Uploaded image for project: 'Operator Runtime'
  1. Operator Runtime
  2. OPRUN-3470

Runtime validation of container images using sigstore signatures

    • Icon: Epic Epic
    • Resolution: Done
    • Icon: Major Major
    • None
    • None
    • Runtime validation of container images using sigstore signatures
    • Strategic Product Work
    • 11
    • False
    • None
    • False
    • Not Selected
    • To Do
    • OCPSTRAT-1347 - [GA release] Next-gen OLM (OLM v1)
    • OCPSTRAT-1347[GA release] Next-gen OLM (OLM v1)
    • 0% To Do, 0% In Progress, 100% Done

      NOTE: All features will be tech-preview in the first release and then will graduate to GA in the next release or when it is ready for GA.

      Epic Goal

      • Runtime validation of container images using sigstore signatures.

      Why is this important?

      • The Red Hat-sponsored Sigstore project is gaining traction in the Kubernetes community, aiming to simplify the signing of cloud-native artifacts. OpenShift leverages Sigstore tooling to enable scalable and flexible signature validation, including support for disconnected environments. This functionality will be available as a Tech Preview in 4.17 and is targeted for General Availability (GA) in the upcoming 4.18 release. To fully support this integration, the (cluster)extension lifecycle management needs to (be prepared to) handle runtime validation of Sigstore signatures for container images.
      •  

      Scenarios

      1. ...

      Acceptance Criteria

      • CI - MUST be running successfully with tests automated
      • Release Technical Enablement - Provide necessary release enablement details and documents.
      • ...

      Dependencies (internal and external)

      1. ...

      Previous Work (Optional):

      1. โ€ฆ

      Open questions::

      1. Very high level intro questions:
        1. What is sigstore?
        2. How does it work?
        3. Where is it already integrated?
        4. Are there Go libraries available that abstract its core functionality?
      2. Which OLM-related images do users expect to be subject to image signature verification?
      3. How are users of OLM expected to interact with sigstore-related features?
        1. Will any OLM user want to enable or disable image signature verification separately from any defaults? If so, how is that expected to work for each of the following classes of images.
          1. For Catalogs
          2. For Bundles
          3. For operator and related images
        2. Will any OLM user want to be able to define specific verification configurations for catalog, bundle, operator, or operand images (e.g. a separate CA for verification)?
          1. If so, what sorts of things should be configurable?
        3. If an image is not signed, what is OLM expected to do?
        4. If an image signature is invalid, what is OLM expected to do?
      4. Does this feature preclude OLM from using other distribution mechanisms and protocols?
      5. Do all image registry clients need to perform image signature verification? If only a subset, why that particular subset? (Thinking of opm, kubectl-operator, etc.)
      6. For the OLM content distribution persona, how can OLM facilitate signing of their OLM artifacts?
      7. Is it sufficient to delegate all image signature verification functionality to an underlying CRI?
        1. If so, how will OLM users know if the underlying CRI implements image signature verification?
        2. If so, how will image signature verification work for non-runnable images
          1. helm OCI artifacts
          2. potential future for OLM-specific OCI artifacts for catalogs and bundles.

      Done Checklist

      • CI - CI is running, tests are automated and merged.
      • Release Enablement <link to Feature Enablement Presentation>
      • DEV - Upstream code and tests merged: <link to meaningful PR or GitHub Issue>
      • DEV - Upstream documentation merged: <link to meaningful PR or GitHub Issue>
      • DEV - Downstream build attached to advisory: <link to errata>
      • QE - Test plans in Polarion: <link or reference to Polarion>
      • QE - Automated tests merged: <link or reference to automated tests>
      • DOC - Downstream documentation merged: <link to meaningful PR>

            [OPRUN-3470] Runtime validation of container images using sigstore signatures

            Joe Lanford added a comment -

            Looks great! `tc-approved` label added.

            Joe Lanford added a comment - Looks great! `tc-approved` label added.

            Jian Zhang added a comment -

            ok, we will test and update this story soon. cc: rhn-support-kuiwang 

            Jian Zhang added a comment - ok, we will test and update this story soon. cc: rhn-support-kuiwang  

            I agree with Joe, we need to test this from OLM point of view. Specially because the core work got done as part of another feature.

