Status: implemented
Creation date: 2022-10-20
Last update: 2023-02-20
This RFC proposes to establish a canonical Revision
format for an Artifact
which points to a specific revision represented as a checksum (e.g. an OCI
manifest digest or Git commit SHA) of a named pointer (e.g. an OCI repository
name or Git tag). In addition, it proposes to include the algorithm name (e.g.
sha256
) as a prefix to an advertised checksum for an Artifact
and
further referring to it as a Digest
, deprecating the Checksum
field.
The current Artifact
type's Revision
field format is not "officially"
standardized (albeit assumed throughout our code bases), and has mostly been
derived from GitRepository
which uses /
as a separator between the named
pointer (a Git branch or tag) and a specific (SHA-1, or theoretical SHA-256)
revision.
Since the introduction of OCIRepository
and with the recent changes around
HelmChart
objects to allow the consumption of charts from OCI registries,
this could be seen as outdated or confusing due to the format differing from
the canonical format used by OCI, which is <name>@<algo>:<checksum>
(the
part after @
formally known as a "digest") to refer to a
specific version of an OCI manifest.
While also taking note that Git does not have an official canonical format for
e.g. branch references at a specific commit, and /
has less of a symbolic
meaning than @
, which could be interpreted as "<branch>
at
<commit SHA>
".
In addition, with the introduction of algorithm prefixes for an Artifact
's
checksum, it would be possible to add support and allow user configuration of
other algorithms than SHA-256. For example SHA-384 and SHA-512, or the more
performant (parallelizable) BLAKE3.
Besides this, it would make it easier to implement a client that can verify the checksum without having to resort to an assumed format or guessing method based on the length of it, and allows for a more robust solution in which it can continue to calculate against the algorithm of a previous configuration.
The inclusion of the Artifact
's algorithm prefix has been proposed before in
source-controller#855,
with supportive response from Core Maintainers.
- Establish a canonical format to refer to an
Artifact
'sRevision
field which consists of a named pointer and a specific checksum reference. - Allow easier verification of the
Artifact
's checksum by including an alias for the algorithm. - Deprecate the
Artifact
'sChecksum
field in favor of theDigest
field. - Allow configuration of the algorithm used to calculate the checksum of an
Artifact
. - Allow configuration of algorithms other than SHA-256 to calculate the
Digest
of anArtifact
. - Allow compatibility with SemVer name references which might contain an
@
symbol already (e.g.[email protected]@sha256:...
, as opposed to OCI'sname:v1.0.0@sha256:...
).
- Define a canonical format for an
Artifact
'sRevision
field which contains a named pointer and a different reference than a checksum.
Change the format of the Revision
field of the source.toolkit.fluxcd.io
Group's Artifact
type across all Source
kinds to contain an @
separator
opposed to /
, and include the algorithm alias as a prefix to the checksum
(creating a "digest").
[ <named pointer> ] [ [ "@" ] <algo> ":" <checksum> ]
Where <named pointer>
is the name of e.g. a Git branch or OCI repository
name, <checksum>
is the exact revision (e.g. a Git commit SHA or OCI manifest
digest), and <algo>
is the alias of the algorithm used to calculate the
checksum (e.g. sha256
). In case only a named pointer or digest is advertised,
the @
is omitted.
For a GitRepository
's Artifact
pointing towards an SHA-1 Git commit on
branch main
, the Revision
field value would become:
main@sha1:1eabc9a41ca088515cab83f1cce49eb43e84b67f
For a GitRepository
's Artifact
pointing towards a specific SHA-1 Git commit
without a defined branch or tag, the Revision
field value would become:
sha1:1eabc9a41ca088515cab83f1cce49eb43e84b67f
For a Bucket
's Artifact
with a revision based on an SHA-256 calculation of
a list of object keys and their etags, the Revision
field value would become:
sha256:8fb62a09c9e48ace5463bf940dc15e85f525be4f230e223bbceef6e13024110c
For a HelmChart
's Artifact
pointing towards a Helm chart version, the
Revision
field value would become:
1.2.3
Introduce a new field to the source.toolkit.fluxcd.io
Group's Artifact
type
across all Source
kinds called Digest
, containing the checksum of the file
advertised in the Path
, and alias of the algorithm used to calculate it
(creating a "digest").
<algo> ":" <checksum>
For a GitRepository
Artifact
's checksum calculated using SHA-256, the
Digest
field value would become:
sha256:1111f92aba67995f108b3ee3ffdc00edcfe206b11fbbb459c8ef4c4a8209fca8
In favor of the Digest
field, the Checksum
field of the source.toolkit.fluxcd.io
Group's Artifact
type across all Source
kinds is deprecated, and removed in
a future version.
As a user of the source-controller, I want to be able to see the exact revision of an Artifact that is being used, so that I can verify that it matches the expected revision at a remote source.
For a Source kind that has an Artifact
with a Revision
which contains a
checksum, the field value can be retrieved using the Kubernetes API. For
example:
$ kubectl get gitrepository -o jsonpath='{.status.artifact.revision}' <name>
main@sha1:1eabc9a41ca088515cab83f1cce49eb43e84b67f
As a user of the source-controller, I want to be able to verify the checksum of an Artifact.
For a Source kind with an Artifact
the digest consisting of the algorithm
alias and checksum is advertised in the Digest
field, and can be retrieved
using the Kubernetes API. For example:
$ kubectl get gitrepository -o jsonpath='{.status.artifact.digest}' <name>
sha256:1111f92aba67995f108b3ee3ffdc00edcfe206b11fbbb459c8ef4c4a8209fca8
As a user of the source-controller, I want to be able to configure the algorithm used to calculate the checksum of an Artifact.
The source-controller binary accepts a --artifact-digest-algo
flag which
configures the algorithm used to calculate the checksum of an Artifact
.
The default value is sha256
, but can be changed to sha384
, sha512
or blake3
.
When set, newly advertised Artifact
's Digest
fields will be calculated
using the configured algorithm. For previous Artifact
's that were set using
a previous configuration, the Artifact
's Digest
field will be recalculated
using the advertised algorithm.
As a user of the notification-controller, I want to be able to see the exact revision a notification is referring to.
The notification-controller can use the revision for a Source's Artifact
attached as an annotation to an Event
, and correctly parses the value field
when attempting to extract e.g. a Git commit digest from an event for a
GitRepository
. As currently already applicable for the /
separator.
As a user of the notification-controller, I want to be able to observe what commit has been applied on my (supported) Git provider.
The notification-controller can use the revision attached as an annotation to
an Event
, and is capable of extracting the correct reference for a Git
provider integration (e.g. GitHub, GitLab) to construct a payload. For example,
extracting 1eabc9a41ca088515cab83f1cce49eb43e84b67f
from
main@sha1:1eabc9a41ca088515cab83f1cce49eb43e84b67f
.
As a Flux CLI user, I want to see the current revision of my Source in a listed overview.
By running flux get source <kind>
, the listed view of Sources would show a
truncated version of the checksum in the Revision
field.
$ flux get source gitrepository
NAME REVISION SUSPENDED READY MESSAGE
flux-monitoring main@sha1:1eabc9a4 False True stored artifact for revision 'main@sha1:1eabc9a41ca088515cab83f1cce49eb43e84b67f'
$ flux get source oci
NAME REVISION SUSPENDED READY MESSAGE
apps-source local@sha256:e5fa481b False True stored artifact for digest 'local@sha256:e5fa481bb17327bd269927d0a223862d243d76c89fe697ea8c9adefc47c47e17'
$ flux get source bucket
NAME REVISION SUSPENDED READY MESSAGE
apps-source sha256:e3b0c442 False True stored artifact for revision 'sha256:8fb62a09c9e48ace5463bf940dc15e85f525be4f230e223bbceef6e13024110c'
The two main alternatives around the Revision
parts in this RFC are to either
keep the current field value formats as is, or to invent another format. Given
the motivation for this RFC outlines the reasoning for not
keeping the current Revision
format, and the proposed is a commonly known
format. Neither strike as a better alternative.
For the changes related to Checksum
and Digest
, the alternative is to keep
the current field name as is, and only change the field value format. However,
given the naming of the field is more accurate with the introduction of the
algorithm alias, and now is the time to make last (breaking) changes to the
API. This does not strike as a better alternative.
For an Artifact
's Revision
which contains a checksum referring to an exact
revision, the checksum within the value MUST be appended with an alias for the
algorithm separated by :
(e.g. sha256:...
), further referred to as a
"digest". The algorithm alias and checksum of the digest MUST be lowercase and
alphanumeric.
For an Artifact
's Revision
which contains a digest and a named pointer,
it MUST be prefixed with @
, and appended at the end of the Revision
value.
The named pointer MAY contain arbitrary characters, including but not limited
to /
and @
.
[ <named pointer> ] [ [ "@" ] <algo> ":" <checksum> ]
Where [ ]
indicates an optional element, " "
a literal string, and < >
a variable.
When parsing the Revision
field value of an Artifact
to extract the digest,
the value after the last @
is considered to be the digest. The remaining
value on the left side is considered to be the named pointer, which MAY contain
an additional @
separator if applicable for the domain of the Source
implementation.
When truncating the Revision
field value of an Artifact
to display in a
view with limited space, the <checksum>
of the digest MAY be truncated to
7 or more characters. The <algo>
of the digest MUST NOT be truncated.
In addition, a digest MUST always contain the full length checksum for the
algorithm.
To allow backwards compatibility in the notification-controller, Flux CLI and
other applicable components, the Revision
new field value format could be
detected by the presence of the @
or :
characters. Falling back to their
current behaviour if not present, phasing out the old format in a future
release.
The Artifact
's Digest
field advertises the checksum of the file in the
URL
. The checksum within the value MUST be appended with an alias for the
algorithm separated by :
(e.g. sha256:...
). This follows the
digest format of OCI.
<algo> ":" <checksum>
Where " "
indicates a literal string, and < >
a variable.
The library used for calculating the Digest
field value is
github.com/opencontainers/go-digest
. This library is stable and extensible,
and used by various OCI libraries which we already depend on.
The checksum in the Digest
field value MUST be calculated using the canonical
algorithm set at runtime.
The algorithm used for calculating the Digest
field value MAY be configured
using the --artifact-digest-algo
flag of the source-controller binary. The
default value is sha256
, but can be changed to sha384
, sha512
or
blake3
.
Note: availability of BLAKE3 is at present dependent on an explicit import
of github.com/opencontainers/go-digest/blake3
.
When the provided algorithm is NOT supported, the source-controller MUST fail to start.
When the configured algorithm changes, the Digest
MAY be recalculated to
update the value.
The checksum of a downloaded artifact MUST be verified against the Digest
field value. If the checksum does not match, the verification MUST fail.
The Artifact
's Checksum
field is deprecated and MUST be removed in a
future release. The Digest
field MUST be used instead.
To allow backwards compatibility, the source-controller could continue
to advertise the checksum part of a Digest
in the Checksum
field until
the field is removed.
- 2023-02-20 First implementation released with flux2 v0.40.0