Harden Zot Registry

OIDC + API key authentication on zot with anonymous pull preserved, and tag immutability enforced server-side via accessControl. Completed as a C2 Mikado goal across PRs #236 and #237.

What Was Done

Updated ansible/roles/zot/templates/config.json.j2 with:

  1. http.auth.openid — OIDC provider pointing to Authentik (authentik.ops.eblu.me)
  2. http.auth.apikey: true — API key generation for CI service accounts
  3. http.accessControl — three-tier policy:
    • anonymousPolicy: ["read"] — anyone can pull
    • artifact-workloads group: ["read", "create"] — CI can push new tags but cannot overwrite or delete (immutable tags)
    • admins group: ["read", "create", "update", "delete"] — break-glass
  4. http.externalUrlhttps://registry.ops.eblu.me for OIDC callback redirects
  5. accessControl.metrics.users: [""] — allows anonymous Prometheus/Alloy scraping

Key Files

FilePurpose
ansible/roles/zot/templates/config.json.j2Zot config with auth + access control
ansible/roles/zot/defaults/main.ymlOIDC issuer and external URL variables
ansible/roles/zot/templates/oidc-credentials.json.j2OIDC client credentials
.dagger/src/blumeops_ci/main.pypublish() with registry auth
.forgejo/workflows/build-container.yamlDagger push with API key
.forgejo/workflows/build-container-nix.yamlSkopeo push with API key

Verified

  • Anonymous pull works (pull-through cache on gilbert)
  • Unauthenticated push fails (401)
  • OIDC browser login works (redirect to Authentik and back)
  • API key push works (zot-ci API key)
  • CI push succeeds (Dagger and Nix/skopeo paths)
  • Pull-through caching still works
  • Metrics endpoint accessible without auth
  • mise run services-check passes