Skip to content

Commit be1d932

Browse files
authored
Merge branch 'main' into feat/ai-model-processor
2 parents 11106e9 + 5b320d3 commit be1d932

File tree

9 files changed

+610
-1
lines changed

9 files changed

+610
-1
lines changed

ADOPTERS.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,3 @@
11
# Harbor Adopters
22

3-
Please refer to our [Contributing Guide here](https://github.com/goharbor/harbor/blob/main/ADOPTERS.md)
3+
Please refer to our [Adopters here](https://github.com/goharbor/harbor/blob/main/ADOPTERS.md)
140 KB
Loading
29.9 KB
Loading
28 KB
Loading
282 KB
Loading
130 KB
Loading
85.4 KB
Loading

proposals/new/Redis-TLS-support.md

Lines changed: 35 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,35 @@
1+
# Proposal: Support Redis TLS -Phase1
2+
3+
Author: MinerYang
4+
5+
Discussion:
6+
* https://github.com/goharbor/harbor/issues/13223
7+
8+
9+
## Background
10+
While external redis been used for Harbor, allow users to secure their redis connection with Harbor components by SSL/TLS.
11+
12+
## Abstract
13+
With growing demand for secure Redis connections in cloud environments and it become a recommended best practice for an external managed redis services,like Azure cache for redis, Amzon ElasticCache or Redis in HA mode with Redis Sentinel, Harbor will support SSL/TLS encryption for external Redis connections, ensuring secure and reliable communication between Harbor services and Redis instances.
14+
15+
## Goals
16+
- Server-authentication for TLS connection of external Redis service
17+
18+
## Non-Goals
19+
- Internal Redis TLS support
20+
- mTLS(both server and client authentication) support for Redis service
21+
22+
**NOTE:**
23+
By default, standard [Redis uses mutual TLS](https://redis.io/docs/latest/operate/oss_and_stack/management/security/encryption/) and requires both server and clients to authenticate with valid certificates. However Harbor would not support mTLS in Phase-1. You may use `tls-auth-clients no` to disable client authentication.
24+
25+
## Implenmentation
26+
![redisTLS_compts](../images/redis-tls/compts-impl.png)
27+
28+
## Config via offline-installer
29+
Config external redis for harbor offline installer in `harbor.yml` file, we will use `tlsOptions.rootCA` to determine if enable the TLS connection and mount the redis CA to a system trusted directory.
30+
![redisTLS_compts](../images/redis-tls/offline-installer-config.png)
31+
32+
33+
## Config via harbor-helm
34+
Config external redis for harbor-helm in `values.yaml` file, we will use `tlsOptions.enable` to determine if it is a redis TLS connection, and opting `caBundleSecrets` for CA mount to system trusted directory. Users need concatenate their own redis CA with other certificates for all external service that needs a certificate authentications, and create the secret with the `ca.crt` key.
35+
![redisTLS_compts](../images/redis-tls/harbor-helm-config.png)

proposals/new/enhance_audit_log.md

Lines changed: 574 additions & 0 deletions
Large diffs are not rendered by default.

0 commit comments

Comments
 (0)