Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Implement signed images verification #67

Closed
konstantina-gramatova opened this issue Sep 29, 2022 · 2 comments · Fixed by #215
Closed

Implement signed images verification #67

konstantina-gramatova opened this issue Sep 29, 2022 · 2 comments · Fixed by #215
Assignees
Labels
security Security improvement task Single unit of work
Milestone

Comments

@konstantina-gramatova
Copy link
Contributor

All used container images must undergo a signature verification (if signed) based on the provided verification data. If the verification fails, running a container instance using such an image must be aborted with the appropriate error.

The verification has to be implemented integrating sigstore's Cosign.
If a global daemon's configuration is applicable, it has to be covered as well.

@konstantina-gramatova konstantina-gramatova added the task Single unit of work label Sep 29, 2022
@konstantina-gramatova konstantina-gramatova added this to the M3 milestone Sep 29, 2022
@e-grigorov e-grigorov added the security Security improvement label Oct 6, 2022
@dimitar-dimitrow dimitar-dimitrow self-assigned this Oct 11, 2022
@dimitar-dimitrow
Copy link
Contributor

dimitar-dimitrow commented Nov 17, 2022

Signatures would be pulled only on creation and would be deleted with their corresponding container images. Keys for verification could be provided globally - through container-management configuration, per container - through container configuration. Per container keys are prioritized.

Image Signed Global Keys Per Container Keys No Keys
No Skip verification Skip verification Skip verification
Yes Perform Verification Perform Verification Skip verification

Skip verification - no verification is performed, container is created/started
Perform Verification - if verification fails, container is not created/started; if verification is successful, container is created/started.

@dimitar-dimitrow
Copy link
Contributor

The focus has changed to implement signed image verification with notation-go instead of sigstore/cosign, for more information check this comment.

@dimitar-dimitrow dimitar-dimitrow linked a pull request Nov 22, 2023 that will close this issue
dimitar-dimitrow added a commit to bosch-io/container-management that referenced this issue Nov 30, 2023
Signed-off-by: Dimitar Dimitrov <dimitar.dimitrov3@bosch.com>
dimitar-dimitrow added a commit to bosch-io/container-management that referenced this issue Nov 30, 2023
Signed-off-by: Dimitar Dimitrov <dimitar.dimitrov3@bosch.com>
dimitar-dimitrow added a commit to bosch-io/container-management that referenced this issue Nov 30, 2023
Signed-off-by: Dimitar Dimitrov <dimitar.dimitrov3@bosch.com>
dimitar-dimitrow added a commit to bosch-io/container-management that referenced this issue Dec 12, 2023
Signed-off-by: Dimitar Dimitrov <dimitar.dimitrov3@bosch.com>
k-gostev pushed a commit that referenced this issue Dec 12, 2023
* [#67] Implement signed images verification
---------

Signed-off-by: Dimitar Dimitrov <dimitar.dimitrov3@bosch.com>
k-gostev pushed a commit that referenced this issue Apr 30, 2024
* [#67] Implement signed images verification
---------

Signed-off-by: Dimitar Dimitrov <dimitar.dimitrov3@bosch.com>
dimitar-dimitrow added a commit that referenced this issue May 10, 2024
[#234] Merge `dev-m5` branch into `main`
* [#51] Improve containerd client unit tests (#203)
* [#201] Optimized, deterministic intermediate desired state feedback messages (#204)
* [#208] Add file flag to the CLI create command (#209)
* [#191] Container remains Stopped after container-management service restart (#214)
* [#210] Remove command should accept more than one container ID (#212)
* [#196] Starting of constantly restarting container fails (#216)
* [#67] Implement signed images verification (#215)
* [#91] Provide unit tests covering signed images verification (#220)
* [#213] Add quiet flag, to the list command. (#221)
* [#217] CLI Remove command improvements (#224)

---------

Signed-off-by: Daniel Milchev fixed-term.daniel.milchev@bosch.io
Signed-off-by: Stoyan Zoubev <Stoyan.Zoubev@bosch.com>
Signed-off-by: Kristiyan Gostev <kristiyan.gostev@bosch.com>
Signed-off-by: Dimitar Dimitrov <dimitar.dimitrov3@bosch.com>
Co-authored-by: Daniel Milchev <fixed-term.daniel.milchev@bosch.io>
Co-authored-by: Stoyan Zoubev <Stoyan.Zoubev@bosch.io>
Co-authored-by: Dimitar Dimitrov <dimitar.dimitrov3@bosch.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
security Security improvement task Single unit of work
Projects
Status: Done
Development

Successfully merging a pull request may close this issue.

4 participants