-
Notifications
You must be signed in to change notification settings - Fork 92
Configuration file spec #76
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
1db7a79
bd6054b
f1ea87a
531a109
9b64000
321db15
0838141
fe46a2e
3f91b78
894e6c9
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
| @@ -0,0 +1,61 @@ | ||
| # Notation Configuration | ||
|
|
||
| To enable persisted configuration, simplifying the execution of the `notation` cli, the following configuration file will be available | ||
|
|
||
| > Note: there will be a policy based configuration that will come at a later point. | ||
|
|
||
| ## Location | ||
|
|
||
| The default location and file will be stored at: `~/.notation/config.json`. The `notation` cli and libraries will support alternate locations through a `config-location` parameters. | ||
|
|
||
| > TODO: Add Windows and Mac locations | ||
|
|
||
| ## Properties | ||
SteveLasker marked this conversation as resolved.
Show resolved
Hide resolved
|
||
|
|
||
| Property | Type | Value | ||
| ------ | ------ | --- | ||
| `verificationCerts.certs`|_array_|collection of name/value pairs for a collection of public certs that are used for verification. These may be replaced with a future policy configuration. | ||
| `cert.name`|_string_|a named reference to the certificate | ||
| `cert.path`|_string_|a location by which the certificate can be found by the notation cli or notation libraries | ||
| `signing-keys.keys`|_array_|a collection of name/value pairs of signing keys. | ||
| `key.name`|_string_|a named reference to the key | ||
| `key.path`|_string_|a location by which the key can be found by the notation cli or notation libraries | ||
| `signing-keys.default`|_string_|the signing key to be used when `notation sign` is called without `--name` | ||
| `insecureRegistries`|_array_|a list of registries that may be used without https | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. How is
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. notation pushes and pulls content to a registry using the oras-go libraries. insecureRegistires is a list of registries enables the flow, as an exception to the normal HTTPS required flag. |
||
|
|
||
| ## Samples | ||
|
|
||
| `~/.notary/notation-config.json` | ||
|
|
||
| ```json | ||
| { | ||
| "verificationCerts": { | ||
| "certs": [ | ||
| { | ||
| "name": "wabbit-networks.io", | ||
| "path": "~/./notary/keys/wabbit-networks.crt" | ||
| }, | ||
| { | ||
| "name": "import.acme-rockets.io", | ||
| "path": "~/./notary/keys/import-acme-rockets.crt" | ||
| } | ||
| ] | ||
| }, | ||
|
Comment on lines
+32
to
+43
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Why do we need
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I was trying to align with
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Leaving for this PR, and lets address how we want to handle
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. @SteveLasker - Moving this into the notary location exposes the notation CLI to need ACLs and policise that are present with notaryV1. My recommendatiaon is to have this under .notation for now and open an issue to unify the config location with notaryv1 if that is the requirement.
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
If we are planning to support only referencing(using path) not inlining of certificate then we can rename
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
@sajayantony @SteveLasker would like to understand better if there is a requirement, and the motivation for unifying config with notary V1.
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
It was more about reducing folder sprawl. I'm trying to avoid end users having to "feel the pain" of multiple folders being created as a result of using v1 and v2.
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Yes, we should incorporate truststore policy. However, suggesting we add that as we iterate the details of the trust store policy. This will document the current state, so we can release a notation cli that we can iterate with. |
||
| "signingKeys": { | ||
| "default": "wabbit-networks.io", | ||
| "keys": [ | ||
| { | ||
| "name": "wabbit-networks.io", | ||
| "path": "~/./notary/keys/wabbit-networks.key" | ||
| }, | ||
| { | ||
| "name": "import.acme-rockets.io", | ||
| "path": "~/./notary/keys/import-acme-rockets.key" | ||
| } | ||
| ] | ||
| }, | ||
|
Comment on lines
+44
to
+56
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more.
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. +1 on requiring signing certificate in addition to private key.
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. opened issue: #89 |
||
| "insecureRegistries": [ | ||
| "registry.wabbit-networks.io" | ||
| ] | ||
| } | ||
| ``` | ||
Uh oh!
There was an error while loading. Please reload this page.