Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
47 commits
Select commit Hold shift + click to select a range
c93da7f
Add 400 code response in swagger.yaml for updateRegistry updateReplic…
yuzp1996 Jul 14, 2025
6c620dc
Update FixVersion and ScoreV3 (#22007)
strigazi Jul 15, 2025
19f4958
Add "status" of CVEs to artfact scan report (#22177)
reasonerjt Jul 16, 2025
01dba8a
Improve portal README.md formatting and clarity (#22173)
rgcr Jul 17, 2025
c83f2d1
chore: Updated RELEASE.md by updating Minor Release Support Map (#22145)
mooneeb Jul 17, 2025
440f53e
Add status field to the API on secyurityHub (#22182)
reasonerjt Jul 18, 2025
ebdfb54
Set MAX_JOB_DURATION_SECONDS from jobservice config.yml (#22116)
stonezdj Jul 18, 2025
0f67947
clean up project metadata for tag retention policy after deletion (#2…
MinerYang Jul 18, 2025
8007c2e
chore(deps): bump helm.sh/helm/v3 from 3.18.2 to 3.18.3 in /src (#22113)
dependabot[bot] Jul 21, 2025
71f2ea8
chore(deps): bump helm.sh/helm/v3 from 3.18.3 to 3.18.4 in /src (#22188)
dependabot[bot] Jul 21, 2025
e8c2e47
Remove testcase Open Image Scanners doc page (#22180)
stonezdj Jul 22, 2025
bb7162f
Don't always skip vuln check when artifact is not scannable (#22187)
reasonerjt Jul 22, 2025
ea4110c
Display download url for BUILD_PACKAGE action (#22197)
stonezdj Jul 23, 2025
de65768
add the replicaiton adapter whitelist (#22198)
wy65701436 Jul 23, 2025
ebc340a
fix: correct the permission of project maintainer role for webhook po…
chlins Jul 25, 2025
f15638c
update the orm filter func (#22208)
wy65701436 Jul 29, 2025
257afeb
bump golang version (#22205)
wy65701436 Jul 29, 2025
171d9b4
Add HTTP 409 error when creating robot account (#22201)
stonezdj Jul 29, 2025
70b03c9
feat: support raw format for CNAI model (#22040)
chlins Jul 29, 2025
6a1abab
The tag retention job failed with 403 error message (#22159)
stonezdj Jul 31, 2025
cc97ec0
remove extra build_base=false && pull_base_from_dockerhub=false check…
MinerYang Aug 7, 2025
50c4048
chore(deps): bump github.com/volcengine/volcengine-go-sdk from 1.1.19…
dependabot[bot] Aug 8, 2025
ce86b43
Delete local cache if the artifact doesn't exist in upstream registry…
stonezdj Aug 11, 2025
9f809f1
update the support list of proxy cache (#22237)
wy65701436 Aug 11, 2025
91d2fa6
bump go version (#22238)
wy65701436 Aug 11, 2025
2210373
feat: Single Active Replication (#21347)
bupd Aug 11, 2025
ebaa0c4
bump base verson for v2.15.0 (#22241)
wy65701436 Aug 12, 2025
a8336a7
build base images (#22249)
wy65701436 Aug 12, 2025
bd67811
Upload build logs to github artifact (#22223)
stonezdj Aug 13, 2025
e80b940
add prepare migration script for 2.14.0 (#22247)
MinerYang Aug 13, 2025
682eaaa
chore(deps): bump helm.sh/helm/v3 from 3.18.4 to 3.18.5 in /src (#22258)
dependabot[bot] Aug 15, 2025
aaff6fe
chore(deps): bump actions/checkout from 3 to 5 (#22250)
dependabot[bot] Aug 15, 2025
7be31c1
chore(deps): bump github.com/volcengine/volcengine-go-sdk from 1.1.25…
dependabot[bot] Aug 15, 2025
747d54d
Return the Resport when the scanner is unhealthy (#22255)
reasonerjt Aug 18, 2025
63b61d6
Refine the sql to query non empty repositories (#22269)
stonezdj Aug 21, 2025
da2e863
chore(deps): bump github.com/beego/beego/v2 from 2.3.6 to 2.3.8 in /s…
dependabot[bot] Aug 26, 2025
4729d15
chore(deps): bump github.com/prometheus/client_model from 0.6.1 to 0.…
dependabot[bot] Aug 27, 2025
aeea1a5
chore(deps): bump github.com/cloudevents/sdk-go/v2 from 2.15.2 to 2.1…
dependabot[bot] Aug 27, 2025
5a9c1f6
chore(deps): bump github.com/go-openapi/swag from 0.23.0 to 0.23.1 in…
dependabot[bot] Aug 27, 2025
dadc33b
chore(deps): bump github.com/volcengine/volcengine-go-sdk from 1.1.26…
dependabot[bot] Aug 27, 2025
1070e03
Update README.md (#48)
Vad1mo Dec 10, 2024
11c101c
Update README.md (#54)
Vad1mo Dec 10, 2024
dd36169
Merge branch 'next' into nest-merge
bupd Aug 28, 2025
c6f9c91
feat: daggerize harbor
bupd Aug 28, 2025
783f396
fix: dagger cmds
bupd Aug 28, 2025
f7bdfd2
feat: add publish pipeline with dagger
bupd Aug 28, 2025
aac2fd9
fix: pipeline
bupd Aug 28, 2025
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .buildbaselog
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,9 @@
* Add date here... Add signature here...
- Add your reason here...

* Aug 12 2025 <[email protected]>
- Refresh base image

* Oct 24 2024 <[email protected]>
- Refresh base image

Expand Down
4 changes: 4 additions & 0 deletions .dagger/.gitattributes
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
/dagger.gen.go linguist-generated
/internal/dagger/** linguist-generated
/internal/querybuilder/** linguist-generated
/internal/telemetry/** linguist-generated
5 changes: 5 additions & 0 deletions .dagger/.gitignore
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
/dagger.gen.go
/internal/dagger
/internal/querybuilder
/internal/telemetry
/.env
Comment on lines +1 to +5
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Ignore the real registry passwd to avoid committing secrets.

Add the concrete htpasswd path to this ignore list.

Apply:

 /dagger.gen.go
 /internal/dagger
 /internal/querybuilder
 /internal/telemetry
 /.env
+ /config/registry/passwd
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
/dagger.gen.go
/internal/dagger
/internal/querybuilder
/internal/telemetry
/.env
/dagger.gen.go
/internal/dagger
/internal/querybuilder
/internal/telemetry
/.env
/config/registry/passwd
🤖 Prompt for AI Agents
In .dagger/.gitignore around lines 1-5, the real registry htpasswd file is not
being ignored; add a concrete ignore entry for it. Edit .dagger/.gitignore and
add the line "/.dagger/registry.htpasswd" (or the exact filename you use for the
registry htpasswd) so the real registry password file is not committed.

115 changes: 115 additions & 0 deletions .dagger/README.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,115 @@
# Dagger Harbor Setup and Usage Guide

## Introduction

This guide explains how to use Dagger to build, run, and test a Harbor setup locally.

## Prerequisites

- Dagger installed
- Harbor source code available
- Generate `consts.go`

## Getting Started

### Generate `consts.go` file
```bash
go run ./.dagger/scripts/parseMakefile.go
```

### Step 1: Build and Spin Up Harbor Components Locally

Run the following command to build and start the necessary Harbor components inside Dagger:

```bash
dagger call run-dev up -v
```

This command will:

- Build the Harbor components.
- Spin up the Harbor backend inside Dagger, similar to running the entire Harbor server.
- Bind Harbor to port `8080`.

### Step 2: Start the Portal

After running the Harbor backend, you can move to the portal directory to spin up the Harbor portal:

```bash
cd ./src/portal
```

> **Note:** The current portal image has some issues.
So follow the instructions in the `./src/portal/README.md` for setup.

Make sure to configure the portal to connect to the Harbor backend by setting the `target-harbor-server` in the portal's configuration to:

```bash
http://localhost:8080
```

This ensures the portal connects to the Harbor running inside Dagger.

### Step 3: Running Harbor Locally

Once both Harbor backend and the portal are set up, you will have a working Harbor setup. You can now use this setup for building, running, and testing Harbor locally.

## Available Functions in Dagger

You can list all available functions in Dagger by running:

```bash
dagger functions
```

This will display a list of functions you can use. Currently, we have the following functions:

### 1. **publish-all-images**

Publishes all images in the registry.

Example usage:

```bash
dagger call publish-all-images --registry-username=harbor-cli --registry=demo.goharbor.io --registry-password=env:REGPASS --image-tags v3.0.0 --version v3.0.0 --debugbin=false --project-name=library/dagger-test -vvv
```

- `-vvv` flag is used for highly verbose output. You can remove this flag for a less verbose output.
- Feel free to change the version and registry flags according to your needs.

### 2. **publish-image**

Publishes a specific image package.

Example usage:

```bash
dagger call publish-image --registry-username=admin --registry=ttl.sh --registry-password=env:REGPASS --image-tags v3.2.2 --version v3.0 --pkg registryctl --debugbin=false --project-name=library/dagger-test -vvv -i
```

This will publish the `registryctl` package.

### 3. **build-binary**

Builds specific Harbor binaries for a given platform.

Example usage:

```bash
dagger call build-binary --pkg core --platform "linux/amd64" --version v2.12.2 --debugbin=false export --path=bin/harbor_core
```

This command will build the `core` package for the `linux/amd64` platform and export the binary to `harbor_core`.

#### Extras
Use these to pull the `dagger.json` and `.dagger` folder
In case if you want to use dagger in other branches this might be helpful.
Also while using this don't forget to Generate consts file based on the branch
```
oras pull bupd/harbor-dagger-dir:latest
oras pull bupd/harbor-dagger-json:latest
```

## Conclusion

By following the above steps, you can have a fully functional Harbor setup running inside Dagger. You can use this setup for local development and testing. The available Dagger functions like `publish-all-images`, `publish-image`, and `build-binary` make it easy to manage Harbor images and binaries.
7 changes: 7 additions & 0 deletions .dagger/config/core/app.conf
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
appname = Harbor
# runmode = prod
runmode = dev
enablegzip = true

[prod]
httpport = 8080
51 changes: 51 additions & 0 deletions .dagger/config/core/env
Original file line number Diff line number Diff line change
@@ -0,0 +1,51 @@
CONFIG_PATH=/etc/core/app.conf
UAA_CA_ROOT=/etc/core/certificates/uaa_ca.pem
_REDIS_URL_CORE=redis://redis:6379?idle_timeout_seconds=30
SYNC_QUOTA=true
_REDIS_URL_REG=redis://redis:6379/1?idle_timeout_seconds=30

LOG_LEVEL=debug
EXT_ENDPOINT=http://localhost
DATABASE_TYPE=postgresql
POSTGRESQL_HOST=postgresql
POSTGRESQL_PORT=5432
POSTGRESQL_USERNAME=postgres
POSTGRESQL_PASSWORD=root123
POSTGRESQL_DATABASE=registry
POSTGRESQL_SSLMODE=disable
Comment on lines +10 to +15
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

🛠️ Refactor suggestion

Also avoid committing DB credentials.

POSTGRESQL_PASSWORD=root123 should be injected, even in dev.

Apply:

-POSTGRESQL_PASSWORD=root123
+POSTGRESQL_PASSWORD=${POSTGRESQL_PASSWORD:-devpassword}
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
POSTGRESQL_HOST=postgresql
POSTGRESQL_PORT=5432
POSTGRESQL_USERNAME=postgres
POSTGRESQL_PASSWORD=root123
POSTGRESQL_DATABASE=registry
POSTGRESQL_SSLMODE=disable
POSTGRESQL_HOST=postgresql
POSTGRESQL_PORT=5432
POSTGRESQL_USERNAME=postgres
POSTGRESQL_PASSWORD=${POSTGRESQL_PASSWORD:-devpassword}
POSTGRESQL_DATABASE=registry
POSTGRESQL_SSLMODE=disable
🤖 Prompt for AI Agents
In .dagger/config/core/env around lines 10 to 15, the file currently contains a
committed plaintext DB password (POSTGRESQL_PASSWORD=root123); remove this
hardcoded credential and change the config to expect an injected secret instead
(e.g., reference an environment variable or secret placeholder), add a
.env.example or README entry showing the variable name, and ensure the real
password is provided at runtime via the CI/CD/secret manager or dagger secret
injection so no credentials are stored in the repo.

POSTGRESQL_MAX_IDLE_CONNS=100
POSTGRESQL_MAX_OPEN_CONNS=900
POSTGRESQL_CONN_MAX_LIFETIME=5m
POSTGRESQL_CONN_MAX_IDLE_TIME=0
REGISTRY_URL=http://registry:5000
PORTAL_URL=http://portal:8080
TOKEN_SERVICE_URL=http://core:8080/service/token
HARBOR_ADMIN_PASSWORD=Harbor12345
MAX_JOB_WORKERS=10
CORE_SECRET=D1fWkYKg6OQgISeP
JOBSERVICE_SECRET=gVQJX0AlVjstElN8
WITH_TRIVY=False
Comment on lines +25 to +27
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

⚠️ Potential issue

Hardcoded secrets committed to VCS (critical).

CORE_SECRET, JOBSERVICE_SECRET, and REGISTRY_CREDENTIAL_PASSWORD are real-looking secrets. Even for dev, keep them out of Git; load via Dagger Secrets, env injection, or a local .env not tracked.

Suggested minimal hardening (placeholders + env expansion):

-CORE_SECRET=D1fWkYKg6OQgISeP
-JOBSERVICE_SECRET=gVQJX0AlVjstElN8
+CORE_SECRET=${CORE_SECRET:?set CORE_SECRET via dev secrets}
+JOBSERVICE_SECRET=${JOBSERVICE_SECRET:?set JOBSERVICE_SECRET via dev secrets}
@@
-REGISTRY_CREDENTIAL_PASSWORD=TRJUhYbJgSjXZWAj3oLEet3ugJ3nAOk3
+REGISTRY_CREDENTIAL_PASSWORD=${REGISTRY_CREDENTIAL_PASSWORD:?set REGISTRY_CREDENTIAL_PASSWORD}

Follow-up:

  • Move this file to .dagger/config/core/env.example and .gitignore the real env.
  • Wire Dagger to pass secrets (e.g., WithSecretFile/WithEnvVariable).

I can provide a Dagger snippet to load these from the host or a secret store.

Also applies to: 37-37

🧰 Tools
🪛 Gitleaks (8.27.2)

25-25: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


26-26: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)

🤖 Prompt for AI Agents
.dagger/config/core/env lines 25-27 (and line 37) contain hardcoded secrets;
remove these real secret values and replace them with non-sensitive placeholders
(e.g., CORE_SECRET=${CORE_SECRET:-placeholder}) and entries referencing
environment expansion only, move the current file to
.dagger/config/core/env.example, add .dagger/config/core/env to .gitignore, and
update Dagger pipeline to inject the real secrets at runtime via Dagger secrets
or host env (e.g., WithSecretFile/WithEnvVariable) so that no real secrets are
committed to VCS.

CORE_URL=http://core:8080
CORE_LOCAL_URL=http://127.0.0.1:8080
JOBSERVICE_URL=http://jobservice:8080
TRIVY_ADAPTER_URL=http://trivy-adapter:8080
REGISTRY_STORAGE_PROVIDER_NAME=filesystem
READ_ONLY=false
RELOAD_KEY=
REGISTRY_CONTROLLER_URL=http://registryctl:8080
REGISTRY_CREDENTIAL_USERNAME=harbor_registry_user
REGISTRY_CREDENTIAL_PASSWORD=TRJUhYbJgSjXZWAj3oLEet3ugJ3nAOk3
CSRF_KEY=
ROBOT_SCANNER_NAME_PREFIX=FFTP6U3S
PERMITTED_REGISTRY_TYPES_FOR_PROXY_CACHE=docker-hub,harbor,azure-acr,ali-acr,aws-ecr,google-gcr,quay,docker-registry,github-ghcr,jfrog-artifactory

HTTP_PROXY=
HTTPS_PROXY=
NO_PROXY=db,localhost,redis,log,exporter,postgresql,trivy-adapter,portal,.internal,registry,127.0.0.1,jobservice,nginx,.local,core,registryctl

PORT=8080




QUOTA_UPDATE_PROVIDER=db
9 changes: 9 additions & 0 deletions .dagger/config/debug_entrypoint.sh
Original file line number Diff line number Diff line change
@@ -0,0 +1,9 @@
#!/bin/sh

# Execute the command (passed as $1 arg)
echo "Executing: dlv --headless=true --listen=0.0.0.0:4001 --accept-multiclient --log-output=debugger,debuglineerr,gdbwire,lldbout,rpc --log=true --continue --api-version=2 exec $1"

# Start the dlv process in the background
# /root/go/bin/dlv exec --headless --listen localhost:$2 $1
dlv --headless=true --listen=0.0.0.0:4001 --accept-multiclient --log-output=debugger,debuglineerr,gdbwire,lldbout,rpc --log=true --continue --api-version=2 exec $1
# dlv --headless=true --listen=0.0.0.0:4001 --accept-multiclient --log-output=debugger,debuglineerr,gdbwire,lldbout,rpc --log=true --api-version=2 attach $pid
47 changes: 47 additions & 0 deletions .dagger/config/jobservice/config.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,47 @@
# original config
---
#Protocol used to serve
protocol: "http"

#Server listening port
port: 8080

#Worker pool
worker_pool:
#Worker concurrency
workers: 10
backend: "redis"
#Additional config if use 'redis' backend
redis_pool:
#redis://[arbitrary_username:password@]ipaddress:port/database_index
redis_url: redis://redis:6379/2?idle_timeout_seconds=30
namespace: "harbor_job_service_namespace"
idle_timeout_second: 3600
#Loggers for the running job
job_loggers:
# The jobLoggers backend name, only support "STD_OUTPUT", "FILE" and/or "DB"
- name: "STD_OUTPUT"
level: "DEBUG" # INFO/DEBUG/WARNING/ERROR/FATAL
- name: "FILE"
level: "DEBUG"
settings: # Customized settings of logger
base_dir: "/var/log/jobs"
sweeper:
duration: 1 #days
settings: # Customized settings of sweeper
work_dir: "/var/log/jobs"

#Loggers for the job service
loggers:
- name: "STD_OUTPUT" # Same with above
level: "DEBUG"


reaper:
# the max time to wait for a task to finish, if unfinished after max_update_hours, the task will be mark as error, but the task will continue to run, default value is 24,
max_update_hours: 24
# the max time for execution in running state without new task created
max_dangling_hours: 168

# the max size of job log returned by API, default is 10M
max_retrieve_size_mb: 10
17 changes: 17 additions & 0 deletions .dagger/config/jobservice/env
Original file line number Diff line number Diff line change
@@ -0,0 +1,17 @@
CORE_SECRET=D1fWkYKg6OQgISeP
REGISTRY_URL=http://registry:5000
JOBSERVICE_SECRET=gVQJX0AlVjstElN8
CORE_URL=http://core:8080
Comment on lines +1 to +4
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Verification agent

🧩 Analysis chain

Remove committed secrets; inject via Dagger/CI secrets and rotate immediately.

CORE_SECRET, JOBSERVICE_SECRET, and REGISTRY_CREDENTIAL_PASSWORD are hardcoded. Even for local dev, this is a leakage vector and will trip gitleaks. Replace with placeholders and source real values from Dagger secrets or your CI secret store. Rotate any environments where these values were used.

Apply this diff to redact and document:

-CORE_SECRET=D1fWkYKg6OQgISeP
+## Inject via Dagger secret or env at runtime (e.g., dagger -e CORE_SECRET=...).
+CORE_SECRET=REPLACE_ME

-JOBSERVICE_SECRET=gVQJX0AlVjstElN8
+## Inject via Dagger secret or env at runtime.
+JOBSERVICE_SECRET=REPLACE_ME
...
-REGISTRY_CREDENTIAL_PASSWORD=TRJUhYbJgSjXZWAj3oLEet3ugJ3nAOk3
+## Inject via Dagger secret or env at runtime.
+REGISTRY_CREDENTIAL_PASSWORD=REPLACE_ME

To confirm no secrets remain:

If you want, I can provide a follow-up patch to:

  • move this file to env.example with placeholders,
  • load real values via .dagger/run_env.sh using dagger.Secret().AsEnvVariable(...).

Also applies to: 10-15


🏁 Script executed:

#!/bin/bash
# Fail on high-entropy strings resembling secrets (quick sweep).
rg -nP '(?i)(secret|passwd|password|token|apikey|key)\s*[:=]\s*[A-Za-z0-9+/=]{16,}' -C2

Length of output: 15970


Remove hardcoded secrets in .dagger/config/jobservice/env
The file still contains live values for CORE_SECRET and JOBSERVICE_SECRET (the previous scan missed hidden files by default). Replace them with placeholders, inject via Dagger/CI secrets at runtime, and rotate any environments where these were used. Update your secret-scan to include hidden files (e.g. rg --hidden -nP …) to confirm no high-entropy values remain. REGISTRY_URL and CORE_URL are service endpoints, not secrets. Consider renaming this to env.example and sourcing real values in your .dagger/run_env.sh.

.dagger/config/jobservice/env
-CORE_SECRET=D1fWkYKg6OQgISeP
+CORE_SECRET=REPLACE_ME
-JOBSERVICE_SECRET=gVQJX0AlVjstElN8
+JOBSERVICE_SECRET=REPLACE_ME
📝 Committable suggestion

‼️ IMPORTANT
Carefully review the code before committing. Ensure that it accurately replaces the highlighted code, contains no missing lines, and has no issues with indentation. Thoroughly test & benchmark the code to ensure it meets the requirements.

Suggested change
CORE_SECRET=D1fWkYKg6OQgISeP
REGISTRY_URL=http://registry:5000
JOBSERVICE_SECRET=gVQJX0AlVjstElN8
CORE_URL=http://core:8080
CORE_SECRET=REPLACE_ME
REGISTRY_URL=http://registry:5000
JOBSERVICE_SECRET=REPLACE_ME
CORE_URL=http://core:8080
🧰 Tools
🪛 Gitleaks (8.27.2)

1-1: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)


3-3: Detected a Generic API Key, potentially exposing access to various services and sensitive operations.

(generic-api-key)

🤖 Prompt for AI Agents
.dagger/config/jobservice/env lines 1-4 contain hardcoded secrets (CORE_SECRET
and JOBSERVICE_SECRET); replace those two values with placeholder variables
(e.g. CORE_SECRET_PLACEHOLDER, JOBSERVICE_SECRET_PLACEHOLDER) and remove any
real secret material, ensure REGISTRY_URL and CORE_URL remain as service
endpoints or placeholders if desired; wire the real secrets into the pipeline by
reading them from Dagger/CI secret injection at runtime (update
.dagger/run_env.sh to source injected secrets), rotate any environment
credentials that used the leaked values, rename this file to
.dagger/config/jobservice/env.example (or add a copy) so it no longer stores
real secrets, and update your secret-scan command to include hidden files (for
example use ripgrep with --hidden) to verify no high-entropy values remain.

REGISTRY_CONTROLLER_URL=http://registryctl:8080
JOBSERVICE_WEBHOOK_JOB_MAX_RETRY=3
JOBSERVICE_WEBHOOK_JOB_HTTP_CLIENT_TIMEOUT=3


HTTP_PROXY=
HTTPS_PROXY=
NO_PROXY=db,localhost,redis,log,exporter,postgresql,trivy-adapter,portal,.internal,registry,127.0.0.1,jobservice,nginx,.local,core,registryctl
REGISTRY_CREDENTIAL_USERNAME=harbor_registry_user
REGISTRY_CREDENTIAL_PASSWORD=TRJUhYbJgSjXZWAj3oLEet3ugJ3nAOk3



42 changes: 42 additions & 0 deletions .dagger/config/portal/nginx.conf
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
# original conf
worker_processes auto;
pid /tmp/nginx.pid;

events {
worker_connections 1024;
}

http {

client_body_temp_path /tmp/client_body_temp;
proxy_temp_path /tmp/proxy_temp;
fastcgi_temp_path /tmp/fastcgi_temp;
uwsgi_temp_path /tmp/uwsgi_temp;
scgi_temp_path /tmp/scgi_temp;

server {
listen 8080;
server_name localhost;

root /usr/share/nginx/html;
index index.html index.htm;
include /etc/nginx/mime.types;

gzip on;
gzip_min_length 1000;
gzip_proxied expired no-cache no-store private auth;
gzip_types text/plain text/css application/json application/javascript application/x-javascript text/xml application/xml application/xml+rss text/javascript;

location /devcenter-api-2.0 {
try_files $uri $uri/ /swagger-ui-index.html;
}

location / {
try_files $uri $uri/ /index.html;
}

location = /index.html {
add_header Cache-Control "no-store, no-cache, must-revalidate";
}
}
}
Loading
Loading