-
Notifications
You must be signed in to change notification settings - Fork 205
HIP: Helm support Container Tools configuration (auth.json, registries.conf, etc) for OCI registry access management
#391
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Changes from 3 commits
1b89550
6335ac4
7588b79
850727a
b96cb0f
b00f334
ec384fb
7bd9734
5b21eee
8dce6d1
c1717df
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,193 @@ | ||
| --- | ||
| hip: 9999 | ||
| title: "registries.conf support for OCI registry management" | ||
| authors: [ "George Jenkins <gvjenkins@gmail.com>", "Andrew Block <andy.block@gmail.com>" ] | ||
| created: "2025-02-16" | ||
| type: "feature" | ||
| status: "draft" | ||
| helm-version: "4" | ||
| --- | ||
|
|
||
| ## Abstract | ||
|
|
||
| [registries.conf][registries-conf] (and related) are an alternative specification for managing client OCI registry configuration that supports more advanced features, compared to Docker's `docker/config.json` that Helm currently uses today. | ||
|
|
||
| This HIP focuses on the initial implementation of supporting `registries.conf` / [auth.json][auth-json] to supersede `docker/config.json` within Helm via ORAS. | ||
| Today, `auth.json` provides the equivalent functionality to `docker/config.json` for storing OCI registry credentials. | ||
| Further HIPs will be created to expose additional functionality based on utilizing `registries.conf`. | ||
|
|
||
| [registries-conf]: <https://github.com/containers/container-libs/blob/main/image/docs/containers-registries.conf.5.md> "registries.conf specification" | ||
| [auth-json]: <https://github.com/containers/container-libs/blob/main/images/docs/containers-auth.json.5.md> "auth.json specification" | ||
|
|
||
| <!-- | ||
| Note: `registries.conf` is the reference used herein to refer to both `registries.conf` and `auth.json` and related containers/container-lib client registries configuration files: | ||
| <https://github.com/containers/container-libs/blob/main/image/docs/>. | ||
| While Helm will not support most of these immediately, this HIP lays the groundwork for future features to utilize these. | ||
| --> | ||
|
|
||
| ## Motivation | ||
|
|
||
| Helm uses Docker's `docker/config.json` to store client OCI registry configuration today. | ||
| Configuration here is limited to mapping a registry domain to authentication credentials. | ||
|
|
||
| `registries.conf` provides much more advanced functionality for client OCI registry management than `docker/config.json`. | ||
| Notably: | ||
|
|
||
| - support for repository prefixes (allowing different credentials for different prefixes) | ||
| - registry mirrors | ||
| - registry "aliasing"—features | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Add:
Member
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. added |
||
| - allowing/denying registries | ||
|
|
||
| Helm intends to introduce features that utilize these functionalities. | ||
| Supporting `registries.conf` would enable these features without requiring Helm to create or implement its own mechanisms. | ||
| This is possible because `registries.conf` has been standardized by the CNCF-hosted [Podman container tools project](https://www.cncf.io/projects/podman-container-tools/). | ||
|
|
||
| ## Rationale | ||
|
|
||
| Utilizing an existing specification and libraries enables Helm to immediately build upon an existing standard, rather than inventing its own convention. | ||
|
|
||
| `registries.conf` was picked as being a format intended for consumption beyond the Docker application container ecosystem. | ||
|
|
||
| ORAS (the library Helm uses for supporting OCI functionality) has planned support for `registries.conf` client OCI registry management. | ||
|
|
||
| Helm will fall back or prefer to `docker/config.json` for registry authentication (see below for options) to ensure existing user workflows remain functional. | ||
|
|
||
| ## Specification | ||
|
|
||
| When enabled, Helm will utilize the `registries.conf` specification when determining OCI registry information and `auth.json` for registry credentials: | ||
| <https://github.com/containers/container-libs/blob/main/image/docs/containers-registries.conf.5.md> | ||
| <https://github.com/containers/container-libs/blob/main/images/docs/containers-auth.json.5.md> | ||
|
|
||
| Helm will write to `registries.conf` / `auth.json`, should either of these files exist, when performing OCI registry operations that modify client OCI registry configuration (e.g., `helm registry login`). As long as the operation can be supported by `docker/config.json`, Helm will dual-write to `docker/config.json` for compatibility purposes. Dual-write will be removed in a future version of Helm, and Helm will write only to `registries.conf` / `auth.json`. | ||
|
|
||
| Helm will use the same filepath ordering when searching for matching OCI entries in `registries.conf` and credentials in `auth.json` as described in the respective specifications. | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This says Helm will use "the same filepath ordering ... as described in the respective specifications", but the text below only enumerates the primary There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. FWIW the There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. The underlying oras-go code should and will follow the current approach and it might be nice to also support thisnew approach. I think it would be best if Helm did the same. |
||
|
|
||
| `registries.conf`: | ||
|
|
||
| 1. `$HOME/.config/containers/registries.conf` if it exists | ||
| 2. Otherwise `/etc/containers/registries.conf` | ||
|
|
||
| `auth.json`: | ||
|
|
||
| 1. Location specified in environment variable `REGISTRY_AUTH_FILE` if set | ||
|
Member
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. need to consider that https://github.com/helm/community/pull/391/files#r1978342074 |
||
| 2. `${XDG_RUNTIME_DIR}/containers/auth.json` on Linux; `$HOME/.config/containers/auth.json` on Windows and macOS | ||
|
|
||
| Helm will use ORAS v3 for updating (and reading) `registries.conf` / `auth.json`. | ||
| Helm must utilize any `credHelpers` specified in `auth.json`. | ||
|
|
||
| If reading a registry configuration from `registries.conf` or `auth.json` results in a configuration that Helm does not support, Helm must ignore that entry (e.g., a `location` field or non-empty URI path). | ||
|
|
||
| If an error occurs while reading `registries.conf` or `auth.json`, Helm must report an error to the user. Otherwise, users who expect configuration from `registries.conf` / `auth.json` to be effective may encounter unexpected fallback behavior. | ||
|
|
||
| Helm must expect (and even encourage) users to utilize other tooling to manage `registries.conf`. | ||
|
|
||
| ## `registries.conf`/`auth.json` vs. `docker/config.json` preference | ||
gjenkins8 marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| To manage the release, Helm will introduce an environment variable `HELM_EXPERIMENTAL_OCI_REGISTRIES_CONF`. | ||
| Initially, when unset or set to `false`, Helm will continue to use only `docker/config.json`. | ||
gjenkins8 marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
| When set to `true`, Helm will enable `registries.conf` / `auth.json` support as described herein. | ||
|
|
||
| Once stable: | ||
|
|
||
| 1. Helm will default the unset behavior of `HELM_EXPERIMENTAL_OCI_REGISTRIES_CONF` to enable `registries.conf` / `auth.json` support. | ||
| Then eventually remove the environment variable altogether. | ||
| 2. If necessary, as determined by community feedback, Helm will introduce an environment variable `HELM_OCI_AUTH_CONFIG_PREFERENCE=registriesconf|docker` to control the preference order used when resolving OCI registries configuration (including credentials). | ||
| The default value of `HELM_OCI_AUTH_CONFIG_PREFERENCE` will be determined based on community feedback. | ||
|
|
||
| If `docker` is the default, Helm users who expect features from `registries.conf` or `auth.json` to be effective will instead have their configuration determined by `docker/config.json`. | ||
| If `registriesconf` is the default, Helm users with erroneous `registries.conf` or `auth.json` configurations will experience authentication failures to OCI registries until they correct their configuration. | ||
|
|
||
| Introducing an `HELM_OCI_AUTH_CONFIG_PREFERENCE` variable will add complexity for Helm users and should only be implemented if necessary. That is, defaulting to `registriesconf` would cause significant user disruption. | ||
|
|
||
| ### Example: basic login | ||
|
|
||
| For example, a registry login command: | ||
|
|
||
| ```bash | ||
| helm registry login "registry.example.com" --username foo --password bar | ||
| ``` | ||
|
|
||
| Will result in the `auth.json` excerpt: | ||
|
|
||
| ```json | ||
| # auth.json | ||
| "auths": { | ||
| ... | ||
| "registry.example.com/theprefix": { | ||
| "auth": "Zm9vOmJhcgo=" | ||
| } | ||
| } | ||
| ``` | ||
|
|
||
| <!-- | ||
| ### Example: Remapped registry | ||
|
|
||
| ```toml | ||
| # registries.conf | ||
| [[registry]] | ||
| prefix = "registry.example.com/theprefix" | ||
| location = "internal-registry-for-example.com/myteam/theprefix" | ||
| ``` | ||
|
|
||
| ```json | ||
| # auth.json | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. For better or worse, That might be a fairly disruptive change to users of “login”, so it probably should be discussed as such. |
||
| "auths": { | ||
| ... | ||
| "internal-registry-for-example.com/myteam/theprefix": { | ||
| "auth": "Zm9vOmJhcgo=" | ||
mattfarina marked this conversation as resolved.
