Commit 0970b3e0 authored by 舒成's avatar 舒成

2.1.6

parent 7d41e5ec
Pipeline #62897 passed with stage
...@@ -35,7 +35,7 @@ steps: ...@@ -35,7 +35,7 @@ steps:
"REGISTRY_DATA_PATH": "/data/downloads/k8s/registry/{{ TARGET_ARCH }}", "REGISTRY_DATA_PATH": "/data/downloads/k8s/registry/{{ TARGET_ARCH }}",
"REGISTRY_DATA_FILE": "images-harbor-{{ TARGET_VERSION }}.tar.gz", "REGISTRY_DATA_FILE": "images-harbor-{{ TARGET_VERSION }}.tar.gz",
"TARGET_ARCH":"amd64", "TARGET_ARCH":"amd64",
"TARGET_VERSION":"v2.1.3" "TARGET_VERSION":"v2.1.6"
}' }'
--extra-vars "@ansible/images.yaml" --extra-vars "@ansible/images.yaml"
...@@ -49,7 +49,7 @@ steps: ...@@ -49,7 +49,7 @@ steps:
"REGISTRY_DATA_PATH": "/data/downloads/k8s/registry/{{ TARGET_ARCH }}", "REGISTRY_DATA_PATH": "/data/downloads/k8s/registry/{{ TARGET_ARCH }}",
"REGISTRY_DATA_FILE": "images-harbor-{{ TARGET_VERSION }}.tar.gz", "REGISTRY_DATA_FILE": "images-harbor-{{ TARGET_VERSION }}.tar.gz",
"TARGET_ARCH":"arm64", "TARGET_ARCH":"arm64",
"TARGET_VERSION":"v2.1.3" "TARGET_VERSION":"v2.1.6"
}' }'
--extra-vars "@ansible/images.yaml" --extra-vars "@ansible/images.yaml"
...@@ -63,7 +63,21 @@ steps: ...@@ -63,7 +63,21 @@ steps:
"REGISTRY_DATA_PATH": "/data/downloads/k8s/registry/{{ TARGET_ARCH }}", "REGISTRY_DATA_PATH": "/data/downloads/k8s/registry/{{ TARGET_ARCH }}",
"REGISTRY_DATA_FILE": "images-harbor-{{ TARGET_VERSION }}.tar.gz", "REGISTRY_DATA_FILE": "images-harbor-{{ TARGET_VERSION }}.tar.gz",
"TARGET_ARCH":"ppc64le", "TARGET_ARCH":"ppc64le",
"TARGET_VERSION":"v2.1.3" "TARGET_VERSION":"v2.1.6"
}'
--extra-vars "@ansible/images.yaml"
- name: ansible-mips64le
image: registry.cn-qingdao.aliyuncs.com/wod/ansible-image:v1.0
commands:
- >-
ansible-playbook /etc/ansible/linux/main.yml
--extra-vars
'{
"REGISTRY_DATA_PATH": "/data/downloads/k8s/registry/{{ TARGET_ARCH }}",
"REGISTRY_DATA_FILE": "images-harbor-{{ TARGET_VERSION }}.tar.gz",
"TARGET_ARCH":"mips64le",
"TARGET_VERSION":"v2.1.6"
}' }'
--extra-vars "@ansible/images.yaml" --extra-vars "@ansible/images.yaml"
......
charts/* charts/*
requirements.lock requirements.lock
\ No newline at end of file
beagle-*.tgz
\ No newline at end of file
apiVersion: v1 apiVersion: v1
name: beagle-harbor name: beagle-harbor
version: 2.1.3 version: 2.1.6
appVersion: 2.1.3 appVersion: 2.1.6
description: An open source trusted cloud native registry that stores, signs, and scans content description: An open source trusted cloud native registry that stores, signs, and scans content
keywords: keywords:
- docker - docker
......
...@@ -31,76 +31,96 @@ harbor \ ...@@ -31,76 +31,96 @@ harbor \
/etc/kubernetes/helm/beagle-harbor \ /etc/kubernetes/helm/beagle-harbor \
-f /etc/kubernetes/helm/beagle-harbor/values-overrides.yaml > /etc/kubernetes/helm/beagle-harbor/dist.yaml -f /etc/kubernetes/helm/beagle-harbor/values-overrides.yaml > /etc/kubernetes/helm/beagle-harbor/dist.yaml
# package # 5. Package
helm package . -d C:/Tmp/Charts ## 打包项目
helm package .
## 部署项目
helm install \
harbor \
/etc/kubernetes/charts/beagle-harbor-2.1.6.tgz \
--namespace devops \
-f /etc/kubernetes/charts/beagle-harbor.yaml
## 更新项目
helm upgrade \
harbor \
/etc/kubernetes/charts/beagle-harbor-2.1.6.tgz \
--namespace devops \
-f /etc/kubernetes/charts/beagle-harbor.yaml
## 删除项目
helm uninstall \
--namespace devops \
harbor
``` ```
## images x86_64 ## images x86_64
```bash ```bash
# gitlab.wodcloud.com/cloud/awecloud-goharbor-harbor # gitlab.wodcloud.com/cloud/awecloud-goharbor-harbor
registry.cn-qingdao.aliyuncs.com/wod/harbor-portal:v2.1.3 registry.cn-qingdao.aliyuncs.com/wod/harbor-portal:v2.1.6
registry.cn-qingdao.aliyuncs.com/wod/harbor-core:v2.1.3 registry.cn-qingdao.aliyuncs.com/wod/harbor-core:v2.1.6
registry.cn-qingdao.aliyuncs.com/wod/harbor-jobservice:v2.1.3 registry.cn-qingdao.aliyuncs.com/wod/harbor-jobservice:v2.1.6
registry.cn-qingdao.aliyuncs.com/wod/harbor-registryctl:v2.1.3 registry.cn-qingdao.aliyuncs.com/wod/harbor-registryctl:v2.1.6
# gitlab.wodcloud.com/cloud/awecloud-goharbor-harbor-db # gitlab.wodcloud.com/cloud/awecloud-goharbor-harbor-db
registry.cn-qingdao.aliyuncs.com/wod/harbor-db:v2.1.3 registry.cn-qingdao.aliyuncs.com/wod/harbor-db:v2.1.6
# registry # registry
registry.cn-qingdao.aliyuncs.com/wod/registry:2.7.1 registry.cn-qingdao.aliyuncs.com/wod/registry:v2.7.1
# gitlab.wodcloud.com/cloud/chartmuseum # gitlab.wodcloud.com/cloud/chartmuseum
registry.cn-qingdao.aliyuncs.com/wod/harbor-chartmuseum:v2.1.3 registry.cn-qingdao.aliyuncs.com/wod/chartmuseum:v0.12.0
# gitlab.wodcloud.com/cloud/clair # gitlab.wodcloud.com/cloud/clair
registry.cn-qingdao.aliyuncs.com/wod/harbor-clair:v2.1.3 registry.cn-qingdao.aliyuncs.com/wod/clair:v2.1.7
# gitlab.wodcloud.com/cloud/awecloud-goharbor-harbor-scanner-clair # gitlab.wodcloud.com/cloud/awecloud-goharbor-harbor-scanner-clair
registry.cn-qingdao.aliyuncs.com/wod/harbor-clair-adapter:v2.1.3 registry.cn-qingdao.aliyuncs.com/wod/harbor-scanner-clair:v1.1.1
# gitlab.wodcloud.com/cloud/harbor-scanner-trivy # gitlab.wodcloud.com/cloud/harbor-scanner-trivy
registry.cn-qingdao.aliyuncs.com/wod/harbor-trivy-adapter:v2.1.3 registry.cn-qingdao.aliyuncs.com/wod/harbor-scanner-trivy:v0.17.0
# gitlab.wodcloud.com/cloud/notary # gitlab.wodcloud.com/cloud/notary
registry.cn-qingdao.aliyuncs.com/wod/harbor-notary-server:v2.1.3 registry.cn-qingdao.aliyuncs.com/wod/notary-server:v0.6.1
registry.cn-qingdao.aliyuncs.com/wod/harbor-notary-signer:v2.1.3 registry.cn-qingdao.aliyuncs.com/wod/notary-signer:v0.6.1
# redis # redis
registry.cn-qingdao.aliyuncs.com/wod/redis:6.0.9 registry.cn-qingdao.aliyuncs.com/wod/redis:6.2.6
``` ```
## images arm64 ## images arm64
```bash ```bash
# gitlab.wodcloud.com/cloud/awecloud-goharbor-harbor # gitlab.wodcloud.com/cloud/awecloud-goharbor-harbor
registry.cn-qingdao.aliyuncs.com/wod/harbor-portal:v2.1.3-arm64 registry.cn-qingdao.aliyuncs.com/wod/harbor-portal:v2.1.6-arm64
registry.cn-qingdao.aliyuncs.com/wod/harbor-core:v2.1.3-arm64 registry.cn-qingdao.aliyuncs.com/wod/harbor-core:v2.1.6-arm64
registry.cn-qingdao.aliyuncs.com/wod/harbor-jobservice:v2.1.3-arm64 registry.cn-qingdao.aliyuncs.com/wod/harbor-jobservice:v2.1.6-arm64
registry.cn-qingdao.aliyuncs.com/wod/harbor-registryctl:v2.1.3-arm64 registry.cn-qingdao.aliyuncs.com/wod/harbor-registryctl:v2.1.6-arm64
# gitlab.wodcloud.com/cloud/awecloud-goharbor-harbor-db # gitlab.wodcloud.com/cloud/awecloud-goharbor-harbor-db
registry.cn-qingdao.aliyuncs.com/wod/harbor-db:v2.1.3-arm64 registry.cn-qingdao.aliyuncs.com/wod/harbor-db:v2.1.6-arm64
# registry # registry
registry.cn-qingdao.aliyuncs.com/wod/registry:2.7.1-arm64 registry.cn-qingdao.aliyuncs.com/wod/registry:v2.7.1-arm64
# gitlab.wodcloud.com/cloud/chartmuseum # gitlab.wodcloud.com/cloud/chartmuseum
registry.cn-qingdao.aliyuncs.com/wod/harbor-chartmuseum:v2.1.3-arm64 registry.cn-qingdao.aliyuncs.com/wod/chartmuseum:v0.12.0-arm64
# gitlab.wodcloud.com/cloud/clair # gitlab.wodcloud.com/cloud/clair
registry.cn-qingdao.aliyuncs.com/wod/harbor-clair:v2.1.3-arm64 registry.cn-qingdao.aliyuncs.com/wod/clair:v2.1.7-arm64
# gitlab.wodcloud.com/cloud/awecloud-goharbor-harbor-scanner-clair # gitlab.wodcloud.com/cloud/awecloud-goharbor-harbor-scanner-clair
registry.cn-qingdao.aliyuncs.com/wod/harbor-clair-adapter:v2.1.3-arm64 registry.cn-qingdao.aliyuncs.com/wod/harbor-scanner-clair:v1.1.1-arm64
# gitlab.wodcloud.com/cloud/harbor-scanner-trivy # gitlab.wodcloud.com/cloud/harbor-scanner-trivy
registry.cn-qingdao.aliyuncs.com/wod/harbor-trivy-adapter:v2.1.3-arm64 registry.cn-qingdao.aliyuncs.com/wod/harbor-scanner-trivy:v0.17.0-arm64
# gitlab.wodcloud.com/cloud/notary # gitlab.wodcloud.com/cloud/notary
registry.cn-qingdao.aliyuncs.com/wod/harbor-notary-server:v2.1.3-arm64 registry.cn-qingdao.aliyuncs.com/wod/notary-server:v0.6.1-arm64
registry.cn-qingdao.aliyuncs.com/wod/harbor-notary-signer:v2.1.3-arm64 registry.cn-qingdao.aliyuncs.com/wod/notary-signer:v0.6.1-arm64
# redis # redis
registry.cn-qingdao.aliyuncs.com/wod/redis:6.0.9-arm64 registry.cn-qingdao.aliyuncs.com/wod/redis:6.2.6-arm64
``` ```
...@@ -271,7 +271,7 @@ The following table lists the configurable parameters of the Harbor chart and th ...@@ -271,7 +271,7 @@ The following table lists the configurable parameters of the Harbor chart and th
| `clair.clair.image.repository` | Repository for clair image | `goharbor/clair-photon` | | `clair.clair.image.repository` | Repository for clair image | `goharbor/clair-photon` |
| `clair.clair.image.tag` | Tag for clair image | `dev` | | `clair.clair.image.tag` | Tag for clair image | `dev` |
| `clair.clair.resources` | The [resources] to allocate for clair container | | | `clair.clair.resources` | The [resources] to allocate for clair container | |
| `clair.adapter.image.repository` | Repository for clair adapter image | `goharbor/clair-adapter-photon` | | `clair.adapter.image.repository` | Repository for clair adapter image | `goharbor/harbor-scanner-clair-photon` |
| `clair.adapter.image.tag` | Tag for clair adapter image | `dev` | | `clair.adapter.image.tag` | Tag for clair adapter image | `dev` |
| `clair.adapter.resources` | The [resources] to allocate for clair adapter container | | | `clair.adapter.resources` | The [resources] to allocate for clair adapter container | |
| `clair.replicas` | The replica count | `1` | | `clair.replicas` | The replica count | `1` |
......
IMAGES: IMAGES:
- repo: harbor-portal - repo: harbor-portal
tag: "v2.1.3" tag: 'v2.1.6'
- repo: harbor-core - repo: harbor-core
tag: "v2.1.3" tag: 'v2.1.6'
- repo: harbor-jobservice - repo: harbor-jobservice
tag: "v2.1.3" tag: 'v2.1.6'
- repo: harbor-db - repo: harbor-db
tag: "v2.1.3" tag: 'v2.1.6'
- repo: harbor-registryctl - repo: harbor-registryctl
tag: "v2.1.3" tag: 'v2.1.6'
- repo: harbor-chartmuseum - repo: chartmuseum
tag: "v2.1.3" tag: 'v0.12.0'
- repo: harbor-clair - repo: clair
tag: "v2.1.3" tag: 'v2.1.7'
- repo: harbor-clair-adapter - repo: harbor-scanner-clair
tag: "v2.1.3" tag: 'v1.1.1'
- repo: harbor-trivy-adapter - repo: harbor-scanner-trivy
tag: "v2.1.3" tag: v0.17.0
- repo: harbor-notary-server - repo: notary-server
tag: "v2.1.3" tag: v0.6.1
- repo: harbor-notary-signer - repo: notary-signer
tag: "v2.1.3" tag: v0.6.1
- repo: registry - repo: registry
tag: "2.7.1" tag: 'v2.7.1'
- repo: redis - repo: redis
tag: "6.0.9" tag: '6.2.6'
\ No newline at end of file
...@@ -7,7 +7,7 @@ expose: ...@@ -7,7 +7,7 @@ expose:
core: hub.wodcloud.local core: hub.wodcloud.local
notary: notary.wodcloud.local notary: notary.wodcloud.local
annotations: annotations:
ingress.kubernetes.io/proxy-body-size: "0" ingress.kubernetes.io/proxy-body-size: '0'
externalURL: https://hub.wodcloud.local externalURL: https://hub.wodcloud.local
...@@ -15,41 +15,41 @@ persistence: ...@@ -15,41 +15,41 @@ persistence:
enabled: true enabled: true
persistentVolumeClaim: persistentVolumeClaim:
registry: registry:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
chartmuseum: chartmuseum:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
jobservice: jobservice:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
database: database:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
redis: redis:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
trivy: trivy:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
imageChartStorage: imageChartStorage:
# s3 , filesystem # s3 , filesystem
type: filesystem type: filesystem
...@@ -62,34 +62,34 @@ persistence: ...@@ -62,34 +62,34 @@ persistence:
encrypt: false encrypt: false
v4auth: true v4auth: true
chunksize: '5242880' chunksize: '5242880'
rootdirectory: / rootdirectory: /
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
logLevel: info logLevel: info
harborAdminPassword: "spaceIN511" harborAdminPassword: 'spaceIN511'
secretKey: "IpTIscRIgmerlare" secretKey: 'IpTIscRIgmerlare'
portal: portal:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-portal repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-portal
tag: v2.1.3 tag: v2.1.6
core: core:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-core repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-core
tag: v2.1.3 tag: v2.1.6
jobservice: jobservice:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-jobservice repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-jobservice
tag: v2.1.3 tag: v2.1.6
registry: registry:
registry: registry:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/registry repository: registry.cn-qingdao.aliyuncs.com/wod/registry
tag: 2.7.1 tag: v2.7.1
resources: resources:
limits: limits:
memory: 4Gi memory: 4Gi
...@@ -98,12 +98,12 @@ registry: ...@@ -98,12 +98,12 @@ registry:
controller: controller:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-registryctl repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-registryctl
tag: v2.1.3 tag: v2.1.6
chartmuseum: chartmuseum:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-chartmuseum repository: registry.cn-qingdao.aliyuncs.com/wod/chartmuseum
tag: v2.1.3 tag: v2.1.6
nodeSelector: {} nodeSelector: {}
# nodeSelector: # nodeSelector:
# harbor: enabled # harbor: enabled
...@@ -111,40 +111,40 @@ chartmuseum: ...@@ -111,40 +111,40 @@ chartmuseum:
type: hostPath type: hostPath
emptyDir: {} emptyDir: {}
hostPath: hostPath:
root: /data root: /data
clair: clair:
clair: clair:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-clair repository: registry.cn-qingdao.aliyuncs.com/wod/clair
tag: v2.1.3 tag: v2.1.6
adapter: adapter:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-clair-adapter repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-scanner-clair
tag: v2.1.3 tag: v2.1.6
trivy: trivy:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-trivy-adapter repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-scanner-trivy
tag: v2.1.3 tag: v2.1.6
notary: notary:
server: server:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-notary-server repository: registry.cn-qingdao.aliyuncs.com/wod/notary-server
tag: v2.1.3 tag: v2.1.6
signer: signer:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-notary-signer repository: registry.cn-qingdao.aliyuncs.com/wod/notary-signer
tag: v2.1.3 tag: v2.1.6
database: database:
type: internal type: internal
internal: internal:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-db repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-db
tag: v2.1.3 tag: v2.1.6
password: "spaceIN511" password: 'spaceIN511'
resources: resources:
limits: limits:
memory: 4Gi memory: 4Gi
...@@ -156,4 +156,4 @@ redis: ...@@ -156,4 +156,4 @@ redis:
internal: internal:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/redis repository: registry.cn-qingdao.aliyuncs.com/wod/redis
tag: 6.0.9 tag: 6.2.6
\ No newline at end of file
...@@ -7,7 +7,7 @@ expose: ...@@ -7,7 +7,7 @@ expose:
core: hub.wodcloud.local core: hub.wodcloud.local
notary: notary.wodcloud.local notary: notary.wodcloud.local
annotations: annotations:
ingress.kubernetes.io/proxy-body-size: "0" ingress.kubernetes.io/proxy-body-size: '0'
externalURL: https://hub.wodcloud.local externalURL: https://hub.wodcloud.local
...@@ -15,41 +15,41 @@ persistence: ...@@ -15,41 +15,41 @@ persistence:
enabled: true enabled: true
persistentVolumeClaim: persistentVolumeClaim:
registry: registry:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
chartmuseum: chartmuseum:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
jobservice: jobservice:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
database: database:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
redis: redis:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
trivy: trivy:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
imageChartStorage: imageChartStorage:
# s3 , filesystem # s3 , filesystem
type: filesystem type: filesystem
...@@ -62,34 +62,34 @@ persistence: ...@@ -62,34 +62,34 @@ persistence:
encrypt: false encrypt: false
v4auth: true v4auth: true
chunksize: '5242880' chunksize: '5242880'
rootdirectory: / rootdirectory: /
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
logLevel: info logLevel: info
harborAdminPassword: "spaceIN511" harborAdminPassword: 'spaceIN511'
secretKey: "IpTIscRIgmerlare" secretKey: 'IpTIscRIgmerlare'
portal: portal:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-portal repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-portal
tag: v2.1.3-arm64 tag: v2.1.6-arm64
core: core:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-core repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-core
tag: v2.1.3-arm64 tag: v2.1.6-arm64
jobservice: jobservice:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-jobservice repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-jobservice
tag: v2.1.3-arm64 tag: v2.1.6-arm64
registry: registry:
registry: registry:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/registry repository: registry.cn-qingdao.aliyuncs.com/wod/registry
tag: 2.7.1-arm64 tag: v2.7.1-arm64
resources: resources:
limits: limits:
memory: 4Gi memory: 4Gi
...@@ -98,12 +98,12 @@ registry: ...@@ -98,12 +98,12 @@ registry:
controller: controller:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-registryctl repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-registryctl
tag: v2.1.3-arm64 tag: v2.1.6-arm64
chartmuseum: chartmuseum:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-chartmuseum repository: registry.cn-qingdao.aliyuncs.com/wod/chartmuseum
tag: v2.1.3-arm64 tag: v2.1.6-arm64
nodeSelector: {} nodeSelector: {}
# nodeSelector: # nodeSelector:
# harbor: enabled # harbor: enabled
...@@ -111,40 +111,40 @@ chartmuseum: ...@@ -111,40 +111,40 @@ chartmuseum:
type: hostPath type: hostPath
emptyDir: {} emptyDir: {}
hostPath: hostPath:
root: /data root: /data
clair: clair:
clair: clair:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-clair repository: registry.cn-qingdao.aliyuncs.com/wod/clair
tag: v2.1.3-arm64 tag: v2.1.6-arm64
adapter: adapter:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-clair-adapter repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-scanner-clair
tag: v2.1.3-arm64 tag: v2.1.6-arm64
trivy: trivy:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-trivy-adapter repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-scanner-trivy
tag: v2.1.3-arm64 tag: v2.1.6-arm64
notary: notary:
server: server:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-notary-server repository: registry.cn-qingdao.aliyuncs.com/wod/notary-server
tag: v2.1.3-arm64 tag: v2.1.6-arm64
signer: signer:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-notary-signer repository: registry.cn-qingdao.aliyuncs.com/wod/notary-signer
tag: v2.1.3-arm64 tag: v2.1.6-arm64
database: database:
type: internal type: internal
internal: internal:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-db repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-db
tag: v2.1.3-arm64 tag: v2.1.6-arm64
password: "spaceIN511" password: 'spaceIN511'
resources: resources:
limits: limits:
memory: 4Gi memory: 4Gi
...@@ -156,4 +156,4 @@ redis: ...@@ -156,4 +156,4 @@ redis:
internal: internal:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/redis repository: registry.cn-qingdao.aliyuncs.com/wod/redis
tag: 6.0.9-arm64 tag: 6.2.6-arm64
\ No newline at end of file
...@@ -7,7 +7,7 @@ expose: ...@@ -7,7 +7,7 @@ expose:
core: hub.test.wodcloud.com core: hub.test.wodcloud.com
notary: notary.test.wodcloud.com notary: notary.test.wodcloud.com
annotations: annotations:
ingress.kubernetes.io/proxy-body-size: "0" ingress.kubernetes.io/proxy-body-size: '0'
externalURL: https://hub.test.wodcloud.com externalURL: https://hub.test.wodcloud.com
...@@ -19,21 +19,21 @@ persistence: ...@@ -19,21 +19,21 @@ persistence:
filesystem: filesystem:
rootdirectory: /data rootdirectory: /data
#s3: #s3:
# accesskey: AKIAIOSFODNN7EXAMPLE # accesskey: AKIAIOSFODNN7EXAMPLE
# secretkey: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY # secretkey: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
# region: us-east-1 # region: us-east-1
# regionendpoint: https://minio.sxwh.local # regionendpoint: https://minio.sxwh.local
# bucket: registry # bucket: registry
# encrypt: false # encrypt: false
# v4auth: true # v4auth: true
# chunksize: '5242880' # chunksize: '5242880'
# rootdirectory: / # rootdirectory: /
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
logLevel: info logLevel: info
harborAdminPassword: "spaceIN511" harborAdminPassword: 'spaceIN511'
secretKey: "IpTIscRIgmerlare" secretKey: 'IpTIscRIgmerlare'
portal: portal:
image: image:
...@@ -59,14 +59,14 @@ registry: ...@@ -59,14 +59,14 @@ registry:
registry: registry:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/registry repository: registry.cn-qingdao.aliyuncs.com/wod/registry
tag: 2.7.1 tag: v2.7.1
resources: resources:
limits: limits:
memory: 4Gi memory: 4Gi
requests: requests:
memory: 256Mi memory: 256Mi
nodeSelector: nodeSelector:
harbor: enabled harbor: enabled
storageSpec: storageSpec:
# type: emptyDir , hostPath , volumeClaimTemplate # type: emptyDir , hostPath , volumeClaimTemplate
type: hostPath type: hostPath
...@@ -76,11 +76,11 @@ registry: ...@@ -76,11 +76,11 @@ registry:
volumeClaimTemplate: volumeClaimTemplate:
spec: spec:
storageClassName: rook-ceph-block storageClassName: rook-ceph-block
accessModes: ["ReadWriteOnce"] accessModes: ['ReadWriteOnce']
resources: resources:
requests: requests:
storage: 100Gi storage: 100Gi
selector: {} selector: {}
controller: controller:
image: image:
...@@ -95,12 +95,12 @@ chartmuseum: ...@@ -95,12 +95,12 @@ chartmuseum:
tag: v0.9.0-v1.8.2 tag: v0.9.0-v1.8.2
replicas: 1 replicas: 1
nodeSelector: nodeSelector:
harbor: enabled harbor: enabled
storageSpec: storageSpec:
type: hostPath type: hostPath
emptyDir: {} emptyDir: {}
hostPath: hostPath:
root: /data root: /data
clair: clair:
enabled: true enabled: true
...@@ -128,7 +128,7 @@ database: ...@@ -128,7 +128,7 @@ database:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-db repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-db
tag: v1.8.2 tag: v1.8.2
password: "spaceIN511" password: 'spaceIN511'
resources: resources:
limits: limits:
memory: 4Gi memory: 4Gi
...@@ -140,11 +140,11 @@ database: ...@@ -140,11 +140,11 @@ database:
type: hostPath type: hostPath
emptyDir: {} emptyDir: {}
hostPath: hostPath:
root: /data root: /data
volumeClaimTemplate: volumeClaimTemplate:
spec: spec:
storageClassName: rook-ceph-block storageClassName: rook-ceph-block
accessModes: ["ReadWriteOnce"] accessModes: ['ReadWriteOnce']
resources: resources:
requests: requests:
storage: 20Gi storage: 20Gi
...@@ -155,4 +155,4 @@ redis: ...@@ -155,4 +155,4 @@ redis:
internal: internal:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/redis repository: registry.cn-qingdao.aliyuncs.com/wod/redis
tag: 4.0.14-alpine tag: 4.0.14-alpine
\ No newline at end of file
...@@ -7,7 +7,7 @@ expose: ...@@ -7,7 +7,7 @@ expose:
core: hub.wodcloud.local core: hub.wodcloud.local
notary: notary.wodcloud.local notary: notary.wodcloud.local
annotations: annotations:
ingress.kubernetes.io/proxy-body-size: "0" ingress.kubernetes.io/proxy-body-size: '0'
externalURL: https://hub.wodcloud.local externalURL: https://hub.wodcloud.local
...@@ -15,41 +15,41 @@ persistence: ...@@ -15,41 +15,41 @@ persistence:
enabled: true enabled: true
persistentVolumeClaim: persistentVolumeClaim:
registry: registry:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
chartmuseum: chartmuseum:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
jobservice: jobservice:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
database: database:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
redis: redis:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
trivy: trivy:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
imageChartStorage: imageChartStorage:
# s3 , filesystem # s3 , filesystem
type: filesystem type: filesystem
...@@ -62,34 +62,34 @@ persistence: ...@@ -62,34 +62,34 @@ persistence:
encrypt: false encrypt: false
v4auth: true v4auth: true
chunksize: '5242880' chunksize: '5242880'
rootdirectory: / rootdirectory: /
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
logLevel: info logLevel: info
harborAdminPassword: "spaceIN511" harborAdminPassword: 'spaceIN511'
secretKey: "IpTIscRIgmerlare" secretKey: 'IpTIscRIgmerlare'
portal: portal:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-portal repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-portal
tag: v2.1.3-ppc64le tag: v2.1.6-ppc64le
core: core:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-core repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-core
tag: v2.1.3-ppc64le tag: v2.1.6-ppc64le
jobservice: jobservice:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-jobservice repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-jobservice
tag: v2.1.3-ppc64le tag: v2.1.6-ppc64le
registry: registry:
registry: registry:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/registry repository: registry.cn-qingdao.aliyuncs.com/wod/registry
tag: 2.7.1-ppc64le tag: v2.7.1-ppc64le
resources: resources:
limits: limits:
memory: 4Gi memory: 4Gi
...@@ -98,11 +98,11 @@ registry: ...@@ -98,11 +98,11 @@ registry:
controller: controller:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-registryctl repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-registryctl
tag: v2.1.3-ppc64le tag: v2.1.6-ppc64le
chartmuseum: chartmuseum:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-chartmuseum repository: registry.cn-qingdao.aliyuncs.com/wod/chartmuseum
tag: v2.1.1-ppc64le tag: v2.1.1-ppc64le
nodeSelector: {} nodeSelector: {}
# nodeSelector: # nodeSelector:
...@@ -111,31 +111,31 @@ chartmuseum: ...@@ -111,31 +111,31 @@ chartmuseum:
type: hostPath type: hostPath
emptyDir: {} emptyDir: {}
hostPath: hostPath:
root: /data root: /data
clair: clair:
clair: clair:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-clair repository: registry.cn-qingdao.aliyuncs.com/wod/clair
tag: v2.1.1-ppc64le tag: v2.1.1-ppc64le
adapter: adapter:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-clair-adapter repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-scanner-clair
tag: v2.1.1-ppc64le tag: v2.1.1-ppc64le
trivy: trivy:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-trivy-adapter repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-scanner-trivy
tag: v2.1.1-ppc64le tag: v2.1.1-ppc64le
notary: notary:
server: server:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-notary-server repository: registry.cn-qingdao.aliyuncs.com/wod/notary-server
tag: v2.1.1-ppc64le tag: v2.1.1-ppc64le
signer: signer:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-notary-signer repository: registry.cn-qingdao.aliyuncs.com/wod/notary-signer
tag: v2.1.1-ppc64le tag: v2.1.1-ppc64le
database: database:
...@@ -143,8 +143,8 @@ database: ...@@ -143,8 +143,8 @@ database:
internal: internal:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-db repository: registry.cn-qingdao.aliyuncs.com/wod/harbor-db
tag: v2.1.3-ppc64le tag: v2.1.6-ppc64le
password: "spaceIN511" password: 'spaceIN511'
resources: resources:
limits: limits:
memory: 4Gi memory: 4Gi
...@@ -156,4 +156,4 @@ redis: ...@@ -156,4 +156,4 @@ redis:
internal: internal:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/redis repository: registry.cn-qingdao.aliyuncs.com/wod/redis
tag: 6.0.9-ppc64le tag: 6.2.6-ppc64le
\ No newline at end of file
...@@ -7,7 +7,7 @@ expose: ...@@ -7,7 +7,7 @@ expose:
core: hub.test.wodcloud.com core: hub.test.wodcloud.com
notary: notary.test.wodcloud.com notary: notary.test.wodcloud.com
annotations: annotations:
ingress.kubernetes.io/proxy-body-size: "0" ingress.kubernetes.io/proxy-body-size: '0'
externalURL: https://hub.test.wodcloud.com externalURL: https://hub.test.wodcloud.com
...@@ -19,21 +19,21 @@ persistence: ...@@ -19,21 +19,21 @@ persistence:
filesystem: filesystem:
rootdirectory: /data rootdirectory: /data
#s3: #s3:
# accesskey: AKIAIOSFODNN7EXAMPLE # accesskey: AKIAIOSFODNN7EXAMPLE
# secretkey: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY # secretkey: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
# region: us-east-1 # region: us-east-1
# regionendpoint: https://minio.sxwh.local # regionendpoint: https://minio.sxwh.local
# bucket: registry # bucket: registry
# encrypt: false # encrypt: false
# v4auth: true # v4auth: true
# chunksize: '5242880' # chunksize: '5242880'
# rootdirectory: / # rootdirectory: /
imagePullPolicy: IfNotPresent imagePullPolicy: IfNotPresent
logLevel: info logLevel: info
harborAdminPassword: "spaceIN511" harborAdminPassword: 'spaceIN511'
secretKey: "IpTIscRIgmerlare" secretKey: 'IpTIscRIgmerlare'
portal: portal:
image: image:
...@@ -59,14 +59,14 @@ registry: ...@@ -59,14 +59,14 @@ registry:
registry: registry:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/registry repository: registry.cn-qingdao.aliyuncs.com/wod/registry
tag: 2.7.1 tag: v2.7.1
resources: resources:
limits: limits:
memory: 4Gi memory: 4Gi
requests: requests:
memory: 256Mi memory: 256Mi
nodeSelector: nodeSelector:
harbor: enabled harbor: enabled
storageSpec: storageSpec:
# type: emptyDir , hostPath , volumeClaimTemplate # type: emptyDir , hostPath , volumeClaimTemplate
type: hostPath type: hostPath
...@@ -76,11 +76,11 @@ registry: ...@@ -76,11 +76,11 @@ registry:
volumeClaimTemplate: volumeClaimTemplate:
spec: spec:
storageClassName: rook-ceph-block storageClassName: rook-ceph-block
accessModes: ["ReadWriteOnce"] accessModes: ['ReadWriteOnce']
resources: resources:
requests: requests:
storage: 100Gi storage: 100Gi
selector: {} selector: {}
controller: controller:
image: image:
...@@ -95,12 +95,12 @@ chartmuseum: ...@@ -95,12 +95,12 @@ chartmuseum:
tag: v0.9.0-v1.8.2 tag: v0.9.0-v1.8.2
replicas: 1 replicas: 1
nodeSelector: nodeSelector:
harbor: enabled harbor: enabled
storageSpec: storageSpec:
type: hostPath type: hostPath
emptyDir: {} emptyDir: {}
hostPath: hostPath:
root: /data root: /data
clair: clair:
enabled: true enabled: true
...@@ -125,19 +125,19 @@ notary: ...@@ -125,19 +125,19 @@ notary:
database: database:
type: external type: external
external: external:
host: "stolon-proxy.devops" host: 'stolon-proxy.devops'
port: "5432" port: '5432'
username: "postgres" username: 'postgres'
password: "spaceIN511" password: 'spaceIN511'
coreDatabase: "hub_registry" coreDatabase: 'hub_registry'
clairDatabase: "hub_clair" clairDatabase: 'hub_clair'
notaryServerDatabase: "hub_notary_server" notaryServerDatabase: 'hub_notary_server'
notarySignerDatabase: "hub_notary_signer" notarySignerDatabase: 'hub_notary_signer'
sslmode: "disable" sslmode: 'disable'
redis: redis:
type: internal type: internal
internal: internal:
image: image:
repository: registry.cn-qingdao.aliyuncs.com/wod/redis repository: registry.cn-qingdao.aliyuncs.com/wod/redis
tag: 4.0.14-alpine tag: 4.0.14-alpine
\ No newline at end of file
...@@ -20,17 +20,17 @@ expose: ...@@ -20,17 +20,17 @@ expose:
auto: auto:
# The common name used to generate the certificate, it's necessary # The common name used to generate the certificate, it's necessary
# when the type isn't "ingress" # when the type isn't "ingress"
commonName: "" commonName: ''
secret: secret:
# The name of secret which contains keys named: # The name of secret which contains keys named:
# "tls.crt" - the certificate # "tls.crt" - the certificate
# "tls.key" - the private key # "tls.key" - the private key
secretName: "" secretName: ''
# The name of secret which contains keys named: # The name of secret which contains keys named:
# "tls.crt" - the certificate # "tls.crt" - the certificate
# "tls.key" - the private key # "tls.key" - the private key
# Only needed when the "expose.type" is "ingress". # Only needed when the "expose.type" is "ingress".
notarySecretName: "" notarySecretName: ''
ingress: ingress:
hosts: hosts:
core: core.harbor.domain core: core.harbor.domain
...@@ -41,10 +41,10 @@ expose: ...@@ -41,10 +41,10 @@ expose:
# set to `ncp` if using the NCP (NSX-T Container Plugin) ingress controller # set to `ncp` if using the NCP (NSX-T Container Plugin) ingress controller
controller: default controller: default
annotations: annotations:
ingress.kubernetes.io/ssl-redirect: "true" ingress.kubernetes.io/ssl-redirect: 'true'
ingress.kubernetes.io/proxy-body-size: "0" ingress.kubernetes.io/proxy-body-size: '0'
nginx.ingress.kubernetes.io/ssl-redirect: "true" nginx.ingress.kubernetes.io/ssl-redirect: 'true'
nginx.ingress.kubernetes.io/proxy-body-size: "0" nginx.ingress.kubernetes.io/proxy-body-size: '0'
clusterIP: clusterIP:
# The name of ClusterIP service # The name of ClusterIP service
name: harbor name: harbor
...@@ -80,7 +80,7 @@ expose: ...@@ -80,7 +80,7 @@ expose:
# The name of LoadBalancer service # The name of LoadBalancer service
name: harbor name: harbor
# Set the IP if the LoadBalancer supports assigning IP # Set the IP if the LoadBalancer supports assigning IP
IP: "" IP: ''
ports: ports:
# The service port Harbor listens on when serving with HTTP # The service port Harbor listens on when serving with HTTP
httpPort: 80 httpPort: 80
...@@ -116,65 +116,65 @@ internalTLS: ...@@ -116,65 +116,65 @@ internalTLS:
# 1) "auto" will generate cert automatically # 1) "auto" will generate cert automatically
# 2) "manual" need provide cert file manually in following value # 2) "manual" need provide cert file manually in following value
# 3) "secret" internal certificates from secret # 3) "secret" internal certificates from secret
certSource: "auto" certSource: 'auto'
# The content of trust ca, only available when `certSource` is "manual" # The content of trust ca, only available when `certSource` is "manual"
trustCa: "" trustCa: ''
# core related cert configuration # core related cert configuration
core: core:
# secret name for core's tls certs # secret name for core's tls certs
secretName: "" secretName: ''
# Content of core's TLS cert file, only available when `certSource` is "manual" # Content of core's TLS cert file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of core's TLS key file, only available when `certSource` is "manual" # Content of core's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# jobservice related cert configuration # jobservice related cert configuration
jobservice: jobservice:
# secret name for jobservice's tls certs # secret name for jobservice's tls certs
secretName: "" secretName: ''
# Content of jobservice's TLS key file, only available when `certSource` is "manual" # Content of jobservice's TLS key file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of jobservice's TLS key file, only available when `certSource` is "manual" # Content of jobservice's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# registry related cert configuration # registry related cert configuration
registry: registry:
# secret name for registry's tls certs # secret name for registry's tls certs
secretName: "" secretName: ''
# Content of registry's TLS key file, only available when `certSource` is "manual" # Content of registry's TLS key file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of registry's TLS key file, only available when `certSource` is "manual" # Content of registry's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# portal related cert configuration # portal related cert configuration
portal: portal:
# secret name for portal's tls certs # secret name for portal's tls certs
secretName: "" secretName: ''
# Content of portal's TLS key file, only available when `certSource` is "manual" # Content of portal's TLS key file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of portal's TLS key file, only available when `certSource` is "manual" # Content of portal's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# chartmuseum related cert configuration # chartmuseum related cert configuration
chartmuseum: chartmuseum:
# secret name for chartmuseum's tls certs # secret name for chartmuseum's tls certs
secretName: "" secretName: ''
# Content of chartmuseum's TLS key file, only available when `certSource` is "manual" # Content of chartmuseum's TLS key file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of chartmuseum's TLS key file, only available when `certSource` is "manual" # Content of chartmuseum's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# clair related cert configuration # clair related cert configuration
clair: clair:
# secret name for clair's tls certs # secret name for clair's tls certs
secretName: "" secretName: ''
# Content of clair's TLS key file, only available when `certSource` is "manual" # Content of clair's TLS key file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of clair's TLS key file, only available when `certSource` is "manual" # Content of clair's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# trivy related cert configuration # trivy related cert configuration
trivy: trivy:
# secret name for trivy's tls certs # secret name for trivy's tls certs
secretName: "" secretName: ''
# Content of trivy's TLS key file, only available when `certSource` is "manual" # Content of trivy's TLS key file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of trivy's TLS key file, only available when `certSource` is "manual" # Content of trivy's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# The persistence is enabled by default and a default StorageClass # The persistence is enabled by default and a default StorageClass
# is needed in the k8s cluster to provision volumes dynamicly. # is needed in the k8s cluster to provision volumes dynamicly.
...@@ -189,51 +189,51 @@ persistence: ...@@ -189,51 +189,51 @@ persistence:
# operation. Leaving it empty will delete PVCs after the chart deleted # operation. Leaving it empty will delete PVCs after the chart deleted
# (this does not apply for PVCs that are created for internal database # (this does not apply for PVCs that are created for internal database
# and redis components, i.e. they are never deleted automatically) # and redis components, i.e. they are never deleted automatically)
resourcePolicy: "keep" resourcePolicy: 'keep'
persistentVolumeClaim: persistentVolumeClaim:
registry: registry:
# Use the existing PVC which must be created manually before bound, # Use the existing PVC which must be created manually before bound,
# and specify the "subPath" if the PVC is shared with other components # and specify the "subPath" if the PVC is shared with other components
existingClaim: "" existingClaim: ''
# Specify the "storageClass" used to provision the volume. Or the default # Specify the "storageClass" used to provision the volume. Or the default
# StorageClass will be used(the default). # StorageClass will be used(the default).
# Set it to "-" to disable dynamic provisioning # Set it to "-" to disable dynamic provisioning
storageClass: "" storageClass: ''
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
chartmuseum: chartmuseum:
existingClaim: "" existingClaim: ''
storageClass: "" storageClass: ''
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
jobservice: jobservice:
existingClaim: "" existingClaim: ''
storageClass: "" storageClass: ''
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
# If external database is used, the following settings for database will # If external database is used, the following settings for database will
# be ignored # be ignored
database: database:
existingClaim: "" existingClaim: ''
storageClass: "" storageClass: ''
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
# If external Redis is used, the following settings for Redis will # If external Redis is used, the following settings for Redis will
# be ignored # be ignored
redis: redis:
existingClaim: "" existingClaim: ''
storageClass: "" storageClass: ''
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
trivy: trivy:
existingClaim: "" existingClaim: ''
storageClass: "" storageClass: ''
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
# Define which storage backend is used for registry and chartmuseum to store # Define which storage backend is used for registry and chartmuseum to store
...@@ -338,15 +338,15 @@ updateStrategy: ...@@ -338,15 +338,15 @@ updateStrategy:
logLevel: info logLevel: info
# The initial password of Harbor admin. Change it from portal after launching Harbor # The initial password of Harbor admin. Change it from portal after launching Harbor
harborAdminPassword: "Harbor12345" harborAdminPassword: 'Harbor12345'
# The name of the secret which contains key named "ca.crt". Setting this enables the # The name of the secret which contains key named "ca.crt". Setting this enables the
# download link on portal to download the certificate of CA when the certificate isn't # download link on portal to download the certificate of CA when the certificate isn't
# generated automatically # generated automatically
caSecretName: "" caSecretName: ''
# The secret key used for encryption. Must be a string of 16 chars. # The secret key used for encryption. Must be a string of 16 chars.
secretKey: "not-a-secure-key" secretKey: 'not-a-secure-key'
# The proxy settings for updating clair vulnerabilities from the Internet and replicating # The proxy settings for updating clair vulnerabilities from the Internet and replicating
# artifacts from/to the registries that cannot be reached directly # artifacts from/to the registries that cannot be reached directly
...@@ -375,9 +375,9 @@ proxy: ...@@ -375,9 +375,9 @@ proxy:
nginx: nginx:
image: image:
repository: goharbor/nginx-photon repository: goharbor/nginx-photon
tag: v2.1.3 tag: v2.1.6
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
replicas: 1 replicas: 1
# resources: # resources:
# requests: # requests:
...@@ -392,9 +392,9 @@ nginx: ...@@ -392,9 +392,9 @@ nginx:
portal: portal:
image: image:
repository: goharbor/harbor-portal repository: goharbor/harbor-portal
tag: v2.1.3 tag: v2.1.6
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
replicas: 1 replicas: 1
# resources: # resources:
# requests: # requests:
...@@ -409,9 +409,9 @@ portal: ...@@ -409,9 +409,9 @@ portal:
core: core:
image: image:
repository: goharbor/harbor-core repository: goharbor/harbor-core
tag: v2.1.3 tag: v2.1.6
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
replicas: 1 replicas: 1
## Startup probe values ## Startup probe values
startupProbe: startupProbe:
...@@ -429,24 +429,24 @@ core: ...@@ -429,24 +429,24 @@ core:
# Secret is used when core server communicates with other components. # Secret is used when core server communicates with other components.
# If a secret key is not specified, Helm will generate one. # If a secret key is not specified, Helm will generate one.
# Must be a string of 16 chars. # Must be a string of 16 chars.
secret: "" secret: ''
# Fill the name of a kubernetes secret if you want to use your own # Fill the name of a kubernetes secret if you want to use your own
# TLS certificate and private key for token encryption/decryption. # TLS certificate and private key for token encryption/decryption.
# The secret must contain keys named: # The secret must contain keys named:
# "tls.crt" - the certificate # "tls.crt" - the certificate
# "tls.key" - the private key # "tls.key" - the private key
# The default key pair will be used if it isn't set # The default key pair will be used if it isn't set
secretName: "" secretName: ''
# The XSRF key. Will be generated automatically if it isn't specified # The XSRF key. Will be generated automatically if it isn't specified
xsrfKey: "" xsrfKey: ''
jobservice: jobservice:
image: image:
repository: goharbor/harbor-jobservice repository: goharbor/harbor-jobservice
tag: v2.1.3 tag: v2.1.6
replicas: 1 replicas: 1
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
maxJobWorkers: 10 maxJobWorkers: 10
# The logger for jobs: "file", "database" or "stdout" # The logger for jobs: "file", "database" or "stdout"
jobLogger: file jobLogger: file
...@@ -462,15 +462,15 @@ jobservice: ...@@ -462,15 +462,15 @@ jobservice:
# Secret is used when job service communicates with other components. # Secret is used when job service communicates with other components.
# If a secret key is not specified, Helm will generate one. # If a secret key is not specified, Helm will generate one.
# Must be a string of 16 chars. # Must be a string of 16 chars.
secret: "" secret: ''
registry: registry:
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
registry: registry:
image: image:
repository: goharbor/registry-photon repository: goharbor/registry-photon
tag: v2.1.3 tag: v2.1.6
# resources: # resources:
# requests: # requests:
# memory: 256Mi # memory: 256Mi
...@@ -478,7 +478,7 @@ registry: ...@@ -478,7 +478,7 @@ registry:
controller: controller:
image: image:
repository: goharbor/harbor-registryctl repository: goharbor/harbor-registryctl
tag: v2.1.3 tag: v2.1.6
# resources: # resources:
# requests: # requests:
...@@ -495,15 +495,15 @@ registry: ...@@ -495,15 +495,15 @@ registry:
# See: https://github.com/docker/distribution/blob/master/docs/configuration.md#http # See: https://github.com/docker/distribution/blob/master/docs/configuration.md#http
# If a secret key is not specified, Helm will generate one. # If a secret key is not specified, Helm will generate one.
# Must be a string of 16 chars. # Must be a string of 16 chars.
secret: "" secret: ''
# If true, the registry returns relative URLs in Location headers. The client is responsible for resolving the correct URL. # If true, the registry returns relative URLs in Location headers. The client is responsible for resolving the correct URL.
relativeurls: false relativeurls: false
credentials: credentials:
username: "harbor_registry_user" username: 'harbor_registry_user'
password: "harbor_registry_password" password: 'harbor_registry_password'
# If you update the username or password of registry, make sure use cli tool htpasswd to generate the bcrypt hash # If you update the username or password of registry, make sure use cli tool htpasswd to generate the bcrypt hash
# e.g. "htpasswd -nbBC10 $username $password" # e.g. "htpasswd -nbBC10 $username $password"
htpasswd: "harbor_registry_user:$2y$10$9L4Tc0DJbFFMB6RdSCunrOpTHdwhid4ktBJmLD00bYgqkkGOvll3m" htpasswd: 'harbor_registry_user:$2y$10$9L4Tc0DJbFFMB6RdSCunrOpTHdwhid4ktBJmLD00bYgqkkGOvll3m'
middleware: middleware:
enabled: false enabled: false
...@@ -515,17 +515,17 @@ registry: ...@@ -515,17 +515,17 @@ registry:
ipfilteredby: none ipfilteredby: none
# The secret key that should be present is CLOUDFRONT_KEY_DATA, which should be the encoded private key # The secret key that should be present is CLOUDFRONT_KEY_DATA, which should be the encoded private key
# that allows access to CloudFront # that allows access to CloudFront
privateKeySecret: "my-secret" privateKeySecret: 'my-secret'
chartmuseum: chartmuseum:
enabled: true enabled: true
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
# Harbor defaults ChartMuseum to returning relative urls, if you want using absolute url you should enable it by change the following value to 'true' # Harbor defaults ChartMuseum to returning relative urls, if you want using absolute url you should enable it by change the following value to 'true'
absoluteUrl: false absoluteUrl: false
image: image:
repository: goharbor/chartmuseum-photon repository: goharbor/chartmuseum-photon
tag: v2.1.3 tag: v2.1.6
replicas: 1 replicas: 1
# resources: # resources:
# requests: # requests:
...@@ -540,19 +540,19 @@ chartmuseum: ...@@ -540,19 +540,19 @@ chartmuseum:
clair: clair:
enabled: true enabled: true
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
clair: clair:
image: image:
repository: goharbor/clair-photon repository: goharbor/clair-photon
tag: v2.1.3 tag: v2.1.6
# resources: # resources:
# requests: # requests:
# memory: 256Mi # memory: 256Mi
# cpu: 100m # cpu: 100m
adapter: adapter:
image: image:
repository: goharbor/clair-adapter-photon repository: goharbor/harbor-scanner-clair-photon
tag: v2.1.3 tag: v2.1.6
# resources: # resources:
# requests: # requests:
# memory: 256Mi # memory: 256Mi
...@@ -574,17 +574,17 @@ trivy: ...@@ -574,17 +574,17 @@ trivy:
# repository the repository for Trivy adapter image # repository the repository for Trivy adapter image
repository: goharbor/trivy-adapter-photon repository: goharbor/trivy-adapter-photon
# tag the tag for Trivy adapter image # tag the tag for Trivy adapter image
tag: v2.1.3 tag: v2.1.6
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
# replicas the number of Pod replicas # replicas the number of Pod replicas
replicas: 1 replicas: 1
# debugMode the flag to enable Trivy debug mode with more verbose scanning log # debugMode the flag to enable Trivy debug mode with more verbose scanning log
debugMode: false debugMode: false
# vulnType a comma-separated list of vulnerability types. Possible values are `os` and `library`. # vulnType a comma-separated list of vulnerability types. Possible values are `os` and `library`.
