As part of signature verification workflow, users need to configure the trust policy configuration file to specify trusted identities that signed the artifacts, the level of signature verification to use and other settings. For more details, see trust policy specification and examples.
The notation policy
command provides a user-friendly way to manage trust policies. It allows users to show trust policy configuration, import/export a trust policy configuration file from/to a JSON file. To get started user can refer to the following trust policy configuration sample. In this sample, there are four policies configured for different requirements:
- The Policy named "wabbit-networks-images" is for verifying images signed by Wabbit Networks and stored in two repositories
registry.acme-rockets.io/software/net-monitor
andregistry.acme-rockets.io/software/net-logger
. - Policy named "unsigned-image" is for skipping the verification on unsigned images stored in repository
registry.acme-rockets.io/software/unsigned/net-utils
. - Policy "allow-expired-images" is for logging instead of failing expired images stored in repository
registry.acme-rockets.io/software/legacy/metrics
. - Policy "global-policy-for-all-other-images" is for verifying any other images that signed by the ACME Rockets.
{
"version": "1.0",
"trustPolicies": [
{
"name": "wabbit-networks-images",
"registryScopes": [
"registry.acme-rockets.io/software/net-monitor",
"registry.acme-rockets.io/software/net-logger"
],
"signatureVerification": {
"level": "strict"
},
"trustStores": [
"ca:wabbit-networks",
],
"trustedIdentities": [
"x509.subject: C=US, ST=WA, L=Seattle, O=wabbit-networks.io, OU=Security Tools"
]
},
{
"name": "unsigned-image",
"registryScopes": [ "registry.acme-rockets.io/software/unsigned/net-utils" ],
"signatureVerification": {
"level" : "skip"
}
},
{
"name": "allow-expired-images",
"registryScopes": [ "registry.acme-rockets.io/software/legacy/metrics" ],
"signatureVerification": {
"level" : "strict",
"override" : {
"expiry" : "log"
}
},
"trustStores": ["ca:acme-rockets"],
"trustedIdentities": ["*"]
},
{
"name": "global-policy-for-all-other-images",
"registryScopes": [ "*" ],
"signatureVerification": {
"level": "strict"
},
"trustStores": [
"ca:acme-rockets"
],
"trustedIdentities": [
"x509.subject: C=US, ST=WA, L=Seattle, O=acme-rockets.io, CN=SecureBuilder"
]
}
]
}
Manage trust policy configuration for signature verification.
Usage:
notation policy [command]
Available Commands:
import import trust policy configuration from a JSON file
show show trust policy configuration
Flags:
-h, --help help for policy
Import trust policy configuration from a JSON file
Usage:
notation policy import [flags] <file_path>
Flags:
-d, --debug debug mode
--force override the existing trust policy configuration, never prompt
-h, --help help for import
-v, --verbose verbose mode
Show trust policy configuration
Usage:
notation policy show [flags]
Flags:
-d, --debug debug mode
-h, --help help for show
-v, --verbose verbose mode
An example of import trust policy configuration from a JSON file:
notation policy import ./my_policy.json
The trust policy configuration in the JSON file should be validated according to trust policy properties. A successful message should be printed out if trust policy configuration are imported successfully. Error logs including the reason should be printed out if the importing fails.
If there is an existing trust policy configuration, prompt for users to confirm whether discarding existing configuration or not. Users can use --force
flag to discard existing trust policy configuration without prompt.
Use the following command to show trust policy configuration:
notation policy show
Upon successful execution, the trust policy configuration are printed out in a pretty JSON format. If trust policy is not configured, users should receive an error message, and a tip to import trust policy configuration from a JSON file.
Users can redirect the output of command notation policy show
to a JSON file.
notation policy show > ./trust_policy.json
The steps to update trust policy configuration:
-
Export trust policy configuration into a JSON file.
notation policy show > ./trust_policy.json
-
Edit the exported JSON file "trust_policy.json", update trust policy configuration and save the file.
-
Import trust policy configuration from the file.
notation policy import ./trust_policy.json