An open source trusted cloud native registry project that stores, signs, and scans content.
Go to file
Cheng Dan f5c36a0123 helm chart doc improve
Signed-off-by: Cheng Dan <ssbdan@gmail.com>
2018-08-20 17:00:31 +08:00
.github update README 2016-12-29 15:02:44 +08:00
contrib helm chart doc improve 2018-08-20 17:00:31 +08:00
docs Add gc api of regsistryctl to swagger file 2018-08-17 16:44:47 +08:00
make Signed-off-by: wangyan <wangyan@vmware.com> 2018-08-13 02:58:27 -07:00
src Merge pull request #5632 from ninjadq/fix_ui_issues 2018-08-19 11:01:28 +08:00
tests Fix module not found error in API test (#5647) 2018-08-17 10:55:19 +08:00
tools Update CFG migrator to match the new redis setting (#5567) 2018-08-09 15:30:35 +08:00
.drone.ova.yml Add OVA CI scripts 2017-11-03 03:40:56 -07:00
.drone.yml Remove step to trigger downstream product in CI pipeline 2018-08-09 03:09:37 -07:00
.gitignore Feature of helm chart UI 2018-08-01 13:20:06 +08:00
.gitmessage Update README and .gitmessage 2018-07-17 16:42:03 +08:00
.travis.yml Batch update docker image namespace to goharbor 2018-08-09 23:24:21 -07:00
AUTHORS update docs for 1.2 (#2974) 2017-08-07 14:38:10 +08:00
CHANGELOG.md Update change log 2018-01-31 14:15:13 +08:00
CONTRIBUTING.md Adding correct links, and minor edits for spelling (#5080) 2018-06-07 13:17:07 +08:00
LICENSE Check in license files for 1.6.0 2018-08-03 13:37:05 +08:00
Makefile Add E2E API test cases for replication based on labels (#5639) 2018-08-16 18:36:27 +08:00
NOTICE Update license and notice for 1.4 release 2018-01-31 11:35:42 +08:00
OWNERS.md create OWNERS.md file 2018-08-13 15:00:03 -04:00
README.md Add CII Best Practices Badge 2018-08-17 13:36:14 -04:00
ROADMAP.md update documents (#2020) 2017-04-17 13:46:39 +08:00
VERSION Bump harbor release version to 1.6.0 2018-07-24 03:46:05 -07:00
code-of-conduct.md Update to code-of-conduct.md 2018-06-06 11:13:38 -04:00
open_source_license Check in license files for 1.6.0 2018-08-03 13:37:05 +08:00
partners.md Tweaking partners.md 2018-07-13 12:55:42 -04:00

README.md

Harbor

Build Status Coverage Status Go Report Card CII Best Practices

Note: The master branch may be in an unstable or even broken state during development. Please use releases instead of the master branch in order to get stable binaries.

Harbor

Project Harbor is an an open source trusted cloud native registry project that stores, signs, and scans content. Harbor extends the open source Docker Distribution by adding the functionalities usually required by users such as security, identity and management. Having a registry closer to the build and run environment can improve the image transfer efficiency. Harbor supports replication of images between registries, and also offers advanced security features such as user management, access control and activity auditing.

Harbor is hosted by the Cloud Native Computing Foundation (CNCF). If you are an organization that wants to help shape the evolution of cloud native technologies, consider joining the CNCF. For details about who's involved and how Harbor plays a role, read the CNCF announcement.

Features

  • Role based access control: Users and repositories are organized via 'projects' and a user can have different permission for images under a project.
  • Policy based image replication: Images can be replicated (synchronized) between multiple registry instances, with auto-retry on errors. Great for load balancing, high availability, multi-datacenter, hybrid and multi-cloud scenarios.
  • Vulnerability Scanning: Harbor scans images regularly and warns users of vulnerabilities.
  • LDAP/AD support: Harbor integrates with existing enterprise LDAP/AD for user authentication and management.
  • Image deletion & garbage collection: Images can be deleted and their space can be recycled.
  • Notary: Image authenticity can be ensured.
  • Graphical user portal: User can easily browse, search repositories and manage projects.
  • Auditing: All the operations to the repositories are tracked.
  • RESTful API: RESTful APIs for most administrative operations, easy to integrate with external systems.
  • Easy deployment: Provide both an online and offline installer.

Install & Run

System requirements:

On a Linux host: docker 17.03.0-ce+ and docker-compose 1.10.0+ .

Download binaries of Harbor release and follow Installation & Configuration Guide to install Harbor.

Refer to User Guide for more details on how to use Harbor.

Community

Twitter: @project_harbor
User Group: Join Harbor user email group: harbor-users@googlegroups.com to get update of Harbor's news, features, releases, or to provide suggestion and feedback. To subscribe, send an email to harbor-users+subscribe@googlegroups.com .
Developer Group: Join Harbor developer group: harbor-dev@googlegroups.com for discussion on Harbor development and contribution. To subscribe, send an email to harbor-dev+subscribe@googlegroups.com.
Slack: Join Harbor's community for discussion and ask questions: VMware {code}, channel: #harbor.

Demo Server: Harbor provides a demo environment with the latest Harbor stable build installed. If you want to have a try, please refer to Demo Server for more details.

More info on partners and users.

Contribution

We welcome contributions from the community. If you wish to contribute code and you have not signed our contributor license agreement (CLA), our bot will update the issue when you open a pull request. For any questions about the CLA process, please refer to our FAQ. Contact us for any questions: email.

Demos

License

Harbor is available under the Apache 2 license.

This project uses open source components which have additional licensing terms. The official docker images and licensing terms for these open source components can be found at the following locations:

Commercial Support

If you need commercial support of Harbor, please contact us for more information: email.