Skip to content

Latest commit

 

History

History
239 lines (164 loc) · 13.5 KB

index.md

File metadata and controls

239 lines (164 loc) · 13.5 KB

API Documentation (v1beta1)

This document is automatically generated from the API definition in the code.

Table of Contents

Attestation

Attestation defines the type of attestation to validate and optionally apply a policy decision to it. Authority block is used to verify the specified attestation types, and if Policy is specified, then it's applied only after the validation of the Attestation signature has been verified.

Field Description Scheme Required
name Name of the attestation. These can then be referenced at the CIP level policy. string true
predicateType PredicateType defines which predicate type to verify. Matches cosign verify-attestation options. string true
policy Policy defines all of the matching signatures, and all of the matching attestations (whose attestations are verified). Policy false

Back to TOC

Authority

The authorities block defines the rules for discovering and validating signatures. Signatures are cryptographically verified using one of the "key" or "keyless" fields. When multiple authorities are specified, any of them may be used to source the valid signature we are looking for to admit an image.

Field Description Scheme Required
name Name is the name for this authority. Used by the CIP Policy validator to be able to reference matching signature or attestation verifications. If not specified, the name will be authority- string true
key Key defines the type of key to validate the image. KeyRef false
keyless Keyless sets the configuration to verify the authority against a Fulcio instance. KeylessRef false
static Static specifies that signatures / attestations are not validated but instead a static policy is applied against matching images. StaticRef false
source Sources sets the configuration to specify the sources from where to consume the signatures. []Source false
ctlog CTLog sets the configuration to verify the authority against a Rekor instance. TLog false
attestations Attestations is a list of individual attestations for this authority, once the signature for this authority has been verified. []Attestation false
rfc3161timestamp RFC3161Timestamp sets the configuration to verify the signature timestamp against a RFC3161 time-stamping instance. RFC3161Timestamp false

Back to TOC

ClusterImagePolicy

ClusterImagePolicy defines the images that go through verification and the authorities used for verification

Field Description Scheme Required
metadata metav1.ObjectMeta true
spec Spec holds the desired state of the ClusterImagePolicy (from the client). ClusterImagePolicySpec true
status Status represents the current state of the ClusterImagePolicy. This data may be out of date. ClusterImagePolicyStatus false

Back to TOC

ClusterImagePolicyList

ClusterImagePolicyList is a list of ClusterImagePolicy resources

Field Description Scheme Required
metadata metav1.ListMeta true
items []ClusterImagePolicy true

Back to TOC

ClusterImagePolicySpec

ClusterImagePolicySpec defines a list of images that should be verified

Field Description Scheme Required
images Images defines the patterns of image names that should be subject to this policy. []ImagePattern true
authorities Authorities defines the rules for discovering and validating signatures. []Authority false
policy Policy is an optional policy that can be applied against all the successfully validated Authorities. If no authorities pass, this does not even get evaluated, as the Policy is considered failed. Policy false
mode Mode controls whether a failing policy will be rejected (not admitted), or if errors are converted to Warnings. enforce - Reject (default) warn - allow but warn string false
match Match allows selecting resources based on their properties. []MatchResource false

Back to TOC

ClusterImagePolicyStatus

ClusterImagePolicyStatus represents the current state of a ClusterImagePolicy.

ConfigMapReference

ConfigMapReference is cut&paste from SecretReference, but for the life of me couldn't find one in the public types. If there's one, use it.

Field Description Scheme Required
name Name is unique within a namespace to reference a configmap resource. string false
namespace Namespace defines the space within which the configmap name must be unique. string false
key Key defines the key to pull from the configmap. string false

Back to TOC

Identity

Identity may contain the issuer and/or the subject found in the transparency log. Issuer/Subject uses a strict match, while IssuerRegExp and SubjectRegExp apply a regexp for matching.

Field Description Scheme Required
issuer Issuer defines the issuer for this identity. string false
subject Subject defines the subject for this identity. string false
issuerRegExp IssuerRegExp specifies a regular expression to match the issuer for this identity. string false
subjectRegExp SubjectRegExp specifies a regular expression to match the subject for this identity. string false

Back to TOC

ImagePattern

ImagePattern defines a pattern and its associated authorties If multiple patterns match a particular image, then ALL of those authorities must be satisfied for the image to be admitted.

Field Description Scheme Required
glob Glob defines a globbing pattern. string true

Back to TOC

KeyRef

This references a public verification key stored in a secret in the cosign-system namespace. A KeyRef must specify only one of SecretRef, Data or KMS

Field Description Scheme Required
secretRef SecretRef sets a reference to a secret with the key. v1.SecretReference false
data Data contains the inline public key. string false
kms KMS contains the KMS url of the public key Supported formats differ based on the KMS system used. string false
hashAlgorithm HashAlgorithm always defaults to sha256 if the algorithm hasn't been explicitly set string false

Back to TOC

KeylessRef

KeylessRef contains location of the validating certificate and the identities against which to verify. KeylessRef will contain either the URL to the verifying certificate, or it will contain the certificate data inline or in a secret.

Field Description Scheme Required
url URL defines a url to the keyless instance. apis.URL false
identities Identities sets a list of identities. []Identity true
ca-cert CACert sets a reference to CA certificate KeyRef false
trustRootRef Use the Certificate Chain from the referred TrustRoot.CertificateAuthorities and TrustRoot.CTLog string false
insecureIgnoreSCT InsecureIgnoreSCT omits verifying if a certificate contains an embedded SCT bool false

Back to TOC

MatchResource

MatchResource allows selecting resources based on its version, group and resource. It is also possible to select resources based on a list of matching labels.

Field Description Scheme Required
selector metav1.LabelSelector false

Back to TOC

Policy

Policy specifies a policy to use for Attestation or the CIP validation (iff at least one authority matches). Exactly one of Data, URL, or ConfigMapReference must be specified.

Field Description Scheme Required
type Which kind of policy this is, currently only rego or cue are supported. Furthermore, only cue is tested :) string true
data Data contains the policy definition. string false
remote Remote defines the url to a policy. RemotePolicy false
configMapRef ConfigMapRef defines the reference to a configMap with the policy definition. ConfigMapReference false
fetchConfigFile FetchConfigFile controls whether ConfigFile will be fetched and made available for CIP level policy evaluation. Note that this only gets evaluated (and hence fetched) iff at least one authority matches. The ConfigFile will then be available in this format: https://github.com/opencontainers/image-spec/blob/main/config.md bool false
includeSpec IncludeSpec controls whether resource Spec will be included and made available for CIP level policy evaluation. Note that this only gets evaluated iff at least one authority matches. Also note that because Spec may be of a different shape depending on the resource being evaluatied (see MatchResource for filtering) you might want to configure these to match the policy file to ensure the shape of the Spec is what you expect when evaling the policy. bool false
includeObjectMeta IncludeObjectMeta controls whether the ObjectMeta will be included and made available for CIP level policy evalutation. Note that this only gets evaluated iff at least one authority matches. bool false
includeTypeMeta IncludeTypeMeta controls whether the TypeMeta will be included and made available for CIP level policy evalutation. Note that this only gets evaluated iff at least one authority matches. bool false

Back to TOC

RFC3161Timestamp

RFC3161Timestamp specifies the URL to a RFC3161 time-stamping server that holds the time-stamped verification for the signature

Field Description Scheme Required
trustRootRef Use the Certificate Chain from the referred TrustRoot.TimeStampAuthorities string false

Back to TOC

RemotePolicy

RemotePolicy defines all the properties to fetch a remote policy

Field Description Scheme Required
url URL to the policy data. apis.URL false
sha256sum Sha256sum defines the exact sha256sum computed out of the 'body' of the http response. string false

Back to TOC

Source

Source specifies the location of the signature / attestations.

Field Description Scheme Required
oci OCI defines the registry from where to pull the signature / attestations. string false
signaturePullSecrets SignaturePullSecrets is an optional list of references to secrets in the same namespace as the deploying resource for pulling any of the signatures used by this Source. []v1.LocalObjectReference false
tagPrefix TagPrefix is an optional prefix that signature and attestations have. This is the 'tag based discovery' and in the future once references are fully supported that should likely be the preferred way to handle these. string false

Back to TOC

StaticRef

StaticRef specifies that signatures / attestations are not validated but instead a static policy is applied against matching images.

Field Description Scheme Required
action Action defines how to handle a matching policy. string true
message For fail actions, emit an optional custom message string false

Back to TOC

TLog

TLog specifies the URL to a transparency log that holds the signature and public key information

Field Description Scheme Required
url URL sets the url to the rekor instance (by default the public rekor.sigstore.dev) apis.URL false
trustRootRef Use the Public Key from the referred TrustRoot.TLog string false

Back to TOC