roadmap icon indicating copy to clipboard operation
roadmap copied to clipboard

Support OIDC identities for docker login

Open mlbiam opened this issue 3 years ago • 3 comments

Tell us about your request Currently dockerhub requires a static token or password. These tokens are easily lost and hard to track and replace. It would be much better for dockerhub to support an oidc identity that can be created by a pipeline as opposed to a static token. These tokens can be validated by either a public well-known oidc discovery document or via a pinned certificate for private pipelines.

Which service(s) is this request for? dockerhub

Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard? I want to be able to securely publish containers from my GitHub actions pipeline with the pipeline's identity, rather then a static account stored as a secret.

Are you currently working around the issue? Not yet, though planning to

Additional context Add any other context or screenshots about the feature request here.

mlbiam avatar Feb 10 '22 15:02 mlbiam

Hi, any update on this? We're using OIDC for integrations with the cloud platforms, would be great to have that for pushing to Docker Hub as well.

Apologies if there is another way of doing this that I have missed!

martin-traverse avatar Nov 13 '24 19:11 martin-traverse

Hey friends, I realize this is a very old ticket and we have been wanting to do this for quite a while now. Happy to say that we are starting planning and scoping out what an OIDC type of provider would look like for registry and hub. Nothing solid yet, but just an update 😄

technicallyjosh avatar Nov 15 '24 23:11 technicallyjosh

Hello all! Just an update here. We have our first system design and are underway on this!

We hear ya on the "Bring my own auth for OIDC" and we'll get there, but the first implementation of this will be GitHub Actions OIDC to start. A lot of what we are designing is a more broad implementation so this can branch into whatever customers want to use.

Thanks for the patience and expect more updates in Q1 of this year. 🎉

technicallyjosh avatar Jan 21 '25 23:01 technicallyjosh

@technicallyjosh, just checking in. Any updates here?

ajschmidt8 avatar Apr 16 '25 05:04 ajschmidt8

It would be great to have OIDC available from GitHub Actions and Terraform Cloud, so we can terraform our Docker repos and teams etc, and not just push images.

scott-doyland-burrows avatar Jun 11 '25 11:06 scott-doyland-burrows

Hi all! We're currently working on offering GitHub OIDC and will release it internally first. For BETA, were targeting somewhere mid July. Once we have more concrete dates, I'll post here.

etugarinova avatar Jun 11 '25 15:06 etugarinova

I'm assuming once it works for GitHub, then adding Terraform Cloud would be relatively simple and so could follow fairly soon after.

scott-doyland-burrows avatar Jun 11 '25 16:06 scott-doyland-burrows

@etugarinova if we want to participate in the beta, should we just subscribe to this issue or is there another way to submit?

JonZeolla avatar Jul 08 '25 13:07 JonZeolla

I'm assuming once it works for GitHub, then adding Terraform Cloud would be relatively simple and so could follow fairly soon after.

You are correct in your assumption. We plan long-term to integrate with other providers. Would be great to understand the most wanted for sure.

@JonZeolla We will be releasing as "Beta" to everyone.

I can update here: We are starting full internal testing here in the next week or so. Beta will start shortly after!

technicallyjosh avatar Jul 29 '25 01:07 technicallyjosh

CircleCI please. They already support OIDC with AWS

https://circleci.com/docs/guides/permissions-authentication/openid-connect-tokens.html

mariusgrigaitis avatar Aug 07 '25 11:08 mariusgrigaitis

CircleCI please. They already support OIDC with AWS

Yup! Definitely on our list to check out :) We've built this to be pretty generic in authentication so any future OIDC providers should be way less work to set up for us.

Appreciate the call out.

technicallyjosh avatar Aug 14 '25 18:08 technicallyjosh

Support for GitLab CI would be welcome. It already supports OIDC with PyPI.

PhilippWendler avatar Sep 10 '25 04:09 PhilippWendler

Sounds like this has been progressing - any ideas on the timeline for a public release yet?

NPM put their OIDC feature to GA a couple of months ago. We've had a renewed focus on moving everything onto OIDC following Shal Halud.

martin-traverse avatar Sep 22 '25 09:09 martin-traverse

I'm wondering the available date of this feature too. Really appreciate it if we can get it earlier!

zliang-akamai avatar Sep 26 '25 16:09 zliang-akamai

Would be a great use-case to support Google Artifact Registry as Remote Repository / Pull-through Cache.

bijoy26 avatar Oct 30 '25 12:10 bijoy26

Very interested in this feature too, if there`s a beta test possible, my FOSS organization can participate: https://github.com/sablierapp

acouvreur avatar Nov 09 '25 20:11 acouvreur

CircleCI please. They already support OIDC with AWS

Yup! Definitely on our list to check out :) We've built this to be pretty generic in authentication so any future OIDC providers should be way less work to set up for us.

Appreciate the call out.

I'm curious. Is there anything against letting the user decide which JWT token iss, aud, sub to allow specified access to a repository?

kohtala avatar Nov 13 '25 12:11 kohtala

Yup! Definitely on our list to check out :) We've built this to be pretty generic in authentication so any future OIDC providers should be way less work to set up for us.

You shouldn’t be setting up providers at all beyond a nice UI for configuring one or two of the most popular ones. We need to be able to configure any OIDC issuer. I know the current trend is for registries to support “trusted providers” but enterprises very often don’t use popular cloud providers for CI/CD. They need the capability to configure any OIDC issuer, like Hashicorp Vault, Azure Managed Identities, AWS IAM roles, or an issuer backed by an on-prem HSM. We happen to use Azure DevOps for CI/CD, which while a SaaS offering with OIDC tokens, registries haven’t supported it and get stuck still using legacy authentication methods and managing an inane number of tokens. Azure has a really good generic OIDC implementation in Workload Identity Federation that could be a good reference example. JFrog has a good OIDC implementation as well. AWS’s is workable ( like most of the IAM design it’s a bit wonky and doesn’t support standard endpoints 🤦‍♂️)

davidcorrigan714 avatar Nov 13 '25 13:11 davidcorrigan714

Following Sha1-Hulud v2 it would be nice to accelerate this a bit.

alexaka1 avatar Nov 29 '25 15:11 alexaka1