Harbor 是一个用于存储、签名、扫描镜像,通过添加一些常用的功能如安全性、身份权限管理等来扩展 docker registry 项目,此外还支持在 registry 之 间复制镜像,还提供更加高级的安全功能,如用户管理、访问控制和活动审计等.
harbor认证原理过程如下图

安装 Harbor
Harbor 官方提供了对应的 Helm Chart 包,所以使用helm安装
首先下载 Harbor Chart 包到要安装的集群上
git clone https://github.com/goharbor/harbor-helm
切换到我们需要安装的分支
git checkout 1.1.0
values.yaml文件,我们通过覆盖该文件的属性来改变配置
expose:
# 设置暴露服务的方式。将类型设置为 ingress、clusterIP或nodePort补充对应部分的信息。
type: ingress
tls:
# 是否开启 tls,注意:如果类型是 ingress 并且tls被禁用,则在pull/push镜像时,则必须包含端口。详细查看文档:https://github.com/goharbor/harbor/issues/5291。
enabled: true
# 如果你想使用自己的 TLS 证书和私钥,请填这个 secret 的名称,这个 secret 必须包名为 tls.crt 和 tls.key 的证书和私钥文件,如果没有设置则会自动生成证书和私钥文件。
secretName: ""
# 默认 Notary 服务会使用上面相同的证书和私钥文件,如果你想用一个独立的则填充下面的字段,注意只有类型是 ingress 的时候才需要。
notarySecretName: ""
# common name 是用于生成证书的,当类型是 clusterIP 或者 nodePort 并且 secretName 为空的时候才需要
commonName: ""
ingress:
hosts:
core: core.harbor.domain
notary: notary.harbor.domain
annotations:
ingress.kubernetes.io/ssl-redirect: "true"
nginx.ingress.kubernetes.io/ssl-redirect: "true"
ingress.kubernetes.io/proxy-body-size: "0"
nginx.ingress.kubernetes.io/proxy-body-size: "0"
clusterIP:
# ClusterIP 服务的名称
name: harbor
ports:
httpPort: 80
httpsPort: 443
# Notary 服务监听端口,只有当 notary.enabled 设置为 true 的时候有效
notaryPort: 4443
nodePort:
# NodePort 服务名称
name: harbor
ports:
http:
port: 80
nodePort: 30002
https:
port: 443
nodePort: 30003
notary:
port: 4443
nodePort: 30004
# Harbor 核心服务外部访问 URL。主要用于:
# 1) 补全 portal 页面上面显示的 docker/helm 命令
# 2) 补全返回给 docker/notary 客户端的 token 服务 URL
# 格式:protocol://domain[:port]。
# 1) 如果 expose.type=ingress,"domain"的值就是 expose.ingress.hosts.core 的值
# 2) 如果 expose.type=clusterIP,"domain"的值就是 expose.clusterIP.name 的值
# 3) 如果 expose.type=nodePort,"domain"的值就是 k8s 节点的 IP 地址
# 如果在代理后面部署 Harbor,请将其设置为代理的 URL
externalURL: https://core.harbor.domain
# 默认情况下开启数据持久化,在k8s集群中需要动态的挂载卷默认需要一个StorageClass对象。
# 如果你有已经存在可以使用的持久卷,需要在"storageClass"中指定你的 storageClass 或者设置 "existingClaim"。
#
# 对于存储 docker 镜像和 Helm charts 包,你也可以用 "azure"、"gcs"、"s3"、"swift" 或者 "oss",直接在 "imageChartStorage" 区域设置即可
persistence:
enabled: true
# 设置成"keep"避免在执行 helm 删除操作期间移除 PVC,留空则在 chart 被删除后删除 PVC
resourcePolicy: "keep"
persistentVolumeClaim:
registry:
# 使用一个存在的 PVC(必须在绑定前先手动创建)
existingClaim: ""
# 指定"storageClass",或者使用默认的 StorageClass 对象,设置成"-"禁用动态分配挂载卷
storageClass: ""
subPath: ""
accessMode: ReadWriteOnce
size: 5Gi
chartmuseum:
existingClaim: ""
storageClass: ""
subPath: ""
accessMode: ReadWriteOnce
size: 5Gi
jobservice:
existingClaim: ""
storageClass: ""
subPath: ""
accessMode: ReadWriteOnce
size: 1Gi
# 如果使用外部的数据库服务,下面的设置将会被忽略
database:
existingClaim: ""
storageClass: ""
subPath: ""
accessMode: ReadWriteOnce
size: 1Gi
# 如果使用外部的 Redis 服务,下面的设置将会被忽略
redis:
existingClaim: ""
storageClass: ""
subPath: ""
accessMode: ReadWriteOnce
size: 1Gi
# 定义使用什么存储后端来存储镜像和 charts 包,详细文档地址:https://github.com/docker/distribution/blob/master/docs/configuration.md#storage
imageChartStorage:
# 正对镜像和chart存储是否禁用跳转,对于一些不支持的后端(例如对于使用minio的`s3`存储),需要禁用它。为了禁止跳转,只需要设置`disableredirect=true`即可,详细文档地址:https://github.com/docker/distribution/blob/master/docs/configuration.md#redirect
disableredirect: false
# 指定存储类型:"filesystem", "azure", "gcs", "s3", "swift", "oss",在相应的区域填上对应的信息。
# 如果你想使用 pv 则必须设置成"filesystem"类型
type: filesystem
filesystem:
rootdirectory: /storage
#maxthreads: 100
azure:
accountname: accountname
accountkey: base64encodedaccountkey
container: containername
#realm: core.windows.net
gcs:
bucket: bucketname
# The base64 encoded json file which contains the key
encodedkey: base64-encoded-json-key-file
#rootdirectory: /gcs/object/name/prefix
#chunksize: "5242880"
s3:
region: us-west-1
bucket: bucketname
#accesskey: awsaccesskey
#secretkey: awssecretkey
#regionendpoint: http://myobjects.local
#encrypt: false
#keyid: mykeyid
#secure: true
#v4auth: true
#chunksize: "5242880"
#rootdirectory: /s3/object/name/prefix
#storageclass: STANDARD
swift:
authurl: https://storage.myprovider.com/v3/auth
username: username
password: password
container: containername
#region: fr
#tenant: tenantname
#tenantid: tenantid
#domain: domainname
#domainid: domainid
#trustid: trustid
#insecureskipverify: false
#chunksize: 5M
#prefix:
#secretkey: secretkey
#accesskey: accesskey
#authversion: 3
#endpointtype: public
#tempurlcontainerkey: false
#tempurlmethods:
oss:
accesskeyid: accesskeyid
accesskeysecret: accesskeysecret
region: regionname
bucket: bucketname
#endpoint: endpoint
#internal: false
#encrypt: false
#secure: true
#chunksize: 10M
#rootdirectory: rootdirectory
imagePullPolicy: IfNotPresent
logLevel: debug
# Harbor admin 初始密码,Harbor 启动后通过 Portal 修改该密码
harborAdminPassword: "Harbor12345"
# 用于加密的一个 secret key,必须是一个16位的字符串
secretKey: "not-a-secure-key"
# 如果你通过"ingress"保留服务,则下面的Nginx不会被使用
nginx:
image:
repository: goharbor/nginx-photon
tag: v1.7.0
replicas: 1
# resources:
# requests:
# memory: 256Mi
# cpu: 100m
nodeSelector: {}
tolerations: []
affinity: {}
## 额外的 Deployment 的一些 annotations
podAnnotations: {}
portal:
image:
repository: goharbor/harbor-portal
tag: v1.7.0
replicas: 1
# resources:
# requests:
# memory: 256Mi
# cpu: 100m
nodeSelector: {}
tolerations: []
affinity: {}
podAnnotations: {}
core:
image:
repository: goharbor/harbor-core
tag: v1.7.0
replicas: 1
# resources:
# requests:
# memory: 256Mi
# cpu: 100m
nodeSelector: {}
tolerations: []
affinity: {}
podAnnotations: {}
adminserver:
image:
repository: goharbor/harbor-adminserver
tag: v1.7.0
replicas: 1
# resources:
# requests:
# memory: 256Mi
# cpu: 100m
nodeSelector: {}
tolerations: []
affinity: {}
podAnnotations: {}
jobservice:
image:
repository: goharbor/harbor-jobservice
tag: v1.7.0
replicas: 1
maxJobWorkers: 10
# jobs 的日志收集器:"file", "database" or "stdout"
jobLogger: file
# resources:
# requests:
# memory: 256Mi
# cpu: 100m
nodeSelector: {}
tolerations: []
affinity: {}
podAnnotations: {}
registry:
registry:
image:
repository: goharbor/registry-photon
tag: v2.6.2-v1.7.0
controller:
image:
repository: goharbor/harbor-registryctl
tag: v1.7.0
replicas: 1
nodeSelector: {}
tolerations: []
affinity: {}
podAnnotations: {}
chartmuseum:
enabled: true
image:
repository: goharbor/chartmuseum-photon
tag: v0.7.1-v1.7.0
replicas: 1
# resources:
# requests:
# memory: 256Mi
# cpu: 100m
nodeSelector: {}
tolerations: []
affinity: {}
podAnnotations: {}
clair:
enabled: true
image:
repository: goharbor/clair-photon
tag: v2.0.7-v1.7.0
replicas: 1
# 用于从 Internet 更新漏洞数据库的http(s)代理
httpProxy:
httpsProxy:
# clair 更新程序的间隔,单位为小时,设置为0来禁用
updatersInterval: 12
# resources:
# requests:
# memory: 256Mi
# cpu: 100m
nodeSelector: {}
tolerations: []
affinity: {}
podAnnotations: {}
notary:
enabled: true
server:
image:
repository: goharbor/notary-server-photon
tag: v0.6.1-v1.7.0
replicas: 1
# resources:
# requests:
# memory: 256Mi
# cpu: 100m
signer:
image:
repository: goharbor/notary-signer-photon
tag: v0.6.1-v1.7.0
replicas: 1
# resources:
# requests:
# memory: 256Mi
# cpu: 100m
nodeSelector: {}
tolerations: []
affinity: {}
podAnnotations: {}
database:
# 如果使用外部的数据库,则设置 type=external,然后填写 external 区域的一些连接信息
type: internal
internal:
image:
repository: goharbor/harbor-db
tag: v1.7.0
# 内部的数据库的初始化超级用户的密码
password: "changeit"
# resources:
# requests:
# memory: 256Mi
# cpu: 100m
nodeSelector: {}
tolerations: []
affinity: {}
external:
host: "192.168.0.1"
port: "5432"
username: "user"
password: "password"
coreDatabase: "registry"
clairDatabase: "clair"
notaryServerDatabase: "notary_server"
notarySignerDatabase: "notary_signer"
sslmode: "disable"
podAnnotations: {}
redis:
# 如果使用外部的 Redis 服务,设置 type=external,然后补充 external 部分的连接信息。
type: internal
internal:
image:
repository: goharbor/redis-photon
tag: v1.7.0
# resources:
# requests:
# memory: 256Mi
# cpu: 100m
nodeSelector: {}
tolerations: []
affinity: {}
external:
host: "192.168.0.2"
port: "6379"
# coreDatabaseIndex 必须设置为0
coreDatabaseIndex: "0"
jobserviceDatabaseIndex: "1"
registryDatabaseIndex: "2"
chartmuseumDatabaseIndex: "3"
password: ""
podAnnotations: {}
新建一个harbor-values.yaml文件
# 创建一个namespace
kubectl create ns kube-harbor
expose:
type: ingress
tls:
enabled: true
ingress:
hosts:
core: registry.2iwm.com
notary: notary.2iwm.com
annotations:
kubernetes.io/ingress.class: "traefik"
ingress.kubernetes.io/ssl-redirect: "true"
ingress.kubernetes.io/proxy-body-size: "0"
externalURL: https://registry.2iwm.com
persistence:
enabled: true
resourcePolicy: "keep"
persistentVolumeClaim:
registry:
storageClass: "harbor-data"
chartmuseum:
storageClass: "harbor-data"
jobservice:
storageClass: "harbor-data"
database:
storageClass: "harbor-data"
redis:
storageClass: "harbor-data"
为上面的这些服务创建好可用的 PVC 或者 StorageClass 对象,harbor-data.yaml
apiVersion: storage.k8s.io/v1
kind: StorageClass
metadata:
name: harbor-data
provisioner: fuseim.pri/ifs
先新建StorageClass 资源对象
kubectl create -f harbor-data.yaml
storageclass.storage.k8s.io "harbor-data" created
使用自定义values 文件安装
helm install --name harbor --replace -f harbor-values.yml . --namespace kube-harbor
NAME: harbor
LAST DEPLOYED: Mon Sep 23 12:43:14 2019
NAMESPACE: kube-harbor
STATUS: DEPLOYED
RESOURCES:
==> v1/ConfigMap
NAME DATA AGE
harbor-harbor-chartmuseum 23 1s
harbor-harbor-clair 1 1s
harbor-harbor-core 34 1s
harbor-harbor-jobservice 1 1s
harbor-harbor-notary-server 5 1s
harbor-harbor-registry 2 1s
==> v1/Deployment
NAME READY UP-TO-DATE AVAILABLE AGE
harbor-harbor-chartmuseum 0/1 1 0 1s
harbor-harbor-clair 0/1 1 0 1s
harbor-harbor-core 0/1 1 0 1s
harbor-harbor-jobservice 0/1 1 0 1s
harbor-harbor-notary-server 0/1 1 0 1s
harbor-harbor-notary-signer 0/1 1 0 1s
harbor-harbor-portal 0/1 0 0 1s
harbor-harbor-registry 0/1 0 0 1s
==> v1/PersistentVolumeClaim
NAME STATUS VOLUME CAPACITY ACCESS MODES STORAGECLASS AGE
harbor-harbor-chartmuseum Bound pvc-a8878c74-ddbc-11e9-aebc-000c29e1bf58 5Gi RWO harbor-data 1s
harbor-harbor-jobservice Bound pvc-a8883c25-ddbc-11e9-aebc-000c29e1bf58 1Gi RWO harbor-data 1s
harbor-harbor-registry Bound pvc-a889441d-ddbc-11e9-aebc-000c29e1bf58 5Gi RWO harbor-data 1s
==> v1/Pod(related)
NAME READY STATUS RESTARTS AGE
harbor-harbor-chartmuseum-6db6cf4d8f-ftn4x 0/1 ContainerCreating 0 1s
harbor-harbor-clair-c8dcc59b-m76xr 0/1 Pending 0 1s
harbor-harbor-core-6bc65954cc-n58g6 0/1 Pending 0 1s
harbor-harbor-database-0 0/1 Pending 0 0s
harbor-harbor-jobservice-6dbd584477-dvn9p 0/1 Pending 0 1s
harbor-harbor-notary-server-64fc9bf78d-kr4fg 0/1 Pending 0 1s
harbor-harbor-notary-signer-75c69b6f9-cwx5v 0/1 ContainerCreating 0 0s
harbor-harbor-portal-7c9b5747d6-j5kfs 0/1 ContainerCreating 0 0s
harbor-harbor-redis-0 0/1 Pending 0 0s
harbor-harbor-registry-5b657f558d-rqh8k 0/2 Pending 0 0s
==> v1/Secret
NAME TYPE DATA AGE
harbor-harbor-chartmuseum Opaque 1 1s
harbor-harbor-core Opaque 7 1s
harbor-harbor-database Opaque 1 1s
harbor-harbor-ingress kubernetes.io/tls 3 1s
harbor-harbor-jobservice Opaque 1 1s
harbor-harbor-registry Opaque 2 1s
==> v1/Service
NAME TYPE CLUSTER-IP EXTERNAL-IP PORT(S) AGE
harbor-harbor-chartmuseum ClusterIP 10.109.173.57 <none> 80/TCP 1s
harbor-harbor-clair ClusterIP 10.99.22.143 <none> 6060/TCP,6061/TCP 1s
harbor-harbor-core ClusterIP 10.101.80.94 <none> 80/TCP 1s
harbor-harbor-database ClusterIP 10.99.21.49 <none> 5432/TCP 1s
harbor-harbor-jobservice ClusterIP 10.107.44.228 <none> 80/TCP 1s
harbor-harbor-notary-server ClusterIP 10.108.88.203 <none> 4443/TCP 1s
harbor-harbor-notary-signer ClusterIP 10.100.157.250 <none> 7899/TCP 1s
harbor-harbor-portal ClusterIP 10.103.158.158 <none> 80/TCP 1s
harbor-harbor-redis ClusterIP 10.104.8.248 <none> 6379/TCP 1s
harbor-harbor-registry ClusterIP 10.109.61.93 <none> 5000/TCP,8080/TCP 1s
==> v1/StatefulSet
NAME READY AGE
harbor-harbor-database 0/1 0s
harbor-harbor-redis 0/1 0s
==> v1beta1/Ingress
NAME HOSTS ADDRESS PORTS AGE
harbor-harbor-ingress registry.2iwm.com,notary.2iwm.com 80, 443 0s
NOTES:
Please wait for several minutes for Harbor deployment to complete.
Then you should be able to visit the Harbor portal at https://registry.2iwm.com.
For more details, please visit https://github.com/goharbor/harbor.
kubectl get pod -n kube-harbor
NAME READY STATUS RESTARTS AGE
harbor-harbor-chartmuseum-6db6cf4d8f-ftn4x 1/1 Running 0 67m
harbor-harbor-clair-c8dcc59b-m76xr 1/1 Running 0 67m
harbor-harbor-core-6bc65954cc-n58g6 1/1 Running 0 67m
harbor-harbor-database-0 1/1 Running 0 67m
harbor-harbor-jobservice-6dbd584477-dvn9p 1/1 Running 0 67m
harbor-harbor-notary-server-64fc9bf78d-kr4fg 1/1 Running 0 67m
harbor-harbor-notary-signer-75c69b6f9-cwx5v 1/1 Running 0 67m
harbor-harbor-portal-7c9b5747d6-j5kfs 1/1 Running 0 67m
harbor-harbor-redis-0 1/1 Running 0 67m
harbor-harbor-registry-5b657f558d-rqh8k 2/2 Running 0 67m
# kubectl get ingress -n kube-harbor
NAME HOSTS ADDRESS PORTS AGE
harbor-harbor-ingress registry.2iwm.com,notary.2iwm.com 80, 443 69m
在本机hosts里面添加上registry.2iwm.com notary.2iwm.com 映射,在浏览器中输入registry.2iwm.com即可打开harbor页面

用户名 admin 密码 Harbor12345
使用docker客户端登录的时候,在 docker 启动配置文件/usr/lib/systemd/system/docker.service中修改ExecStart的启动参数,互虐证书的校验,重启docker。
ExecStart=/usr/bin/dockerd --insecure-registry registry.2iwm.com
docker login registry.2iwm.com
Username: admin
Password:
WARNING! Your password will be stored unencrypted in /root/.docker/config.json.
Configure a credential helper to remove this warning. See
https://docs.docker.com/engine/reference/commandline/login/#credentials-store
Login Succeeded
接下来就可以push、pull镜像了