Ecosyste.ms: Awesome

An open API service indexing awesome lists of open source software.

Awesome Lists | Featured Topics | Projects

https://github.com/kelseyhightower/grafeas-tutorial

A step by step guide for getting started with Grafeas and Kubernetes.
https://github.com/kelseyhightower/grafeas-tutorial

Last synced: about 1 month ago
JSON representation

A step by step guide for getting started with Grafeas and Kubernetes.

Awesome Lists containing this project

README

        

# Grafeas Tutorial

This tutorial will guide you through testing Grafeas. In it, you will create a Kubernetes cluster configured to only allow container images signed by a specific key, configurable via a configmap. Container image signatures will be stored in Grafeas. To make sure only signed images are allowed, you will start an admission plugin service which finds signatures in Grafeas and verifies them.

Check out the [Introducing Grafeas](https://cloudplatform.googleblog.com/2017/10/introducing-grafeas-open-source-api-.html) blog post for additional context.

## Tutorial

### Prerequisites

Clone this repository:

```
git clone https://github.com/kelseyhightower/grafeas-tutorial.git
```

```
cd grafeas-tutorial
```

The remainder of this tutorial assumes you are in the `grafeas-tutorial` directory.

### Infrastructure

A Kubernetes 1.9+ cluster is required with support for the [ValidatingAdmissionWebhook](https://kubernetes.io/docs/admin/admission-controllers/#validatingadmissionwebhook-alpha-in-18-beta-in-19) alpha feature enabled.

If you have access to [Google Kubernetes Engine](https://cloud.google.com/kubernetes-engine) use the gcloud command to create a 1.9.1 Kubernetes cluster:

```
gcloud alpha container clusters create grafeas \
--enable-kubernetes-alpha \
--cluster-version 1.9.1-gke.0
```

> Any Kubernetes 1.9 cluster with support for validating admission webhooks will work.

### Deploy the Grafeas Server

[Grafeas](http://grafeas.io/about) is an open artifact metadata API to audit and govern your software supply chain. In this tutorial Grafeas will be used to store container image signatures.

Create the Grafeas server deployment:

```
kubectl apply -f kubernetes/grafeas.yaml
```

> While in early alpha the Grafeas server leverages an in-memory data store. If the Grafeas server is ever restarted all image signature must be repopulated.

### Generating GPG Signing Keys

In this section you will generate a [gpg keypair](https://www.gnupg.org/gph/en/manual.html#INTRO) suitable for signing container image metadata.

Install gpg for you platform:

#### OS X

```
brew install gpg2
```

#### Linux

```
apt-get install gnupg
```

Once gpg has been installed generate a signing key:

```
gpg --quick-generate-key --yes [email protected]
```

Retrive the ID of the signing key:

```
gpg --list-keys --keyid-format short
```

```
------------------------------------
pub rsa2048/0CD9D96F 2017-10-17 [SC] [expires: 2019-10-17]
510CE141B559A243439EB18926CE52D30CD9D96F
uid [ultimate] [email protected]
sub rsa2048/2C216B83 2017-10-17 [E]
```

> Based on the above output the key ID is 0CD9D96F. Your key ID will be different.

Store the ID of your signing key in the `GPG_KEY_ID` env var:

```
GPG_KEY_ID="0CD9D96F"
```
#### Signing Container Image Metadata

Container images tend to range in size from a few megabytes to multiple gigabytes. Signing and distributing container images can be quite resource intensive so we are going to opt for signing the [image digest](https://cloud.google.com/container-registry/docs/concepts/image-formats#content_addressability) which uniquely identifies a container image.

In this tutorial the `gcr.io/hightowerlabs/echod` container image will be used for testing. Instead of trusting an image tag such `0.0.1`, which can be reused and point to a different container image later, we are going to trust the image digest.

```
cat image-digest.txt
```
```
sha256:aba48d60ba4410ec921f9d2e8169236c57660d121f9430dc9758d754eec8f887
```

Sign the image digest text file:

```
gpg -u [email protected] \
--armor \
--clearsign \
--output=signature.gpg \
image-digest.txt
```

Verify the signature:

```
gpg --output - --verify signature.gpg
```

```
sha256:aba48d60ba4410ec921f9d2e8169236c57660d121f9430dc9758d754eec8f887
gpg: Signature made Tue Oct 17 09:11:53 2017 PDT
gpg: using RSA key 510CE141B559A243439EB18926CE52D30CD9D96F
gpg: issuer "[email protected]"
gpg: Good signature from "[email protected]" [ultimate]
```

In order for others to verify signed images they must trust and have access to the image signer's public key. Export the image signer's public key:

```
gpg --armor --export [email protected] > ${GPG_KEY_ID}.pub
```

### Create a pgpSignedAttestation Occurrence

Now that we have a signed container image, and a public key to verify it, we need to create a [pgpSignedAttestation occurrence](https://github.com/Grafeas/Grafeas/blob/master/samples/server/go-server/api/docs/PgpSignedAttestation.md) using the Grafeas API.

In a new terminal create a secure tunnel to the grafeas server:

```
kubectl port-forward \
$(kubectl get pods -l app=grafeas -o jsonpath='{.items[0].metadata.name}') \
8080:8080
```

Create the `production` attestationAuthority note:

```
curl -X POST \
"http://127.0.0.1:8080/v1alpha1/projects/image-signing/notes?noteId=production" \
-d @note.json
```

Generate an pgpSignedAttestation occurrence:

```
GPG_SIGNATURE=$(cat signature.gpg | base64)
```

```
RESOURCE_URL="https://gcr.io/hightowerlabs/echod@sha256:aba48d60ba4410ec921f9d2e8169236c57660d121f9430dc9758d754eec8f887"
```

```
cat > occurrence.json < Only the `gcr.io/hightowerlabs/echod` container image identified by the `sha256:aba48d60ba4410ec921f9d2e8169236c57660d121f9430dc9758d754eec8f887` image digest and be verified by the Grafeas API. Additional images require a new occurrence.

### Deploy the Image Signature Webhook

Create the `image-signature-webhook` configmap and store the image signer's public key:

```
kubectl create configmap image-signature-webhook \
--from-file ${GPG_KEY_ID}.pub
```

```
kubectl get configmap image-signature-webhook -o yaml
```

Create the `tls-image-signature-webhook` secret and store the TLS certs:

```
kubectl create secret tls tls-image-signature-webhook \
--key pki/image-signature-webhook-key.pem \
--cert pki/image-signature-webhook.pem
```

Create the `image-signature-webhook` deployment:

```
kubectl apply -f kubernetes/image-signature-webhook.yaml
```

Create the `image-signature-webook` ValidatingWebhookConfiguration:

```
kubectl apply -f kubernetes/validating-webhook-configuration.yaml
```

> After you create the validating webhook configuration, the system will take a few seconds to honor the new configuration.

### Testing the Admission Webhook

Attempt to run the `nginx:1.13` container image which does not have an pgpSignedAttestation occurrence in the Grafeas API. Create the `nginx` pod:

```
kubectl apply -f pods/nginx.yaml
```

Notice the `nginx` pod was not created and the follow error was returned:

```
The "" is invalid: : No matched signatures for container image: nginx:1.13
```

Attempt to run the `gcr.io/hightowerlabs/echod@sha256:aba48d60ba4410ec921f9d2e8169236c57660d121f9430dc9758d754eec8f887` container image which has an pgpSignedAttestation occurrence in the Grafeas API.

```
kubectl apply -f pods/echod.yaml
```
```
pod "echod" created
```

At this point the following pods should be running in your cluster:

```
kubectl get pods
```
```
NAME READY STATUS RESTARTS AGE
echod 1/1 Running 0 5m
grafeas-5b5759cbcf-lx8r5 1/1 Running 0 12m
image-signature-webhook-6cc7d6bd74-55blt 1/1 Running 0 8m
```

> Notice the `nginx` pod was not created because the `nginx:1.13` container image was not verified by the image signature webhook.

## Cleanup

Run the following commands to remove the Kubernetes resources created during this tutorial:

```
kubectl delete deployments grafeas image-signature-webhook
kubectl delete pods echod
kubectl delete svc grafeas image-signature-webhook
kubectl delete secrets tls-image-signature-webhook
kubectl delete configmap image-signature-webhook
```