In the beginning, I believe it is worth saying that this project is just a proof-of-concept project that shows people how they can use cosign and OPA (Open Policy Agent) together to implement the signing and verifying container image process together.
In most basic form, cosign is a container signing tool; it helps us to sign and verify container images by using the signature algorithm (ECDSA-P256) and payload format (Red Hat Simple Signing).
Dan Lorenc, who is one of the maintainers of the project, wrote an excellent article about what cosign is and the motivation behind it; you can follow the link to access it.
On the other hand side, the Open Policy Agent (OPA, pronounced "oh-pa") is an open-source, general-purpose policy engine that unifies policy enforcement across the stack. So, the motivation behind using this kind of policy engine is providing an easy way of enforcing organizational policies across the stack.
Let's assume that we have to ensure only the images that have valid signatures can be deployed into production-grade Kubernetes clusters. So, to implement this kind of scenario is that we can use OPA's http.send built-in function to call some external service an HTTP server that exposes /verify
endpoint and uses cosign
under the hood to verify the signature of an image.
This is what we want to achieve at the end of the day:
- Define the
package
:
package signature
- Assign default value to the
verified
rule:
default verified = false
- Create the rule body:
verified {
# read the `image` from the `input` that will be verified
body := { "image": input.image }
# hardcoded consts
headers_json := { "Content-Type": "application/json" }
cosignHTTPWrapperURL := "http://localhost:8080/verify"
# send HTTP POST request to cosign-wrapper
output := http.send({"method": "post", "url": cosignHTTPWrapperURL, "headers": headers_json, "body": body})
# check if result verified
output.body.verified
}
P.S: In this demo, we used the http
, and ignored the authentication
process. Better use the https
.
Run the OPA Server with pre-loaded Rego policies
$ opa run --server rego
{"addrs":[":8181"],"diagnostic-addrs":[],"level":"info","msg":"Initializing server.","time":"2021-07-14T23:19:49+03:00"}
$ cosign generate-key-pair
input.json
:
{ "input": { "image": "gcr.io/developerguy-311909/ubuntu:unsigned"} }
- Test with unsigned image:
$ curl -X POST :8181/v1/data/signature/verified -H "Content-Type: application/json" -d "@input.json"
{"result":false}
# OPA Log
{"client_addr":"[::1]:62078","level":"info","msg":"Sent response.","req_id":2,"req_method":"POST","req_path":"/v1/data/signature/verified","resp_bytes":16,"resp_duration":2.107975,"resp_status":200,"time":"2021-07-14T23:22:47+03:00"}
- Sign:
$ cosign sign -key cosign.key $IMAGE
Pushing signature to: ...
- Test with signed image:
$ curl -X POST :8181/v1/data/signature/verified -H "Content-Type: application/json" -d "@input.json"
{"result":true}
You should notice that we worked on the local environment to make that happen; of course, there is an alternative way of implementing this kind of demonstration. You can do the same in the Kubernetes environment. To do that, you can use OPA Gatekeeper, which is a customizable AdmissionWebhook, instead of using just OPA in the bare minimum and running cosign-http-wrapper
as a Pod.
You can implement a way of protecting Kubernetes clusters from an unsigned image by just using cosign and OPA seamlessly.