Hora
A reference verifier in the framework is a component that is responsible to verify a specific artifact type(s) using the provided configuration. It provides the following capabilities
CanVerify
This document proposes a generic plugin-based solution for integrating different verifiers into the framework.
The following terms will be used throughout the document
The following sections of the document aims to specify the interface between "framework" and "plugins"
The key words "must", "must not", "required", "shall", "shall not", "should", "should not", "recommended", "may" and "optional" are used as specified in RFC 2119.
The verifier specification defines
The framework can be configured with a set of parameters that are used by both the framework and plugins. When a specific plugin is executed, its corresponding parameters will be passed as an execution configuration to the plugin. The framework MAY support dynamic updates to the configuration as needed and hence it is recommended for the plugins to not consider this configuration as static and always use the config passed by the framework for execution.
The verifier configuration is [TBD] YAML/JSON with the following properties
Property | Type | IsRequired | Description |
---|---|---|---|
version | string | true | The semantic version 2.0 of the verifier specification to which all configuration and data types conform. Currently it is 1.0.0 |
plugins | array | true | The array of verifier plugins and their configuration. This is a list of plugin configuration object described in the following section. |
The following are the keys used to describe configuration of individual plugins.
Property | Type | IsRequired | Description |
---|---|---|---|
name | string | true | The name of the plugin that should match with plugin binary on disk. Must not contain characters disallowed in file paths for the system (e.g. / or ) |
pluginBinDirs | array | false | The list of paths to look for the plugin binary to execute. Default: the home path of the framework. |
artifactTypes | array | true | The list of artifact types for which this verifier plugin has to be executed. [TBD] May change to matchingLabels |
nestedReferences | array | false | The list of artifact types for which this verifier should initiate nested verification. [TBD] This is subject to change as it is under review |
Any other fields specified for a plugin other than the above mentioned are considered as opaque. The framework MUST preserve unknown fields and pass through these fields to the plugins at the time of execution. Plugins may define additional fields that they accept and may generate an error if called with unknown fields.
verifiers:
version: 1.0.0
plugins:
- name: nv2verifier
artifactTypes: application/vnd.cncf.notary.v2
verificationCerts:
- "/home/user/.notary/keys/wabbit-networks.crt"
- name: sbom
artifactTypes: application/x.example.sbom.v0
nestedReferences: application/vnd.cncf.notary.v2
The framework defines an interface for all the capabilities provided by the verifier.
An interace defined in golang
:
type ReferenceVerifier interface {
Name() string
CanVerify(ctx context.Context, referenceDescriptor ocispecs.ReferenceDescriptor) bool
Verify(ctx context.Context,
subjectReference common.Reference,
referenceDescriptor ocispecs.ReferenceDescriptor,
referrerStore *referrerStore.Store,
executor executor.Executor
) (VerifierResult, error)
}
The method is used to get the name of the verifier.
The framework will invoke this method of the verifier to determine if it supports verification of a given artifact reference.
If verifier acknowledges its support for a reference type, the framework will invoke this method on the verifier to trigger the verification of the artifact reference. In addition to the artifact reference that has to be verified, the framework MUST include the associated referrer store and the framework's execution engine as part of the invocation. This will enable the verifier to query additional data from the store and also to initiate nested verification as needed.
The framework MUST provide a reference implementation of the verifier interface using the plugin architecture It will execute the configured plugins to implement the methods of the interface.
The interface method CanVerify
can be implemented by the framework using the verifier configuration without executing the plugin. It can use artifactTypes
key (or matchingLabels
) to determine the support of a verifier plugin for a given artifact reference.
Nested verification can also be handled by the framework with the use of executor engine that is pasased through the interface method.
The rest of the sections of the document defines the protocol for executing the plugins to implement the Verify
method of the verifier interface.
The protocol is based on the execution of binaries invoked by the framework. The framework passes parameters to the plugin via environment variables and configuration. The configuration is supplied via stdin
. The plugin returns the result on stdout
on success, or an error on stderr
if the verification fails. Configuration and results are encoded using JSON format.
There are two types of inputs that are passed to the plugin. They are parameters which define invokation specific settings and the other is configuration that includes verifier and store configuration settings.
Execution parameters are passed to the plugins via OS environment variables. The parameters that are passed to a verifier are defined below
VERIFY
{DNS/IP}/{Repository}:[name|digest]
version
field of the verifier configuration.When a plugin is registered using the configuration, the framework interprets the configuration per plugin and transforms it to a format that is expected by the plugin. This section describes the transformations made by the framework before the configuration is passed to the plugin.
The execution configuration for a plugin invocation is encoded in JSON. It will contain the plugin configuration that is provided by the user, primarily unchanged except for the specified additions
The execution configuration provided by the framework will contain the following fields.
config
: A JSON object representing the plugin configuration provided as part of registration with the framework and passed unchanged.storeConfig
: A JSON object representing the configuration of the store that will be used to create a store plugin to fetch additional data needed for verificationreferenceDesc
: A JSON object that has the descriptor properties of a reference type.Plugins can return either a Success or Error result type.
The output of the verification process will be returned by the plugin. It MUST output a JSON object with the following properties upon successful VERIFY
operation
isSuccess
(bool) Indicates if the artifact is verified successfully or not.results
: (list of strings) A list of strings that describe the outcomes of the verification process.name
: (string) The name of the verifier plugin which matches with the name provided as part of the registration.Plugins should output a JSON object with the following properties if they encounter an error
code
: A numeric error code as described belowmsg
: A short message describing the errordetails
: More details describing the error.[TODO] Add the error codes after the implementation
The framework MAY provide libraries that can provide skeletons for writing plugins. These libraries can scaffold the parameter and configuration parsing and transformation and can define methods that the plugin writers can override for the implementation. These libraries also should catch any exceptions retruned from the plugins and return a proper error result to the framework. A simple CLI for example hora plugin verifier add myverifier
to create a stub for a plugin using these libraries MAY be provided by the framework.
A example protocol sequence for a verify
operation is given below
stores:
version: 1.0.0
plugins:
- name: ociregistry
useHttp: true
verifiers:
version: 1.0.0
plugins:
- name: nv2verifier
artifactTypes: application/vnd.cncf.notary.v2
verificationCerts:
- "/home/user/.notary/keys/wabbit-networks.crt"
- name: sbom
artifactTypes: application/x.example.sbom.v0
nestedReferences: application/vnd.cncf.notary.v2
executor:
cache: false
policy:
type: opa
policy: |
package hora.rules
verify_artifact{
regex.match(".+.azurecr.io$", input.subject)
}
ociregistry
will be used as the reference for a subject registry.wabbit-networks.io:5000/net-monitor:signed@sha256:a0fc570a245b09ed752c42d600ee3bb5b4f77bbd70d8898780b7ab43454530eb
and will be verified
{
"mediaType": "application/vnd.cncf.oras.artifact.manifest.v1+json",
"digest": "sha256:5b0bcabd1ed22e9fb1310cf6c2dec7cdef19f0ad69efa1f392e94a4333501270",
"size": 7682,
"artifactType": "application/vnd.cncf.notary.v2"
}
artifactTypes
property to match the verifier plugin for the above reference type. In this case, the verifier with the name nv2verifier
supports its verification.nv2verifier
with the following environment variablesVERIFY
registry.wabbit-networks.io:5000/net-monitor:signed@sha256:a0fc570a245b09ed752c42d600ee3bb5b4f77bbd70d8898780b7ab43454530eb
1.0.0
{
"config" : {
"name" : "nv2verifier",
"artifactTypes": "[application/vnd.cncf.notary.v2]",
"verificationCerts": ["/home/user/.notary/keys/wabbit-networks.crt"]
},
"storeConfig": {
"name": "ociregistry",
"useHttp": true
},
"referenceDesc": {
"mediaType": "application/vnd.cncf.oras.artifact.manifest.v1+json",
"digest": "sha256:5b0bcabd1ed22e9fb1310cf6c2dec7cdef19f0ad69efa1f392e94a4333501270",
"size": 7682,
"artifactType": "application/vnd.cncf.notary.v2"
}
}
nv2verifier
verifies the artifact using the provided configuration and returns a following JSON result
{
"isSuccess": true,
"name": "nv2verifier",
"results": [
"signature verification success"
]
}