            Lalatendu Mohanty added a comment - I agree with Joe, we need to test this from OLM point of view. Specially because the core work got done as part of another feature.

            Joe Lanford added a comment -

            rhn-support-jiazha I think we may still want this to be tested in the context of OLM because OLM is the client that is reading/loading `/etc/containers/policy.json` and then using it when calling the containers/image library to pull an image.

            It is possible that we have a bug in our code that is different than the code that exists in cri-o to pull images.

            Joe Lanford added a comment - rhn-support-jiazha I think we may still want this to be tested in the context of OLM because OLM is the client that is reading/loading `/etc/containers/policy.json` and then using it when calling the containers/image library to pull an image. It is possible that we have a bug in our code that is different than the code that exists in cri-o to pull images.

            Joe Lanford added a comment -

            rhn-support-jiazha We did not end up having time to do an official design for image signature verification in the 4.18 cycle. However, as part of https://issues.redhat.com/browse/OPRUN-3460 and the switch to using the containers/image library, we ended up having to implement something.

            That something was to use whatever configuration we find in the mounted /etc/containers directory. And if nothing is found, don't do image signature verification.

            Tests should verify that the cluster's global signature policy is honored when catalog and bundle images are pulled by catalogd and operator-controller. Because of the lack of design, the engineering team does not consider image signature verification to be a specific feature of OLMv1 (yet). However we may be able to retroactively write a design doc and declare it as a feature if it turns out the existing implementation is sufficient/correct.

            If the implementation that occurred as part of OPRUN-3460 is buggy in its attempt to support image pulling, we can fix those as bugs. However if there are structural or conceptual problems with the current implementation, fixing those will require designs and the solution may not be backport-able.

            Joe Lanford added a comment - rhn-support-jiazha We did not end up having time to do an official design for image signature verification in the 4.18 cycle. However, as part of https://issues.redhat.com/browse/OPRUN-3460 and the switch to using the containers/image library, we ended up having to implement something . That something was to use whatever configuration we find in the mounted /etc/containers directory. And if nothing is found, don't do image signature verification. Tests should verify that the cluster's global signature policy is honored when catalog and bundle images are pulled by catalogd and operator-controller. Because of the lack of design, the engineering team does not consider image signature verification to be a specific feature of OLMv1 (yet). However we may be able to retroactively write a design doc and declare it as a feature if it turns out the existing implementation is sufficient/correct. If the implementation that occurred as part of OPRUN-3460 is buggy in its attempt to support image pulling, we can fix those as bugs. However if there are structural or conceptual problems with the current implementation, fixing those will require designs and the solution may not be backport-able.

            Jian Zhang added a comment -

            Hi rhn-coreos-tunwu , sorry for the late reply. I don't think this feature is finished, but wait for jlanford@redhat.com 's confirmation. 

            Jian Zhang added a comment - Hi rhn-coreos-tunwu , sorry for the late reply. I don't think this feature is finished, but wait for jlanford@redhat.com 's confirmation. 

            Tony Wu added a comment -

            lmohanty@redhat.com, jlanford@redhat.com, rhn-support-jiazha, do we end up verifying this work with the OCP 4.18 release?  Were any tests done already? 

            Tony Wu added a comment - lmohanty@redhat.com , jlanford@redhat.com , rhn-support-jiazha , do we end up verifying this work with the OCP 4.18 release?  Were any tests done already? 

            Jian Zhang added a comment -

            Hi jlanford@redhat.com and lmohanty@redhat.com , since the branch readiness (November 20) is approaching, should we update the TargetVersion to openshift-4.19? Thanks!

            Jian Zhang added a comment - Hi jlanford@redhat.com and lmohanty@redhat.com , since the branch readiness (November 20) is approaching, should we update the TargetVersion to openshift-4.19? Thanks!

            Joe Lanford added a comment -

            I unset targetVersion (which was originally set to 4.18). We have not made any progress on this epic, and we are not expecting to deliver it in 4.18.

            Joe Lanford added a comment - I unset targetVersion (which was originally set to 4.18). We have not made any progress on this epic, and we are not expecting to deliver it in 4.18.

              Unassigned Unassigned
              lmohanty@redhat.com Lalatendu Mohanty
              Kui Wang Kui Wang
              Votes:
              0 Vote for this issue
              Watchers:
              6 Start watching this issue

                Created:
                Updated:
                Resolved: