An open source trusted cloud native registry project that stores, signs, and scans content.
Go to file
Wenkai Yin(尹文开) 17318aedc3
Merge pull request #10547 from ywk253100/200120_artifact
Add foreign key to avoid the concurrent issue
2020-01-21 17:44:27 +08:00
.github Merge pull request #10456 from bitsf/stop_travis 2020-01-18 02:59:41 +08:00
api feat(swagger): generate apis v2.0 from swagger.yaml 2020-01-14 02:20:18 +00:00
contrib Update config file names 2019-09-02 18:19:06 +08:00
docs Adding missing file 2020-01-15 16:16:29 +01:00
make Add foreign key to avoid the concurrent issue 2020-01-21 16:03:51 +08:00
src Merge pull request #10547 from ywk253100/200120_artifact 2020-01-21 17:44:27 +08:00
tests feat(cicd): try fix sometimes docker push time out 2020-01-20 11:57:03 +08:00
tools feat(swagger): generate apis v2.0 from swagger.yaml 2020-01-14 02:20:18 +00:00
.dockerignore Add dockerignore file to prevent local node_modules to be copied into the portal image 2019-05-18 09:11:35 +02:00
.drone.yml There is a new commit in harbor-e2e-engine:1.42, which is upgrade docker to the latest version, so drone.yml should be update to the new one. 2019-11-19 15:03:04 +08:00
.gitignore Add ng-swagger-gen to automatically generate models and services with 2020-01-14 15:18:32 +08:00
.gitmessage Update README and .gitmessage 2018-07-17 16:42:03 +08:00
.travis.yml add make clean 2019-12-05 14:44:07 +08:00
ADOPTERS.md Merge pull request #9534 from zhill/add_anchore_adopter 2019-10-23 20:49:39 +08:00
CHANGELOG.md Update CHANGELOG.md for v1.8.0 2019-06-04 11:20:28 +01:00
CONTRIBUTING.md Bump up golang version to v1.13.4 2019-11-26 19:18:45 +08:00
gskey.sh.enc Enable travis to update logs to GSR (#5949) 2018-09-27 08:54:56 +08:00
LICENSE Replacing copyright notices with "Copyright Project Harbor Authors". 2018-09-19 16:59:36 +00:00
Makefile build(swagger): change download link of swagger-codegen-cli 2020-01-16 02:26:46 +00:00
OWNERS.md Update OWNERS.md 2019-10-21 02:34:09 -05:00
README.md doc[compatibility]:add doc ref in the README 2019-12-12 18:43:49 +08:00
RELEASES.md Document the versioning and release process, also updating the SECURITY.md 2019-10-18 14:24:42 +08:00
ROADMAP.md Update ROADMAP.md 2019-10-22 11:16:09 -07:00
SECURITY.md Document the versioning and release process, also updating the SECURITY.md 2019-10-18 14:24:42 +08:00
VERSION Bump up version to v1.11.0 2019-12-06 13:31:37 +08:00

Harbor

Build Status Coverage Status Go Report Card CII Best Practices Codacy Badge Nightly Status


notificationCommunity Meeting
The Harbor Project holds bi-weekly community calls in two different timezones. To join the community calls or to watch previous meeting notes and recordings, please visit the meeting schedule.



Note: The master branch may be in an unstable or even broken state during development. Please use releases instead of the master branch in order to get a stable set of binaries.

Harbor

Harbor is an open source trusted cloud native registry project that stores, signs, and scans content. Harbor extends the open source Docker Distribution by adding the functionalities usually required by users such as security, identity and management. Having a registry closer to the build and run environment can improve the image transfer efficiency. Harbor supports replication of images between registries, and also offers advanced security features such as user management, access control and activity auditing.

Harbor is hosted by the Cloud Native Computing Foundation (CNCF). If you are an organization that wants to help shape the evolution of cloud native technologies, consider joining the CNCF. For details about who's involved and how Harbor plays a role, read the CNCF announcement.

Features

  • Cloud native registry: With support for both container images and Helm charts, Harbor serves as registry for cloud native environments like container runtimes and orchestration platforms.
  • Role based access control: Users and repositories are organized via 'projects' and a user can have different permission for images or Helm charts under a project.
  • Policy based replication: Images and charts can be replicated (synchronized) between multiple registry instances based on policies with multiple filters (repository, tag and label). Harbor automatically retries a replication if it encounters any errors. Great for load balancing, high availability, multi-datacenter, hybrid and multi-cloud scenarios.
  • Vulnerability Scanning: Harbor scans images regularly and warns users of vulnerabilities.
  • LDAP/AD support: Harbor integrates with existing enterprise LDAP/AD for user authentication and management, and supports importing LDAP groups into Harbor and assigning proper project roles to them.
  • OIDC support: Harbor leverages OpenID Connect (OIDC) to verify the identity of users authenticated by an external authorization server or identity provider. Single sign-on can be enabled to log into the Harbor portal.
  • Image deletion & garbage collection: Images can be deleted and their space can be recycled.
  • Notary: Image authenticity can be ensured.
  • Graphical user portal: User can easily browse, search repositories and manage projects.
  • Auditing: All the operations to the repositories are tracked.
  • RESTful API: RESTful APIs for most administrative operations, easy to integrate with external systems. An embedded Swagger UI is available for exploring and testing the API.
  • Easy deployment: Provide both an online and offline installer. In addition, a Helm Chart can be used to deploy Harbor on Kubernetes.

API

  • Harbor RESTful API: The APIs for most administrative operations of Harbor and can be used to perform integrations with Harbor programmatically.
    • Spec validation status:

Compatibility

The compatibility list document provides compatibility information for the Harbor components.

Install & Run

System requirements:

On a Linux host: docker 17.06.0-ce+ and docker-compose 1.18.0+ .

Download binaries of Harbor release and follow Installation & Configuration Guide to install Harbor.

If you want to deploy Harbor on Kubernetes, please use the Harbor chart.

Refer to User Guide for more details on how to use Harbor.

Community

Additional Tools

Tools layered on top of Harbor and contributed by community.

  • Harbor.Tagd
    • Automates the process of cleaning up old tags from your Harbor container registries.
    • Lead by @nlowe from HylandSoftware.

Demos

  • Live Demo - A demo environment with the latest Harbor stable build installed. For additional information please refer to this page.
  • Video Demos - Demos for Harbor features and continuously updated.

Partners and Users

For a list of users, please refer to ADOPTERS.md.

Security

Security Audit

A third party security audit was performed by Cure53 in October of 2019. You can see the full report here.

Reporting security vulnerabilities

If you've found a security related issue, a vulnerability, or a potential vulnerability in Harbor please let the Harbor Security Team know with the details of the vulnerability. We'll send a confirmation email to acknowledge your report, and we'll send an additional email when we've identified the issue positively or negatively.

For further details please see our complete security release process.

License

Harbor is available under the Apache 2 license.

This project uses open source components which have additional licensing terms. The official docker images and licensing terms for these open source components can be found at the following locations: