-
Notifications
You must be signed in to change notification settings - Fork 151
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
request: sign db image with cosign #205
Comments
@knqyf263 Can I work on this? If I'm getting this correct, we sign the build artifact in our CI and push it to our Container Registry, and give our end users an option to verify the artifact they downloaded either using our public key or keyless. Is there anything else you have in mind? |
Sounds good! |
Hey @knqyf263, so I have worked on something similar at Kyverno and had a query. The design system for this we followed there was to push the signature as well as the artifact (in our case, DB) in the same CR. The issue we faced there later was that the metrics(number of downloads for the package) weren't accurate anymore as cosign verifications downloaded the Hence we later shifted to a separate Since, in our case, until now, we are overwriting the image with the same tag on our CR, it does not populate the CR and keeps it clean. Attaching a screenshot for an exact mockup I tried for our trivy-db on my personal GHCR package: As we can see. for every update and push in the CR, it generates and pushes a new sig file. Hence, in my opinion, we should create a separate package registry, too, like |
Nice catch. It makes sense to have another repository for signatures. |
For highly regulated clients there's an interest in the DB image being signed. This could be done on GHCR with cosign.
The text was updated successfully, but these errors were encountered: