-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Switch to signed images #28
Comments
I was able to implement this in the The signature of the image is verified the way you'd expect with The problem is with using the signed image with While both rebases worked just fine, which gets past the problem above, the image signature does not seem to be getting verified at all. It neither rejected rebasing onto a non-signed image, nor onto an image with the wrong signature. This goes against the whole point of having the image signed in the first place, no? |
After playing with this a bit further, combing through documentation, and even trying to find the relevant pieces of source code in ostreedev/ostree-rs-ext, I still wasn't able to make any progress. Also, a search for the term Thinking there might be a bug in |
Thanks for your investigation into this! I've subbed to the rpm-ostree issue! |
Alright this is live in skope 1.13 now, here are the best instructions/examples I can find: |
Alright! I was able to test this successfully using the examples provided but using our cosign key:
It looks like we'll want to set the type to reject and then explicitly allow I also wonder if there's a way we could avoid having to list every image in the yaml file? |
I think setting How I had done it in my repository was specify a key path specifically for the image, and then have a less specific catch-all case ( I vaguely remember this set-up working when pulling an image with |
Yeah just noticed that when I tried to update a distrobox:
I'll keep investigating, thanks for your help! EDIT: adding a link to ahgencer's PR: ahgencer/ocitree@main...pr-cosign |
I currently have my
which allows me to use signed images from
while being able to pull any unsigned images from other repos like
|
Alright thanks everyone, I got it working locally. Last question, should we keep this in |
/usr/etc is the correct place |
Initial PR here, needs review and probably some RPM thing: |
Ok so I can't switch back to an unsigned image ...
Do we know how to test to see if the change affects existing setups? I just want to doublecheck that we're not breaking updates for people not on signed images, which is basically everyone, heh. |
Alright, this is live, all the docs are PRed, I've swapped over and you can rebase back to fedora or another unsigned image just fine, thanks so much folks! Feel free to file follow on PRs or issues if you run into something, thanks! |
Filing for future consideration. Currently rebasing to the signed image fails:
According to the manpage we could set up the policy.json and probably also config in containers-registries.d to make it all seamless.
The text was updated successfully, but these errors were encountered: