Compare commits

...

3 Commits

Author SHA1 Message Date
miner e2167b6923
add proxy timeout for nginx https config (#2202)
Signed-off-by: my036811 <miner.yang@broadcom.com>
2025-06-09 15:07:37 +08:00
rkthtrifork ac65d7b4d6
added existingSecretAdminPassword to the values.yaml file (#2180)
Signed-off-by: rkthtrifork <rkth@trifork.com>
2025-05-06 15:49:31 +08:00
SoohwanKim ba600bc14f
Fix: fix bug where log level configuration was not applied (#2167)
Signed-off-by: SooHwan <soowh91@gmail.com>
Signed-off-by: SooHwan Kim <soowh91@gmail.com>
Co-authored-by: soowh91 <soowh91@uracle.co.kr>
2025-04-15 14:20:56 +08:00
3 changed files with 6 additions and 2 deletions

View File

@ -15,6 +15,8 @@ data:
JOBSERVICE_WEBHOOK_JOB_MAX_RETRY: "{{ .Values.jobservice.notification.webhook_job_max_retry }}" JOBSERVICE_WEBHOOK_JOB_MAX_RETRY: "{{ .Values.jobservice.notification.webhook_job_max_retry }}"
JOBSERVICE_WEBHOOK_JOB_HTTP_CLIENT_TIMEOUT: "{{ .Values.jobservice.notification.webhook_job_http_client_timeout }}" JOBSERVICE_WEBHOOK_JOB_HTTP_CLIENT_TIMEOUT: "{{ .Values.jobservice.notification.webhook_job_http_client_timeout }}"
LOG_LEVEL: "{{ .Values.logLevel }}"
{{- if has "jobservice" .Values.proxy.components }} {{- if has "jobservice" .Values.proxy.components }}
HTTP_PROXY: "{{ .Values.proxy.httpProxy }}" HTTP_PROXY: "{{ .Values.proxy.httpProxy }}"
HTTPS_PROXY: "{{ .Values.proxy.httpsProxy }}" HTTPS_PROXY: "{{ .Values.proxy.httpsProxy }}"

View File

@ -138,6 +138,8 @@ data:
proxy_set_header X-Forwarded-Proto $x_forwarded_proto; proxy_set_header X-Forwarded-Proto $x_forwarded_proto;
proxy_buffering off; proxy_buffering off;
proxy_request_buffering off; proxy_request_buffering off;
proxy_send_timeout 900;
proxy_read_timeout 900;
} }
location /service/ { location /service/ {

View File

@ -270,7 +270,7 @@ persistence:
# The initial password of Harbor admin. Change it from portal after launching Harbor # The initial password of Harbor admin. Change it from portal after launching Harbor
# or give an existing secret for it # or give an existing secret for it
# key in secret is given via (default to HARBOR_ADMIN_PASSWORD) # key in secret is given via (default to HARBOR_ADMIN_PASSWORD)
# existingSecretAdminPassword: existingSecretAdminPassword: ""
existingSecretAdminPasswordKey: HARBOR_ADMIN_PASSWORD existingSecretAdminPasswordKey: HARBOR_ADMIN_PASSWORD
harborAdminPassword: "Harbor12345" harborAdminPassword: "Harbor12345"
@ -626,7 +626,7 @@ core:
tokenCert: | tokenCert: |
# The XSRF key. Will be generated automatically if it isn't specified # The XSRF key. Will be generated automatically if it isn't specified
# While you specified, Please make sure it is 32 characters, otherwise would have validation issue at the harbor-core runtime # While you specified, Please make sure it is 32 characters, otherwise would have validation issue at the harbor-core runtime
# https://github.com/goharbor/harbor/pull/21154 # https://github.com/goharbor/harbor/pull/21154
xsrfKey: "" xsrfKey: ""
# If using existingSecret, the key is defined by core.existingXsrfSecretKey # If using existingSecret, the key is defined by core.existingXsrfSecretKey
existingXsrfSecret: "" existingXsrfSecret: ""