Documentation
¶
Index ¶
- Constants
- Variables
- type AccessLog
- type Auth
- type Catalog
- type ClientAuth
- type Configuration
- type Debug
- type Endpoint
- type Events
- type ExecConfig
- type FileChecker
- type H2C
- type HTTP
- type HTTP2
- type HTTPChecker
- type Health
- type Ignore
- type LetsEncrypt
- type Log
- type LogHook
- type Loglevel
- type MailOptions
- type Middleware
- type Notifications
- type Parameters
- type Parser
- type Platform
- type Platforms
- type Policy
- type Prometheus
- type Proxy
- type Redis
- type RedisOptions
- type RedisTLSOptions
- type Repository
- type SMTP
- type Storage
- type StorageDriver
- type TCPChecker
- type TLS
- type URLs
- type Validation
- type ValidationIndexes
- type ValidationManifests
- type Version
- type VersionedParseInfo
Constants ¶
const ( ClientAuthRequestClientCert = "request-client-cert" ClientAuthRequireAnyClientCert = "require-any-client-cert" ClientAuthVerifyClientCertIfGiven = "verify-client-cert-if-given" ClientAuthRequireAndVerifyClientCert = "require-and-verify-client-cert" )
Variables ¶
var CurrentVersion = MajorMinorVersion(0, 1)
CurrentVersion is the most recent Version that can be parsed
Functions ¶
This section is empty.
Types ¶
type AccessLog ¶
type AccessLog struct { // Disabled disables access logging. Disabled bool `yaml:"disabled,omitempty"` }
AccessLog configures options for access logging.
type Auth ¶
type Auth map[string]Parameters
Auth defines the configuration for registry authorization.
func (Auth) MarshalYAML ¶
MarshalYAML implements the yaml.Marshaler interface
func (Auth) Parameters ¶
func (auth Auth) Parameters() Parameters
Parameters returns the Parameters map for an Auth configuration
func (*Auth) UnmarshalYAML ¶
UnmarshalYAML implements the yaml.Unmarshaler interface Unmarshals a single item map into a Storage or a string into a Storage type with no parameters
type Catalog ¶
type Catalog struct { // Max number of entries returned by the catalog endpoint. Requesting n entries // to the catalog endpoint will return at most MaxEntries entries. // An empty or a negative value will set a default of 1000 maximum entries by default. MaxEntries int `yaml:"maxentries,omitempty"` }
Catalog provides configuration options for the /v2/_catalog endpoint.
type ClientAuth ¶
type ClientAuth string
func (*ClientAuth) UnmarshalYAML ¶
func (clientAuth *ClientAuth) UnmarshalYAML(unmarshal func(interface{}) error) error
UnmarshalYAML implements the yaml.Umarshaler interface Unmarshals a string into a ClientAuth, validating that it represents a valid ClientAuth mod
type Configuration ¶
type Configuration struct { // Version is the version which defines the format of the rest of the configuration Version Version `yaml:"version"` // Log supports setting various parameters related to the logging // subsystem. Log Log `yaml:"log"` // Loglevel is the level at which registry operations are logged. // // Deprecated: Use Log.Level instead. Loglevel Loglevel `yaml:"loglevel,omitempty"` // Storage is the configuration for the registry's storage driver Storage Storage `yaml:"storage"` // Auth allows configuration of various authorization methods that may be // used to gate requests. Auth Auth `yaml:"auth,omitempty"` // Middleware lists all middlewares to be used by the registry. Middleware map[string][]Middleware `yaml:"middleware,omitempty"` // HTTP contains configuration parameters for the registry's http // interface. HTTP HTTP `yaml:"http,omitempty"` // Notifications specifies configuration about various endpoint to which // registry events are dispatched. Notifications Notifications `yaml:"notifications,omitempty"` // Redis configures the redis pool available to the registry webapp. Redis Redis `yaml:"redis,omitempty"` // Health provides the configuration section for health checks. // It allows defining various checks to monitor the health of different subsystems. Health Health `yaml:"health,omitempty"` // Catalog is composed of MaxEntries. // Catalog endpoint (/v2/_catalog) configuration, it provides the configuration // options to control the maximum number of entries returned by the catalog endpoint. Catalog Catalog `yaml:"catalog,omitempty"` // Proxy defines the configuration options for using the registry as a pull-through cache. Proxy Proxy `yaml:"proxy,omitempty"` // Validation configures validation options for the registry. Validation Validation `yaml:"validation,omitempty"` // Policy configures registry policy options. Policy Policy `yaml:"policy,omitempty"` }
Configuration is a versioned registry configuration, intended to be provided by a yaml file, and optionally modified by environment variables.
Note that yaml field names should never include _ characters, since this is the separator used in environment variable names.
func Parse ¶
func Parse(rd io.Reader) (*Configuration, error)
Parse parses an input configuration yaml document into a Configuration struct This should generally be capable of handling old configuration format versions
Environment variables may be used to override configuration parameters other than version, following the scheme below: Configuration.Abc may be replaced by the value of REGISTRY_ABC, Configuration.Abc.Xyz may be replaced by the value of REGISTRY_ABC_XYZ, and so forth
type Debug ¶
type Debug struct { // Addr specifies the bind address for the debug server. Addr string `yaml:"addr,omitempty"` // Prometheus configures the Prometheus telemetry endpoint for monitoring purposes. Prometheus Prometheus `yaml:"prometheus,omitempty"` }
Debug defines the configuration options for the registry's debug interface. It allows administrators to enable or disable the debug server and configure telemetry and monitoring endpoints such as Prometheus.
type Endpoint ¶
type Endpoint struct { Name string `yaml:"name"` // identifies the endpoint in the registry instance. Disabled bool `yaml:"disabled"` // disables the endpoint URL string `yaml:"url"` // post url for the endpoint. Headers http.Header `yaml:"headers"` // static headers that should be added to all requests Timeout time.Duration `yaml:"timeout"` // HTTP timeout Threshold int `yaml:"threshold"` // circuit breaker threshold before backing off on failure Backoff time.Duration `yaml:"backoff"` // backoff duration IgnoredMediaTypes []string `yaml:"ignoredmediatypes"` // target media types to ignore Ignore Ignore `yaml:"ignore"` // ignore event types }
Endpoint describes the configuration of an http webhook notification endpoint.
type Events ¶
type Events struct {
IncludeReferences bool `yaml:"includereferences"` // include reference data in manifest events
}
Events configures notification events.
type ExecConfig ¶
type ExecConfig struct { // Command is the command to execute. Command string `yaml:"command"` // Lifetime is the expiry period of the credentials. The credentials // returned by the command is reused through the configured lifetime, then // the command will be re-executed to retrieve new credentials. // If set to zero, the command will be executed for every request. // If not set, the command will only be executed once. Lifetime *time.Duration `yaml:"lifetime,omitempty"` }
ExecConfig defines the configuration for executing a command as a credential helper. This allows the registry to authenticate against an upstream registry by executing a specified command to obtain credentials. The command can be re-executed based on the configured lifetime, enabling the registry to run as a pull-through cache that manages its authentication dynamically.
type FileChecker ¶
type FileChecker struct { // Interval is the duration in between checks Interval time.Duration `yaml:"interval,omitempty"` // File is the path to check File string `yaml:"file,omitempty"` // Threshold is the number of times a check must fail to trigger an // unhealthy state Threshold int `yaml:"threshold,omitempty"` }
FileChecker is a type of entry in the health section for checking files.
type H2C ¶
type H2C struct { // Enables H2C (HTTP/2 Cleartext). Enable to support HTTP/2 without needing to configure TLS // Useful when deploying the registry behind a load balancer (e.g. Cloud Run) Enabled bool `yaml:"enabled,omitempty"` }
H2C configures support for HTTP/2 Cleartext.
type HTTP ¶
type HTTP struct { // Addr specifies the bind address for the registry instance. Addr string `yaml:"addr,omitempty"` // Net specifies the net portion of the bind address. A default empty value means tcp. Net string `yaml:"net,omitempty"` // Host specifies an externally-reachable address for the registry, as a fully // qualified URL. Host string `yaml:"host,omitempty"` // Prefix specifies a URL path prefix for the HTTP interface. // This can be used to serve the registry under a specific path // rather than at the root of the domain (e.g., "/registry"). Prefix string `yaml:"prefix,omitempty"` // Secret specifies the secret key which HMAC tokens are created with. Secret string `yaml:"secret,omitempty"` // RelativeURLs specifies that relative URLs should be returned in // Location headers RelativeURLs bool `yaml:"relativeurls,omitempty"` // Amount of time to wait for connection to drain before shutting down when registry // receives a stop signal DrainTimeout time.Duration `yaml:"draintimeout,omitempty"` // TLS instructs the http server to listen with a TLS configuration. // This only support simple tls configuration with a cert and key. // Mostly, this is useful for testing situations or simple deployments // that require tls. If more complex configurations are required, use // a proxy or make a proposal to add support here. TLS TLS `yaml:"tls,omitempty"` // Headers is a set of headers to include in HTTP responses. A common // use case for this would be security headers such as // Strict-Transport-Security. The map keys are the header names, and // the values are the associated header payloads. Headers http.Header `yaml:"headers,omitempty"` // Debug configures the http debug interface, if specified. This can // include services such as pprof, expvar and other data that should // not be exposed externally. Left disabled by default. Debug Debug `yaml:"debug,omitempty"` // HTTP2 configures options for HTTP/2 support. HTTP2 HTTP2 `yaml:"http2,omitempty"` // H2C configures support for HTTP/2 without requiring TLS (HTTP/2 Cleartext). H2C H2C `yaml:"h2c,omitempty"` }
HTTP defines configuration options for the HTTP interface of the registry.
type HTTP2 ¶
type HTTP2 struct { // Specifies whether the registry should disallow clients attempting // to connect via HTTP/2. If set to true, only HTTP/1.1 is supported. Disabled bool `yaml:"disabled,omitempty"` }
HTTP2 configures options.
type HTTPChecker ¶
type HTTPChecker struct { // Timeout is the duration to wait before timing out the HTTP request Timeout time.Duration `yaml:"timeout,omitempty"` // StatusCode is the expected status code StatusCode int // Interval is the duration in between checks Interval time.Duration `yaml:"interval,omitempty"` // URI is the HTTP URI to check URI string `yaml:"uri,omitempty"` // Headers lists static headers that should be added to all requests Headers http.Header `yaml:"headers"` // Threshold is the number of times a check must fail to trigger an // unhealthy state Threshold int `yaml:"threshold,omitempty"` }
HTTPChecker is a type of entry in the health section for checking HTTP URIs.
type Health ¶
type Health struct { // FileCheckers is a list of paths to check FileCheckers []FileChecker `yaml:"file,omitempty"` // HTTPCheckers is a list of URIs to check HTTPCheckers []HTTPChecker `yaml:"http,omitempty"` // TCPCheckers is a list of URIs to check TCPCheckers []TCPChecker `yaml:"tcp,omitempty"` // StorageDriver configures a health check on the configured storage // driver StorageDriver StorageDriver `yaml:"storagedriver,omitempty"` }
Health provides the configuration section for health checks.
type Ignore ¶
type Ignore struct { MediaTypes []string `yaml:"mediatypes"` // target media types to ignore Actions []string `yaml:"actions"` // ignore action types }
Ignore configures mediaTypes and actions of the event, that it won't be propagated
type LetsEncrypt ¶
type LetsEncrypt struct { // CacheFile specifies cache file to use for lets encrypt // certificates and keys. CacheFile string `yaml:"cachefile,omitempty"` // Email is the email to use during Let's Encrypt registration Email string `yaml:"email,omitempty"` // Hosts specifies the hosts which are allowed to obtain Let's // Encrypt certificates. Hosts []string `yaml:"hosts,omitempty"` // DirectoryURL points to the CA directory endpoint. // If empty, LetsEncrypt is used. DirectoryURL string `yaml:"directoryurl,omitempty"` }
LetsEncrypt configures automatic TLS certificate provisioning using Let's Encrypt.
type Log ¶
type Log struct { // AccessLog configures access logging. AccessLog AccessLog `yaml:"accesslog,omitempty"` // Level is the granularity at which registry operations are logged. Level Loglevel `yaml:"level,omitempty"` // Formatter overrides the default formatter with another. Options // include "text", "json" and "logstash". Formatter string `yaml:"formatter,omitempty"` // Fields allows users to specify static string fields to include in // the logger context. Fields map[string]interface{} `yaml:"fields,omitempty"` // Hooks allows users to configure the log hooks, to enabling the // sequent handling behavior, when defined levels of log message emit. Hooks []LogHook `yaml:"hooks,omitempty"` // ReportCaller allows user to configure the log to report the caller ReportCaller bool `yaml:"reportcaller,omitempty"` }
Log represents the configuration for logging within the application.
type LogHook ¶
type LogHook struct { // Disable lets user select to enable hook or not. Disabled bool `yaml:"disabled,omitempty"` // Type allows user to select which type of hook handler they want. Type string `yaml:"type,omitempty"` // Levels set which levels of log message will let hook executed. Levels []string `yaml:"levels,omitempty"` // MailOptions allows user to configure email parameters. MailOptions MailOptions `yaml:"options,omitempty"` }
LogHook is composed of hook Level and Type. After hooks configuration, it can execute the next handling automatically, when defined levels of log message emitted. Example: hook can sending an email notification when error log happens in app.
type Loglevel ¶
type Loglevel string
Loglevel is the level at which operations are logged This can be error, warn, info, or debug
func (*Loglevel) UnmarshalYAML ¶
UnmarshalYAML implements the yaml.Umarshaler interface Unmarshals a string into a Loglevel, lowercasing the string and validating that it represents a valid loglevel
type MailOptions ¶
type MailOptions struct { // SMTP defines the configuration options for the SMTP server used for sending email notifications. SMTP SMTP `yaml:"smtp,omitempty"` // From defines mail sending address From string `yaml:"from,omitempty"` // To defines mail receiving address To []string `yaml:"to,omitempty"` }
MailOptions provides the configuration sections to user, for specific handler.
type Middleware ¶
type Middleware struct { // Name the middleware registers itself as Name string `yaml:"name"` // Flag to disable middleware easily Disabled bool `yaml:"disabled,omitempty"` // Map of parameters that will be passed to the middleware's initialization function Options Parameters `yaml:"options"` }
Middleware configures named middlewares to be applied at injection points.
type Notifications ¶
type Notifications struct { // EventConfig is the configuration for the event format that is sent to each Endpoint. EventConfig Events `yaml:"events,omitempty"` // Endpoints is a list of http configurations for endpoints that // respond to webhook notifications. In the future, we may allow other // kinds of endpoints, such as external queues. Endpoints []Endpoint `yaml:"endpoints,omitempty"` }
Notifications configures multiple http endpoints.
type Parameters ¶
type Parameters map[string]interface{}
Parameters defines a key-value parameters mapping
type Parser ¶
type Parser struct {
// contains filtered or unexported fields
}
Parser can be used to parse a configuration file and environment of a defined version into a unified output structure
func NewParser ¶
func NewParser(prefix string, parseInfos []VersionedParseInfo) *Parser
NewParser returns a *Parser with the given environment prefix which handles versioned configurations which match the given parseInfos
func (*Parser) Parse ¶
Parse reads in the given []byte and environment and writes the resulting configuration into the input v
Environment variables may be used to override configuration parameters other than version, following the scheme below: v.Abc may be replaced by the value of PREFIX_ABC, v.Abc.Xyz may be replaced by the value of PREFIX_ABC_XYZ, and so forth
type Platform ¶
type Platform struct { // Architecture is the architecture for this platform Architecture string `yaml:"architecture,omitempty"` // OS is the operating system for this platform OS string `yaml:"os,omitempty"` }
Platform specifies the characteristics of a computing environment and allows registry administrators to define required platforms for image validation. Administrators can select specific architectures and operating systems that must exist in the registry. This ensures that all image indexes uploaded to the registry are valid for the specified platforms.
type Platforms ¶
type Platforms string
Platforms configures the validation applies to the platform images included in an image index This can be all, none, or list
func (*Platforms) UnmarshalYAML ¶
UnmarshalYAML implements the yaml.Umarshaler interface Unmarshals a string into a Platforms option, lowercasing the string and validating that it represents a valid option
type Policy ¶
type Policy struct { // Repository configures policies for repositories Repository Repository `yaml:"repository,omitempty"` }
Policy defines configuration options for managing registry policies.
type Prometheus ¶
type Prometheus struct { // Enabled determines whether Prometheus telemetry is enabled or not. Enabled bool `yaml:"enabled,omitempty"` // Path specifies the URL path where the Prometheus metrics are exposed. // The default is "/metrics", but it can be customized here. Path string `yaml:"path,omitempty"` }
Prometheus configures the Prometheus telemetry endpoint for the registry. It allows administrators to enable Prometheus monitoring and customize the scrape path for metric collection.
type Proxy ¶
type Proxy struct { // RemoteURL is the URL of the remote registry RemoteURL string `yaml:"remoteurl"` // Username of the hub user Username string `yaml:"username"` // Password of the hub user Password string `yaml:"password"` // Exec specifies a custom exec-based command to retrieve credentials. // If set, Username and Password are ignored. Exec *ExecConfig `yaml:"exec,omitempty"` // TTL is the expiry time of the content and will be cleaned up when it expires // if not set, defaults to 7 * 24 hours // If set to zero, will never expire cache TTL *time.Duration `yaml:"ttl,omitempty"` }
Proxy configures the registry as a pull through cache
type Redis ¶
type Redis struct { // Options provides the configuration for connecting to Redis, including // options for both clustered and standalone Redis setups. It is provided inline // from the `redis.UniversalOptions` struct. Options RedisOptions `yaml:",inline"` // TLS contains the TLS settings for secure communication with the Redis server. // If specified, these settings will enable encryption and authentication via TLS. TLS RedisTLSOptions `yaml:"tls,omitempty"` }
Redis represents the configuration for connecting to a Redis server. It includes both the basic connection options and optional TLS settings to secure the connection.
func (Redis) MarshalYAML ¶
func (*Redis) UnmarshalYAML ¶
type RedisOptions ¶
type RedisOptions = redis.UniversalOptions
RedisOptions represents the configuration options for Redis, which are provided by the redis package. This struct can be used to configure the connection to Redis in a universal (clustered or standalone) setup.
type RedisTLSOptions ¶
type RedisTLSOptions struct { // Certificate specifies the path to the certificate file for TLS authentication. // This certificate is used to establish a secure connection with the Redis server. Certificate string `yaml:"certificate,omitempty"` // Key specifies the path to the private key file associated with the certificate. // This key is used to authenticate the client during the TLS handshake. Key string `yaml:"key,omitempty"` // ClientCAs specifies a list of certificates to be used to verify the server's // certificate during the TLS handshake. This can be used for mutual TLS authentication. ClientCAs []string `yaml:"clientcas,omitempty"` }
RedisTLSOptions configures the TLS (Transport Layer Security) settings for Redis connections, allowing secure communication over the network.
type Repository ¶
type Repository struct { // Classes is a list of repository classes that the registry allows content for. // This value is matched against the media type in uploaded manifests. // If this field is non-empty, the registry enforces that all uploaded // content belongs to one of the specified classes. Classes []string `yaml:"classes"` }
Repository defines configuration options related to repository policies in the registry.
type SMTP ¶
type SMTP struct { // Addr defines smtp host address Addr string `yaml:"addr,omitempty"` // Username defines user name to smtp host Username string `yaml:"username,omitempty"` // Password defines password of login user Password string `yaml:"password,omitempty"` // Insecure defines if smtp login skips the secure certification. Insecure bool `yaml:"insecure,omitempty"` }
SMTP represents the configuration for an SMTP (Simple Mail Transfer Protocol) server used for sending emails. It includes settings for the SMTP server's address, authentication, and other relevant configurations needed to connect and send emails.
type Storage ¶
type Storage map[string]Parameters
Storage defines the configuration for registry object storage
func (Storage) MarshalYAML ¶
MarshalYAML implements the yaml.Marshaler interface
func (Storage) Parameters ¶
func (storage Storage) Parameters() Parameters
Parameters returns the Parameters map for a Storage configuration
func (Storage) TagParameters ¶
func (storage Storage) TagParameters() Parameters
TagParameters returns the Parameters map for a Storage tag configuration
func (*Storage) UnmarshalYAML ¶
UnmarshalYAML implements the yaml.Unmarshaler interface Unmarshals a single item map into a Storage or a string into a Storage type with no parameters
type StorageDriver ¶
type StorageDriver struct { // Enabled turns on the health check for the storage driver Enabled bool `yaml:"enabled,omitempty"` // Interval is the duration in between checks Interval time.Duration `yaml:"interval,omitempty"` // Threshold is the number of times a check must fail to trigger an // unhealthy state Threshold int `yaml:"threshold,omitempty"` }
StorageDriver configures health checks specific to the storage driver.
type TCPChecker ¶
type TCPChecker struct { // Timeout is the duration to wait before timing out the TCP connection Timeout time.Duration `yaml:"timeout,omitempty"` // Interval is the duration in between checks Interval time.Duration `yaml:"interval,omitempty"` // Addr is the TCP address to check Addr string `yaml:"addr,omitempty"` // Threshold is the number of times a check must fail to trigger an // unhealthy state Threshold int `yaml:"threshold,omitempty"` }
TCPChecker is a type of entry in the health section for checking TCP servers.
type TLS ¶
type TLS struct { // Certificate specifies the path to an x509 certificate file to // be used for TLS. Certificate string `yaml:"certificate,omitempty"` // Key specifies the path to the x509 key file, which should // contain the private portion for the file specified in // Certificate. Key string `yaml:"key,omitempty"` // Specifies the CA certs for client authentication // A file may contain multiple CA certificates encoded as PEM ClientCAs []string `yaml:"clientcas,omitempty"` // Client certificate authentication mode // One of: request-client-cert, require-any-client-cert, verify-client-cert-if-given, require-and-verify-client-cert ClientAuth ClientAuth `yaml:"clientauth,omitempty"` // Specifies the lowest TLS version allowed MinimumTLS string `yaml:"minimumtls,omitempty"` // Specifies a list of cipher suites allowed CipherSuites []string `yaml:"ciphersuites,omitempty"` // LetsEncrypt is used to configuration setting up TLS through // Let's Encrypt instead of manually specifying certificate and // key. If a TLS certificate is specified, the Let's Encrypt // section will not be used. LetsEncrypt LetsEncrypt `yaml:"letsencrypt,omitempty"` }
TLS defines the configuration options for enabling and configuring TLS (Transport Layer Security) for secure communication between the registry and clients. It allows the registry to listen for HTTPS connections with a specified certificate, key, and optional client authentication settings.
type URLs ¶
type URLs struct { // Allow specifies regular expressions (https://godoc.org/regexp/syntax) // that URLs in pushed manifests must match. Allow []string `yaml:"allow,omitempty"` // Deny specifies regular expressions (https://godoc.org/regexp/syntax) // that URLs in pushed manifests must not match. Deny []string `yaml:"deny,omitempty"` }
URLs defines validation rules for URLs found in the manifests pushed to the registry.
type Validation ¶
type Validation struct { // Enabled enables the other options in this section. This field is // deprecated in favor of Disabled. Enabled bool `yaml:"enabled,omitempty"` // Disabled disables the other options in this section. Disabled bool `yaml:"disabled,omitempty"` // Manifests configures manifest validation. Manifests ValidationManifests `yaml:"manifests,omitempty"` }
Validation configures validation options for the registry.
type ValidationIndexes ¶
type ValidationIndexes struct { // Platforms configures the validation applies to the platform images included in an image index Platforms Platforms `yaml:"platforms"` // PlatformList filters the set of platforms to validate for image existence. PlatformList []Platform `yaml:"platformlist,omitempty"` }
ValidationIndexes configures validation rules for image indexes within the manifest.
type ValidationManifests ¶
type ValidationManifests struct { // URLs configures validation for URLs in pushed manifests. URLs URLs `yaml:"urls,omitempty"` // ImageIndexes configures validation of image indexes Indexes ValidationIndexes `yaml:"indexes,omitempty"` }
ValidationManifests configures validation rules for manifests pushed to the registry.
type Version ¶
type Version string
Version is a major/minor version pair of the form Major.Minor Major version upgrades indicate structure or type changes Minor version upgrades should be strictly additive
func MajorMinorVersion ¶
MajorMinorVersion constructs a Version from its Major and Minor components
func (*Version) UnmarshalYAML ¶
UnmarshalYAML implements the yaml.Unmarshaler interface Unmarshals a string of the form X.Y into a Version, validating that X and Y can represent unsigned integers
type VersionedParseInfo ¶
type VersionedParseInfo struct { // Version is the version which this parsing information relates to Version Version // ParseAs defines the type which a configuration file of this version // should be parsed into ParseAs reflect.Type // ConversionFunc defines a method for converting the parsed configuration // (of type ParseAs) into the current configuration version // Note: this method signature is very unclear with the absence of generics ConversionFunc func(interface{}) (interface{}, error) }
VersionedParseInfo defines how a specific version of a configuration should be parsed into the current version