vulnType: "os,library" vulnType: 'os,library'
# severity a comma-separated list of severities to be checked # severity a comma-separated list of severities to be checked
severity: "UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL" severity: 'UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL'
# ignoreUnfixed the flag to display only fixed vulnerabilities # ignoreUnfixed the flag to display only fixed vulnerabilities
ignoreUnfixed: false ignoreUnfixed: false
# insecure the flag to skip verifying registry certificate # insecure the flag to skip verifying registry certificate
...@@ -604,7 +604,7 @@ trivy: ...@@ -604,7 +604,7 @@ trivy:
# #
# You can create a GitHub token by following the instructions in # You can create a GitHub token by following the instructions in
# https://help.github.com/en/github/authenticating-to-github/creating-a-personal-access-token-for-the-command-line # https://help.github.com/en/github/authenticating-to-github/creating-a-personal-access-token-for-the-command-line
gitHubToken: "" gitHubToken: ''
# skipUpdate the flag to disable Trivy DB downloads from GitHub # skipUpdate the flag to disable Trivy DB downloads from GitHub
# #
# You might want to set the value of this flag to `true` in test or CI/CD environments to avoid GitHub rate limiting issues. # You might want to set the value of this flag to `true` in test or CI/CD environments to avoid GitHub rate limiting issues.
...@@ -628,10 +628,10 @@ notary: ...@@ -628,10 +628,10 @@ notary:
enabled: true enabled: true
server: server:
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
image: image:
repository: goharbor/notary-server-photon repository: goharbor/notary-server-photon
tag: v2.1.3 tag: v2.1.6
replicas: 1 replicas: 1
# resources: # resources:
# requests: # requests:
...@@ -639,10 +639,10 @@ notary: ...@@ -639,10 +639,10 @@ notary:
# cpu: 100m # cpu: 100m
signer: signer:
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
image: image:
repository: goharbor/notary-signer-photon repository: goharbor/notary-signer-photon
tag: v2.1.3 tag: v2.1.6
replicas: 1 replicas: 1
# resources: # resources:
# requests: # requests:
...@@ -659,7 +659,7 @@ notary: ...@@ -659,7 +659,7 @@ notary:
# The secret must contain keys named ca.crt, tls.crt and tls.key that # The secret must contain keys named ca.crt, tls.crt and tls.key that
# contain the CA, certificate and private key. # contain the CA, certificate and private key.
# They will be generated if not set. # They will be generated if not set.
secretName: "" secretName: ''
database: database:
# if external database is used, set "type" to "external" # if external database is used, set "type" to "external"
...@@ -667,12 +667,12 @@ database: ...@@ -667,12 +667,12 @@ database:
type: internal type: internal
internal: internal:
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
image: image:
repository: goharbor/harbor-db repository: goharbor/harbor-db
tag: v2.1.3 tag: v2.1.6
# The initial superuser password for internal database # The initial superuser password for internal database
password: "changeit" password: 'changeit'
# resources: # resources:
# requests: # requests:
# memory: 256Mi # memory: 256Mi
...@@ -681,14 +681,14 @@ database: ...@@ -681,14 +681,14 @@ database:
tolerations: [] tolerations: []
affinity: {} affinity: {}
external: external:
host: "192.168.0.1" host: '192.168.0.1'
port: "5432" port: '5432'
username: "user" username: 'user'
password: "password" password: 'password'
coreDatabase: "registry" coreDatabase: 'registry'
clairDatabase: "clair" clairDatabase: 'clair'
notaryServerDatabase: "notary_server" notaryServerDatabase: 'notary_server'
notarySignerDatabase: "notary_signer" notarySignerDatabase: 'notary_signer'
# "disable" - No SSL # "disable" - No SSL
# "require" - Always SSL (skip verification) # "require" - Always SSL (skip verification)
# "verify-ca" - Always SSL (verify that the certificate presented by the # "verify-ca" - Always SSL (verify that the certificate presented by the
...@@ -696,7 +696,7 @@ database: ...@@ -696,7 +696,7 @@ database:
# "verify-full" - Always SSL (verify that the certification presented by the # "verify-full" - Always SSL (verify that the certification presented by the
# server was signed by a trusted CA and the server host name matches the one # server was signed by a trusted CA and the server host name matches the one
# in the certificate) # in the certificate)
sslmode: "disable" sslmode: 'disable'
# The maximum number of connections in the idle connection pool. # The maximum number of connections in the idle connection pool.
# If it <=0, no idle connections are retained. # If it <=0, no idle connections are retained.
maxIdleConns: 50 maxIdleConns: 50
...@@ -713,10 +713,10 @@ redis: ...@@ -713,10 +713,10 @@ redis:
type: internal type: internal
internal: internal:
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
image: image:
repository: goharbor/redis-photon repository: goharbor/redis-photon
tag: v2.1.3 tag: v2.1.6
# resources: # resources:
# requests: # requests:
# memory: 256Mi # memory: 256Mi
...@@ -728,20 +728,20 @@ redis: ...@@ -728,20 +728,20 @@ redis:
# support redis, redis+sentinel # support redis, redis+sentinel
# addr for redis: <host_redis>:<port_redis> # addr for redis: <host_redis>:<port_redis>
# addr for redis+sentinel: <host_sentinel1>:<port_sentinel1>,<host_sentinel2>:<port_sentinel2>,<host_sentinel3>:<port_sentinel3> # addr for redis+sentinel: <host_sentinel1>:<port_sentinel1>,<host_sentinel2>:<port_sentinel2>,<host_sentinel3>:<port_sentinel3>
addr: "192.168.0.2:6379" addr: '192.168.0.2:6379'
# The name of the set of Redis instances to monitor, it must be set to support redis+sentinel # The name of the set of Redis instances to monitor, it must be set to support redis+sentinel
sentinelMasterSet: "" sentinelMasterSet: ''
# The "coreDatabaseIndex" must be "0" as the library Harbor # The "coreDatabaseIndex" must be "0" as the library Harbor
# used doesn't support configuring it # used doesn't support configuring it
coreDatabaseIndex: "0" coreDatabaseIndex: '0'
jobserviceDatabaseIndex: "1" jobserviceDatabaseIndex: '1'
registryDatabaseIndex: "2" registryDatabaseIndex: '2'
chartmuseumDatabaseIndex: "3" chartmuseumDatabaseIndex: '3'
clairAdapterIndex: "4" clairAdapterIndex: '4'
trivyAdapterIndex: "5" trivyAdapterIndex: '5'
password: "" password: ''
## Additional deployment annotations ## Additional deployment annotations
podAnnotations: {} podAnnotations: {}
commonLabels: commonLabels:
app.bd-apaas.com/cluster-component: registry app.bd-apaas.com/cluster-component: registry
\ No newline at end of file
...@@ -20,17 +20,17 @@ expose: ...@@ -20,17 +20,17 @@ expose:
auto: auto:
# The common name used to generate the certificate, it's necessary # The common name used to generate the certificate, it's necessary
# when the type isn't "ingress" # when the type isn't "ingress"
commonName: "" commonName: ''
secret: secret:
# The name of secret which contains keys named: # The name of secret which contains keys named:
# "tls.crt" - the certificate # "tls.crt" - the certificate
# "tls.key" - the private key # "tls.key" - the private key
secretName: "" secretName: ''
