-
Notifications
You must be signed in to change notification settings - Fork 7.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
X509 Authentication with OCI registry #10798
Comments
I noticed this as well. We use x509 client authentication instead of passwords and I am facing the same issue. We can not adopt the OCI features, until we have a way to authenticate with the registry as a client with helm via certificates. Perhaps it makes sense to follow the following approach since other tools like podman/skopeo/docker all use it: https://docs.docker.com/engine/security/certificates/ There is a dir for each registry domain with the CA & client's cert/key used for authentication. It seems almost standard among these tools and podman does something similar, but the dirs are located here, /etc/containers/certs.d. The certs allow skopeo, podman, crio, and buildah to authenticate. |
@bacongobbler |
@catric96 there is work currently in flight in the upstream ORAS to add this feature. As soon as it is in the dependency library, it can then be integrated into helm |
This issue has been marked as stale because it has been open for 90 days with no activity. This thread will be automatically closed in 30 days if no further activity occurs. |
Has this since been merged into helm? I wasn't sure which ORAS issue this was linked to after looking through |
looks like ORAS v2 now supports mTLS |
This issue has been marked as stale because it has been open for 90 days with no activity. This thread will be automatically closed in 30 days if no further activity occurs. |
This issue has been marked as stale because it has been open for 90 days with no activity. This thread will be automatically closed in 30 days if no further activity occurs. |
Hi, there currently does not seem to be a way to authenticate with X509 certs with a registry.
The registry does not have password authentication (which seems to be currently supported with the registry config.json that can be passed in via --registry-config flag).
Would it be possible to add a way to specify X509 certs or point to a file path where they are located to authenticate?
Output of
helm version
:3.8.0
Output of
kubectl version
:v1.2.4 (with K3S)
Cloud Provider/Platform (AKS, GKE, Minikube etc.):
K3S
The text was updated successfully, but these errors were encountered: