constellation/rfc/image-api.md
Malte Poll 7d8e36a853 rfc: define measurements v2
The old measurements.json (v1) was contain one set of measurements and had a path scoped for every CSP.
The new version is less structured, allowing for future extensions.
2023-05-05 14:36:45 +02:00

267 lines
11 KiB
Markdown

# OS image & measurement discovery
The Constellation OS image build pipeline generates a set of images using a chosen commit of the Constellation monorepo and a desired release version number.
```mermaid
graph LR
version["input: version (<code>v2.2.0</code>)"] --> imageid["image name (<code>v2.2.0</code>)"]
commit["input: Constellation repo commit hash (<code>cc0de5c</code>)"] --> pipeline
imageid --> pipeline{build images}
pipeline --> awsimage["raw AWS image"]
pipeline --> azureimage[raw Azure image]
pipeline --> gcpimage[raw GCP image]
awsimage --> awsupload{AWS ami upload}
azureimage --> azureupload{Azure image upload}
gcpimage --> gcpupload{GCP image upload}
gcpimage --> gcpmeasure{measure}
awsimage --> awsmeasure{measure}
azureimage --> azuremeasure{measure}
awsupload --> awsimage1[ami-123]
awsupload --> awsimage2[ami-456]
awsupload --> awsimage3[ami-789]
azureupload --> azureimage1[azure-cvm-123]
azureupload --> azureimage2[azure-trusted-launch-123]
gcpupload --> gcpimage1[gcp-image-123]
awsmeasure --> awsmeasurements[measurements.yml]
azuremeasure --> azuremeasurements[measurements.yml]
gcpmeasure --> gcpmeasurements[measurements.yml]
awsimage1 --> lut{Upload image lookup table to S3<br>key: <code>v2.2.0</code><br>value: lookup table for image references specific to each CSP}
awsimage2 --> lut
awsimage3 --> lut
azureimage1 --> lut
azureimage2 --> lut
gcpimage1 --> lut
awsmeasurements --> s3measurements{"Upload image measurements to S3<br><code>aws/v2.2.0/measurements.yaml<br>azure/v2.2.0/measurements.yaml<br>gcp/v2.2.0/measurements.yaml<br></code>"}
azuremeasurements --> s3measurements
gcpmeasurements --> s3measurements
```
## Inputs and outputs of the build pipeline
The build pipeline takes as inputs:
- a version number that is one of
- a release version number (e.g. `v2.2.0`) for release images
- a pseudo-version number (e.g. `v2.3.0-pre.0.`) for other images
- a branch name of the Constellation monorepo that is used to build the images
- a commit hash of the Constellation monorepo that is used to build the images (e.g. `cc0de5c68d41f31dd0b284d574f137e0b0ad106b`)
- a commit timestamp of the Constellation monorepo that is used to build the images (e.g. `20221115082220`)
The build pipeline produces as outputs:
- a raw OS image for every CSP
- a set of measurements for each raw OS image
- one or more images uploaded to each CSP (e.g. AWS AMIs, Azure images, GCP images)
- a lookup table that maps the image name to the CSP-specific image references
The lookup table is uploaded to S3 and is used to identify the CSP specific references that belong to a given image.
Measurements are uploaded to S3 and can be looked up for each cloud service provider and image name.
## Image API Endpoints
The build pipeline produces artifacts that are uploaded to S3 and can be accessed via HTTP.
The artifacts are organized in a directory structure that allows to look up the artifacts for a given image name.
Where applicable, the API uses the following CSP names:
- `aws` for Amazon Web Services
- `azure` for Microsoft Azure
- `gcp` for Google Cloud Platform
- `openstack` for OpenStack
- `qemu` for QEMU
The following HTTP endpoints are available:
- `GET /constellation/v2/ref/<REF>/stream/<STREAM>/<VERSION>/image/`
- [`info.json` returns the lookup table for the given image version.](#image-lookup-table-v2)
- `measurements.json` contains the measurements for the given image version.
- `measurements.json.sig` returns the signature of the measurements file.
- `GET /constellation/v1/ref/<REF>/stream/<STREAM>/<VERSION>/image/`
- [`info.json` returns the lookup table for the given image version.](#image-lookup-table-v1)
- `sbom.<format>.json` contains SBOM files for the given image version. The exact formats and file names are TBD.
- `GET /constellation/v1/ref/<REF>/stream/<STREAM>/<VERSION>/csp/<csp>/` contains files with measurements and signatures for the given image version and CSP.
- `measurements.json` contains the measurements for the given image version and CSP.
- `measurements.json.sig` returns the signature of the measurements file.
- `image.raw` returns the raw image for the given image version and CSP.
