To facilitate commands that follow, store your Google Cloud project ID in an environment variable as follows:
PROJECT_ID=PROJECT_ID
where PROJECT_ID is the name of your project.
If the default project is not selected, set it now:
gcloud config set project ${PROJECT_ID}Create a cluster with Binary Authorization enabled Create the cluster
Now you can create a GKE cluster with Binary Authorization enabled. Here, you create a cluster named test-cluster
in the GKE zone us-central1-a
.
To create the cluster, follow these steps:
Visit the GKE menu in Google Cloud console.
Click Create Cluster.
Enter test-cluster
in the Name field.
Select Zonal in the Location type options.
Select us-central1-a
from the Zone drop-down list.
Click Availability, networking, security, and additional features.
In the Security section, select Enable Binary Authorization.
Select Enforce-only.
Click Create.
kubectl
You must also update the local kubeconfig
file for your kubectl
installation. This provides the credentials and endpoint information required to access the cluster in GKE.
To update the local kubeconfig
file, follow these steps:
gcloud container clusters get-credentials \ --zone us-central1-a \ test-clusterView the default policy
A policy in Binary Authorization is a set of rules that govern the deployment of container images. You can have one policy per project. By default, the policy is configured to allow all container images to be deployed.
To view the default policy, follow these steps:
Go to the Binary Authorization page in the Google Cloud console.
Click Edit Policy.
In Project Default Rule, the option Allow All Images is displayed.
Click Save Policy.
An attestor is the verification authority that the Binary Authorization enforcer uses at deploy time to decide whether to allow GKE to deploy the corresponding signed container image. The attestor contains the public key and is typically managed by people responsible for software supply chain security.
Creating an attestor requires you to:
For this tutorial, you have one attestor named test-attestor
. In a real-world scenario, you can have any number of attestors, each one representing a party that participates in the authorization process for the image.
Binary Authorization uses cryptographic keys to securely verify the identity of signers. This ensures that only authorized container images can deploy. The key pair consists of a private key and a public key. The signer uses the private key to sign the container image digest, producing a signature that is then stored in an attestation. The public key is stored in the attestor. At deploy time, the Binary Authorization enforcer uses the attestor's public key to verify the signature in the attestation before allowing the container to deploy.
In this tutorial, you use Public-Key Infrastructure (X.509) (PKIX) format for cryptographic keys. This tutorial uses the recommended Elliptic Curve Digital Signature Algorithm (ECDSA) to generate a PKIX key pair. You can also use RSA or PGP keys for signing. See Key purposes and algorithms for more information on signing algorithms.
The keys generated and stored by Cloud Key Management Service (Cloud KMS) are PKIX-compliant. See Creating attestors using the CLI for more information on using PKIX keys and Cloud KMS.
Warning: We strongly recommend against using locally generated key pairs in production environments as they present a security risk. We recommend that you instead use Cloud Key Management Service. This example is provided for illustrative purposes only.To generate a PKIX key pair, do the following:
Create the private key:
PRIVATE_KEY_FILE="/tmp/ec_private.pem" openssl ecparam -genkey -name prime256v1 -noout -out ${PRIVATE_KEY_FILE}
Extract the public key from the private key:
PUBLIC_KEY_FILE="/tmp/ec_public.pem" openssl ec -in ${PRIVATE_KEY_FILE} -pubout -out ${PUBLIC_KEY_FILE}
Now you can create the attestor itself in Binary Authorization and associate the public key that you created.
To create the attestor, do the following:
Return to the Binary Authorization page in the Google Cloud console.
In the Attestors tab, click Create.
Fill out the fields as follows:
Enter test-attestor
in the Attestor name field.
Verify Automatically create a Artifact Analysis note is checked.
Click Add a PKIX Public Key.
Open /tmp/ec_public.pem
in a text editor. This is the public key file that you created in the previous step. Copy the contents of the file to the Public key material text box.
Click Elliptic Curve P-256 - SHA256 Digest
in the Signature algorithm pull down.
Click Done.
Click Create to create the attestor.
Store the public key ID.
To view your attestor's public key ID after adding it to the attestor, use gcloud container binauthz attestors describe ${ATTESTOR_NAME}
. To create an environment variable to store the public key ID, execute the following command:
ATTESTOR_NAME=test-attestor
PUBLIC_KEY_ID=$(gcloud container binauthz attestors describe ${ATTESTOR_NAME}\
--format='value(userOwnedGrafeasNote.publicKeys[0].id)')
Now, you can configure your policy:
Return to the Binary Authorization page in Google Cloud console.
In the Policy tab, click Edit Policy.
Select Allow Only Images That Have Been Approved By the Following Attestors.
Click Add Attestors.
Click Add by project and attestor name.
Enter PROJECT_ID in the Project name field.
Enter test-attestor
in the Attestor name field.
Click Add 1 Attestor.
Click Save Policy.
For more information, see Configuring a Policy Using the Console.
Test the policyYou can test the policy you configured above by trying to deploy a sample container image to the cluster. The policy will block deployment because the required attestation has not been made.
For this tutorial, you can use sample images from Artifact Registry. The image from Artifact Registry is located at the path us-docker.pkg.dev/google-samples/containers/gke/hello-app:1.0
. The path contains a public image created by Google that contains a "Hello, World!" sample application.
To try to deploy the image, execute the following command:
kubectl run hello-server --image us-docker.pkg.dev/google-samples/containers/gke/hello-app:1.0 --port 8080
Now, verify that the deployment was blocked by Binary Authorization:
kubectl get pods
The command prints the following message, which indicates that the image was not deployed:
No resources found.
You can get further details about the deployment:
kubectl get event --template \ '{{range.items}}{{"\033[0;36m"}}{{.reason}}:{{"\033[0m"}}\{{.message}}{{"\n"}}{{end}}'
You see a response that resembles the following:
FailedCreate: Error creating: pods POD_NAME is forbidden: admission webhook "imagepolicywebhook.image-policy.k8s.io" denied the request: Image IMAGE_NAME denied by Binary Authorization default admission rule. Image IMAGE_NAME denied by ATTESTOR_NAME: No attestations found
In this output:
Make sure to delete the deployment so you can continue to the next step:
kubectl delete deployment hello-serverCreate an attestation
An attestation is a digital document created by a signer that certifies that GKE is allowed to deploy the associated container image. The process of creating an attestation is sometimes called "signing an image."
In this tutorial, you create an attestation for example images from Artifact Registry.
To create an attestation, do the following:
Set variables that store the registry path and digest of the image, and the attestor name:
Artifact RegistryIMAGE_PATH="us-docker.pkg.dev/google-samples/containers/gke/hello-app" IMAGE_DIGEST="sha256:37e5287945774f27b418ce567cd77f4bbc9ef44a1bcd1a2312369f31f9cce567" ATTESTOR="test-attestor" IMAGE_TO_ATTEST=${IMAGE_PATH}@${IMAGE_DIGEST}
Generate the attestation payload:
Note: In the following command, while an${IMAGE_PATH}
is required to create the signature payload for the attestation, only the ${IMAGE_DIGEST}
is used at deploy time. This means you can deploy an identical container image from multiple locations with the same attestation. Artifact Registry
gcloud container binauthz create-signature-payload \ --artifact-url=${IMAGE_PATH}@${IMAGE_DIGEST} > /tmp/generated_payload.json
The payload JSON file has the following contents:
{ "critical": { "identity": { "docker-reference": "us-docker.pkg.dev/google-samples/containers/gke/hello-app" }, "image": { "docker-manifest-digest": "sha256:37e5287945774f27b418ce567cd77f4bbc9ef44a1bcd1a2312369f31f9cce567" }, "type": "Google cloud binauthz container signature" } }
Sign the payload with your PKIX private key and output a signature file:
openssl dgst -sha256 -sign ${PRIVATE_KEY_FILE} /tmp/generated_payload.json > /tmp/ec_signature
The signature file is a digitally-signed version of the payload JSON file you created above.
Create and validate the attestation:
gcloud container binauthz attestations create \ --project="${PROJECT_ID}" \ --artifact-url="${IMAGE_TO_ATTEST}" \ --attestor="projects/${PROJECT_ID}/attestors/${ATTESTOR_NAME}" \ --signature-file=/tmp/ec_signature \ --public-key-id="${PUBLIC_KEY_ID}" \ --validate
where PUBLIC_KEY_ID
is the public key id that you found in Generate a PKIX key pair above.
The validate
flag checks that the attestation can be verified by the attestor you configured in your policy.
Verify that the attestation was created:
gcloud container binauthz attestations list \ --attestor=$ATTESTOR_NAME --attestor-project=$PROJECT_ID
For more information on creating attestations, see Creating Attestations.
Retest the policyAgain, test the policy by deploying a sample container image to the cluster. This time, you must deploy the image using the digest rather than a tag like 1.0
or latest
, as Binary Authorization will use the digest to look up attestations. Here, Binary Authorization allows the image to be deployed because the required attestation has been made.
To deploy the image, execute the following command:
kubectl run hello-server --image ${IMAGE_PATH}@${IMAGE_DIGEST} --port 8080
To verify that the image was deployed, execute the following command:
kubectl get pods
The command prints a message similar to the following, which indicates that deployment was successful:
NAME READY STATUS RESTARTS AGE hello-server-579859fb5b-h2k8s 1/1 Running 0 1m
To delete the pod, execute the following command:
kubectl delete pod hello-server
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4