En

Harbor官网安全更新(2021-02-24)

来源:Harbor官网 发布日期:2021-02-24 阅读次数:6374 评论:0

基本信息

发布日期:2021-02-24(官方当地时间)

更新类型:安全更新

更新版本:v2.2.0

感知时间:2021-02-24 15:50:45

风险等级:未知

情报贡献:TSRC

更新标题

安全更新

更新详情

## What's New

### New Features
* **System Level Robot Account**
- Introduce system-level robot accounts to enable them to access multiple projects.
- Support for Aqua CSP Scanner
- Selective API access for robot accounts
- $sign removed from robot accounts names

* **Metrics & Observability**
Enable Harbor to expose performance & system information indicators to provide observability.

* **OIDC Admin Group**
Allows specifying a special privileged admin group for OIDC auth, achieving parity with LDAP auth

* **Additional Features**
- Migrate GC/Scan all/Tag Retention and Replication to task manager/scheduler.
- Enhance the proxy cache to support Google Container Registry(GCR), Elastic Container Registry(ECR), Azure Container Registry(Azure), Quay.io.
- Support Dell EMC ECS s3.
- Bump up Trivy 0.14, support pluggable scanner spec v1.1.(https://github.com/goharbor/pluggable-scanner-spec)
- Refine project manage & robot API to support both project ID & Name as indicator.
- Golang v1.15.6. Harbor is now built using Golang v1.15.6 as of this release.

### Upgrade Considerations
- **Certificate Impact**: Since Harbor is compiled by Golang v1.15.6, the certificates may need to be updated. Go `1.15.0` introduced changes to SSL/TLS connection validation which requires certificates to include a `SAN`. This field was not included in older certificates are generated by Harbor prepare script. For more information, see Go GitHub issue https://github.com/golang/go/issues/39568.

### Deprecations
- Deprecate built-in Clair. Users still have the option to install Clair in out-of-tree fashion by pairing with Harbor through its interrogation services framework.
- The ChartMuseum is scheduled to be deprecated in a future v2.4.0 release.

### Breaking Changes
- **API**: The `/systeminfo` API now displays less information when the request is triggered by an unauthenticated user. For details please refer to the following issue comment:
https://github.com/goharbor/harbor/issues/9149#issuecomment-733662106
- **Scan Report**: After upgrading to v2.2, all scan reports in the previous version have been deleted due to changes in the vulnerability database scheme. Please rescan the artifacts to obtain the reports.

## Resolved Issues
- [Full list of issues fixed in v2.2.0](https://github.com/goharbor/harbor/issues?q=is%3Aissue+label%3Atarget%2F2.2.0+is%3Aclosed)


## Contributors

* Will Sun
* Qian Deng
* Wang Yan
* He Weiwei
* danfengliu
* Daniel Jiang
* Wenkai Yin(尹文开)
* stonezdj(Daojun Zhang)
* Ziming
* Abigail McCarthy
* Chlins Zhang
* Dirk Mueller
* sluetze
* mmpei
* 疯魔慕薇
* Thoro
* Steven Zou
* Ángel Barrera
* Bo Shao
* Greg
* Sven Haardiek
* prahaladdarkin
* Flávio Ramalho
* KeisukeYamashita
* Daniel Pacak

软件描述

暂无

CVE编号

TSRC分析

暂无

业界资讯

暂无

评论

提交评论 您输入的评论有误,请重新输入