55f5106f6a
This is an automated DistroBaker update from upstream sources. If you do not know what this is about or would like to opt out, contact the OSCI team. Source: https://src.fedoraproject.org/rpms/skopeo.git#d61b3acc1f66d4464a5cfa8be0dd8e72416d434a
283 lines
11 KiB
Markdown
283 lines
11 KiB
Markdown
% CONTAINERS-POLICY.JSON(5) policy.json Man Page
|
|
% Miloslav Trmač
|
|
% September 2016
|
|
|
|
# NAME
|
|
containers-policy.json - syntax for the signature verification policy file
|
|
|
|
## DESCRIPTION
|
|
|
|
Signature verification policy files are used to specify policy, e.g. trusted keys,
|
|
applicable when deciding whether to accept an image, or individual signatures of that image, as valid.
|
|
|
|
By default, the policy is read from `$HOME/.config/containers/policy.json`, if it exists, otherwise from `/etc/containers/policy.json`; applications performing verification may allow using a different policy instead.
|
|
|
|
## FORMAT
|
|
|
|
The signature verification policy file, usually called `policy.json`,
|
|
uses a JSON format. Unlike some other JSON files, its parsing is fairly strict:
|
|
unrecognized, duplicated or otherwise invalid fields cause the entire file,
|
|
and usually the entire operation, to be rejected.
|
|
|
|
The purpose of the policy file is to define a set of *policy requirements* for a container image,
|
|
usually depending on its location (where it is being pulled from) or otherwise defined identity.
|
|
|
|
Policy requirements can be defined for:
|
|
|
|
- An individual *scope* in a *transport*.
|
|
The *transport* values are the same as the transport prefixes when pushing/pulling images (e.g. `docker:`, `atomic:`),
|
|
and *scope* values are defined by each transport; see below for more details.
|
|
|
|
Usually, a scope can be defined to match a single image, and various prefixes of
|
|
such a most specific scope define namespaces of matching images.
|
|
- A default policy for a single transport, expressed using an empty string as a scope
|
|
- A global default policy.
|
|
|
|
If multiple policy requirements match a given image, only the requirements from the most specific match apply,
|
|
the more general policy requirements definitions are ignored.
|
|
|
|
This is expressed in JSON using the top-level syntax
|
|
```js
|
|
{
|
|
"default": [/* policy requirements: global default */]
|
|
"transports": {
|
|
transport_name: {
|
|
"": [/* policy requirements: default for transport $transport_name */],
|
|
scope_1: [/* policy requirements: default for $scope_1 in $transport_name */],
|
|
scope_2: [/*…*/]
|
|
/*…*/
|
|
},
|
|
transport_name_2: {/*…*/}
|
|
/*…*/
|
|
}
|
|
}
|
|
```
|
|
|
|
The global `default` set of policy requirements is mandatory; all of the other fields
|
|
(`transports` itself, any specific transport, the transport-specific default, etc.) are optional.
|
|
|
|
<!-- NOTE: Keep this in sync with transports/transports.go! -->
|
|
## Supported transports and their scopes
|
|
|
|
### `atomic:`
|
|
|
|
The `atomic:` transport refers to images in an Atomic Registry.
|
|
|
|
Supported scopes use the form _hostname_[`:`_port_][`/`_namespace_[`/`_imagestream_ [`:`_tag_]]],
|
|
i.e. either specifying a complete name of a tagged image, or prefix denoting
|
|
a host/namespace/image stream.
|
|
|
|
*Note:* The _hostname_ and _port_ refer to the Docker registry host and port (the one used
|
|
e.g. for `docker pull`), _not_ to the OpenShift API host and port.
|
|
|
|
### `dir:`
|
|
|
|
The `dir:` transport refers to images stored in local directories.
|
|
|
|
Supported scopes are paths of directories (either containing a single image or
|
|
subdirectories possibly containing images).
|
|
|
|
*Note:* The paths must be absolute and contain no symlinks. Paths violating these requirements may be silently ignored.
|
|
|
|
The top-level scope `"/"` is forbidden; use the transport default scope `""`,
|
|
for consistency with other transports.
