一、Harbor簡介
1.Harbor介紹
Harbor是一個用于存儲和分發(fā)Docker鏡像的企業(yè)級Registry服務(wù)器,通過添加一些企業(yè)必需的功能特性,例如安全、標(biāo)識和管理等,擴(kuò)展了開源Docker Distribution。作為一個企業(yè)級私有Registry服務(wù)器,Harbor提供了更好的性能和安全。提升用戶使用Registry構(gòu)建和運(yùn)行環(huán)境傳輸鏡像的效率。Harbor支持安裝在多個Registry節(jié)點的鏡像資源復(fù)制,鏡像全部保存在私有Registry中, 確保數(shù)據(jù)和知識產(chǎn)權(quán)在公司內(nèi)部網(wǎng)絡(luò)中管控。另外,Harbor也提供了高級的安全特性,諸如用戶管理,訪問控制和活動審計等。
2.Harbor特性
- 基于角色的訪問控制 :用戶與Docker鏡像倉庫通過“項目”進(jìn)行組織管理,一個用戶可以對多個鏡像倉庫在同一命名空間(project)里有不同的權(quán)限。
- 鏡像復(fù)制 : 鏡像可以在多個Registry實例中復(fù)制(同步)。尤其適合于負(fù)載均衡,高可用,混合云和多云的場景。
- 圖形化用戶界面 : 用戶可以通過瀏覽器來瀏覽,檢索當(dāng)前Docker鏡像倉庫,管理項目和命名空間。
- AD/LDAP 支持 : Harbor可以集成企業(yè)內(nèi)部已有的AD/LDAP,用于鑒權(quán)認(rèn)證管理。
- 審計管理 : 所有針對鏡像倉庫的操作都可以被記錄追溯,用于審計管理。
- 國際化 : 已擁有英文、中文、德文、日文和俄文的本地化版本。更多的語言將會添加進(jìn)來。
- RESTful API : RESTful API 提供給管理員對于Harbor更多的操控, 使得與其它管理軟件集成變得更容易。
- 部署簡單 : 提供在線和離線兩種安裝工具, 也可以安裝到vSphere平臺(OVA方式)虛擬設(shè)備。
3.Harbor組件
Harbor在架構(gòu)上主要由6個組件構(gòu)成:
Proxy:Harbor的registry, UI, token等服務(wù),通過一個前置的反向代理統(tǒng)一接收瀏覽器、Docker客戶端的請求,并將請求轉(zhuǎn)發(fā)給后端不同的服務(wù)。
Registry: 負(fù)責(zé)儲存Docker鏡像,并處理docker push/pull 命令。由于我們要對用戶進(jìn)行訪問控制,即不同用戶對Docker image有不同的讀寫權(quán)限,Registry會指向一個token服務(wù),強(qiáng)制用戶的每次docker pull/push請求都要攜帶一個合法的token, Registry會通過公鑰對token 進(jìn)行解密驗證。
Core services: 這是Harbor的核心功能,主要提供以下服務(wù):
UI:提供圖形化界面,幫助用戶管理registry上的鏡像(image), 并對用戶進(jìn)行授權(quán)。
webhook:為了及時獲取registry 上image狀態(tài)變化的情況, 在Registry上配置webhook,把狀態(tài)變化傳遞給UI模塊。
token 服務(wù):負(fù)責(zé)根據(jù)用戶權(quán)限給每個docker push/pull命令簽發(fā)token. Docker 客戶端向Regi?stry服務(wù)發(fā)起的請求,如果不包含token,會被重定向到這里,獲得token后再重新向Registry進(jìn)行請求。
Database:為core services提供數(shù)據(jù)庫服務(wù),負(fù)責(zé)儲存用戶權(quán)限、審計日志、Docker image分組信息等數(shù)據(jù)。
Job Services:提供鏡像遠(yuǎn)程復(fù)制功能,可以把本地鏡像同步到其他Harbor實例中。
Log collector:為了幫助監(jiān)控Harbor運(yùn)行,負(fù)責(zé)收集其他組件的log,供日后進(jìn)行分析。
各個組件之間的關(guān)系如下圖所示:
[圖片上傳中...(image-2a4036-1546833505079-2)]
4.Harbor實現(xiàn)
Harbor的每個組件都是以Docker容器的形式構(gòu)建的,官方也是使用Docker Compose來對它進(jìn)行部署。用于部署Harbor的Docker Compose模板位于 harbor/docker-compose.yml,打開這個模板文件,發(fā)現(xiàn)Harbor是由7個容器組成的;
# docker-compose ps
Name Command State Ports
------------------------------------------------------------------------------------------------------------------------------
harbor-adminserver /harbor/harbor_adminserver Up
harbor-db docker-entrypoint.sh mysqld Up 3306/tcp
harbor-jobservice /harbor/harbor_jobservice Up
harbor-log /bin/sh -c crond && rm -f ... Up 127.0.0.1:1514->514/tcp
harbor-ui /harbor/harbor_ui Up
nginx nginx -g daemon off; Up 0.0.0.0:443->443/tcp, 0.0.0.0:4443->4443/tcp, 0.0.0.0:80->80/tcp
registry /entrypoint.sh serve /etc/ ... Up 5000/tcp
nginx:nginx負(fù)責(zé)流量轉(zhuǎn)發(fā)和安全驗證,對外提供的流量都是從nginx中轉(zhuǎn),所以開放https的443端口,它將流量分發(fā)到后端的ui和正在docker鏡像存儲的docker registry。
harbor-jobservice:harbor-jobservice 是harbor的job管理模塊,job在harbor里面主要是為了鏡像倉庫之前同步使用的;
harbor-ui:harbor-ui是web管理頁面,主要是前端的頁面和后端CURD的接口;
registry:registry就是docker原生的倉庫,負(fù)責(zé)保存鏡像。
harbor-adminserver:harbor-adminserver是harbor系統(tǒng)管理接口,可以修改系統(tǒng)配置以及獲取系統(tǒng)信息。
這幾個容器通過Docker link的形式連接在一起,在容器之間通過容器名字互相訪問。對終端用戶而言,只需要暴露proxy (即Nginx)的服務(wù)端口。
harbor-db:harbor-db是harbor的數(shù)據(jù)庫,這里保存了系統(tǒng)的job以及項目、人員權(quán)限管理。由于本harbor的認(rèn)證也是通過數(shù)據(jù),在生產(chǎn)環(huán)節(jié)大多對接到企業(yè)的ldap中;
harbor-log:harbor-log是harbor的日志服務(wù),統(tǒng)一管理harbor的日志。通過inspect可以看出容器統(tǒng)一將日志輸出的syslog。
這幾個容器通過Docker link的形式連接在一起,這樣,在容器之間可以通過容器名字互相訪問。對終端用戶而言,只需要暴露proxy (即Nginx)的服務(wù)端口。
二、安裝和配置Harbor
1.環(huán)境說明
環(huán)境名稱 | 版本 |
---|---|
系統(tǒng)版本 | CentOS Linux release 7.2.1511 (Core) |
docker-ce | 17.03.1-ce |
docker-compose | 1.16.1 |
Harbor | v1.2.0 |
安裝方式 | 在線安裝 |
安裝位置 | /usr/local/harbor |
2.首先安裝docker
安裝Harbor需要先安裝docker和docker-compose
# yum install -y yum-utils \
device-mapper-persistent-data \
lvm2
配置repository:
# yum-config-manager \
--add-repo \
https://download.docker.com/linux/centos/docker-ce.repo
安裝最新版本docker-ce Docker version 17.03.1-ce
# yum install docker-ce
啟動docker:
# systemctl start docker
如果需要卸載docker-ce,操作如下:
yum remove docker-ce
卸載后images,containers,volumes,configuration files 是不能自動刪除的,為了刪除all images,containers,and volumes,請執(zhí)行如下命令:
rm -rf /var/lib/docker
3.安裝docker-compose
必須先安裝docker
方法一:二進(jìn)制安裝
a.下載二進(jìn)制文件
# curl -L https://github.com/docker/compose/releases/download/1.16.1/docker-compose-`uname -s`-`uname -m` -o /usr/local/bin/docker-compose
如果需要安裝其他版本的話,請修改上面命令中的版本號。
b.賦予二進(jìn)制文件可執(zhí)行權(quán)限
# chmod +x /usr/local/bin/docker-compose
c.根據(jù)自己的情況決定是否安裝命令補(bǔ)全功能
# yum install bash-completion
# curl -L https://raw.githubusercontent.com/docker/compose/1.16.1/contrib/completion/bash/docker-compose -o /etc/bash_completion.d/docker-compose
重新登陸后就生效了
# docker-compose
build config down exec images logs port pull restart run start top up
bundle create events help kill pause ps push rm scale stop unpause version
d.測試是否安裝成功
# docker-compose --version
docker-compose version 1.16.1, build 6d1ac21
方法二:pip
# yum install python-pip
# pip install docker-compose
測試:
# docker-compose --version
卸載docker-compose
對應(yīng)上面兩種安裝方法:
二進(jìn)制:
# rm /usr/local/bin/docker-compose
pip:
# pip uninstall docker-compose
4.安裝Harbor
安裝方式分為在線安裝和離線安裝兩種方式,我這里選擇的是在線安裝。
wget -P /usr/loca/src/ https://github.com/vmware/harbor/releases/download/v1.2.0/harbor-online-installer-v1.2.0.tgz
也可以下載下面的文件進(jìn)行離線安裝:
https://github.com/vmware/harbor/releases/download/v1.2.0/harbor-offline-installer-v1.2.0.tgz
不過這個文件,我沒有下載成功。因為在亞馬遜S3上總是連接超時
安裝:
# cd /usr/local/src/
# tar zxf harbor-online-installer-v1.2.0.tgz -C /usr/local/
# cd /usr/local/harbor/
5.修改配置文件
配置文件為:/usr/local/harbor/harbor.cfg
配置的內(nèi)容為:
# vim /usr/local/harbor/harbor.cfg
hostname = rgs.unixfbi.com
#郵箱配置
email_server = smtp.qq.com
email_server_port = 25
email_username = unixfbi@unixfbi.com
email_password =12345678
email_from = UnixFBI <unixfbi@unixfbi.com>
email_ssl = false
#禁止用戶注冊
self_registration = off
#設(shè)置只有管理員可以創(chuàng)建項目
project_creation_restriction = adminonly
6.執(zhí)行安裝腳本
# /usr/local/harbor/install.sh
執(zhí)行過程
[Step 0]: checking installation environment ...
Note: docker version: 17.03.1
Note: docker-compose version: 1.16.1
[Step 1]: preparing environment ...
Clearing the configuration file: ./common/config/adminserver/env
Clearing the configuration file: ./common/config/ui/env
Clearing the configuration file: ./common/config/ui/app.conf
Clearing the configuration file: ./common/config/ui/private_key.pem
Clearing the configuration file: ./common/config/db/env
Clearing the configuration file: ./common/config/jobservice/env
Clearing the configuration file: ./common/config/jobservice/app.conf
Clearing the configuration file: ./common/config/registry/config.yml
Clearing the configuration file: ./common/config/registry/root.crt
Clearing the configuration file: ./common/config/nginx/nginx.conf
loaded secret from file: /data/secretkey
Generated configuration file: ./common/config/nginx/nginx.conf
Generated configuration file: ./common/config/adminserver/env
Generated configuration file: ./common/config/ui/env
Generated configuration file: ./common/config/registry/config.yml
Generated configuration file: ./common/config/db/env
Generated configuration file: ./common/config/jobservice/env
Generated configuration file: ./common/config/jobservice/app.conf
Generated configuration file: ./common/config/ui/app.conf
Generated certificate, key file: ./common/config/ui/private_key.pem, cert file: ./common/config/registry/root.crt
The configuration files are ready, please use docker-compose to start the service.
[Step 2]: checking existing instance of Harbor ...
[Step 3]: starting Harbor ...
Creating network "harbor_harbor" with the default driver
Pulling log (vmware/harbor-log:v1.2.0)...
v1.2.0: Pulling from vmware/harbor-log
93b3dcee11d6: Pull complete
07d028a1dbdd: Pull complete
208723cd598a: Pull complete
b876b05989fc: Pull complete
12f0e0ef448a: Pull complete
Digest: sha256:608e10b7aaac07e10a4cd639d8848aef96daa7dd5c7ebaaf6a7ecd47f903e1f8
Status: Downloaded newer image for vmware/harbor-log:v1.2.0
Pulling adminserver (vmware/harbor-adminserver:v1.2.0)...
v1.2.0: Pulling from vmware/harbor-adminserver
93b3dcee11d6: Already exists
6ab21236e58b: Pull complete
f70b0efff900: Pull complete
c5d206b5e184: Pull complete
Digest: sha256:aba66ec90fc12fe0814cecc9f647f5d17b41395199821cc7af69db9c0fbe446c
Status: Downloaded newer image for vmware/harbor-adminserver:v1.2.0
Pulling registry (vmware/registry:2.6.2-photon)...
2.6.2-photon: Pulling from vmware/registry
93b3dcee11d6: Already exists
007fe7635995: Pull complete
20d63c99b572: Pull complete
2026103b2811: Pull complete
ab7a5be79b33: Pull complete
11757dc5c642: Pull complete
69ab3e15edde: Pull complete
Digest: sha256:3cf06cdff00f48e15a5254b6d0370bcb4423dcd158e7f970dc8246893125b032
Status: Downloaded newer image for vmware/registry:2.6.2-photon
Pulling ui (vmware/harbor-ui:v1.2.0)...
v1.2.0: Pulling from vmware/harbor-ui
93b3dcee11d6: Already exists
6ab21236e58b: Already exists
7753f4b55df6: Pull complete
a647b33bdf74: Pull complete
eb30db926101: Pull complete
204d77847826: Pull complete
4910a0b56c59: Pull complete
e880a4b0031f: Pull complete
Digest: sha256:b198d8f2f59515d286bdcf06c7f99c370eb4475e2547495c3e1db8761940646b
Status: Downloaded newer image for vmware/harbor-ui:v1.2.0
Pulling mysql (vmware/harbor-db:v1.2.0)...
v1.2.0: Pulling from vmware/harbor-db
df559435c037: Pull complete
a6310a57af5d: Pull complete
d13d90890144: Pull complete
b694d8967a6c: Pull complete
a34f6cef56a6: Pull complete
3519eec83af5: Pull complete
34bae610e56c: Pull complete
86a867bebd89: Pull complete
3db2d0ac366e: Pull complete
c0d307ee295f: Pull complete
c5b1b404c5ee: Pull complete
14f4a4328366: Pull complete
c7fa77b46ec4: Pull complete
0cbe2b5669b8: Pull complete
Digest: sha256:c10b3555beb6d1c851ae49a4e90ef4296a1ad42bcd1a58ae97e316b034515b6e
Status: Downloaded newer image for vmware/harbor-db:v1.2.0
Pulling jobservice (vmware/harbor-jobservice:v1.2.0)...
v1.2.0: Pulling from vmware/harbor-jobservice
93b3dcee11d6: Already exists
6ab21236e58b: Already exists
64bd0172d071: Pull complete
b4f5382f226f: Pull complete
Digest: sha256:0692648176c1c87379025b0519036b9f3f1a0eceb2646f17dd40eb143c898d5c
Status: Downloaded newer image for vmware/harbor-jobservice:v1.2.0
Pulling proxy (vmware/nginx-photon:1.11.13)...
1.11.13: Pulling from vmware/nginx-photon
93b3dcee11d6: Already exists
d2a110a9296e: Pull complete
Digest: sha256:9ec5644c667e87bf051e581ce74b2933d3ed469b27862534ba60ccf17b4ff57a
Status: Downloaded newer image for vmware/nginx-photon:1.11.13
Creating harbor-log ...
Creating harbor-log ... done
Creating harbor-db ...
Creating harbor-adminserver ...
Creating registry ...
Creating harbor-db
Creating registry
Creating registry ... done
Creating harbor-ui ...
Creating harbor-ui ... done
Creating nginx ...
Creating harbor-jobservice ...
Creating harbor-jobservice
Creating nginx ... done
? ----Harbor has been installed and started successfully.----
Now you should be able to visit the admin portal at http://rgs.unixfbi.com.
For more details, please visit https://github.com/vmware/harbor .
7.Harbor啟動和停止
Harbor 的日常運(yùn)維管理是通過docker-compose來完成的,Harbor本身有多個服務(wù)進(jìn)程,都放在docker容器之中運(yùn)行,我們可以通過docker ps命令查看。
# docker ps
CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
e6da3450bebe vmware/harbor-jobservice:v1.2.0 "/harbor/harbor_jo..." 4 days ago Up 4 days harbor-jobservice
6134227d7ed4 vmware/nginx-photon:1.11.13 "nginx -g 'daemon ..." 4 days ago Up 4 days 0.0.0.0:80->80/tcp, 0.0.0.0:443->443/tcp, 0.0.0.0:4443->4443/tcp nginx
ef5fe0b856a7 vmware/harbor-ui:v1.2.0 "/harbor/harbor_ui" 4 days ago Up 4 days harbor-ui
a752861c7e92 vmware/registry:2.6.2-photon "/entrypoint.sh se..." 4 days ago Up 4 days 5000/tcp registry
78ea91838582 vmware/harbor-db:v1.2.0 "docker-entrypoint..." 4 days ago Up 4 days 3306/tcp harbor-db
024e226ff135 vmware/harbor-adminserver:v1.2.0 "/harbor/harbor_ad..." 4 days ago Up 4 days harbor-adminserver
3fab80444a1d vmware/harbor-log:v1.2.0 "/bin/sh -c 'crond..." 4 days ago Up 4 days 127.0.0.1:1514->514/tcp harbor-log
或者docker-compose 來查看
# cd /usr/local/harbor/
# docker-compose ps
Name Command State Ports
------------------------------------------------------------------------------------------------------------------------------
harbor-adminserver /harbor/harbor_adminserver Up
harbor-db docker-entrypoint.sh mysqld Up 3306/tcp
harbor-jobservice /harbor/harbor_jobservice Up
harbor-log /bin/sh -c crond && rm -f ... Up 127.0.0.1:1514->514/tcp
harbor-ui /harbor/harbor_ui Up
nginx nginx -g daemon off; Up 0.0.0.0:443->443/tcp, 0.0.0.0:4443->4443/tcp, 0.0.0.0:80->80/tcp
registry /entrypoint.sh serve /etc/ ... Up 5000/tcp
Harbor的啟動和停止
啟動Harbor
# docker-compose start
停止Harbor
# docker-comose stop
重啟Harbor
# docker-compose restart
8.訪問測試
在瀏覽器輸入rgs.unixfbi.com,因為我配置的域名為rgs.unixfbi.com。請大家根據(jù)自己的配置情況輸入訪問的域名;
默認(rèn)賬號密碼: admin / Harbor12345 登錄后修改密碼
[圖片上傳中...(image-3f9df0-1546833505077-1)]
四、測試上傳和下載鏡像
1.修改各docker client配置
# vim /usr/lib/systemd/system/docker.service
ExecStart=/usr/bin/dockerd --insecure-registry rgs.unixfbi.com
增加 --insecure-registry rgs.unixfbi.com 即可。
重啟docker:
# systemctl daemon-reload
# systemctl restart docker
或者
創(chuàng)建/etc/docker/daemon.json文件,在文件中指定倉庫地址
# cat > /etc/docker/daemon.json << EOF
{ "insecure-registries":["rgs.unixfbi.com"] }
EOF
然后重啟docker就可以。
# systemctl restart docker
這樣設(shè)置完成后,就不會提示我們使用https的錯誤了。
2.創(chuàng)建Dockerfile
# vim Dockerfile
FROM centos:centos7.1.1503
ENV TZ "Asia/Shanghai"
3.創(chuàng)建鏡像
# docker build -t rgs.unixfbi.com/library/centos7.1:0.1 .
4.把鏡像push到Harbor
# docker login rgs.unixfbi.com
# docker push rgs.unixfbi.com/library/centos7.1:0.1
如果不是自己創(chuàng)建的鏡像,記得先執(zhí)行 docker tags 給鏡像做tag
例如:
# docker pull busybox
# docker tag busybox:latest rgs.unixfbi.com/library/busybox:latest
# docker push rgs.unixfbi.com/library/busybox:latest
5.登錄web頁面查看鏡像
[圖片上傳中...(image-b0fd92-1546833505077-0)]
6.pull鏡像
從別的機(jī)器上拉一下鏡像
# docker rmi -f $(docker images -q -a )
# docker pull rgs.unixfbi.com/library/centos7.1:0.1
0.1: Pulling from library/centos7.1
07618ba636d9: Pull complete
Digest: sha256:7f398052ae0e93ddf96ba476185c7f436b15abd27acd848a24b88ede4bb3c322
Status: Downloaded newer image for rgs.unixfbi.com/library/centos7.1:0.1
# docker images
REPOSITORY TAG IMAGE ID CREATED SIZE
rgs.unixfbi.com/library/centos7.1 0.1 6c849613a995 5 hours ago 212MB
五、Harbor配置TLS證書
因為我們上面對Harbor的配置都是使用的http協(xié)議訪問,但是我們工作中一般都是配置https訪問。所以我給大家演示一下怎么配置Harbor可以使用https訪問,以及配置TLS證書都需要做哪些工作。
1.修改Harbor配置文件
因為Harbor默認(rèn)使用http協(xié)議訪問,所以我們這里在配置文件中,開啟https配置;
配置harbor.cfg
hostname = rgs.unixfbi.com
ui_url_protocol = https
ssl_cert = /etc/certs/ca.crt
ssl_cert_key = /etc/certs/ca.key
2.創(chuàng)建自簽名證書key文件
# mkdir /etc/certs
# openssl genrsa -out /etc/certs/ca.key 2048
Generating RSA private key, 2048 bit long modulus
....+++
..................................................+++
e is 65537 (0x10001)
3.創(chuàng)建自簽名證書crt文件
注意命令中/CN=rgs.unixfbi.com
字段中rgs.unixfbi.com
修改為你自己的倉庫域名。
# openssl req -x509 -new -nodes -key /etc/certs/ca.key -subj "/CN=rgs.unixfbi.com" -days 5000 -out /etc/certs/ca.crt
4.開始安裝Harbor
# ./install.sh
? ----Harbor has been installed and started successfully.----
Now you should be able to visit the admin portal at https://rgs.unixfbi.com.
For more details, please visit https://github.com/vmware/harbor .
顯示是https了。
5.客戶端配置
客戶端需要創(chuàng)建證書文件存放的位置,并且把服務(wù)端創(chuàng)建的證書拷貝到該目錄下,然后重啟客戶端docker。我們這里創(chuàng)建目錄為:/etc/docker/certs.d/rgs.unixfbi.com
# mkdir -p /etc/docker/certs.d/rgs.unixfbi.com
把服務(wù)端crt證書文件拷貝到客戶端,例如我這的客戶端為:192.168.199.183
# scp /etc/certs/ca.crt root@192.168.199.183:/etc/docker/certs.d/rgs.unixfbi.com/
重啟客戶端docker
# systemctl restart docker
6.測試是否支持https訪問
# docker login rgs.unixfbi.com
Username (admin):
Password:
Login Succeeded
六、遇到問題
遇到的問題就是Harbor我配置的是http訪問,但是docker客戶端默認(rèn)都是https訪問Harbor,所以就會產(chǎn)生錯誤。下面看看我是怎么解決這個問題的吧。下面我們來訪問以下Harbor
# docker pull rgs.unixfbi.com/library/centos7.1:0.1
Error response from daemon: Get https://rgs.unixfbi.com/v1/_ping: dial tcp 192.168.199.233:443: getsockopt: connection refused
問題原因:
因為docker默認(rèn)訪問倉庫時都是使用的https協(xié)議,而我們的倉庫配置的是http
解決方法:
方法一:
在docker啟動的配置倉庫地址添加如下內(nèi)容:
--insecure-registry rgs.unixfbi.com
# vim /usr/lib/systemd/system/docker.service
ExecStart=/usr/bin/dockerd --insecure-registry rgs.unixfbi.com
然后
# systemctl daemon-reload
# systemctl restart docker
方法二:
創(chuàng)建/etc/docker/daemon.json文件,在文件中指定倉庫地址
# cat > /etc/docker/daemon.json << EOF
{ "insecure-registries":["rgs.unixfbi.com"] }
EOF
然后重啟docker就可以了
# systemctl restart docker
方法三:
就是把你的倉庫也配置成https ,設(shè)置證書。好吧,這種方法其實我不說,你也知道。
參考文檔
官網(wǎng) https://github.com/vmware/harbor/tree/master/docs
https://vmware.github.io/harbor/cn/#gettingHarbor
https://my.oschina.net/vmwareharbor/blog/650964
http://blog.csdn.net/liumiaocn/article/details/52862408
http://blog.csdn.net/jiangshouzhuang/article/details/53267094
http://blog.csdn.net/u010278923/article/details/72468791
本文出自 “運(yùn)維特工” 博客,轉(zhuǎn)載請務(wù)必保留此出處 http://www.unixfbi.com