## Image lookup table (v2)
The image lookup table is a JSON file that maps the image name consisting of `ref`, `stream` and `version` to the CSP-specific image references:
```
/constellation/v2/ref/<REF>/stream/<STREAM>/<VERSION>/image/info.json
```
```json
{
"version": "<VERSION>",
"ref": "<REF>",
"stream": "<STREAM>",
"list": [
{
"csp": "<CSP>",
"attestationVariant": "<ATTESTATION_VARIANT>",
"reference": "<CSP_SPECIFIC_IMAGE_REFERENCE>",
"region": "<CSP_REGION>"
},
{
"csp": "aws",
"attestationVariant": "aws-nitro-tpm",
"reference": "ami-123",
"region": "us-east-1"
},
{
"csp": "aws",
"attestationVariant": "aws-nitro-tpm",
"reference": "ami-456",
"region": "us-west-2"
},
{
"csp": "azure",
"attestationVariant": "azure-sev-snp",
"reference": "azure-cvm-123"
}
{
"csp": "azure",
"attestationVariant": "azure-trustedlaunch",
"reference": "azure-trusted-launch-123"
},
{
"csp": "gcp",
"attestationVariant": "gcp-sev-es",
"reference": "gcp-image-123",
},
{
"csp": "openstack",
"attestationVariant": "qemu-vtpm",
"reference": "https://cdn.confidential.cloud/constellation/v1/ref/<REF>/stream/<STREAM>/<VERSION>/image/csp/openstack/qemu-vtpm/image.raw"
},
{
"csp": "qemu",
"attestationVariant": "qemu-vtpm",
"reference": "https://cdn.confidential.cloud/constellation/v1/ref/<REF>/stream/<STREAM>/<VERSION>/image/csp/qemu/qemu-vtpm/image.raw"
}
]
}
```
Fields:
- `version`: The version of the image.
- `ref`: The reference of the image.
- `stream`: The stream of the image.
- `list`: An array of image references for each CSP.
- `csp`: The cloud service provider. Required.
- `attestationVariant`: The attestation variant of the image. Required.
- `reference`: The CSP-specific image reference. Required.
- `region`: The (optional) CSP-specific region of the image.
If required, the fields in the `.list` array can be extended in the future to include additional information while maintaining backwards compatibility.
This document is not signed and can be extended in the future to include more image references.
The same document can be used to identify old images that are no longer used and can be deleted for cost optimization.
## Image measurements (v2)
The image measurements are a JSON file that contains sets of measurements for the given image version:
```
/constellation/v2/ref/<REF>/stream/<STREAM>/<VERSION>/image/measurements.json
```
```json
{
"version": "<VERSION>",
"ref": "<REF>",
"stream": "<STREAM>",
"list": [
"csp": "<CSP>",
"attestationVariant": "<ATTESTATION_VARIANT>",
"measurements": {"<PCR_INDEX>": {<MEASUREMENT>}}
]
}
```
If required, the fields in the `.list` array can be extended in the future to include additional information while maintaining backwards compatibility.
This document has a detached signature that can be retrieved from `measurements.json.sig`.
## Image lookup table (v1)
The image lookup table is a JSON file that maps the image name consisting of `ref`, `stream` and `version` to the CSP-specific image references:
```
/constellation/v1/ref/<REF>/stream/<STREAM>/<VERSION>/image/info.json
```
```json
{
"version": "<VERSION>",
"ref": "<REF>",
"stream": "<STREAM>",
"aws": {
"us-east-1": "ami-123",
"us-west-2": "ami-456",
"eu-west-1": "ami-789"
},
"azure": {
"cvm": "azure-cvm-123",
"trustedlaunch": "azure-trusted-launch-123"
},
"gcp": {
"sev-es": "gcp-image-123"
},
"openstack": {
"sev": "https://cdn.confidential.cloud/constellation/v1/ref/<REF>/stream/<STREAM>/<VERSION>/image/csp/openstack/image.raw"
},
"qemu": {
"default": "https://cdn.confidential.cloud/constellation/v1/ref/<REF>/stream/<STREAM>/<VERSION>/image/csp/qemu/image.raw"
}
}
```
- For AWS, the image lookup table contains the AMI IDs for each region
- For Azure, the image lookup table contains the image IDs for the CVM and Trusted Launch images
- For GCP, the image lookup table contains the image ID
- For QEMU, the image lookup table contains a URL to the QEMU image
This document is not signed and can be extended in the future to include more image references (e.g. if an image is replicated to a new AWS region).
The same document can be used to identify old images that are no longer used and can be deleted for cost optimization.
## CLI image discovery
The CLI needs to be able to discover the image references for a given image name.
By default, the CLI will prefill the `image` field of the `constellation-conf.yaml` when `constellation config generate <CSP>` is run with a hardcoded name (e.g. `v2.2.0`).
The `image` field is independent of the CSP and is a used to discover the CSP-specific image reference as needed for the following operations:
- `constellation create`
- `constellation upgrade apply`
The CLI can find a CSP- and region specific image reference by looking up the image name in the following order:
- if a local file `<IMAGE NAME>.json` exists, use the lookup table in that file
- otherwise, load the image lookup table from a well known URL (e.g. `https://cdn.confidential.cloud/constellation/v2/ref/<REF>/stream/<STREAM>/<VERSION>/image/info.json`) and use the lookup table in that file
- choose the CSP-specific image reference for the current region and attestation variant:
- On AWS, use the AMI ID for the current region (e.g. `us-east-1`) and attestation variant (e.g. `aws-nitro-tpm`)
- On Azure, use the image ID for the attestation variant (CVM or Trusted Launch) (e.g. `azure-sev-snp`)
- On GCP, use the image ID for the attestation variant (e.g. `gcp-sev-es`)
- On QEMU, use the image ID for the attestation variant (e.g. `qemu-vtpm`)
This allows customers to upload images to their own cloud subscription and use them with the CLI by providing the image lookup table as a local file.
## Future extensions
This is a list of possible future extensions that are not part of this RFC.
Their implementation is not guaranteed.
They are listed here to ensure that the design of this RFC is flexible enough to support them.
- The lookup table can be signed using a signing key that is only used for that purpose.
- User managed repositories can be added in the future. This would allow users to reupload Constellation OS images to their cloud subscription and host their own lookup tables that resolve the same image versions to image references pointing to self managed images. An optional `repository` field could be added to the configuration file to allow users to specify the repository to use for image discovery.