Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allowable image signing on non paketo stacks #871

Merged
merged 2 commits into from
Oct 25, 2021

Conversation

matthewmcnew
Copy link
Collaborator

@matthewmcnew matthewmcnew commented Oct 25, 2021

Mount the home volume in the completion container:

  • If a build utilizing image signing is run on a stack with a different user than the completion image the container will not have access to the home directory.
  • This allows the container to always have a writeable HOME directory which is the same as build-init.

Prevent unnecessarily loading of credentials on builds that do not perform image signing.

If a build utilizing image signing is run on a stack with a different user than the completion image the container will not have access to the home directory.
This allows the container to always have a writeable HOME directory which is the same as build-init.
@matthewmcnew matthewmcnew force-pushed the allowable-image-signing-on-non-paketo-stacks branch from f0b68eb to 95a1534 Compare October 25, 2021 17:23
@matthewmcnew matthewmcnew merged commit 88f0e10 into main Oct 25, 2021
@matthewmcnew matthewmcnew deleted the allowable-image-signing-on-non-paketo-stacks branch October 25, 2021 18:27
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants