Verifier Specification
Overview
A reference verifier in the framework is a component that is responsible to verify a specific artifact type(s) using the provided configuration. It provides the following capabilities
- Given an reference type artifact, determine if the verifier supports its verification like
CanVerify
- Verifies the reference artifact and returns the result of verification.
This document proposes a generic plugin-based solution for integrating different verifiers into the framework.
Terminology
The following terms will be used throughout the document
- verifier is the component that verifies a reference for an artifact. This could be a signature verifier or SBOM verifier for example.
- referrer store is the component that will be used to retrieve referrers for a subject and its related data like blobs and manifests.
- framework is the verification framework that coordinates multiple verifier
- plugin is a program that implements the verifier interface and provides the verification result to the framework upon invocation.
The following sections of the document aims to specify the interface between "framework" and "plugins"
The key words "must", "must not", "required", "shall", "shall not", "should", "should not", "recommended", "may" and "optional" are used as specified in RFC 2119.
Specification
The verifier specification defines
- An interface that defines verifier capabilities
- The format of the configuration used to configure the verifier plugins.
- A protocol for the framework to make requests to the verifier plugins
- A process for executing plugins based on the provided configuration.
- A process for plugins to access the referrer store to fetch additional data required for verification
- Data types of the results returned by plugin to the framework
- Format of error response returned by plugin
- Version compatibility between framework and plugin
Section1 : Verifier Configuration format
The framework can be configured with a set of parameters that are used by both the framework and plugins. When a specific plugin is executed, its corresponding parameters will be passed as an execution configuration to the plugin. The framework MAY support dynamic updates to the configuration as needed and hence it is recommended for the plugins to not consider this configuration as static and always use the config passed by the framework for execution.
Verifier Configuration format
The verifier configuration is [TBD] YAML/JSON with the following properties
Property | Type | IsRequired | Description |
---|---|---|---|
version | string | true | The semantic version 2.0 of the verifier specification to which all configuration and data types conform. Currently it is 1.0.0 |
plugins | array | true | The array of verifier plugins and their configuration. This is a list of plugin configuration object described in the following section. |
Plugin Configuration objects
The following are the keys used to describe configuration of individual plugins.
Property | Type | IsRequired | Description |
---|---|---|---|
name | string | true | The name of the plugin that should match with plugin binary on disk. Must not contain characters disallowed in file paths for the system (e.g. / or ). From version 1.1.0, name can be customized when type has been specified. This feature is backward compatible, when type is not provided, name would behave like type . |
type | string | false | The type of the plugin that should match with plugin binary on disk. Must not contain characters disallowed in file paths for the system (e.g. / or ) |
pluginBinDirs | array | false | The list of paths to look for the plugin binary to execute. Default: the home path of the framework. |
artifactTypes | array | true | The list of artifact types for which this verifier plugin has to be executed. [TBD] May change to matchingLabels |
nestedReferences | array | false | The list of artifact types for which this verifier should initiate nested verification. [TBD] This is subject to change as it is under review |
Any other fields specified for a plugin other than the above mentioned are considered as opaque. The framework MUST preserve unknown fields and pass through these fields to the plugins at the time of execution. Plugins may define additional fields that they accept and may generate an error if called with unknown fields.
Example verifier configuration
verifiers:
version: 1.0.0
plugins:
- name: notation
artifactTypes: application/vnd.cncf.notary.signature
verificationCerts:
- "/home/user/.notary/keys/wabbit-networks.crt"
- name: sbom
artifactTypes: application/x.example.sbom.v0
nestedReferences: application/vnd.cncf.notary.signature
Section2 : Verifier Interface
The framework defines an interface for all the capabilities provided by the verifier.
An interace defined in golang
:
type ReferenceVerifier interface {
Name() string
Type() string
CanVerify(ctx context.Context, referenceDescriptor ocispecs.ReferenceDescriptor) bool
Verify(ctx context.Context,
subjectReference common.Reference,
referenceDescriptor ocispecs.ReferenceDescriptor,
referrerStore *referrerStore.Store,
executor executor.Executor
) (VerifierResult, error)
}
Name
The method is used to get the name of the verifier.
Type
The method is used to get the type of the verifier.
CanVerify
The framework will invoke this method of the verifier to determine if it supports verification of a given artifact reference.
Verify
If verifier acknowledges its support for a reference type, the framework will invoke this method on the verifier to trigger the verification of the artifact reference. In addition to the artifact reference that has to be verified, the framework MUST include the associated referrer store and the framework's execution engine as part of the invocation. This will enable the verifier to query additional data from the store and also to initiate nested verification as needed.
Section 3 : Plugin Based Verifier
The framework MUST provide a reference implementation of the verifier interface using the plugin architecture It will execute the configured plugins to implement the methods of the interface.
The interface method CanVerify
can be implemented by the framework using the verifier configuration without executing the plugin. It can use artifactTypes
key (or matchingLabels
) to determine the support of a verifier plugin for a given artifact reference.
Nested verification can also be handled by the framework with the use of executor engine that is pasased through the interface method.
The rest of the sections of the document defines the protocol for executing the plugins to implement the Verify
method of the verifier interface.
Section 4: Plugin Execution Protocol
The protocol is based on the execution of binaries invoked by the framework. The framework passes parameters to the plugin via environment variables and configuration. The configuration is supplied via stdin
. The plugin returns the result on stdout
on success, or an error on stderr
if the verification fails. Configuration and results are encoded using JSON format.
There are two types of inputs that are passed to the plugin. They are parameters which define invokation specific settings and the other is configuration that includes verifier and store configuration settings.
Parameters
Execution parameters are passed to the plugins via OS environment variables. The parameters that are passed to a verifier are defined below
- RATIFY_VERIFIER_COMMAND indicates the operation to be executed. Currently the only operation that is desired is
VERIFY
- RATIFY_VERIFIER_SUBJECT is the artifact under verification usually identified by a reference as per the OCI
{DNS/IP}/{Repository}:[name|digest]
- RATIFY_VERIFIER_VERSION is the version of the specification used between the framework and plugin. This value is taken from the
version
field of the verifier configuration.
Execution Configuration
When a plugin is registered using the configuration, the framework interprets the configuration per plugin and transforms it to a format that is expected by the plugin. This section describes the transformations made by the framework before the configuration is passed to the plugin.
The execution configuration for a plugin invocation is encoded in JSON. It will contain the plugin configuration that is provided by the user, primarily unchanged except for the specified additions
The execution configuration provided by the framework will contain the following fields.
config
: A JSON object representing the plugin configuration provided as part of registration with the framework and passed unchanged.storeConfig
: A JSON object representing the configuration of the store that will be used to create a store plugin to fetch additional data needed for verificationreferenceDesc
: A JSON object that has the descriptor properties of a reference type.
Section 5: Result Types
Plugins can return either a Success or Error result type.
Success
The output of the verification process will be returned by the plugin. It MUST output a JSON object with the following properties upon successful VERIFY
operation
isSuccess
(bool) Indicates if the artifact is verified successfully or not.results
: (list of strings) A list of strings that describe the outcomes of the verification process.name
: (string) The name of the verifier plugin which matches with the name provided as part of the registration.
Error
Plugins should output a JSON object with the following properties if they encounter an error
code
: A numeric error code as described belowmsg
: A short message describing the errordetails
: More details describing the error.
[TODO] Add the error codes after the implementation
Section 5: Plugin Implementation
The framework MAY provide libraries that can provide skeletons for writing plugins. These libraries can scaffold the parameter and configuration parsing and transformation and can define methods that the plugin writers can override for the implementation. These libraries also should catch any exceptions retruned from the plugins and return a proper error result to the framework. A simple CLI for example ratify plugin verifier add myverifier
to create a stub for a plugin using these libraries MAY be provided by the framework.
Appendix : Examples
A example protocol sequence for a verify
operation is given below
- The following framework configuration will be used for the example ([TBD] need to decide if it is JSON or YAML)
stores:
version: 1.0.0
plugins:
- name: ociregistry
useHttp: true
verifiers:
version: 1.0.0
plugins:
- name: notation
artifactTypes: application/vnd.cncf.notary.signature
verificationCerts:
- "/home/user/.notary/keys/wabbit-networks.crt"
- name: sbom
artifactTypes: application/x.example.sbom.v0
nestedReferences: application/vnd.cncf.notary.signature
executor:
cache: false
policy:
type: opa
policy: |
package ratify.rules
verify_artifact{
regex.match(".+.azurecr.io$", input.subject)
}
- The following descriptor fetched from the store
ociregistry
will be used as the reference for a subjectregistry.wabbit-networks.io:5000/net-monitor:signed@sha256:a0fc570a245b09ed752c42d600ee3bb5b4f77bbd70d8898780b7ab43454530eb
and will be verified
{
"mediaType": "application/vnd.cncf.oras.artifact.manifest.v1+json",
"digest": "sha256:5b0bcabd1ed22e9fb1310cf6c2dec7cdef19f0ad69efa1f392e94a4333501270",
"size": 7682,
"artifactType": "application/vnd.cncf.notary.signature"
}
- The framework uses the
artifactTypes
property to match the verifier plugin for the above reference type. In this case, the verifier with the namenotation
supports its verification. - The framework calls the plugin
notation
with the following environment variables
- RATIFY_VERIFIER_COMMAND :
VERIFY
- RATIFY_VERIFIER_SUBJECT:
registry.wabbit-networks.io:5000/net-monitor:signed@sha256:a0fc570a245b09ed752c42d600ee3bb5b4f77bbd70d8898780b7ab43454530eb
- RATIFY_VERIFIER_VERSION:
1.0.0
- It calls the plugin with the following JSON execution configuration
{
"config" : {
"name" : "notation",
"artifactTypes": "[application/vnd.cncf.notary.signature]",
"verificationCerts": ["/home/user/.notary/keys/wabbit-networks.crt"]
},
"storeConfig": {
"name": "ociregistry",
"useHttp": true
},
"referenceDesc": {
"mediaType": "application/vnd.cncf.oras.artifact.manifest.v1+json",
"digest": "sha256:5b0bcabd1ed22e9fb1310cf6c2dec7cdef19f0ad69efa1f392e94a4333501270",
"size": 7682,
"artifactType": "application/vnd.cncf.notary.signature"
}
}
- The
notation
verifies the artifact using the provided configuration and returns a following JSON result
{
"isSuccess": true,
"name": "notation",
"results": [
"signature verification success"
]
}
Section 6: Built in verifiers
Notation
Notation is a built in verifier to Ratify. Notation currently supports X.509 based PKI and identities, and uses a trust store and trust policy to determine if a signed artifact is considered authentic.
There are two ways to configure verification certificates:
verificationCerts
: Notation verifier will load all certificates from path specified in this array.verificationCertStores
: Defines a collection of Notary Project Trust Stores. Notary Project specification defines a Trust Policy, which is a policy construct to specify which identities and Trust Stores are trusted to produce artifacts in a verification. The name of KMP resource(s) must be accurately provided. When a KMP name is specifed, the notation verifier will be configured to trust all certificates fetched from that particular KMP resource.
NOTE:
verificationCertStores
supersedesverificationCerts
if both fields are specified. WARNING!: Starting in Ratify v1.2.0, theKeyManagementProvider
resource replacesCertificateStore
. It is NOT recommended to use bothCertificateStore
andKeyManagementProvider
resources together. If using helm to upgrade Ratify, please make sure to delete any existingCertificateStore
resources. For self-managedCertificateStore
resources, users should migrate to the equivalentKeyManagementProvider
. If migration is not possible and both resources must exist together, please make sure to use DIFFERENT names for each resource type. Ratify is configured to preferKMP
resources when a matchingCertificateStore
with same name is found.
In the following example, the verifier's configuration references 4 KeyManagementProvider
s, kmp-akv, kmp-akv1, kmp-akv2 and kmp-akv3. It shows a generic and permissive policy. Here, ca:certs
is the only trust store specified and the certs
suffix corresponds to the certs
certification collection listed in the verificationCertStores
section.
A sample notation verifier with verificationCertStores
defined:
apiVersion: config.ratify.deislabs.io/v1beta1
kind: Verifier
metadata:
name: verifier-notation
spec:
name: notation
artifactTypes: application/vnd.cncf.notary.signature
parameters:
verificationCertStores:
certs:
- gatekeeper-system/kmp-akv
- gatekeeper-system/kmp-akv1
certs1:
- gatekeeper-system/kmp-akv2
- gatekeeper-system/kmp-akv3
trustPolicyDoc:
version: "1.0"
trustPolicies:
- name: default
registryScopes:
- "*"
signatureVerification:
level: strict
trustStores:
- ca:certs
trustedIdentities:
- "*"
Breaking changes
In version v1.0.0-rc.7, Ratify updated the name of built-in verifier from notaryv2
to notation
in accordance with notaryproject spec
. As a result, notaryv2
verifier is only supported in Ratify v1.0.0-rc.6 and earlier versions. If you want to upgrade to v1.0.0-rc.7 or later, please update the verifier name to notation
in the configuration or CR. Additionally, please update notaryv2
to notation
in your constraint templates if verifier name was referenced. e.g. example constraint template.
Note: If both notaryv2
and notation
verifiers exist, Ratify might execute both of them while the notaryv2
verifier will fail the verification.