Skip to content

Latest commit

 

History

History
357 lines (258 loc) · 13.9 KB

File metadata and controls

357 lines (258 loc) · 13.9 KB

RFC-0005 Artifact Revision format and introduction of Digest

Status: implemented

Creation date: 2022-10-20

Last update: 2023-02-20

Summary

This RFC proposes to establish a canonical Revision format for an Artifact which points to a specific revision represented as a checksum (e.g. an OCI manifest digest or Git commit SHA) of a named pointer (e.g. an OCI repository name or Git tag). In addition, it proposes to include the algorithm name (e.g. sha256) as a prefix to an advertised checksum for an Artifact and further referring to it as a Digest, deprecating the Checksum field.

Motivation

The current Artifact type's Revision field format is not "officially" standardized (albeit assumed throughout our code bases), and has mostly been derived from GitRepository which uses / as a separator between the named pointer (a Git branch or tag) and a specific (SHA-1, or theoretical SHA-256) revision.

Since the introduction of OCIRepository and with the recent changes around HelmChart objects to allow the consumption of charts from OCI registries, this could be seen as outdated or confusing due to the format differing from the canonical format used by OCI, which is <name>@<algo>:<checksum> (the part after @ formally known as a "digest") to refer to a specific version of an OCI manifest.

While also taking note that Git does not have an official canonical format for e.g. branch references at a specific commit, and / has less of a symbolic meaning than @, which could be interpreted as "<branch> at <commit SHA>".

In addition, with the introduction of algorithm prefixes for an Artifact's checksum, it would be possible to add support and allow user configuration of other algorithms than SHA-256. For example SHA-384 and SHA-512, or the more performant (parallelizable) BLAKE3.

Besides this, it would make it easier to implement a client that can verify the checksum without having to resort to an assumed format or guessing method based on the length of it, and allows for a more robust solution in which it can continue to calculate against the algorithm of a previous configuration.

The inclusion of the Artifact's algorithm prefix has been proposed before in source-controller#855, with supportive response from Core Maintainers.

Goals

  • Establish a canonical format to refer to an Artifact's Revision field which consists of a named pointer and a specific checksum reference.
  • Allow easier verification of the Artifact's checksum by including an alias for the algorithm.
  • Deprecate the Artifact's Checksum field in favor of the Digest field.
  • Allow configuration of the algorithm used to calculate the checksum of an Artifact.
  • Allow configuration of algorithms other than SHA-256 to calculate the Digest of an Artifact.
  • Allow compatibility with SemVer name references which might contain an @ symbol already (e.g. package@v1.0.0@sha256:..., as opposed to OCI's name:v1.0.0@sha256:...).

Non-Goals

  • Define a canonical format for an Artifact's Revision field which contains a named pointer and a different reference than a checksum.

Proposal

Establish an Artifact Revision format

Change the format of the Revision field of the source.toolkit.fluxcd.io Group's Artifact type across all Source kinds to contain an @ separator opposed to /, and include the algorithm alias as a prefix to the checksum (creating a "digest").

[ <named pointer> ] [ [ "@" ] <algo> ":" <checksum> ]

Where <named pointer> is the name of e.g. a Git branch or OCI repository name, <checksum> is the exact revision (e.g. a Git commit SHA or OCI manifest digest), and <algo> is the alias of the algorithm used to calculate the checksum (e.g. sha256). In case only a named pointer or digest is advertised, the @ is omitted.

For a GitRepository's Artifact pointing towards an SHA-1 Git commit on branch main, the Revision field value would become:

main@sha1:1eabc9a41ca088515cab83f1cce49eb43e84b67f

For a GitRepository's Artifact pointing towards a specific SHA-1 Git commit without a defined branch or tag, the Revision field value would become:

sha1:1eabc9a41ca088515cab83f1cce49eb43e84b67f

For a Bucket's Artifact with a revision based on an SHA-256 calculation of a list of object keys and their etags, the Revision field value would become:

sha256:8fb62a09c9e48ace5463bf940dc15e85f525be4f230e223bbceef6e13024110c

For a HelmChart's Artifact pointing towards a Helm chart version, the Revision field value would become:

1.2.3

Introduce a Digest field

Introduce a new field to the source.toolkit.fluxcd.io Group's Artifact type across all Source kinds called Digest, containing the checksum of the file advertised in the Path, and alias of the algorithm used to calculate it (creating a "digest").

<algo> ":" <checksum>

For a GitRepository Artifact's checksum calculated using SHA-256, the Digest field value would become:

sha256:1111f92aba67995f108b3ee3ffdc00edcfe206b11fbbb459c8ef4c4a8209fca8

Deprecate the Checksum field

In favor of the Digest field, the Checksum field of the source.toolkit.fluxcd.io Group's Artifact type across all Source kinds is deprecated, and removed in a future version.

User Stories

Artifact revision verification

As a user of the source-controller, I want to be able to see the exact revision of an Artifact that is being used, so that I can verify that it matches the expected revision at a remote source.

For a Source kind that has an Artifact with a Revision which contains a checksum, the field value can be retrieved using the Kubernetes API. For example:

$ kubectl get gitrepository -o jsonpath='{.status.artifact.revision}' <name>
main@sha1:1eabc9a41ca088515cab83f1cce49eb43e84b67f

Artifact checksum verification

As a user of the source-controller, I want to be able to verify the checksum of an Artifact.

For a Source kind with an Artifact the digest consisting of the algorithm alias and checksum is advertised in the Digest field, and can be retrieved using the Kubernetes API. For example:

$ kubectl get gitrepository -o jsonpath='{.status.artifact.digest}' <name>
sha256:1111f92aba67995f108b3ee3ffdc00edcfe206b11fbbb459c8ef4c4a8209fca8

Artifact checksum algorithm configuration

As a user of the source-controller, I want to be able to configure the algorithm used to calculate the checksum of an Artifact.

The source-controller binary accepts a --artifact-digest-algo flag which configures the algorithm used to calculate the checksum of an Artifact. The default value is sha256, but can be changed to sha384, sha512 or blake3.

When set, newly advertised Artifact's Digest fields will be calculated using the configured algorithm. For previous Artifact's that were set using a previous configuration, the Artifact's Digest field will be recalculated using the advertised algorithm.

Artifact revisions in notifications

As a user of the notification-controller, I want to be able to see the exact revision a notification is referring to.

The notification-controller can use the revision for a Source's Artifact attached as an annotation to an Event, and correctly parses the value field when attempting to extract e.g. a Git commit digest from an event for a GitRepository. As currently already applicable for the / separator.

As a user of the notification-controller, I want to be able to observe what commit has been applied on my (supported) Git provider.

The notification-controller can use the revision attached as an annotation to an Event, and is capable of extracting the correct reference for a Git provider integration (e.g. GitHub, GitLab) to construct a payload. For example, extracting 1eabc9a41ca088515cab83f1cce49eb43e84b67f from main@sha1:1eabc9a41ca088515cab83f1cce49eb43e84b67f.

Artifact revisions in listed views

As a Flux CLI user, I want to see the current revision of my Source in a listed overview.

By running flux get source <kind>, the listed view of Sources would show a truncated version of the checksum in the Revision field.

$ flux get source gitrepository
NAME            REVISION              SUSPENDED       READY   MESSAGE                                                                      
flux-monitoring main@sha1:1eabc9a4    False           True    stored artifact for revision 'main@sha1:1eabc9a41ca088515cab83f1cce49eb43e84b67f'

$ flux get source oci
NAME            REVISION               SUSPENDED       READY   MESSAGE                                                                                              
apps-source     local@sha256:e5fa481b  False           True    stored artifact for digest 'local@sha256:e5fa481bb17327bd269927d0a223862d243d76c89fe697ea8c9adefc47c47e17'

$ flux get source bucket
NAME            REVISION         SUSPENDED       READY   MESSAGE                                                                                              
apps-source     sha256:e3b0c442  False           True    stored artifact for revision 'sha256:8fb62a09c9e48ace5463bf940dc15e85f525be4f230e223bbceef6e13024110c'

Alternatives

The two main alternatives around the Revision parts in this RFC are to either keep the current field value formats as is, or to invent another format. Given the motivation for this RFC outlines the reasoning for not keeping the current Revision format, and the proposed is a commonly known format. Neither strike as a better alternative.

For the changes related to Checksum and Digest, the alternative is to keep the current field name as is, and only change the field value format. However, given the naming of the field is more accurate with the introduction of the algorithm alias, and now is the time to make last (breaking) changes to the API. This does not strike as a better alternative.

Design Details

Artifact Revision format

For an Artifact's Revision which contains a checksum referring to an exact revision, the checksum within the value MUST be appended with an alias for the algorithm separated by : (e.g. sha256:...), further referred to as a "digest". The algorithm alias and checksum of the digest MUST be lowercase and alphanumeric.

For an Artifact's Revision which contains a digest and a named pointer, it MUST be prefixed with @, and appended at the end of the Revision value. The named pointer MAY contain arbitrary characters, including but not limited to / and @.

Format

[ <named pointer> ] [ [ "@" ] <algo> ":" <checksum> ]

Where [ ] indicates an optional element, " " a literal string, and < > a variable.

Parsing

When parsing the Revision field value of an Artifact to extract the digest, the value after the last @ is considered to be the digest. The remaining value on the left side is considered to be the named pointer, which MAY contain an additional @ separator if applicable for the domain of the Source implementation.

Truncation

When truncating the Revision field value of an Artifact to display in a view with limited space, the <checksum> of the digest MAY be truncated to 7 or more characters. The <algo> of the digest MUST NOT be truncated. In addition, a digest MUST always contain the full length checksum for the algorithm.

Backwards compatibility

To allow backwards compatibility in the notification-controller, Flux CLI and other applicable components, the Revision new field value format could be detected by the presence of the @ or : characters. Falling back to their current behaviour if not present, phasing out the old format in a future release.

Artifact Digest

The Artifact's Digest field advertises the checksum of the file in the URL. The checksum within the value MUST be appended with an alias for the algorithm separated by : (e.g. sha256:...). This follows the digest format of OCI.

Format

<algo> ":" <checksum>

Where " " indicates a literal string, and < > a variable.

Library

The library used for calculating the Digest field value is github.com/opencontainers/go-digest. This library is stable and extensible, and used by various OCI libraries which we already depend on.

Calculation

The checksum in the Digest field value MUST be calculated using the canonical algorithm set at runtime.

Configuration

The algorithm used for calculating the Digest field value MAY be configured using the --artifact-digest-algo flag of the source-controller binary. The default value is sha256, but can be changed to sha384, sha512 or blake3.

Note: availability of BLAKE3 is at present dependent on an explicit import of github.com/opencontainers/go-digest/blake3.

When the provided algorithm is NOT supported, the source-controller MUST fail to start.

When the configured algorithm changes, the Digest MAY be recalculated to update the value.

Verification

The checksum of a downloaded artifact MUST be verified against the Digest field value. If the checksum does not match, the verification MUST fail.

Deprecation of Checksum

The Artifact's Checksum field is deprecated and MUST be removed in a future release. The Digest field MUST be used instead.

Backwards compatibility

To allow backwards compatibility, the source-controller could continue to advertise the checksum part of a Digest in the Checksum field until the field is removed.

Implementation History