Having issue while pushing the image to self-hosted harbor registry

Hi Everyone I have a self hosted harbor registry using Docker-Compose and while pushing the image getting the error as

error parsing HTTP 413 response body: invalid character ‘<’ looking for beginning of value: “\r\n413 Request Entity Too Large\r\n\r\n

413 Request Entity Too Large

\r\n
cloudflare\r\n\r\n\r\n”

nginx configuration of Harbor
worker_processes auto;
pid /tmp/nginx.pid;

events {
worker_connections 3096;
use epoll;
multi_accept on;
}

http {
client_body_temp_path /tmp/client_body_temp;
proxy_temp_path /tmp/proxy_temp;
fastcgi_temp_path /tmp/fastcgi_temp;
uwsgi_temp_path /tmp/uwsgi_temp;
scgi_temp_path /tmp/scgi_temp;
tcp_nodelay on;
include /etc/nginx/conf.d/*.upstream.conf;

this is necessary for us to be able to disable request buffering in all cases

proxy_http_version 1.1;

upstream core {
server core:8080;
}

upstream portal {
server portal:8080;
}

log_format timed_combined '$remote_addr - ’
'“$request” $status $body_bytes_sent ’
'“$http_referer” “$http_user_agent” ’
‘$request_time $upstream_response_time $pipe’;

access_log /dev/stdout timed_combined;

map $http_x_forwarded_proto $x_forwarded_proto {
default $http_x_forwarded_proto;
“” $scheme;
}

include /etc/nginx/conf.d/*.server.conf;

server {
listen 8443 ssl;

server_name harbordomain.com;

server_tokens off;
# SSL
ssl_certificate /etc/cert/server.crt;
ssl_certificate_key /etc/cert/server.key;

# Recommendations from https://raymii.org/s/tutorials/Strong_SSL_Security_On_nginx.html
ssl_protocols TLSv1.2 TLSv1.3;
ssl_ciphers '!aNULL:kECDH+AESGCM:ECDH+AESGCM:RSA+AESGCM:kECDH+AES:ECDH+AES:RSA+AES:';
ssl_prefer_server_ciphers on;
ssl_session_cache shared:SSL:10m;

# disable any limits to avoid HTTP 413 for large image uploads
#client_max_body_size 0;

# required to avoid HTTP 411: see Issue #1486 (https://github.com/docker/docker/issues/1486)
#chunked_transfer_encoding on;

# Add extra headers
add_header Strict-Transport-Security "max-age=31536000; includeSubdomains; preload";
add_header X-Frame-Options DENY;
add_header Content-Security-Policy "frame-ancestors 'none'";

# customized location config file can place to /etc/nginx dir with prefix harbor.https. and suffix .conf
include /etc/nginx/conf.d/harbor.https.*.conf;

location / {
  proxy_pass http://portal/;
  proxy_set_header Host $http_host;
  proxy_set_header X-Real-IP $remote_addr;
  proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
  proxy_set_header X-Forwarded-Proto $x_forwarded_proto;

  proxy_cookie_path / "/; HttpOnly; Secure";

  proxy_buffering off;
  proxy_request_buffering off;
}

location /c/ {
  proxy_pass http://core/c/;
  proxy_set_header Host $host;
  proxy_set_header X-Real-IP $remote_addr;
  proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
  proxy_set_header X-Forwarded-Proto $x_forwarded_proto;

  proxy_cookie_path / "/; Secure";

  proxy_buffering off;
  proxy_request_buffering off;
}

location /api/ {
  proxy_pass http://core/api/;
  proxy_set_header Host $host;
  proxy_set_header X-Real-IP $remote_addr;
  proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
  proxy_set_header X-Forwarded-Proto $x_forwarded_proto;

  proxy_cookie_path / "/; Secure";

  proxy_buffering off;
  proxy_request_buffering off;
}

location /v1/ {
  return 404;
}

location /v2/ {
  proxy_pass http://core/v2/;
  proxy_set_header Host $http_host;
  proxy_set_header X-Real-IP $remote_addr;
  proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
  proxy_set_header X-Forwarded-Proto $x_forwarded_proto;
  proxy_buffering off;
  proxy_request_buffering off;
  proxy_send_timeout 900;
  proxy_read_timeout 900;
}

location /service/ {
  proxy_pass http://core/service/;
  proxy_set_header Host $http_host;
  proxy_set_header X-Real-IP $remote_addr;
  proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for;
  proxy_set_header X-Forwarded-Proto $x_forwarded_proto;

  proxy_cookie_path / "/; Secure";

  proxy_buffering off;
  proxy_request_buffering off;
}

location /service/notifications {
  return 404;
}

}
server {
listen 8080;
#server_name harbordomain.com;
return 308 https://$host:443$request_uri;
}
}

Hi @amitchoudhary

disable any limits to avoid HTTP 413 for large image uploads

#client_max_body_size 0;

Setting this to some appropriate value could help you.

sure will try and let you know

hi @Santosh_KodeKloud it worked
Thanks