Skip to content

Commit b4efd40

Browse files
committed
Remove AKV requirement
Add perf metrics Comment on OCI format and multi-arch scenarios Signed-off-by: Dallas Delaney <[email protected]>
1 parent f53439a commit b4efd40

File tree

1 file changed

+12
-6
lines changed

1 file changed

+12
-6
lines changed

specs/proposals/dm-verity.md

Lines changed: 12 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -61,17 +61,19 @@ This section outlines the proposed solution for signing and verifying OCI contai
6161
2. Per-layer signing capability
6262
3. Deterministic EROFS image and Merkle tree generation
6363
4. OCI registry distribution for a new artifact containing the signed layer root hashes via ORAS Attached Artifacts
64-
5. A new AKV plugin for the PKCS#7 format
6564

6665
### Extended Notation CLI
6766

68-
Extend `notation sign` with a new `--dm-verity` flag to enable automated per-layer signing:
67+
Extend `notation sign` with a new `--dm-verity` flag to enable automated per-layer signing. While the command below assumes the container image exists in a remote registry, this argument should also work when signing [OCI image layouts](https://github.com/notaryproject/notation/blob/main/specs/cmd/sign.md#experimental-sign-container-images-stored-in-oci-layout-directory) with argument `--oci-layout` for local signing.
68+
69+
The manifest from the default sign behavior is signed with the expected JWS/COSE formats that can be verified in userspace while the layer hashes are signed with the PKCS#7 format by default until other formats are supported.
70+
71+
This command will not recursively sign multi-arch container images. In this case, the command should be run for each individual image for the requested architecture.
6972

7073
**Sample command:**
7174
```bash
7275
notation sign --dm-verity \
7376
--id myKeyId \
74-
--signature-format pkcs7 \
7577
myregistry.azurecr.io/myapp@sha256:def456...
7678
```
7779
**Sample output:**
@@ -146,9 +148,13 @@ The new entries are described below:
146148
- io.cncf.notary.dm-verity.root-hash: The root hash value of the dm-verity block device
147149
- io.cncf.notary.dm-verity.signature=true: This is a flag that notifies Notation that dm-verity signatures and root hashes exist in the artifact
148150

149-
The new referrer artifact is expected to add less than 5 KB of metadata per layer in the registry
150-
- 1-2 KB for the json manifest entry
151-
- 1-2 KB per signature blob
151+
**Performance Metrics:**
152+
- Registry overhead: ~4 KB per layer
153+
- PKCS#7 signature blob: ~2 KB
154+
- Manifest entry: ~2 KB
155+
- Signing time: ~4-5 seconds per layer
156+
- Timeout: 5 minutes for EROFS conversion with no hardcoded maximum layer size
157+
152158

153159
**Verification command:**
154160

0 commit comments

Comments
 (0)