-
Notifications
You must be signed in to change notification settings - Fork 191
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RFC-0003] Implement OCIRepository verification using Cosign #876
Conversation
We haven't tested it yet, but we'll ASAP. We'll remove the |
Wow cosign comes with 900+ dependencies? 😱 |
Seems to (partly) be due to $ git diff --stat
go.mod | 12 ------------
go.sum | 59 -----------------------------------------------------------
2 files changed, 71 deletions(-) |
@developer-guy please run |
88346fd
to
111e86f
Compare
0577461
to
3b966fe
Compare
3a2c636
to
27e121a
Compare
Signed-off-by: Stefan Prodan <stefan.prodan@gmail.com>
ca91b26
to
c72b4e3
Compare
Signed-off-by: Stefan Prodan <stefan.prodan@gmail.com>
c72b4e3
to
7c92949
Compare
If I configure verification but don't provide a secret ref: spec:
interval: 1m0s
provider: generic
ref:
tag: "1"
timeout: 60s
url: oci://example.com/local-dev/hello-world
verify:
provider: cosign This happens failed to verify the signature using provider 'cosign': unable to get Fulcio root certs: initializing tuf: creating cached local store: mkdir /.sigstore: read-only file system I don't think it's clear what's wrong reading the error. |
This one is related to the deployment of your source-controller, you need to set the following environment variable to the source-controller deployment as we did in the PR: env:
- name: TUF_ROOT # store the Fulcio root CA file in tmp
value: "/tmp/.sigstore" |
@developer-guy that's keyless verification. The issue is with the error not being clear about what happened. There's a log line that tells that keyless verification is attempted:
but it's not clear from the notification, event and status condition messages. It'd be good to amend the error with more context. |
Signed-off-by: Stefan Prodan <stefan.prodan@gmail.com>
ee71371
to
b5ffc9f
Compare
Signed-off-by: Stefan Prodan <stefan.prodan@gmail.com>
cc557de
to
3b637a8
Compare
Agreed, I've added the keyless method to the verification error along with a test for it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
This PR implements cosign verification as specified in RFC-0003 Flux OCI support for Kubernetes manifests.
Usage example
Verify with Cosign public keys stored in a Kubernetes secret:
Verify with Cosign keyless using Rekor public instance:
Fixes #863
Authors: