-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for Sigstore Bundle Specification #1406
Comments
@codysoyland It sounds good. Could you share some examples of yaml definitions here? That would help to understand the changes. |
@hectorj2f Of course! My proposed change to the yaml is the addition of Taking this example from the docs: apiVersion: policy.sigstore.dev/v1beta1
kind: ClusterImagePolicy
metadata:
name: image-policy-keyless-with-attestations
spec:
images:
- glob: registry.local:5000/policy-controller/demo*
authorities:
- name: verify custom attestation
keyless:
url: http://fulcio.fulcio-system.svc
identities:
- issuerRegExp: .*kubernetes.default.*
subjectRegExp: .*kubernetes.io/namespaces/default/serviceaccounts/default
ctlog:
url: http://rekor.rekor-system.svc
attestations:
- name: custom-match-predicate
predicateType: https://cosign.sigstore.dev/attestation/v1
policy:
type: cue
data: |
predicateType: "https://cosign.sigstore.dev/attestation/v1"
predicate: "foobar e2e test" After my proposed changes, the above policy would continue to work as it always had: verify the attestation using the classic If a user wished to verify a Sigstore Bundle, they would modify the above with a apiVersion: policy.sigstore.dev/v1beta1 kind: ClusterImagePolicy metadata: name: image-policy-keyless-with-attestations spec: images: - glob: registry.local:5000/policy-controller/demo* authorities: - name: verify custom attestation signatureFormat: bundle keyless: url: http://fulcio.fulcio-system.svc identities: - issuerRegExp: .*kubernetes.default.* subjectRegExp: .*kubernetes.io/namespaces/default/serviceaccounts/default ctlog: url: http://rekor.rekor-system.svc attestations: - name: custom-match-predicate predicateType: https://cosign.sigstore.dev/attestation/v1 policy: type: cue data: | predicateType: "https://cosign.sigstore.dev/attestation/v1" predicate: "foobar e2e test" |
hello @codysoyland , Any news on this issue ? We are signing our docker images with the We are trying to use the controller from this repository to verify images in our k8s clusters but we are having this issue when submitting new pods:
Is this problem related to your issue ? snippet of the workflow creating, pushing and signing the image
Thanks |
Description
Policy-Controller currently supports verification of attestations/signatures generated using
cosign sign
/cosign attest
, which attach signatures/attestations using the process described in the Cosign Signature Specification. In summary, this signature attachment scheme utilizes a Tag-based discovery mechanism where an image manifest (OCI Image Manifest V1) is created to reference a specific image digest, and each layer references a payload in either the Simple Signing (application/vnd.dev.cosign.simplesigning.v1+json
) format or the DSSE (application/vnd.dsse.envelope.v1+json
) format. Other data needed to perform verification is stored in annotations on the layer descriptor.A newer specification for storing Sigstore Bundles has been accepted, which utilizes the OCI 1.1 Manifest Referrers API to attach Sigstore Bundles as referring artifacts to an image, which simplifies the storage/retrieval of attestations/signatures and enables use of the newer generation of Sigstore clients (e.g.
sigstore-js
,sigstore-python
, andsigstore-go
) to verify Sigstore Bundles.cosign
currently lacks that ability, but there are plans to support it in the future. Additionally, GitHub Artifact Attestations attach Sigstore Bundles following the spec, and Policy-Controller is currently unable to verify these attestations.I would like to add support for verifying image signatures/attestations using the new bundle spec in Policy-Controller. In order to do so without breaking existing usage, I propose we add a
signatureFormat
property to the Authority type, which could be one of[legacy, bundle]
and would default tolegacy
. When theauthority
has the propertysignatureFormat: bundle
, the controller would take an alternative code path which would implement the Sigstore Bundle spec to look up the attestations and verify them usingsigstore-go
. I am preparing a branch which implements the above scheme, and I hope to open a PR in the coming days.The text was updated successfully, but these errors were encountered: