containerd image store doesn't respect configuration setting
Description
When running Docker Desktop on windows for version >=4.34.0 with the option Use containerd for pulling and storing images checked a setting, specifically insecure-registries, I put in the daemon.json file via the Settings -> Docker Engine page, doesn't seem to respect the setting.
Reproduce
Docker Desktop > 4.34.0
- Ensure option
Use containerd for pulling and storing imagesis checked - Edit the
daemon.jsonvia Settings -> Docker Engine to include aninsecure-registriessimilar to:{ "builder": { "gc": { "defaultKeepStorage": "20GB", "enabled": true } }, "experimental": false, "insecure-registries": [ "my-registry1.place.com:3050", "my-registry1.place.com:3033", "my-registry2.place.com:3000" ] } - Apply and restart
- do a
docker loginfor one of the registries in insecure-registries e.g.docker login my-registry1.place.com:3050 - Attempt to do a pull from that registry
docker pull my-registry1.place.com:3050/image:latest - See the unexpected certificate error:
Error response from daemon: failed to resolve reference "my-registry1.place.com:3050/image:latest": failed to authorize: failed to fetch oauth token: Post "https://my-registry1.place.com:3050/api/docker/docker-remote/v2/token": tls: failed to verify certificate: x509: certificate signed by unknown authority
Expected behavior
The docker pull should not attempt to verify the x509 TLS certificate.
docker version
>docker version
Client:
Version: 27.5.1
API version: 1.47
Go version: go1.22.11
Git commit: 9f9e405
Built: Wed Jan 22 13:41:44 2025
OS/Arch: windows/amd64
Context: desktop-linux
Server: Docker Desktop 4.38.0 (181591)
Engine:
Version: 27.5.1
API version: 1.47 (minimum version 1.24)
Go version: go1.22.11
Git commit: 4c9b3b0
Built: Wed Jan 22 13:41:17 2025
OS/Arch: linux/amd64
Experimental: false
containerd:
Version: 1.7.25
GitCommit: bcc810d6b9066471b0b6fa75f557a15a1cbf31bb
runc:
Version: 1.1.12
GitCommit: v1.1.12-0-g51d5e946
docker-init:
Version: 0.19.0
GitCommit: de40ad0
docker info
>docker info
Client:
Version: 27.5.1
Context: desktop-linux
Debug Mode: false
Plugins:
ai: Ask Gordon - Docker Agent (Docker Inc.)
Version: v0.7.3
Path: C:\Program Files\Docker\cli-plugins\docker-ai.exe
buildx: Docker Buildx (Docker Inc.)
Version: v0.20.1-desktop.2
Path: C:\Program Files\Docker\cli-plugins\docker-buildx.exe
compose: Docker Compose (Docker Inc.)
Version: v2.32.4-desktop.1
Path: C:\Program Files\Docker\cli-plugins\docker-compose.exe
debug: Get a shell into any image or container (Docker Inc.)
Version: 0.0.38
Path: C:\Program Files\Docker\cli-plugins\docker-debug.exe
desktop: Docker Desktop commands (Beta) (Docker Inc.)
Version: v0.1.4
Path: C:\Program Files\Docker\cli-plugins\docker-desktop.exe
dev: Docker Dev Environments (Docker Inc.)
Version: v0.1.2
Path: C:\Program Files\Docker\cli-plugins\docker-dev.exe
extension: Manages Docker extensions (Docker Inc.)
Version: v0.2.27
Path: C:\Program Files\Docker\cli-plugins\docker-extension.exe
feedback: Provide feedback, right in your terminal! (Docker Inc.)
Version: v1.0.5
Path: C:\Program Files\Docker\cli-plugins\docker-feedback.exe
init: Creates Docker-related starter files for your project (Docker Inc.)
Version: v1.4.0
Path: C:\Program Files\Docker\cli-plugins\docker-init.exe
sbom: View the packaged-based Software Bill Of Materials (SBOM) for an image (Anchore Inc.)
Version: 0.6.0
Path: C:\Program Files\Docker\cli-plugins\docker-sbom.exe
scout: Docker Scout (Docker Inc.)
Version: v1.16.1
Path: C:\Program Files\Docker\cli-plugins\docker-scout.exe
Server:
Containers: 0
Running: 0
Paused: 0
Stopped: 0
Images: 0
Server Version: 27.5.1
Storage Driver: overlayfs
driver-type: io.containerd.snapshotter.v1
Logging Driver: json-file
Cgroup Driver: cgroupfs
Cgroup Version: 1
Plugins:
Volume: local
Network: bridge host ipvlan macvlan null overlay
Log: awslogs fluentd gcplogs gelf journald json-file local splunk syslog
CDI spec directories:
/etc/cdi
/var/run/cdi
Swarm: inactive
Runtimes: runc io.containerd.runc.v2 nvidia
Default Runtime: runc
Init Binary: docker-init
containerd version: bcc810d6b9066471b0b6fa75f557a15a1cbf31bb
runc version: v1.1.12-0-g51d5e946
init version: de40ad0
Security Options:
seccomp
Profile: unconfined
Kernel Version: 5.15.167.4-microsoft-standard-WSL2
Operating System: Docker Desktop
OSType: linux
Architecture: x86_64
CPUs: 8
Total Memory: 7.572GiB
Name: docker-desktop
ID: ea5f12ca-c996-45b9-bcee-db0b2ca30d86
Docker Root Dir: /var/lib/docker
Debug Mode: false
HTTP Proxy: http.docker.internal:3128
HTTPS Proxy: http.docker.internal:3128
No Proxy: hubproxy.docker.internal
Labels:
com.docker.desktop.address=npipe://\\.\pipe\docker_cli
Experimental: false
Insecure Registries:
hubproxy.docker.internal:5555
sres.web.boeing.com:5033
sres.web.boeing.com:5050
127.0.0.0/8
Live Restore Enabled: false
WARNING: No blkio throttle.read_bps_device support
WARNING: No blkio throttle.write_bps_device support
WARNING: No blkio throttle.read_iops_device support
WARNING: No blkio throttle.write_iops_device support
WARNING: daemon is not using the default seccomp profile
Diagnostics ID
N/A - This is an isolated network.
Additional Info
No response
My theory on this is that the containerd image store doesn't use the settings from daemon.json. Maybe there is a workaround to configure this somewhere else?
I'm not positive this is an actual but, as it may be by-design. If so, maybe some documentation on how to accomplish this in containerd image store?
I was having the same issue. I was able to perform a docker login after adding my certs to the ~/.docker/certs.d/<our_instance_of_gitlab> folder, but was not able to do a docker push/pull. Said something about certificates required even though login was able to find it. Push/pull were able to succeed after disabling the "Use containerd for pulling and storing images" setting, restarting docker, and rebuilding/tagging my image. I have Docker Desktop 4.38.0 installed.
I was having the same issue. I was able to perform a docker login after adding my certs to the ~/.docker/certs.d/<our_instance_of_gitlab> folder, but was not able to do a docker push/pull. Said something about certificates required even though login was able to find it. Push/pull were able to succeed after disabling the "Use containerd for pulling and storing images" setting, restarting docker, and rebuilding/tagging my image. I have Docker Desktop 4.38.0 installed.
I have the the same issue when using version 4.40 , how to solve the problem? Is this a bug ?