harbor/make/harbor.cfg

107 lines
4.2 KiB
INI
Raw Normal View History

2016-04-04 08:04:02 +02:00
## Configuration file of Harbor
2016-04-04 05:29:35 +02:00
#The IP address or hostname to access admin UI and registry service.
2016-04-04 05:20:52 +02:00
#DO NOT use localhost or 127.0.0.1, because Harbor needs to be accessed by external clients.
2016-11-16 13:42:29 +01:00
hostname = reg.mydomain.com
2016-04-04 08:04:02 +02:00
2016-04-04 05:29:35 +02:00
#The protocol for accessing the UI and token/notification service, by default it is http.
2016-04-04 08:13:39 +02:00
#It can be set to https if ssl is enabled on nginx.
2016-11-16 13:42:29 +01:00
ui_url_protocol = http
2016-04-04 08:04:02 +02:00
2017-03-01 08:26:16 +01:00
#The password for the root user of mysql db, change this before any production use.
db_password = root123
#Maximum number of job workers in job service
max_job_workers = 3
#Determine whether or not to generate certificate for the registry's token.
#If the value is on, the prepare script creates new root cert and private key
#for generating token to access the registry. If the value is off the default key/cert will be used.
#This flag also controls the creation of the notary signer's cert.
2017-03-01 08:26:16 +01:00
customize_crt = on
#The path of cert and key files for nginx, they are applied only the protocol is set to https
ssl_cert = /data/cert/server.crt
ssl_cert_key = /data/cert/server.key
#The path of secretkey storage
secretkey_path = /data
#Admiral's url, comment this attribute, or set its value to NA when Harbor is standalone
2017-03-09 13:12:33 +01:00
admiral_url = NA
#The password of the Clair's postgres database, only effective when Harbor is deployed with Clair.
#Please update it before deployment, subsequent update will cause Clair's API server and Harbor unable to access Clair's database.
clair_db_password = password
2017-03-01 08:26:16 +01:00
#NOTES: The properties between BEGIN INITIAL PROPERTIES and END INITIAL PROPERTIES
#only take effect in the first boot, the subsequent changes of these properties
#should be performed on web ui
2017-04-07 12:24:08 +02:00
2017-03-01 08:26:16 +01:00
#************************BEGIN INITIAL PROPERTIES************************
2016-04-04 08:13:39 +02:00
#Email account settings for sending out password resetting emails.
2016-11-24 08:48:36 +01:00
#Email server uses the given username and password to authenticate on TLS connections to host and act as identity.
2016-11-24 10:50:41 +01:00
#Identity left blank to act as username.
2016-11-24 08:48:36 +01:00
email_identity =
email_server = smtp.mydomain.com
email_server_port = 25
email_username = sample_admin@mydomain.com
email_password = abc
email_from = admin <sample_admin@mydomain.com>
email_ssl = false
2016-04-04 08:04:02 +02:00
2016-09-22 09:12:37 +02:00
##The initial password of Harbor admin, only works for the first time when Harbor starts.
#It has no effect after the first launch of Harbor.
#Change the admin password from UI after launching Harbor.
harbor_admin_password = Harbor12345
2016-04-04 08:04:02 +02:00
2016-04-04 05:29:35 +02:00
##By default the auth mode is db_auth, i.e. the credentials are stored in a local database.
#Set it to ldap_auth if you want to verify a user's credentials against an LDAP server.
auth_mode = db_auth
2016-04-04 08:04:02 +02:00
2016-04-04 08:13:39 +02:00
#The url for an ldap endpoint.
ldap_url = ldaps://ldap.mydomain.com
2016-04-04 08:04:02 +02:00
2016-09-22 09:12:37 +02:00
#A user's DN who has the permission to search the LDAP/AD server.
#If your LDAP/AD server does not support anonymous search, you should configure this DN and ldap_search_pwd.
#ldap_searchdn = uid=searchuser,ou=people,dc=mydomain,dc=com
2016-08-18 12:31:41 +02:00
#the password of the ldap_searchdn
2016-09-22 09:12:37 +02:00
#ldap_search_pwd = password
2016-08-18 12:31:41 +02:00
2016-09-22 09:12:37 +02:00
#The base DN from which to look up a user in LDAP/AD
2016-08-18 12:31:41 +02:00
ldap_basedn = ou=people,dc=mydomain,dc=com
2016-09-22 09:12:37 +02:00
#Search filter for LDAP/AD, make sure the syntax of the filter is correct.
#ldap_filter = (objectClass=person)
2016-08-18 12:31:41 +02:00
2016-09-22 09:12:37 +02:00
# The attribute used in a search to match a user, it could be uid, cn, email, sAMAccountName or other attributes depending on your LDAP/AD
2016-08-18 12:31:41 +02:00
ldap_uid = uid
2016-09-22 09:12:37 +02:00
#the scope to search for users, 1-LDAP_SCOPE_BASE, 2-LDAP_SCOPE_ONELEVEL, 3-LDAP_SCOPE_SUBTREE
2016-08-18 12:31:41 +02:00
ldap_scope = 3
2016-04-04 08:04:02 +02:00
#Timeout (in seconds) when connecting to an LDAP Server. The default value (and most reasonable) is 5 seconds.
2017-01-12 11:29:02 +01:00
ldap_timeout = 5
2016-04-08 11:04:47 +02:00
#Turn on or off the self-registration feature
self_registration = on
2016-04-19 19:37:07 +02:00
2016-09-22 09:12:37 +02:00
#The expiration time (in minute) of token created by token service, default is 30 minutes
2016-08-08 05:21:48 +02:00
token_expiration = 30
#The flag to control what users have permission to create projects
#The default value "everyone" allows everyone to creates a project.
#Set to "adminonly" so that only admin user can create project.
2016-11-16 13:42:29 +01:00
project_creation_restriction = everyone
2016-10-14 11:13:15 +02:00
2017-03-01 08:26:16 +01:00
#Determine whether the job service should verify the ssl cert when it connects to a remote registry.
#Set this flag to off when the remote registry uses a self-signed or untrusted certificate.
verify_remote_cert = on
2017-04-07 12:24:08 +02:00
#************************END INITIAL PROPERTIES************************
2016-10-14 11:13:15 +02:00
#############
2016-12-12 05:39:11 +01:00