# The name of secret which contains keys named: # The name of secret which contains keys named:
# "tls.crt" - the certificate # "tls.crt" - the certificate
# "tls.key" - the private key # "tls.key" - the private key
# Only needed when the "expose.type" is "ingress". # Only needed when the "expose.type" is "ingress".
notarySecretName: "" notarySecretName: ''
ingress: ingress:
hosts: hosts:
core: hub core: hub
...@@ -41,10 +41,10 @@ expose: ...@@ -41,10 +41,10 @@ expose:
# set to `ncp` if using the NCP (NSX-T Container Plugin) ingress controller # set to `ncp` if using the NCP (NSX-T Container Plugin) ingress controller
controller: default controller: default
annotations: annotations:
ingress.kubernetes.io/ssl-redirect: "true" ingress.kubernetes.io/ssl-redirect: 'true'
ingress.kubernetes.io/proxy-body-size: "0" ingress.kubernetes.io/proxy-body-size: '0'
nginx.ingress.kubernetes.io/ssl-redirect: "true" nginx.ingress.kubernetes.io/ssl-redirect: 'true'
nginx.ingress.kubernetes.io/proxy-body-size: "0" nginx.ingress.kubernetes.io/proxy-body-size: '0'
clusterIP: clusterIP:
# The name of ClusterIP service # The name of ClusterIP service
name: harbor name: harbor
...@@ -80,7 +80,7 @@ expose: ...@@ -80,7 +80,7 @@ expose:
# The name of LoadBalancer service # The name of LoadBalancer service
name: harbor name: harbor
# Set the IP if the LoadBalancer supports assigning IP # Set the IP if the LoadBalancer supports assigning IP
IP: "" IP: ''
ports: ports:
# The service port Harbor listens on when serving with HTTP # The service port Harbor listens on when serving with HTTP
httpPort: 80 httpPort: 80
...@@ -116,65 +116,65 @@ internalTLS: ...@@ -116,65 +116,65 @@ internalTLS:
# 1) "auto" will generate cert automatically # 1) "auto" will generate cert automatically
# 2) "manual" need provide cert file manually in following value # 2) "manual" need provide cert file manually in following value
# 3) "secret" internal certificates from secret # 3) "secret" internal certificates from secret
certSource: "auto" certSource: 'auto'
# The content of trust ca, only available when `certSource` is "manual" # The content of trust ca, only available when `certSource` is "manual"
trustCa: "" trustCa: ''
# core related cert configuration # core related cert configuration
core: core:
# secret name for core's tls certs # secret name for core's tls certs
secretName: "" secretName: ''
# Content of core's TLS cert file, only available when `certSource` is "manual" # Content of core's TLS cert file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of core's TLS key file, only available when `certSource` is "manual" # Content of core's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# jobservice related cert configuration # jobservice related cert configuration
jobservice: jobservice:
# secret name for jobservice's tls certs # secret name for jobservice's tls certs
secretName: "" secretName: ''
# Content of jobservice's TLS key file, only available when `certSource` is "manual" # Content of jobservice's TLS key file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of jobservice's TLS key file, only available when `certSource` is "manual" # Content of jobservice's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# registry related cert configuration # registry related cert configuration
registry: registry:
# secret name for registry's tls certs # secret name for registry's tls certs
secretName: "" secretName: ''
# Content of registry's TLS key file, only available when `certSource` is "manual" # Content of registry's TLS key file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of registry's TLS key file, only available when `certSource` is "manual" # Content of registry's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# portal related cert configuration # portal related cert configuration
portal: portal:
# secret name for portal's tls certs # secret name for portal's tls certs
secretName: "" secretName: ''
# Content of portal's TLS key file, only available when `certSource` is "manual" # Content of portal's TLS key file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of portal's TLS key file, only available when `certSource` is "manual" # Content of portal's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# chartmuseum related cert configuration # chartmuseum related cert configuration
chartmuseum: chartmuseum:
# secret name for chartmuseum's tls certs # secret name for chartmuseum's tls certs
secretName: "" secretName: ''
# Content of chartmuseum's TLS key file, only available when `certSource` is "manual" # Content of chartmuseum's TLS key file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of chartmuseum's TLS key file, only available when `certSource` is "manual" # Content of chartmuseum's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# clair related cert configuration # clair related cert configuration
clair: clair:
# secret name for clair's tls certs # secret name for clair's tls certs
secretName: "" secretName: ''
# Content of clair's TLS key file, only available when `certSource` is "manual" # Content of clair's TLS key file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of clair's TLS key file, only available when `certSource` is "manual" # Content of clair's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# trivy related cert configuration # trivy related cert configuration
trivy: trivy:
# secret name for trivy's tls certs # secret name for trivy's tls certs
secretName: "" secretName: ''
# Content of trivy's TLS key file, only available when `certSource` is "manual" # Content of trivy's TLS key file, only available when `certSource` is "manual"
crt: "" crt: ''
# Content of trivy's TLS key file, only available when `certSource` is "manual" # Content of trivy's TLS key file, only available when `certSource` is "manual"
key: "" key: ''
# The persistence is enabled by default and a default StorageClass # The persistence is enabled by default and a default StorageClass
# is needed in the k8s cluster to provision volumes dynamicly. # is needed in the k8s cluster to provision volumes dynamicly.
...@@ -189,51 +189,51 @@ persistence: ...@@ -189,51 +189,51 @@ persistence:
# operation. Leaving it empty will delete PVCs after the chart deleted # operation. Leaving it empty will delete PVCs after the chart deleted
# (this does not apply for PVCs that are created for internal database # (this does not apply for PVCs that are created for internal database
# and redis components, i.e. they are never deleted automatically) # and redis components, i.e. they are never deleted automatically)
resourcePolicy: "keep" resourcePolicy: 'keep'
persistentVolumeClaim: persistentVolumeClaim:
registry: registry:
# Use the existing PVC which must be created manually before bound, # Use the existing PVC which must be created manually before bound,
# and specify the "subPath" if the PVC is shared with other components # and specify the "subPath" if the PVC is shared with other components
existingClaim: "" existingClaim: ''
# Specify the "storageClass" used to provision the volume. Or the default # Specify the "storageClass" used to provision the volume. Or the default
# StorageClass will be used(the default). # StorageClass will be used(the default).
# Set it to "-" to disable dynamic provisioning # Set it to "-" to disable dynamic provisioning
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
chartmuseum: chartmuseum:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
jobservice: jobservice:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
# If external database is used, the following settings for database will # If external database is used, the following settings for database will
# be ignored # be ignored
database: database:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 10Gi size: 10Gi
# If external Redis is used, the following settings for Redis will # If external Redis is used, the following settings for Redis will
# be ignored # be ignored
redis: redis:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 1Gi size: 1Gi
trivy: trivy:
existingClaim: "" existingClaim: ''
storageClass: "hostpath" storageClass: 'hostpath'
subPath: "" subPath: ''
accessMode: ReadWriteOnce accessMode: ReadWriteOnce
size: 5Gi size: 5Gi
# Define which storage backend is used for registry and chartmuseum to store # Define which storage backend is used for registry and chartmuseum to store
...@@ -338,15 +338,15 @@ updateStrategy: ...@@ -338,15 +338,15 @@ updateStrategy:
logLevel: info logLevel: info
# The initial password of Harbor admin. Change it from portal after launching Harbor # The initial password of Harbor admin. Change it from portal after launching Harbor
harborAdminPassword: "spaceIN511" harborAdminPassword: 'spaceIN511'
# The name of the secret which contains key named "ca.crt". Setting this enables the # The name of the secret which contains key named "ca.crt". Setting this enables the
# download link on portal to download the certificate of CA when the certificate isn't # download link on portal to download the certificate of CA when the certificate isn't
# generated automatically # generated automatically
caSecretName: "" caSecretName: ''
# The secret key used for encryption. Must be a string of 16 chars. # The secret key used for encryption. Must be a string of 16 chars.
secretKey: "IpTIscRIgmerlare" secretKey: 'IpTIscRIgmerlare'
# The proxy settings for updating clair vulnerabilities from the Internet and replicating # The proxy settings for updating clair vulnerabilities from the Internet and replicating
# artifacts from/to the registries that cannot be reached directly # artifacts from/to the registries that cannot be reached directly
...@@ -375,9 +375,9 @@ proxy: ...@@ -375,9 +375,9 @@ proxy:
nginx: nginx:
image: image:
repository: nginx repository: nginx
tag: v2.1.3 tag: v2.1.6
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
replicas: 1 replicas: 1
# resources: # resources:
# requests: # requests:
...@@ -392,9 +392,9 @@ nginx: ...@@ -392,9 +392,9 @@ nginx:
portal: portal:
image: image:
repository: harbor-portal repository: harbor-portal
tag: v2.1.3 tag: v2.1.6
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
replicas: 1 replicas: 1
# resources: # resources:
# requests: # requests:
...@@ -409,9 +409,9 @@ portal: ...@@ -409,9 +409,9 @@ portal:
core: core:
image: image:
repository: harbor-core repository: harbor-core
tag: v2.1.3 tag: v2.1.6
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
replicas: 1 replicas: 1
## Startup probe values ## Startup probe values
startupProbe: startupProbe:
...@@ -429,24 +429,24 @@ core: ...@@ -429,24 +429,24 @@ core:
# Secret is used when core server communicates with other components. # Secret is used when core server communicates with other components.
# If a secret key is not specified, Helm will generate one. # If a secret key is not specified, Helm will generate one.
# Must be a string of 16 chars. # Must be a string of 16 chars.
secret: "" secret: ''
# Fill the name of a kubernetes secret if you want to use your own # Fill the name of a kubernetes secret if you want to use your own
# TLS certificate and private key for token encryption/decryption. # TLS certificate and private key for token encryption/decryption.
# The secret must contain keys named: # The secret must contain keys named:
# "tls.crt" - the certificate # "tls.crt" - the certificate
# "tls.key" - the private key # "tls.key" - the private key
# The default key pair will be used if it isn't set # The default key pair will be used if it isn't set
secretName: "" secretName: ''
# The XSRF key. Will be generated automatically if it isn't specified # The XSRF key. Will be generated automatically if it isn't specified
xsrfKey: "" xsrfKey: ''
jobservice: jobservice:
image: image:
repository: harbor-jobservice repository: harbor-jobservice
tag: v2.1.3 tag: v2.1.6
replicas: 1 replicas: 1
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
maxJobWorkers: 10 maxJobWorkers: 10
# The logger for jobs: "file", "database" or "stdout" # The logger for jobs: "file", "database" or "stdout"
jobLogger: file jobLogger: file
...@@ -462,15 +462,15 @@ jobservice: ...@@ -462,15 +462,15 @@ jobservice:
# Secret is used when job service communicates with other components. # Secret is used when job service communicates with other components.
