An open source trusted cloud native registry project that stores, signs, and scans content.
Go to file
danfengliu a1063edae6
Add GUI test script for new feature of master-role, without adding a new case for master-role, I add new test steps in old test case named Manage-Project-Members, because master-role is a sub function in project members. (#6945)
In this PR, I also modify a public action keyword to make it suitble for indefinite numbers of parameters.

Signed-off-by: danfengliu <danfengl@vmware.com>
2019-02-22 14:11:56 +08:00
.github Update the settings in stale.yml 2018-10-08 14:25:42 +08:00
contrib Clean up the contrib folder 2018-09-10 20:37:32 +08:00
docs Merge pull request #6919 from heww/permissions-doc 2019-02-20 13:54:07 +08:00
make Disable validation for registry (#6993) 2019-02-22 10:30:40 +08:00
src Merge pull request #6983 from reasonerjt/new-bump-up-notary-migrate 2019-02-21 18:03:17 +08:00
tests Add GUI test script for new feature of master-role, without adding a new case for master-role, I add new test steps in old test case named Manage-Project-Members, because master-role is a sub function in project members. (#6945) 2019-02-22 14:11:56 +08:00
tools Upgrade migrator base os to photon 2.0 2019-02-14 11:35:44 +08:00
.drone.yml Update import path in go code 2018-08-23 17:50:53 +08:00
.gitignore Merge pull request #5896 from erks/normalize_ldap_group_dn 2018-10-02 16:03:03 -04:00
.gitmessage Update README and .gitmessage 2018-07-17 16:42:03 +08:00
.travis.yml Upgrade registry binary to v2.7.0 2019-02-13 10:24:08 +08:00
ADOPTERS.md Updating ADOPTERS.md 2018-10-16 09:24:48 -04:00
CHANGELOG.md Updated change log for v1.4.0 -> v1.6.0 2018-11-02 14:44:59 +11:00
code-of-conduct.md Leveraging CNCF's Code of Conduct 2018-09-27 12:11:07 -04:00
CONTRIBUTING.md Updating CONTRIBUTING.md 2018-12-12 17:02:37 +00:00
gskey.sh.enc Enable travis to update logs to GSR (#5949) 2018-09-27 08:54:56 +08:00
LICENSE Replacing copyright notices with "Copyright Project Harbor Authors". 2018-09-19 16:59:36 +00:00
Makefile Bump up the migrate tool of notary 2019-02-21 00:36:24 -08:00
open_source_license Update OSL for 1.7.0 (#6509) 2018-12-11 16:53:44 +08:00
OWNERS.md Updating OWNERS.md with affiliation 2018-11-05 15:27:33 -05:00
README.md Updating README.md 2018-11-30 15:31:56 -05:00
ROADMAP.md update documents (#2020) 2017-04-17 13:46:39 +08:00
VERSION Promte version on master to v1.8.0 2019-01-09 17:41:47 +08:00

Harbor

Build Status Coverage Status Go Report Card CII Best Practices Codacy Badge Nightly Status


notificationCommunity Meeting
The Harbor Project holds bi-weekly community calls, to join them and watch previous meeting notes and recordings, please see meeting schedule.

Note: The master branch may be in an unstable or even broken state during development. Please use releases instead of the master branch in order to get stable binaries.

Harbor

Harbor is an an open source trusted cloud native registry project that stores, signs, and scans content. Harbor extends the open source Docker Distribution by adding the functionalities usually required by users such as security, identity and management. Having a registry closer to the build and run environment can improve the image transfer efficiency. Harbor supports replication of images between registries, and also offers advanced security features such as user management, access control and activity auditing.

Harbor is hosted by the Cloud Native Computing Foundation (CNCF). If you are an organization that wants to help shape the evolution of cloud native technologies, consider joining the CNCF. For details about who's involved and how Harbor plays a role, read the CNCF announcement.

Features

  • Cloud native registry: With support for both container images and Helm charts, Harbor serves as registry for cloud native environments like container runtimes and orchestration platforms.
  • Role based access control: Users and repositories are organized via 'projects' and a user can have different permission for images under a project.
  • Policy based image replication: Images can be replicated (synchronized) between multiple registry instances based on policies with multiple filters (repository, tag and label). Harbor will auto-retry to replicate if it encounters any errors. Great for load balancing, high availability, multi-datacenter, hybrid and multi-cloud scenarios.
  • Vulnerability Scanning: Harbor scans images regularly and warns users of vulnerabilities.
  • LDAP/AD support: Harbor integrates with existing enterprise LDAP/AD for user authentication and management, and supports importing LDAP groups into Harbor and assigning proper project roles to them.
  • Image deletion & garbage collection: Images can be deleted and their space can be recycled.
  • Notary: Image authenticity can be ensured.
  • Graphical user portal: User can easily browse, search repositories and manage projects.
  • Auditing: All the operations to the repositories are tracked.
  • RESTful API: RESTful APIs for most administrative operations, easy to integrate with external systems.
  • Easy deployment: Provide both an online and offline installer.

Install & Run

System requirements:

On a Linux host: docker 17.03.0-ce+ and docker-compose 1.10.0+ .

Download binaries of Harbor release and follow Installation & Configuration Guide to install Harbor.

If you want to deploy Harbor on Kubernetes, please use the Harbor chart.

Refer to User Guide for more details on how to use Harbor.

Community

Additional Tools

Tools layered on top of Harbor and contributed by community.

  • Harbor.Tagd
    • Automates the process of cleaning up old tags from your Harbor container registries.
    • Lead by @nlowe from HylandSoftware.

Demos

  • Live Demo - A demo environment with the latest Harbor stable build installed. For additional information please refer to this page.
  • Video Demos - Demos for Harbor features and continuously updated.

Partners and Users

For a list of users, please refer to ADOPTERS.md.

License

Harbor is available under the Apache 2 license.

This project uses open source components which have additional licensing terms. The official docker images and licensing terms for these open source components can be found at the following locations: