\/ca-certificates.crt\n-----BEGIN CERTIFICATE-----\nMIIDcDCCAligAwIBAgIRANOLAjECYd1TSCjCfF8uIcwwDQYJKoZIhvcNAQELBQAw\nSzEQMA4GA1UEChMHQWNtZSBDbzE3MDUGA1UEAxMuS3ViZXJuZXRlcyBJbmdyZXNz\n...\nZ4As4XDW01De9zLd8t1RWriA3aBLtXIDcXSYgm6O1L6v2VyjzxSZiuIBiv9HlPQ5\n\/CrWUd8znYbe5Ur6v3kKv29yzc4=\n-----END CERTIFICATE-----\nMac:linux-ot$\n<\/pre><\/div>\n\n\n<p>I also tried adding the &#8220;insecure-registries&#8221; in the Docker daemon.json that didn&#8217;t exist before:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: bash; title: ; notranslate\" title=\"\">\nMac:linux-ot$ cat \/etc\/docker\/daemon.json\n{\n  &quot;insecure-registries&quot; : &#x5B;&quot;registry-sbx.it.dbi-services.com&quot;]\n}\nMac:linux-ot$\n<\/pre><\/div>\n\n\n<p>But despite all that, after the restart of Rancher Desktop, pushing the images still didn&#8217;t work. I also saw some references about needing to use &#8220;http:\/\/&#8221; in the Docker daemon.json &#8220;insecure-registries&#8221; configuration, even for https registries, but still no luck. The error was that the SSL Certificate received was valid for &#8220;ingress.local&#8221; but the registry used was &#8220;registry-sbx.it.dbi-services.com&#8221; and of course the same output was given even if I only executed the &#8220;docker push&#8221; command manually (outside of the script):<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: bash; highlight: [1,17,20,26,28]; title: ; notranslate\" title=\"\">\nMac:linux-ot$ .\/build.sh\n**********************************************\n*** Building the image &#039;linux-ot:8.10-901&#039; ***\n**********************************************\n\nWARNING: experimental flag squash is removed with BuildKit. You should squash inside build using a multi-stage Dockerfile for efficiency.\n&#x5B;+] Building 489.8s (10\/10) FINISHED                                                                            docker:rancher-desktop\n =&gt; &#x5B;internal] load build definition from Dockerfile                                                                              0.1s\n =&gt; =&gt; transferring dockerfile: 3.12kB                                                                                            0.0s\n =&gt; &#x5B;internal] load .dockerignore                                                                                                 0.1s\n =&gt; =&gt; transferring context: 2B                                                                                                   0.0s\n =&gt; &#x5B;internal] load metadata for registry.access.redhat.com\/ubi8:8.10-901.1716482497                                              3.3s\n...\n =&gt; exporting to image                                                                                                           22.5s\n =&gt; =&gt; exporting layers                                                                                                          22.4s\n =&gt; =&gt; writing image sha256:03b090f94723c8947126cd7bfbc9a152612de44baab58417f85e7d1d2e46a5fa                                      0.0s\n =&gt; =&gt; naming to registry-sbx.it.dbi-services.com\/dbi_dctm\/linux-ot:8.10-901                                                      0.0s\n\nThe push refers to repository &#x5B;registry-sbx.it.dbi-services.com\/dbi_dctm\/linux-ot]\nGet &quot;https:\/\/registry-sbx.it.dbi-services.com\/v2\/&quot;: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not registry-sbx.it.dbi-services.com\n\n*********************************************************\n*** Script completed for &#039;dbi_dctm\/linux-ot:8.10-901&#039; ***\n*********************************************************\nMac:linux-ot$\nMac:linux-ot$ docker push registry-sbx.it.dbi-services.com\/dbi_dctm\/linux-ot:8.10-901\nThe push refers to repository &#x5B;registry-sbx.it.dbi-services.com\/dbi_dctm\/linux-ot]\nGet &quot;https:\/\/registry-sbx.it.dbi-services.com\/v2\/&quot;: tls: failed to verify certificate: x509: certificate is valid for ingress.local, not registry-sbx.it.dbi-services.com\nMac:linux-ot$\n<\/pre><\/div>\n\n\n<p>At that time, nobody could change\/fix the certificate used by the registry, but I knew some of my colleagues used &#8220;nerdctl&#8221; instead of &#8220;docker&#8221;, so I decided to try it:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: bash; title: ; notranslate\" title=\"\">\nMac:linux-ot$ nerdctl images\nFATA&#x5B;0000] cannot access containerd socket &quot;\/run\/k3s\/containerd\/containerd.sock&quot; (hint: try running with `--address \/var\/run\/docker\/containerd\/containerd.sock` to connect to Docker-managed containerd): no such file or directory\nError: exit status 1\nMac:linux-ot$\n<\/pre><\/div>\n\n\n<p>While looking into the options of Rancher Desktop, I saw it was possible to choose between two container engines. For that purpose, in the main window, click on the Gear on the top right corner (old versions of Rancher Desktop) or on the Preferences button on the bottom left corner (new versions of Rancher Desktop) and select Container Engine (or Rancher Desktop menu icon &gt; Open preferences dialog &gt; Container Engine). Here are screenshots of an old version of Rancher Desktop first, and then a newer\/recent version of Rancher Desktop:<\/p>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69eaae01ebb98&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69eaae01ebb98\" class=\"wp-block-image size-large wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"623\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-1024x623.png\" alt=\"Change the container engine on Rancher Desktop 1.9 to push images with nerdctl\" class=\"wp-image-33680\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-1024x623.png 1024w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-300x183.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-768x467.png 768w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-1536x935.png 1536w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-2048x1246.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<figure data-wp-context=\"{&quot;imageId&quot;:&quot;69eaae01ec1cd&quot;}\" data-wp-interactive=\"core\/image\" data-wp-key=\"69eaae01ec1cd\" class=\"wp-block-image size-large wp-lightbox-container\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"716\" data-wp-class--hide=\"state.isContentHidden\" data-wp-class--show=\"state.isContentVisible\" data-wp-init=\"callbacks.setButtonStyles\" data-wp-on--click=\"actions.showLightbox\" data-wp-on--load=\"callbacks.setButtonStyles\" data-wp-on-window--resize=\"callbacks.setButtonStyles\" src=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-2-1024x716.png\" alt=\"Change the container engine on Rancher Desktop 1.13 to push images with nerdctl\" class=\"wp-image-33681\" srcset=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-2-1024x716.png 1024w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-2-300x210.png 300w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-2-768x537.png 768w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-2-1536x1074.png 1536w, https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-2-2048x1431.png 2048w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><button\n\t\t\tclass=\"lightbox-trigger\"\n\t\t\ttype=\"button\"\n\t\t\taria-haspopup=\"dialog\"\n\t\t\taria-label=\"Enlarge\"\n\t\t\tdata-wp-init=\"callbacks.initTriggerButton\"\n\t\t\tdata-wp-on--click=\"actions.showLightbox\"\n\t\t\tdata-wp-style--right=\"state.imageButtonRight\"\n\t\t\tdata-wp-style--top=\"state.imageButtonTop\"\n\t\t>\n\t\t\t<svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"12\" height=\"12\" fill=\"none\" viewBox=\"0 0 12 12\">\n\t\t\t\t<path fill=\"#fff\" d=\"M2 0a2 2 0 0 0-2 2v2h1.5V2a.5.5 0 0 1 .5-.5h2V0H2Zm2 10.5H2a.5.5 0 0 1-.5-.5V8H0v2a2 2 0 0 0 2 2h2v-1.5ZM8 12v-1.5h2a.5.5 0 0 0 .5-.5V8H12v2a2 2 0 0 1-2 2H8Zm2-12a2 2 0 0 1 2 2v2h-1.5V2a.5.5 0 0 0-.5-.5H8V0h2Z\" \/>\n\t\t\t<\/svg>\n\t\t<\/button><\/figure>\n\n\n\n<p>As you can see in the error above, &#8220;nerdctl&#8221; requires &#8220;containerd&#8221;. Therefore, I changed my container engine from &#8220;dockerd&#8221; to &#8220;containerd&#8221; and restarted Rancher Desktop. I had to change a little bit the build script since not all command line parameters are available in &#8220;nerdctl&#8221;, apparently, and I also took this opportunity to include the &#8220;insecure-registry&#8221; in the command line, as this is possible with &#8220;nerdctl&#8221; (not with &#8220;dockerd&#8221;). Therefore, my updated script looked like this:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: bash; highlight: [7]; title: ; notranslate\" title=\"\">\n...\nnerdctl build --no-cache --rm \\\n  --tag=&quot;${REGISTRY}\/${OWNER}\/${NAME}&quot; \\\n  --build-arg ARG_BASE_IMAGE=&quot;${BASE_IMAGE}&quot; \\\n  --build-arg ARG_ENV=&quot;${ENV}&quot; .\necho\nnerdctl push --insecure-registry ${REGISTRY}\/${OWNER}\/${NAME}\n...\n<\/pre><\/div>\n\n\n<p>This time, the build and the push of the image with nerdctl were both successful:<\/p>\n\n\n<div class=\"wp-block-syntaxhighlighter-code \"><pre class=\"brush: bash; highlight: [21,22,23,24,25]; title: ; notranslate\" title=\"\">\nMac:linux-ot$ .\/build.sh\n**********************************************\n*** Building the image &#039;linux-ot:8.10-901&#039; ***\n**********************************************\n\n&#x5B;+] Building 507.0s (10\/10)\n&#x5B;+] Building 507.2s (10\/10) FINISHED\n =&gt; &#x5B;internal] load build definition from Dockerfile                                                                              0.2s\n =&gt; =&gt; transferring dockerfile: 3.12kB                                                                                            0.1s\n =&gt; &#x5B;internal] load .dockerignore                                                                                                 0.2s\n =&gt; =&gt; transferring context: 2B                                                                                                   0.1s\n =&gt; &#x5B;internal] load metadata for registry.access.redhat.com\/ubi8:8.10-901.1716482497                                              5.8s\n...\n =&gt; exporting to docker image format                                                                                             35.5s\n =&gt; =&gt; exporting layers                                                                                                          20.8s\n =&gt; =&gt; exporting manifest sha256:9b9b6662b7a790c39882f8b4fd22e2b85bd4c419b6f6ffd350e447c35b2650f7                                 0.0s\n =&gt; =&gt; exporting config sha256:1a4e6c6559a2d7c39a987537691f67b677640eada5ecdcdcc03ec210f7c672bf                                   0.0s\n =&gt; =&gt; sending tarball                                                                                                           14.7s\nLoaded image: registry-sbx.it.dbi-services.com\/dbi_dctm\/linux-ot:8.10-901\n\nINFO&#x5B;0000] pushing as a reduced-platform image (application\/vnd.docker.distribution.manifest.v2+json, sha256:9b9b6662b7a790c39882f8b4fd22e2b85bd4c419b6f6ffd350e447c35b2650f7)\nWARN&#x5B;0000] skipping verifying HTTPS certs for &quot;registry-sbx.it.dbi-services.com&quot;\nmanifest-sha256:9b9b6662b7a790c39882f8b4fd22e2b85bd4c419b6f6ffd350e447c35b2650f7: done           |++++++++++++++++++++++++++++++++++++++|\nconfig-sha256:1a4e6c6559a2d7c39a987537691f67b677640eada5ecdcdcc03ec210f7c672bf:   done           |++++++++++++++++++++++++++++++++++++++|\nelapsed: 42.0s                                                                    total:  17.1 K (416.0 B\/s)\n\n*********************************************************\n*** Script completed for &#039;dbi_dctm\/linux-ot:8.10-901&#039; ***\n*********************************************************\nMac:linux-ot$\n<\/pre><\/div>\n\n\n<p>So, in conclusion, there might be a way to make &#8220;dockerd&#8221; ignore Self-Signed SSL Certificate when it&#8217;s used as the embedded container engine inside Rancher Desktop but if it is, then it&#8217;s well hidden\u2026 If you know about it, don&#8217;t hesitate to share. In any cases, switching to &#8220;containerd&#8221; and &#8220;nerdctl&#8221; is a possible workaround when you just want to quickly start your development on your internal dev environment without having to worry about the certificate being used. Of course, pushing images with &#8220;nerdctl&#8221; means ignoring security in this case, which is never a good idea. Therefore, use it with caution and if you have a similar SSL Certificate issue, make sure to fix it as soon as possible so you can use the secure way.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I recently had to work on creating some custom images for OpenText Documentum 23.4 that will run on Kubernetes but I faced some trouble while trying to push images with &#8220;dockerd&#8221; and &#8220;nerdctl&#8221;. Before I start talking about that, I clearly don&#8217;t consider myself as a Docker expert, of course I worked with it a [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1320],"tags":[1149,3387,601,3386,1150,382],"type_dbi":[],"class_list":["post-33679","post","type-post","status-publish","format-standard","hentry","category-devops","tag-certificate","tag-containerd","tag-docker","tag-nerdctl","tag-self-signed","tag-ssl"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Push images to a Self-Signed Cert registry with Rancher Desktop - dbi Blog<\/title>\n<meta name=\"description\" content=\"Pushing images to a registry using a Self-Signed SSL Certificate with Rancher Desktop might not be as obvious as it should...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Push images to a Self-Signed Cert registry with Rancher Desktop\" \/>\n<meta property=\"og:description\" content=\"Pushing images to a registry using a Self-Signed SSL Certificate with Rancher Desktop might not be as obvious as it should...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-15T23:05:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-25T20:25:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2062\" \/>\n\t<meta property=\"og:image:height\" content=\"1255\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Morgan Patou\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MorganPatou\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Morgan Patou\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/\"},\"author\":{\"name\":\"Morgan Patou\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/c4d05b25843a9bc2ab20415dae6bd2d8\"},\"headline\":\"Push images to a Self-Signed Cert registry with Rancher Desktop\",\"datePublished\":\"2024-06-15T23:05:00+00:00\",\"dateModified\":\"2026-02-25T20:25:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/\"},\"wordCount\":914,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/06\\\/rancher-desktop-1024x623.png\",\"keywords\":[\"Certificate\",\"containerd\",\"Docker\",\"nerdctl\",\"Self-Signed\",\"SSL\"],\"articleSection\":[\"DevOps\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/\",\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/\",\"name\":\"Push images to a Self-Signed Cert registry with Rancher Desktop - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/06\\\/rancher-desktop-1024x623.png\",\"datePublished\":\"2024-06-15T23:05:00+00:00\",\"dateModified\":\"2026-02-25T20:25:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/c4d05b25843a9bc2ab20415dae6bd2d8\"},\"description\":\"Pushing images to a registry using a Self-Signed SSL Certificate with Rancher Desktop might not be as obvious as it should...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/06\\\/rancher-desktop.png\",\"contentUrl\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2024\\\/06\\\/rancher-desktop.png\",\"width\":2062,\"height\":1255},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Push images to a Self-Signed Cert registry with Rancher Desktop\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/c4d05b25843a9bc2ab20415dae6bd2d8\",\"name\":\"Morgan Patou\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g\",\"caption\":\"Morgan Patou\"},\"description\":\"Morgan Patou has over 12 years of experience in Enterprise Content Management (ECM) systems, with a strong focus in recent years on platforms such as Alfresco, Documentum, and M-Files. He specializes in the architecture, setup, customization, and maintenance of ECM infrastructures in complex &amp; critical environments. Morgan is well-versed in both engineering and operations aspects, including high availability design, system integration, and lifecycle management. He also has a solid foundation in open-source and proprietary technologies - ranging from Apache, OpenLDAP or Kerberos to enterprise-grade systems like WebLogic. Morgan Patou holds an Engineering Degree in Computer Science from ENSISA (\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs Sud Alsace) in Mulhouse, France. He is Alfresco Content Services Certified Administrator (ACSCA), Alfresco Content Services Certified Engineer (ACSCE) as well as OpenText Documentum Certified Administrator. His industry experience spans the Public Sector, IT Services, Financial Services\\\/Banking, and the Pharmaceutical industry.\",\"sameAs\":[\"https:\\\/\\\/blog.dbi-services.com\\\/author\\\/morgan-patou\\\/\",\"https:\\\/\\\/x.com\\\/MorganPatou\"],\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/author\\\/morgan-patou\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Push images to a Self-Signed Cert registry with Rancher Desktop - dbi Blog","description":"Pushing images to a registry using a Self-Signed SSL Certificate with Rancher Desktop might not be as obvious as it should...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/","og_locale":"en_US","og_type":"article","og_title":"Push images to a Self-Signed Cert registry with Rancher Desktop","og_description":"Pushing images to a registry using a Self-Signed SSL Certificate with Rancher Desktop might not be as obvious as it should...","og_url":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/","og_site_name":"dbi Blog","article_published_time":"2024-06-15T23:05:00+00:00","article_modified_time":"2026-02-25T20:25:51+00:00","og_image":[{"width":2062,"height":1255,"url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop.png","type":"image\/png"}],"author":"Morgan Patou","twitter_card":"summary_large_image","twitter_creator":"@MorganPatou","twitter_misc":{"Written by":"Morgan Patou","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/"},"author":{"name":"Morgan Patou","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8"},"headline":"Push images to a Self-Signed Cert registry with Rancher Desktop","datePublished":"2024-06-15T23:05:00+00:00","dateModified":"2026-02-25T20:25:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/"},"wordCount":914,"commentCount":0,"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-1024x623.png","keywords":["Certificate","containerd","Docker","nerdctl","Self-Signed","SSL"],"articleSection":["DevOps"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/","url":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/","name":"Push images to a Self-Signed Cert registry with Rancher Desktop - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/#primaryimage"},"image":{"@id":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop-1024x623.png","datePublished":"2024-06-15T23:05:00+00:00","dateModified":"2026-02-25T20:25:51+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8"},"description":"Pushing images to a registry using a Self-Signed SSL Certificate with Rancher Desktop might not be as obvious as it should...","breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/#primaryimage","url":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop.png","contentUrl":"https:\/\/www.dbi-services.com\/blog\/wp-content\/uploads\/sites\/2\/2024\/06\/rancher-desktop.png","width":2062,"height":1255},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/pushing-images-to-a-self-signed-certificate-registry-with-rancher-desktop\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Push images to a Self-Signed Cert registry with Rancher Desktop"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8","name":"Morgan Patou","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g","caption":"Morgan Patou"},"description":"Morgan Patou has over 12 years of experience in Enterprise Content Management (ECM) systems, with a strong focus in recent years on platforms such as Alfresco, Documentum, and M-Files. He specializes in the architecture, setup, customization, and maintenance of ECM infrastructures in complex &amp; critical environments. Morgan is well-versed in both engineering and operations aspects, including high availability design, system integration, and lifecycle management. He also has a solid foundation in open-source and proprietary technologies - ranging from Apache, OpenLDAP or Kerberos to enterprise-grade systems like WebLogic. Morgan Patou holds an Engineering Degree in Computer Science from ENSISA (\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs Sud Alsace) in Mulhouse, France. He is Alfresco Content Services Certified Administrator (ACSCA), Alfresco Content Services Certified Engineer (ACSCE) as well as OpenText Documentum Certified Administrator. His industry experience spans the Public Sector, IT Services, Financial Services\/Banking, and the Pharmaceutical industry.","sameAs":["https:\/\/blog.dbi-services.com\/author\/morgan-patou\/","https:\/\/x.com\/MorganPatou"],"url":"https:\/\/www.dbi-services.com\/blog\/author\/morgan-patou\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/33679","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=33679"}],"version-history":[{"count":5,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/33679\/revisions"}],"predecessor-version":[{"id":43178,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/33679\/revisions\/43178"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=33679"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=33679"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=33679"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=33679"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}