The policy-controller
admission controller can be used to enforce policy on a Kubernetes cluster based on verifiable supply-chain metadata from cosign
.
policy-controller
also resolves the image tags to ensure the image being ran is not different from when it was admitted.
See the installation instructions for more information.
Today, policy-controller
can automatically validate signatures and attestations on container images. Enforcement is configured on a per-namespace basis, and multiple keys are supported.
We're actively working on more features here.
For more information about the policy-controller
, have a look at our documentation website here.
Please see the examples/ directory for example policies etc.
This repo includes a policy-tester
tool which enables checking a policy against various images.
In the root of this repo, run the following to build:
Then run it pointing to a YAML file containing a ClusterImagePolicy, and an image to evaluate the policy against:
(set -o pipefail && \
./policy-tester \
--policy=test/testdata/policy-controller/tester/cip-public-keyless.yaml \
--image=ghcr.io/sigstore/cosign/cosign:v1.9.0 | jq)
You can spin up a local Kind K8s cluster to test local changes to the policy controller using the local-dev
CLI tool. Build the tool with make local-dev
and then run it with ./bin/local-dev setup
.
It optionally accepts the following:
--cluster-name
--k8s-version
--registry-url
You can clean up the cluster with ./bin/local-dev clean --cluster-name=<my cluster name>
.
You will need to have the following tools installed to use this:
If you would like to use the local Kind registry instead of a live one, do not include the registry-url
flag when calling the CLI. It will default to using the local registry. But before running the CLI, you must add the following line to your /etc/hosts
file first: 127.0.0.1 registry.local
To allow the webhook to make requests to ACR, you must use one of the following methods to authenticate:
See the official documentation.
Managed Identities for AKS ClustersSee the official documentation for more details.
--enable-managed-identities
flag with either the az aks create
or az aks update
commands--attach-acr
with either the az aks create
or az aks update
commands. See here for more detailsAZURE_CLIENT_ID
environment variable to the managed identity's client ID.AZURE_TENANT_ID
environment variable to the Azure tenant the managed identity resides in.These will detected by the Azure credential manager.
When you create a cluster that has managed identities enabled, a user assigned managed identity called <AKS cluster name>-agentpool
. Use this identity's client ID when setting AZURE_CLIENT_ID
. Make sure the ACR is attached to your cluster.
If you are deploying policy-controller directly from this repository with make ko-apply
, you will need to add AZURE_CLIENT_ID
and AZURE_TENANT_ID
to the list of environment variables in the webhook deployment configuration.
You can provide the managed identity's client ID as a custom environment variable when installing the Helm chart:
helm install policy-controller sigstore/policy-controller --version 0.9.0 \ --set webhook.env.AZURE_CLIENT_ID=my-managed-id-client-id,webhook.env.AZURE_TENANT_ID=tenant-idService Principals for AKS Clusters Installing Policy Controller from the Helm chart
You should be able to provide the service principal client ID and tenant ID as a workload identity annotations:
helm upgrade --install policy-controller sigstore/policy-controller --version 0.9.0 \ --set-json webhook.serviceAccount.annotations="{\"azure.workload.identity/client-id\": \"${SERVICE_PRINCIPAL_CLIENT_ID}\", \"azure.workload.identity/tenant-id\": \"${TENANT_ID}\"}"
This policy-controller's versions are able to run in the following versions of Kubernetes:
policy-controller> 0.2.x
policy-controller > 0.10.x
Kubernetes 1.23 ✓ Kubernetes 1.24 ✓ Kubernetes 1.25 ✓ Kubernetes 1.27 ✓ Kubernetes 1.28 ✓ Kubernetes 1.29 ✓
note: not fully tested yet, but can be installed
We are intending to move to a monthly cadence for minor releases. Minor releases will be published around the beginning of the month. We may cut a patch release instead, if the changes are small enough not to warrant a minor release. We will also cut patch releases periodically as needed to address bugs.
Should you discover any security issues, please refer to Sigstore's security policy.
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4