Skip to content

Bump github.com/goharbor/harbor from 1.7.2 to 2.4.3+incompatible in /TODO/jwt-to-rbac #11

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: master
Choose a base branch
from

Conversation

dependabot[bot]
Copy link

@dependabot dependabot bot commented on behalf of github Apr 3, 2023

Bumps github.com/goharbor/harbor from 1.7.2 to 2.4.3+incompatible.

Release notes

Sourced from github.com/goharbor/harbor's releases.

v2.4.3

What's Changed

Full Changelog: goharbor/harbor@v2.4.2...v2.4.3

v2.4.3-rc1

What's Changed

Full Changelog: goharbor/harbor@v2.4.2...v2.4.3-rc1

v2.4.2

Bug fixes / Improvements

  • LDAP user lost user group related privileges after upgrade to 2.4.x #16268
  • Add failure-tolerance for garbage collection #16344
  • Deprecate old version scan reports of trivy #16262
  • Support IP and Agent in trace for failed login #16447
  • Bump up Golang 1.17.7 and Trivy v0.24.2 #16417 #16484

Resolved Issues

v2.4.2-rc1

Bug fixes / Improvements

  • LDAP user lost user group related privileges after upgrade to 2.4.x #16268
  • Add failure-tolerance for gc #16344
  • Deprecate old version scan reports of trivy #16262
  • Support IP and Agent in trace for failed login #16447

... (truncated)

Changelog

Sourced from github.com/goharbor/harbor's changelog.

Changelog

v1.8.0 (2019-05-21)

Full list of issues fixed in v1.8.0

  • Support for OpenID Connect - OpenID Connect (OIDC) is an authentication layer on top of OAuth 2.0, allowing Harbor to verify the identity of users based on the authentication performed by an external authorization server or identity provider.
  • Robot accounts - Robot accounts can be configured to provide administrators with a token that can be granted appropriate permissions for pulling or pushing images. Harbor users can continue operating Harbor using their enterprise SSO credentials, and use robot accounts for CI/CD systems that perform Docker client commands.
  • Replication advancements - Harbor new version replication allows you to replicate your Harbor repository to and from non-Harbor registries. Harbor 1.8 expands on the Harbor-to-Harbor replication feature, adding the ability to replicate resources between Harbor and Docker Hub, Docker Registry, and Huawei Registry. This is enabled through both push and pull mode replication.
  • Health check API, showing detailed status and health of all Harbor components.
  • Support for defining cron-based scheduled tasks in the Harbor UI. Administrators can now use cron strings to define the schedule of a job. Scan, garbage collection and replication jobs are all supported. API explorer integration. End users can now explore and trigger Harbor’s API via the swagger UI nested inside Harbor’s UI.
  • Introduce a new master role to project, the role's permissions are more than developer and less than project admin.
  • Introduce harbor.yml as the replacement of harbor.cfg and refactor the prepare script to provide more flexibility to the installation process based on docker-compose
  • Enhancement of the Job Service engine to include webhook events, additional APIs for automation, and numerous bug fixes to improve the stability of the service.
  • Docker Registry upgraded to v2.7.1.

v1.7.5 (2019-04-02)

  • Bumped up Clair to v2.0.8
  • Fixed issues in supporting windows images. #6992 #6369
  • Removed user-agent check-in notification handler. #5729
  • Fixed the issue global search not working if chartmuseum is not installed #6753

v1.7.4 (2019-03-04)

Full list of issues fixed in v1.7.4

v1.7.1 (2019-01-07)

Full list of issues fixed in v1.7.1

v1.7.0 (2018-12-19)

  • Support deploy Harbor with Helm Chart, enables the user to have high availability of Harbor services, refer to the Installation and Configuration Guide.
  • Support on-demand Garbage Collection, enables the admin to configure run docker registry garbage collection manually or automatically with a cron schedule.
  • Support Image Retag, enables the user to tag image to different repositories and projects, this is particularly useful in cases when images need to be retagged programmatically in a CI pipeline.
  • Support Image Build History, makes it easy to see the contents of a container image, refer to the User Guide.
  • Support Logger customization, enables the user to customize STDOUT / STDERR / FILE / DB logger of running jobs.
  • Improve user experience of Helm Chart Repository:
    • Chart searching included in the global search results
    • Show chart versions total number in the chart list
    • Mark labels to helm charts
    • The latest version can be downloaded as default one on the chart list view
    • The chart can be deleted by deleting all the versions under it

v1.6.0 (2018-09-11)

  • Support manages Helm Charts: From version 1.6.0, Harbor is upgraded to be a composite cloud-native registry, which supports both image management and helm charts management.
  • Support LDAP group: User can import an LDAP/AD group to Harbor and assign project roles to it.
  • Replicate images with label filter: Use newly added label filter to narrow down the sourcing image list when doing image replication.
  • Migrate multiple databases to one unified PostgreSQL database.

v1.5.0 (2018-05-07)

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

Bumps [github.com/goharbor/harbor](https://github.com/goharbor/harbor) from 1.7.2 to 2.4.3+incompatible.
- [Release notes](https://github.com/goharbor/harbor/releases)
- [Changelog](https://github.com/goharbor/harbor/blob/main/CHANGELOG.md)
- [Commits](goharbor/harbor@v1.7.2...v2.4.3)

---
updated-dependencies:
- dependency-name: github.com/goharbor/harbor
  dependency-type: direct:production
...

Signed-off-by: dependabot[bot] <[email protected]>
@dependabot dependabot bot added the dependencies Pull requests that update a dependency file label Apr 3, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants