Configuration
Configuration for Veraison services is specified in YAML format. By default,
each executable will try to read configuration from a file called config.yaml
in that executable's current working directory (i.e. the directory it was
launched from -- not the directory the executable itself is located). An
alternative configuration file may be specified using --config
option when
launching the executable.
Deployment configuration
Services configured to run as part of a deployment (e.g. via systemd units)
will typically look for configuration in config/services/config.yaml
under
the deployment's location. For example, services installed via deb
or rpm
packages will have their configuration inside
/opt/veraison/config/services/config.yaml
.
For docker
and aws
deployments, you normally shouldn't be modifying the
configuration inside the containers/EC2 instances directly. Please refer to the
deployments' documentation for information on how they may be configured.
Top-level entries
The following top-level entries will be read for the config file:
auth
: authentication configuration (used by management and provisioning services)ear-signer
: EAR signer configuration (used by vts service)en-store
: endorsements key-value store configuration (used by vts service)logging
: logging configuration (used by all services)management
: management REST API service configuration (used by management service)plugin
: plugin loader configuration (used by vts and management services)provisioning
: provisioning REST API service configuration (used by provisioning service)po-store
: policy key-value store configuration (used by vts and management services)sessionmanager
: verification service's session manager configuration (used by verification service)ta-store
: trust anchors key-value store configuration (used by vts service)verification
: verification REST API service configuration (used by verification service)vts
: Veraison Trusted Services configuration (used by vts service)
Each service executable will only look for the top-level entries it expects and will ignore the rest.
auth
configuration
See Authentication configuration below.
ear-signer
configuration
alg
: the JWS algorithm used for signing, e.g.:ES256
,RS512
.key
: URL with the location of the private key to be used withalg
. The following URL schems are supported:file
: URL path is the path to a local fileaws
: URL path is in the form<region>:<secret-name>
where<region>
is an AWS region, and<secrete-name>
is the name under which the key is stored in AWS Secrets Manager. If a scheme is not specified,file
is assumed. The key is in JWK format.
en-store
configuration
See KV Store configuration below.
logging
configuration
level
(optional): specify the minimum enabled logging level. Supported values (from lowest to highest) are:debug
,info
,warn
,error
. Defaults toinfo
.format
(optional): specify the format of the log records (e.g. which entries appear in it). Currently supported formats:
production
: defaultzap
production config.
development
: defaultzap
development config.
bare
: a relatively bare format, featuring only log level (colored), logger name, and its message, suffixed with any fields.development
(optional): set totrue
to put the logger into development mode. This changes the behavior ofDPanic
and takes stacktraces more liberally.disable-stacktrace
(optional): set totrue
to completely disable automatic stacktrace capturing.sampling
(optional): set the sampling policy. There are two possible sub-settings:initial
andthereafter
, each is an integer value.initial
specifies how many messages, of a given level, will be logged as-is every second. After than, only everythereafter
'th message will be logged within that seconds. e.g.
means, for very level (debug, info, etc) log the first 10 messages that occur in 1 second. If more messages occur within the second, log every 5th message after the first 10.sampling: initial: 10 thereafer: 5
encoding
(optional): specifies logger encoding. Supported values:console
,json
.output-paths
(optional): a list of URLs or file paths to write logging output to. By default, output is written tostdout
(which may also be specified as a "path" along other locations). In case the same configuration is used by multiple services, you can insert"{{ .service }}"
somewhere in paths (part fromstdout
/stderr
) to have different services log into different files.err-output-paths
(optional): a list of URLs or file paths to write internal logger errors to (note: not the error-level logging output). Defaults tostderr
. In case the same configuration is used by multiple services, you can insert"{{ .service }}"
somewhere in paths (part fromstdout
/stderr
) to have different services log into different files.initial-fields
(optional): a map of key-value fields to add to log records (in addition to those added by specific logging sites).
management
configuration
listen-addr
(optional): the address, in the form<host>:<port>
the management server will be listening on. If not specified, this defaults tolocalhost:8088
.protocol
(optional): the protocol that will be used. Must be either "http" or "https". Defaults to "https" if not specified.cert
: path to the x509 certificate to be used. Must be specified if protocol is "https"cert-key
: path to the key associated with the certificate specified incert
. Must be specified if protocol is "https"
plugin
configuration
The following directives are currently supported:
backend
: specifies which plugin mechanism will be used. Currently the only supported plugin backend isgo-plugin
.<backend name>
(in practice, justgo-plugin
): configuration specific to the backend.builtin
: configuration used when plugins are disabled and scheme-specific functionally is compiled into the VTS service executable. (Currently just a place-holder as there is no configuration for the built-in loading mechanism.) Note: enabling or disabling of plugins is a build-time option. It is not possible to do so via configuration.
go-plugin
backend configuration
dir
: path to the directory that will be scanned for plugin executables.
po-store
configuration
See KV Store configuration below.
po-agent
configuration
The following policy agent configuration directives are currently supported:
backend
: specified which policy backend will be used. Currently supported backends:opa
.<backend name>
: an entry with the name of a backend is used to specify configuration for that backend. Multiple such entries may exist in a single config, but only the one for the backend specified by thebackend
directive will be used.
opa
backend configuration
Currently, opa
backend does not support any configuration.
provisioning
configuration
listen-addr
(optional): the address, in the form<host>:<port>
the provisioning server will be listening on. If not specified, this defaults tolocalhost:8443
.protocol
(optional): the protocol that will be used. Must be either "http" or "https". Defaults to "https" if not specified.cert
: path to the x509 certificate to be used. Must be specified if protocol is "https"cert-key
: path to the key associated with the certificate specified incert
. Must be specified if protocol is "https"
sessionmanager
configuration
Session manager has a single configuration point: backend
. This specifies
which ISessionManager
implementation will be used. The following backends are
supported:
ttlcache
: the default; this creates the session cache in memory of theverification-service
process.memcached
: uses an external memcached server.
All other entries under sessionmanager
must be backend names (i.e. ttlcache
or memcached
), providing backend-specific configuration. Only configuration
for the backend selected by backend
entry will actually be used.
ttlcache
backend
ttlcache
backend does not have any configuration points.
memcached
backend
memcached
backend has the following configuration points:
servers
(optional): a list of servers in ": " format that will be used by the backend. The servers will be used with equal weight. Adding the same entry multiple times increases its weight. If this is not specified, it will default to ["localhost:11211"]
.
ta-store
configuration
See KV Store configuration below.
verification
configuration
listen-addr
(optional): the address, in the form<host>:<port>
the verification server will be listening on. If not specified, this defaults tolocalhost:8080
.protocol
(optional): the protocol that will be used. Defaults to "https" if not specified. Must be either "http" or "https".cert
: path to the x509 certificate to be used. Must be specified if protocol is "https"cert-key
: path to the key associated with the certificate specified incert
. Must be specified if protocol is "https"
vts
configuration
server-addr
(optional): address of the VTS server in the form<host>:<port>
. If not specified, this defaults to127.0.0.1:50051
. Unlesslisten-addr
is specified (see below), VTS server will extract the port to listen on from this setting (but will listen on all local interfaces)listen-addr
(optional): The address the VTS server will listen on in the form<host>:<port>
. Only specify this if you want to restrict the server to listen on a particular interface; otherwise, the server will listen on all interfaces on the port specified inserver-addr
.tls
(optional): specifies whether TLS should be used for client connections. Defaults totrue
.cert
: path to the file containing the certificate that should be used by the server iftls
(see above) istrue
.cert-key
: path to the file containing the key associated with the certificate specified byserver-cert
(see above).ca-certs
(optional): a list of paths to certificates that will be used in addition to system certs during mutual validation with the client whentls
(see above) istrue
.
Authentication configuration
Authentication configuration is specified under auth
top-level entry.
-
backend
: specifies which auth backend will be used by the service. The valid options are:passthrough
: a backend that does not perform any authentication, allowing all requests.none
: alias forpassthrough
.basic
: Uses the Basic HTTP authentication scheme. See RFC7617 for details. This is not intended for production.keycloak
: Uses OpenID Connect protocol as implemented by the Keycloak authentication server.
The rest of the expected entries are defined by the value of backend
. See
below for details of how to configure individual backends.
Passthrough
No additional configuration is required. passthrough
will allow all requests.
This is the default if auth
configuration is not provided.
Basic
-
users
: this is a mapping of user names onto their bcrypt password hashes and roles. The key of the mapping is the user name, the value is a further mapping for the details with the following fields:password
: the bcrypt hash of the user's password.roles
: either a single role or a list of roles associated with the user. API authrization will be performed based on the user's roles.
On Linux, bcrypt hashes can be generated on the command line using mkpasswd
utility, e.g.:
mkpasswd -m bcrypt --stdin <<< Passw0rd!
For example:
auth:
backend: basic
users:
user1:
password: "$2b$05$XgVBveh6QPrRHXI.8S/J9uobBR7Wv9z4CL8yACHEmKIQmYSSyKAqC" # Passw0rd!
roles: provisioner
user2:
password: "$2b$05$x5fvAV5WPkX0KXzqf5FMKODz0uyi2ioew1lOrF2Czp2aNH1LQmhki" # @s3cr3t
roles: [manager, provisioner]
Keycloak
host
(optional): host name of the Keycloak service. Defaults tolocalhost
.port
(optional): the port on which the Keycloak service is listening. Defaults to11111
.realm
(optional): the Keycloak realm used by Veraison. A realm contains the configuration for clients, users, roles, etc. It is roughly analogous to a "tenant id". Defaults toveraison
.ca-cert
: the path to a PEM-encoded x509 cert that will be added to CA certs when establishing connection to the Keycloak server. This should be specified if the server has HTTPS enabled and the root CA for its cert is not installed in the system.
For example:
auth:
backend: keycloak
host: keycloak.example.com
port: 11111
realm: veraison
KV Store configuration
kvstore
expects the following entries in configuration:
backend
: the name of the backend to use for the store. Currently supported backends:memory
,sql
.<backend name>
: an entry with the name of a backend is used to specify the configuration for that backend. There may be multiple such entries for different backends. Only the entry matching the active backend specified bybackend
directive will actually be used. The contents for each entry is specific to the backend.
Note: in a config file, kvstore
configuration will typically be namespaced
under the name of a particular store instance, e.g.
ta-store:
backend: sql
sql:
driver: sqlite3
memory
backend configuration
Currently, memory
backend does not support any configuration.
sql
backend configuration
note
sqlite3
, the default driver for the backend, is unsuitable for
production or performance testing.
driver
: The name of the golang SQL driver. Veraison currently includes the following drivers:sqlite3
,mysql
(MySQL and MariaDB), andpgx
(Postgres).datasource
: This points to the database the driver will access. The format is driver-dependent.sqlite3
: the path to the sqlite3 database filepgx
: a URL in the formpostgresql://<user>:<passwd>@<host>:<port>/<database>
mysql
: string in the form<user>:<password>@<protocol>(<address>)/<database>
(Please see the drivers' documentation for more details.)
tablename
(optional): the name of the table within the SQL database that will be used by the store. If this is not specified, it will default to"kvstore"
.max_connections
(optional): the maximum number of parallel connections to DBMS that will be opened by the SQL driver. Once this number is reached, further transactions will block until a connection becomes available. Defaults to10
.
note
max_connections
, like all settings above, is specific to the
store for which it is being configured. This means that the total maximum
numer of connectins Veraison will try to open is the sum of the
max_connections
values for all three stores (30
by default).
Example
This is an example of a complete configuration for all Veraison services.
auth:
backend: keycloak
host: keycloak.example.com
port: 11111
ear-signer:
alg: ES256
key: /opt/veraison/signing/skey.jwk
en-store:
backend: sql
sql:
max_connections: 8
driver: pgx
datasource: postgres://veraison:p4ssw0rd@postgres.example.com:5432/veraison
tablename: endorsements
logging:
level: info
output-paths:
- stdout
- /opt/veraison/logs/{{ .service }}-stdout.log
management:
listen-addr: 0.0.0.0:8088
protocol: https
cert: /opt/veraison/certs/management.crt
cert-key: /opt/veraison/certs/management.key
plugin:
backend: go-plugin
go-plugin:
dir: /opt/veraison/plugins/
po-agent:
backend: opa
po-store:
backend: sql
sql:
max_connections: 8
driver: pgx
datasource: postgres://veraison:p4ssw0rd@postgres.example.com:5432/veraison
tablename: policies
provisioning:
listen-addr: 0.0.0.0:8888
protocol: https
cert: /opt/veraison/certs/provisioning.crt
cert-key: /opt/veraison/certs/provisioning.key
sessionmanager:
backend: memcached
memcached:
servers:
- memcached1.example.com:11211
- memcached2.example.com:11211
ta-store:
backend: sql
sql:
max_connections: 8
driver: pgx
datasource: postgres://veraison:p4ssw0rd@postgres.example.com:5432/veraison
tablename: trust_anchors
verification:
listen-addr: 0.0.0.0:8080
protocol: https
cert: /opt/veraison/certs/verification.crt
cert-key: /opt/veraison/certs/verification.key
vts:
server-addr: localhost:50051
tls: true
cert: /opt/veraison/certs/vts.crt
cert-key: /opt/veraison/certs/vts.key
ca-certs: /opt/veraison/certs/rootCA.crt