Show resolved
Hide resolved
|
||
| } | ||
| } | ||
| ``` | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Do you want to mention There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I guess along these lines, hopefully
Member
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. right, I want to focus this HIP on initial And leave extending to support future functionality to either:
|
||
| --> | ||
|
|
||
| ## Backwards compatibility | ||
|
|
||
| Helm's fallback to Docker's registry configuration ensures the vast majority of existing user workflows remain the same. | ||
|
|
||
| However, there are three potential incompatibility scenarios: | ||
|
|
||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I think there is another possibility here where the user doesn't have a
Member
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. yeah, when I originally wrote this, I thought https://github.com/helm/community/pull/391/files#r1978339008 mentions the same I have (significantly) reworked the language to include |
||
| 1. A corrupt `registries.conf` / `auth.json` will cause an error for existing workflows | ||
| 2. An invalid or incompatible with Helm `registries.conf` / `auth.json` entry for the given OCI registry will cause the user's workflow to fail | ||
| 3. Helm’s preference for `registries.conf` / `auth.json` will break users who assume credentials are stored in Docker’s registry configuration | ||
|
|
||
| The first two can be mitigated by users ensuring their system's `registries.conf` is valid, and only includes configuration options Helm supports for the registries they plan to use with Helm. | ||
|
|
||
| The last is mitigated by not using `registries.conf` / `auth.json` initially unless these exist on the user's system. Finally, defaulting to `HELM_OCI_AUTH_CONFIG_PREFERENCE=docker` as the default, if necessary, will retain full compatibility with existing workflows. | ||
|
|
||
| ## Security implications | ||
|
|
||
| `registries.conf` / `auth.json` introduces a new mechanism for storing OCI credentials, which may introduce credential management vulnerabilities specific to `registries.conf` / `auth.json`. | ||
|
|
||
| ## How to teach this | ||
|
|
||
| Helm's documentation will need to be updated with details of Helm's `registries.conf` / `auth.json` support and fallback to `docker/config.json`. | ||
gjenkins8 marked this conversation as resolved.
Outdated
Show resolved
Hide resolved
|
||
|
|
||
| ## Reference implementation | ||
|
|
||
| - TODO: link to ORAS v3 `registries.conf` implementation, in progress | ||
| - TODO: create experimental PR/branch for Helm implementing this HIP | ||
|
|
||
| ## Rejected ideas | ||
|
|
||
| ### Falling back to Docker’s config upon error reading registries.conf | ||
|
|
||
| Falling back upon error means users who expect their configuration to be taken from `registries.conf` will unexpectedly have OCI configuration taken from Docker, potentially resulting in difficult to diagnose failures authenticating to the repository. | ||
|
|
||
| Rather than "failing fast" and requiring users to ensure their configuration is valid. | ||
|
|
||
| ## Open issues | ||
|
|
||
| - ORAS `registries.conf` support: <https://github.com/oras-project/oras-go/issues/918> | ||
| - Is the release and backwards compatibility plan good enough? | ||
| - ~~Discuss Helm's/ORAS's potential usage of `registries.conf` with `registries.conf` owners~~ | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. They are on board with the idea, but the timeline for release I do not know. |
||
|
|
||
| ## References | ||
|
|
||
| ### ORAS credential store (Docker registry configuration) docs | ||
|
|
||
| <https://pkg.go.dev/oras.land/oras-go/v2/registry/remote/credentials#NewStoreFromDocker> | ||
|
|
||
| ### `registries.conf` / `auth.json` specifications | ||
|
|
||
| <https://github.com/containers/container-libs/blob/main/image/docs/containers-registries.conf.5.md> | ||
| <https://github.com/containers/container-libs/blob/main/images/docs/containers-auth.json.5.md> | ||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
while maintianing backward compatibility since it supports
.docker/config.jsonThere was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Do you mean
auth.jsonis a compatible subset of.docker/config.json?There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think at this point there there are extensions in both formats not understood by the other. But the basic use case of storing per-registry credentials works compatibly.