|
|
|
|
### `docker:`
|
|
|
|
The `docker:` transport refers to images in a registry implementing the "Docker Registry HTTP API V2".
|
|
|
|
Scopes matching individual images are named Docker references *in the fully expanded form*, either
|
|
using a tag or digest. For example, `docker.io/library/busybox:latest` (*not* `busybox:latest`).
|
|
|
|
More general scopes are prefixes of individual-image scopes, and specify a repository (by omitting the tag or digest),
|
|
a repository namespace, or a registry host (by only specifying the host name).
|
|
|
|
### `oci:`
|
|
|
|
The `oci:` transport refers to images in directories compliant with "Open Container Image Layout Specification".
|
|
|
|
Supported scopes use the form _directory_`:`_tag_, and _directory_ referring to
|
|
a directory containing one or more tags, or any of the parent directories.
|
|
|
|
*Note:* See `dir:` above for semantics and restrictions on the directory paths, they apply to `oci:` equivalently.
|
|
|
|
### `tarball:`
|
|
|
|
The `tarball:` transport refers to tarred up container root filesystems.
|
|
|
|
Scopes are ignored.
|
|
|
|
## Policy Requirements
|
|
|
|
Using the mechanisms above, a set of policy requirements is looked up. The policy requirements
|
|
are represented as a JSON array of individual requirement objects. For an image to be accepted,
|
|
*all* of the requirements must be satisfied simulatenously.
|
|
|
|
The policy requirements can also be used to decide whether an individual signature is accepted (= is signed by a recognized key of a known author);
|
|
in that case some requirements may apply only to some signatures, but each signature must be accepted by *at least one* requirement object.
|
|
|
|
The following requirement objects are supported:
|
|
|
|
### `insecureAcceptAnything`
|
|
|
|
A simple requirement with the following syntax
|
|
|
|
```json
|
|
{"type":"insecureAcceptAnything"}
|
|
```
|
|
|
|
This requirement accepts any image (but note that other requirements in the array still apply).
|
|
|
|
When deciding to accept an individual signature, this requirement does not have any effect; it does *not* cause the signature to be accepted, though.
|
|
|
|
This is useful primarily for policy scopes where no signature verification is required;
|
|
because the array of policy requirements must not be empty, this requirement is used
|
|
to represent the lack of requirements explicitly.
|
|
|
|
### `reject`
|
|
|
|
A simple requirement with the following syntax:
|
|
|
|
```json
|
|
{"type":"reject"}
|
|
```
|
|
|
|
This requirement rejects every image, and every signature.
|
|
|
|
### `signedBy`
|
|
|
|
This requirement requires an image to be signed with an expected identity, or accepts a signature if it is using an expected identity and key.
|
|
|
|
```js
|
|
{
|
|
"type": "signedBy",
|
|
"keyType": "GPGKeys", /* The only currently supported value */
|
|
"keyPath": "/path/to/local/keyring/file",
|
|
"keyData": "base64-encoded-keyring-data",
|
|
"signedIdentity": identity_requirement
|
|
}
|
|
```
|
|
<!-- Later: other keyType values -->
|
|
|
|
Exactly one of `keyPath` and `keyData` must be present, containing a GPG keyring of one or more public keys. Only signatures made by these keys are accepted.
|
|
|
|
The `signedIdentity` field, a JSON object, specifies what image identity the signature claims about the image.
|
|
One of the following alternatives are supported:
|
|
|
|
- The identity in the signature must exactly match the image identity. Note that with this, referencing an image by digest (with a signature claiming a _repository_`:`_tag_ identity) will fail.
|
|
|
|
```json
|
|
{"type":"matchExact"}
|
|
```
|
|
- If the image identity carries a tag, the identity in the signature must exactly match;
|
|
if the image identity uses a digest reference, the identity in the signature must be in the same repository as the image identity (using any tag).
|
|
|
|
(Note that with images identified using digest references, the digest from the reference is validated even before signature verification starts.)
|
|
|
|
```json
|
|
{"type":"matchRepoDigestOrExact"}
|
|
```
|
|
- The identity in the signature must be in the same repository as the image identity. This is useful e.g. to pull an image using the `:latest` tag when the image is signed with a tag specifing an exact image version.
|
|
|
|
```json
|
|
{"type":"matchRepository"}
|
|
```
|
|
- The identity in the signature must exactly match a specified identity.
|
|
This is useful e.g. when locally mirroring images signed using their public identity.
|
|
|
|
```js
|
|
{
|
|
"type": "exactReference",
|
|
"dockerReference": docker_reference_value
|
|
}
|
|
```
|
|
- The identity in the signature must be in the same repository as a specified identity.
|
|
This combines the properties of `matchRepository` and `exactReference`.
|
|
|
|
```js
|
|
{
|
|
"type": "exactRepository",
|
|
"dockerRepository": docker_repository_value
|
|
}
|
|
```
|
|
|
|
If the `signedIdentity` field is missing, it is treated as `matchRepoDigestOrExact`.
|
|
|
|
*Note*: `matchExact`, `matchRepoDigestOrExact` and `matchRepository` can be only used if a Docker-like image identity is
|
|
provided by the transport. In particular, the `dir:` and `oci:` transports can be only
|
|
used with `exactReference` or `exactRepository`.
|
|
|
|
<!-- ### `signedBaseLayer` -->
|
|
|
|
## Examples
|
|
|
|
It is *strongly* recommended to set the `default` policy to `reject`, and then
|
|
selectively allow individual transports and scopes as desired.
|
|
|
|
### A reasonably locked-down system
|
|
|
|
(Note that the `/*`…`*/` comments are not valid in JSON, and must not be used in real policies.)
|
|
|
|
```js
|
|
{
|
|
"default": [{"type": "reject"}], /* Reject anything not explicitly allowed */
|
|
"transports": {
|
|
"docker": {
|
|
/* Allow installing images from a specific repository namespace, without cryptographic verification.
|
|
This namespace includes images like openshift/hello-openshift and openshift/origin. */
|
|
"docker.io/openshift": [{"type": "insecureAcceptAnything"}],
|
|
/* Similarly, allow installing the “official” busybox images. Note how the fully expanded
|
|
form, with the explicit /library/, must be used. */
|
|
"docker.io/library/busybox": [{"type": "insecureAcceptAnything"}]
|
|
/* Other docker: images use the global default policy and are rejected */
|
|
},
|
|
"dir": {
|
|
"": [{"type": "insecureAcceptAnything"}] /* Allow any images originating in local directories */
|
|
},
|
|
"atomic": {
|
|
/* The common case: using a known key for a repository or set of repositories */
|
|
"hostname:5000/myns/official": [
|
|
{
|
|
"type": "signedBy",
|
|
"keyType": "GPGKeys",
|
|
"keyPath": "/path/to/official-pubkey.gpg"
|
|
}
|
|
],
|
|
/* A more complex example, for a repository which contains a mirror of a third-party product,
|
|
which must be signed-off by local IT */
|
|
"hostname:5000/vendor/product": [
|
|
{ /* Require the image to be signed by the original vendor, using the vendor's repository location. */
|
|
"type": "signedBy",
|
|
"keyType": "GPGKeys",
|
|
"keyPath": "/path/to/vendor-pubkey.gpg",
|
|
"signedIdentity": {
|
|
"type": "exactRepository",
|
|
"dockerRepository": "vendor-hostname/product/repository"
|
|
}
|
|
},
|
|
{ /* Require the image to _also_ be signed by a local reviewer. */
|
|
"type": "signedBy",
|
|
"keyType": "GPGKeys",
|
|
"keyPath": "/path/to/reviewer-pubkey.gpg"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
}
|
|
```
|
|
|
|
### Completely disable security, allow all images, do not trust any signatures
|
|
|
|
```json
|
|
{
|
|
"default": [{"type": "insecureAcceptAnything"}]
|
|
}
|
|
```
|
|
## SEE ALSO
|
|
atomic(1)
|
|
|
|
## HISTORY
|
|
August 2018, Rename to containers-policy.json(5) by Valentin Rothberg <vrothberg@suse.com>
|
|
|
|
September 2016, Originally compiled by Miloslav Trmač <mitr@redhat.com>
|