ec validate image

Validate conformance of container images with the Enterprise Contract

Synopsis

Validate conformance of container images with the Enterprise Contract

For each image, validation is performed in stages to determine if the image conforms to the Enterprise Contract.

The first validation stage determines if an image has been signed, and the signature matches the provided public key. This is akin to the "cosign verify" command.

The second validation stage determines if one or more attestations exist, and those attestations have been signed matching the provided public key, similarly to the "cosign verify-attestation" command. This stage temporarily stores the attestations for usage in the next stage.

The final stage verifies the attestations conform to rego policies defined in the EnterpriseContractPolicy.

Validation advances each stage as much as possible for each image in order to capture all issues in a single execution.

ec validate image [flags]

Examples

Validate single image with the policy defined in the EnterpriseContractPolicy custom resource named "default" in the enterprise-contract-service Kubernetes namespace:

ec validate image --image registry/name:tag

Validate multiple images from an ApplicationSnapshot Spec file:

ec validate image --images my-app.yaml

Validate attestation of images from an inline ApplicationSnapshot Spec:

ec validate image --images '{"components":[{"containerImage":"<image url>"}]}'

Use a different public key than the one from the EnterpriseContractPolicy resource:

ec validate image --image registry/name:tag --public-key <path/to/public/key>

Use a different Rekor URL than the one from the EnterpriseContractPolicy resource:

ec validate image --image registry/name:tag --rekor-url https://rekor.example.org

Return a non-zero status code on validation failure:

ec validate image --image registry/name:tag
Return a zero status code even if there are validation failures:
ec validate image --image registry/name:tag --strict=false

Use an EnterpriseContractPolicy resource from the currently active kubernetes context:

ec validate image --image registry/name:tag --policy my-policy

Use an EnterpriseContractPolicy resource from a different namespace:

ec validate image --image registry/name:tag --policy my-namespace/my-policy

Use an inline EnterpriseContractPolicy spec

ec validate image --image registry/name:tag --policy '{"publicKey": "<path/to/public/key>"}'

Use an EnterpriseContractPolicy spec from a local YAML file ec validate image --image registry/name:tag --policy my-policy.yaml

Use a git url for the policy configuration. In the first example there should be a '.ec/policy.yaml' or a 'policy.yaml' inside a directory called 'default' in the top level of the git repo. In the second example there should be a '.ec/policy.yaml' or a 'policy.yaml' file in the top level of the git repo. For git repos not hosted on 'github.com' or 'gitlab.com', prefix the url with 'git::'. For the policy configuration files you can use json instead of yaml if you prefer.

ec validate image --image registry/name:tag --policy github.com/user/repo//default?ref=main
ec validate image --image registry/name:tag --policy github.com/user/repo

Write output in JSON format to a file

ec validate image --image registry/name:tag --output json=<path>

Write output in YAML format to stdout and in appstudio format to a file

ec validate image --image registry/name:tag --output yaml --output appstudio=<path>

Write the data used in the policy evaluation to a file in YAML format

ec validate image --image registry/name:tag --output data=<path>

Validate a single image with keyless workflow.

ec validate image --image registry/name:tag --policy my-policy \
  --certificate-identity 'https://github.com/user/repo/.github/workflows/push.yaml@refs/heads/main' \
  --certificate-oidc-issuer 'https://token.actions.githubusercontent.com' \
  --rekor-url 'https://rekor.sigstore.dev'

Use a regular expression to match certificate attributes.

ec validate image --image registry/name:tag --policy my-policy \
  --certificate-identity-regexp '^https://github\.com' \
  --certificate-oidc-issuer-regexp 'githubusercontent' \
  --rekor-url 'https://rekor.sigstore.dev'

Options

--certificate-identity

URL of the certificate identity for keyless verification

--certificate-identity-regexp

Regular expression for the URL of the certificate identity for keyless verification

--certificate-oidc-issuer

URL of the certificate OIDC issuer for keyless verification

--certificate-oidc-issuer-regexp

Regular expresssion for the URL of the certificate OIDC issuer for keyless verification

--color

Enable color when using text output even when the current terminal does not support it (Default: false)

--effective-time

Run policy checks with the provided time. Useful for testing rules with effective dates in the future. The value can be "now" (default) - for current time, "attestation" - for time from the youngest attestation, or a RFC3339 formatted value, e.g. 2022-11-18T00:00:00Z. (Default: now)

--extra-rule-data

Extra data to be provided to the Rego policy evaluator. Use format 'key=value'. May be used multiple times. (Default: [])

-f, --file-path

DEPRECATED - use --images: path to ApplicationSnapshot Spec JSON file

-h, --help

help for image (Default: false)

--ignore-rekor

Skip Rekor transparency log checks during validation. (Default: false)

-i, --image

OCI image reference

--images

path to ApplicationSnapshot Spec JSON file or JSON representation of an ApplicationSnapshot Spec

--info

Include additional information on the failures. For instance for policy violations, include the title and the description of the failed policy rule. (Default: false)

-j, --json-input

DEPRECATED - use --images: JSON representation of an ApplicationSnapshot Spec

--no-color

Disable color when using text output even when the current terminal supports it (Default: false)

--output

write output to a file in a specific format. Use empty string path for stdout. May be used multiple times. Possible formats are: json, yaml, text, appstudio, summary, summary-markdown, junit, data, attestation, policy-input, vsa. In following format and file path additional options can be provided in key=value form following the question mark (?) sign, for example: --output text=output.txt?show-successes=false (Default: [])

-o, --output-file

[DEPRECATED] write output to a file. Use empty string for stdout, default behavior

-p, --policy

Policy configuration as:

  • Kubernetes reference ([<namespace>/]<name>)

  • file (policy.yaml)

  • git reference (github.com/user/repo//default?ref=main), or

  • inline JSON ('{sources: {…​}, identity: {…​}}')")

-k, --public-key

path to the public key. Overrides publicKey from EnterpriseContractPolicy

-r, --rekor-url

Rekor URL. Overrides rekorURL from EnterpriseContractPolicy

--snapshot

Provide the AppStudio Snapshot as a source of the images to validate, as inline JSON of the "spec" or a reference to a Kubernetes object [<namespace>/]<name>

-s, --strict

Return non-zero status on non-successful validation. Defaults to true. Use --strict=false to return a zero status code. (Default: true)

--workers

Number of workers to use for validation. Defaults to 5. (Default: 5)

Options inherited from parent commands

--debug

same as verbose but also show function names and line numbers (Default: false)

--kubeconfig

path to the Kubernetes config file to use

--logfile

file to write the logging output. If not specified logging output will be written to stderr

--quiet

less verbose output (Default: false)

--show-successes

(Default: false)

--timeout

max overall execution duration (Default: 5m0s)

--trace

enable trace logging, set one or more comma separated values: none,all,perf,cpu,mem,opa,log (Default: none)

--verbose

more verbose output (Default: false)