# If a secret key is not specified, Helm will generate one. # If a secret key is not specified, Helm will generate one.
# Must be a string of 16 chars. # Must be a string of 16 chars.
secret: "" secret: ''
registry: registry:
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
registry: registry:
image: image:
repository: registry repository: registry
tag: 2.7.1 tag: v2.7.1
resources: resources:
limits: limits:
memory: 4Gi memory: 4Gi
...@@ -479,7 +479,7 @@ registry: ...@@ -479,7 +479,7 @@ registry:
controller: controller:
image: image:
repository: harbor-registryctl repository: harbor-registryctl
tag: v2.1.3 tag: v2.1.6
# resources: # resources:
# requests: # requests:
...@@ -496,15 +496,15 @@ registry: ...@@ -496,15 +496,15 @@ registry:
# See: https://github.com/docker/distribution/blob/master/docs/configuration.md#http # See: https://github.com/docker/distribution/blob/master/docs/configuration.md#http
# If a secret key is not specified, Helm will generate one. # If a secret key is not specified, Helm will generate one.
# Must be a string of 16 chars. # Must be a string of 16 chars.
secret: "" secret: ''
# If true, the registry returns relative URLs in Location headers. The client is responsible for resolving the correct URL. # If true, the registry returns relative URLs in Location headers. The client is responsible for resolving the correct URL.
relativeurls: false relativeurls: false
credentials: credentials:
username: "harbor_registry_user" username: 'harbor_registry_user'
password: "harbor_registry_password" password: 'harbor_registry_password'
# If you update the username or password of registry, make sure use cli tool htpasswd to generate the bcrypt hash # If you update the username or password of registry, make sure use cli tool htpasswd to generate the bcrypt hash
# e.g. "htpasswd -nbBC10 $username $password" # e.g. "htpasswd -nbBC10 $username $password"
htpasswd: "harbor_registry_user:$2y$10$9L4Tc0DJbFFMB6RdSCunrOpTHdwhid4ktBJmLD00bYgqkkGOvll3m" htpasswd: 'harbor_registry_user:$2y$10$9L4Tc0DJbFFMB6RdSCunrOpTHdwhid4ktBJmLD00bYgqkkGOvll3m'
middleware: middleware:
enabled: false enabled: false
...@@ -516,22 +516,22 @@ registry: ...@@ -516,22 +516,22 @@ registry:
ipfilteredby: none ipfilteredby: none
# The secret key that should be present is CLOUDFRONT_KEY_DATA, which should be the encoded private key # The secret key that should be present is CLOUDFRONT_KEY_DATA, which should be the encoded private key
# that allows access to CloudFront # that allows access to CloudFront
privateKeySecret: "my-secret" privateKeySecret: 'my-secret'
chartmuseum: chartmuseum:
enabled: true enabled: true
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
# Harbor defaults ChartMuseum to returning relative urls, if you want using absolute url you should enable it by change the following value to 'true' # Harbor defaults ChartMuseum to returning relative urls, if you want using absolute url you should enable it by change the following value to 'true'
absoluteUrl: false absoluteUrl: false
image: image:
repository: harbor-chartmuseum repository: chartmuseum
tag: v2.1.3 tag: v0.12.0
storageSpec: storageSpec:
type: hostPath type: hostPath
emptyDir: {} emptyDir: {}
hostPath: hostPath:
root: /data root: /data
replicas: 1 replicas: 1
# resources: # resources:
# requests: # requests:
...@@ -546,19 +546,19 @@ chartmuseum: ...@@ -546,19 +546,19 @@ chartmuseum:
clair: clair:
enabled: true enabled: true
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
clair: clair:
image: image:
repository: harbor-clair repository: clair
tag: v2.1.3 tag: v2.1.7
# resources: # resources:
# requests: # requests:
# memory: 256Mi # memory: 256Mi
# cpu: 100m # cpu: 100m
adapter: adapter:
image: image:
repository: harbor-clair-adapter repository: harbor-scanner-clair
tag: v2.1.3 tag: v1.1.1
# resources: # resources:
# requests: # requests:
# memory: 256Mi # memory: 256Mi
...@@ -578,19 +578,19 @@ trivy: ...@@ -578,19 +578,19 @@ trivy:
enabled: true enabled: true
image: image:
# repository the repository for Trivy adapter image # repository the repository for Trivy adapter image
repository: harbor-trivy-adapter repository: harbor-scanner-trivy
# tag the tag for Trivy adapter image # tag the tag for Trivy adapter image
tag: v2.1.3 tag: v0.17.0
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
# replicas the number of Pod replicas # replicas the number of Pod replicas
replicas: 1 replicas: 1
# debugMode the flag to enable Trivy debug mode with more verbose scanning log # debugMode the flag to enable Trivy debug mode with more verbose scanning log
debugMode: false debugMode: false
# vulnType a comma-separated list of vulnerability types. Possible values are `os` and `library`. # vulnType a comma-separated list of vulnerability types. Possible values are `os` and `library`.
vulnType: "os,library" vulnType: 'os,library'
# severity a comma-separated list of severities to be checked # severity a comma-separated list of severities to be checked
severity: "UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL" severity: 'UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL'
# ignoreUnfixed the flag to display only fixed vulnerabilities # ignoreUnfixed the flag to display only fixed vulnerabilities
ignoreUnfixed: false ignoreUnfixed: false
# insecure the flag to skip verifying registry certificate # insecure the flag to skip verifying registry certificate
...@@ -610,7 +610,7 @@ trivy: ...@@ -610,7 +610,7 @@ trivy:
# #
# You can create a GitHub token by following the instructions in # You can create a GitHub token by following the instructions in
# https://help.github.com/en/github/authenticating-to-github/creating-a-personal-access-token-for-the-command-line # https://help.github.com/en/github/authenticating-to-github/creating-a-personal-access-token-for-the-command-line
gitHubToken: "" gitHubToken: ''
# skipUpdate the flag to disable Trivy DB downloads from GitHub # skipUpdate the flag to disable Trivy DB downloads from GitHub
# #
# You might want to set the value of this flag to `true` in test or CI/CD environments to avoid GitHub rate limiting issues. # You might want to set the value of this flag to `true` in test or CI/CD environments to avoid GitHub rate limiting issues.
...@@ -634,10 +634,10 @@ notary: ...@@ -634,10 +634,10 @@ notary:
enabled: true enabled: true
server: server:
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
image: image:
repository: harbor-notary-server repository: notary-server
tag: v2.1.3 tag: v0.6.1
replicas: 1 replicas: 1
# resources: # resources:
# requests: # requests:
...@@ -645,10 +645,10 @@ notary: ...@@ -645,10 +645,10 @@ notary:
# cpu: 100m # cpu: 100m
signer: signer:
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
image: image:
repository: harbor-notary-signer repository: notary-signer
tag: v2.1.3 tag: v0.6.1
replicas: 1 replicas: 1
# resources: # resources:
# requests: # requests:
...@@ -665,7 +665,7 @@ notary: ...@@ -665,7 +665,7 @@ notary:
# The secret must contain keys named ca.crt, tls.crt and tls.key that # The secret must contain keys named ca.crt, tls.crt and tls.key that
# contain the CA, certificate and private key. # contain the CA, certificate and private key.
# They will be generated if not set. # They will be generated if not set.
secretName: "" secretName: ''
database: database:
# if external database is used, set "type" to "external" # if external database is used, set "type" to "external"
...@@ -673,12 +673,12 @@ database: ...@@ -673,12 +673,12 @@ database:
type: internal type: internal
internal: internal:
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
image: image:
repository: harbor-db repository: harbor-db
tag: v2.1.3 tag: v2.1.6
# The initial superuser password for internal database # The initial superuser password for internal database
password: "spaceIN511" password: 'spaceIN511'
resources: resources:
limits: limits:
memory: 4Gi memory: 4Gi
...@@ -688,14 +688,14 @@ database: ...@@ -688,14 +688,14 @@ database:
tolerations: [] tolerations: []
affinity: {} affinity: {}
external: external:
host: "192.168.0.1" host: '192.168.0.1'
port: "5432" port: '5432'
username: "user" username: 'user'
password: "password" password: 'password'
coreDatabase: "registry" coreDatabase: 'registry'
clairDatabase: "clair" clairDatabase: 'clair'
notaryServerDatabase: "notary_server" notaryServerDatabase: 'notary_server'
notarySignerDatabase: "notary_signer" notarySignerDatabase: 'notary_signer'
# "disable" - No SSL # "disable" - No SSL
# "require" - Always SSL (skip verification) # "require" - Always SSL (skip verification)
# "verify-ca" - Always SSL (verify that the certificate presented by the # "verify-ca" - Always SSL (verify that the certificate presented by the
...@@ -703,7 +703,7 @@ database: ...@@ -703,7 +703,7 @@ database:
# "verify-full" - Always SSL (verify that the certification presented by the # "verify-full" - Always SSL (verify that the certification presented by the
# server was signed by a trusted CA and the server host name matches the one # server was signed by a trusted CA and the server host name matches the one
# in the certificate) # in the certificate)
sslmode: "disable" sslmode: 'disable'
# The maximum number of connections in the idle connection pool. # The maximum number of connections in the idle connection pool.
# If it <=0, no idle connections are retained. # If it <=0, no idle connections are retained.
maxIdleConns: 50 maxIdleConns: 50
...@@ -720,10 +720,10 @@ redis: ...@@ -720,10 +720,10 @@ redis:
type: internal type: internal
internal: internal:
# set the service account to be used, default if left empty # set the service account to be used, default if left empty
serviceAccountName: "" serviceAccountName: ''
image: image:
repository: redis repository: redis
tag: 6.0.9 tag: 6.2.6
# resources: # resources:
# requests: # requests:
# memory: 256Mi # memory: 256Mi
...@@ -735,20 +735,20 @@ redis: ...@@ -735,20 +735,20 @@ redis:
# support redis, redis+sentinel # support redis, redis+sentinel
# addr for redis: <host_redis>:<port_redis> # addr for redis: <host_redis>:<port_redis>
# addr for redis+sentinel: <host_sentinel1>:<port_sentinel1>,<host_sentinel2>:<port_sentinel2>,<host_sentinel3>:<port_sentinel3> # addr for redis+sentinel: <host_sentinel1>:<port_sentinel1>,<host_sentinel2>:<port_sentinel2>,<host_sentinel3>:<port_sentinel3>
addr: "192.168.0.2:6379" addr: '192.168.0.2:6379'
# The name of the set of Redis instances to monitor, it must be set to support redis+sentinel # The name of the set of Redis instances to monitor, it must be set to support redis+sentinel
sentinelMasterSet: "" sentinelMasterSet: ''
# The "coreDatabaseIndex" must be "0" as the library Harbor # The "coreDatabaseIndex" must be "0" as the library Harbor
# used doesn't support configuring it # used doesn't support configuring it
coreDatabaseIndex: "0" coreDatabaseIndex: '0'
jobserviceDatabaseIndex: "1" jobserviceDatabaseIndex: '1'
registryDatabaseIndex: "2" registryDatabaseIndex: '2'
chartmuseumDatabaseIndex: "3" chartmuseumDatabaseIndex: '3'
clairAdapterIndex: "4" clairAdapterIndex: '4'
trivyAdapterIndex: "5" trivyAdapterIndex: '5'
password: "" password: ''
## Additional deployment annotations ## Additional deployment annotations
podAnnotations: {} podAnnotations: {}
commonLabels: commonLabels:
app.bd-apaas.com/cluster-component: registry app.bd-apaas.com/cluster-component: registry
\ No newline at end of file
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment