-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add more notation attributes to values.yaml #1982
base: dev
Are you sure you want to change the base?
feat: add more notation attributes to values.yaml #1982
Conversation
c4f857c
to
ed37c20
Compare
Codecov ReportAll modified and coverable lines are covered by tests ✅ |
636dae5
to
1d9740d
Compare
Signed-off-by: Shahram Kalantari <[email protected]>
1d9740d
to
ecfa7f3
Compare
signatureVerification: | ||
level: strict | ||
trustStores: | ||
- ca: certs |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How can different trust policies use different stores?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
How can different trust policies use different stores?
Consider the following verifier.yaml:
apiVersion: config.ratify.deislabs.io/v1beta1
kind: Verifier
metadata:
name: verifier-notation
spec:
name: notation
artifactTypes: application/vnd.cncf.notary.signature
parameters:
verificationCertStores:
my_private_cert:
- kmpprovider-akv
my_public_cert:
- inline_mar_images
trustPolicyDoc:
version: "1.0"
trustPolicies:
- name: my_private_registry
registryScopes:
- "skalantari_registry.azurecr.io/*"
signatureVerification:
level: strict
trustStores:
- ca:my_private_cert
trustedIdentities:
- "my identity"
- name: mar_images
registryScopes:
- "mcr.azurecr.io/*"
signatureVerification:
level: strict
trustStores:
- ca:inline_mar_images
trustedIdentities:
- "mar identity"
It defines two trustPolicies, each include their trustStores, trustedIdentities, and registryScopes. In my PR, I moved this section to values.yaml so that the user can configure it before the installation. Note that verificationCertStores is filled with the values specified in values.yaml too (notationCerts in values.yaml is used)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Can you describe how users configure values.yaml for the verifier.yaml example?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think what @yizha1 is getting is how would the user from the helm chart be able to set up the verificationCertStores
field because that would require the mapping between the notation trust store name and the ratify KMP names that belong to that trust store.
Description
What this PR does / why we need it:
Currently, helm chart parameters exist for ORAS stores and KMP resources, but not for Notation Verifier. We need to add parameters for setting up Notation Verifier.
Which issue(s) this PR fixes (optional, using
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when the PR gets merged):Fixes #1965
Type of change
Please delete options that are not relevant.
main
branch)How Has This Been Tested?
Checklist:
Post Merge Requirements
Helm Chart Change