Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cosign: verify base image #1700

Open
ahmet2mir opened this issue Jul 15, 2021 · 2 comments
Open

Cosign: verify base image #1700

ahmet2mir opened this issue Jul 15, 2021 · 2 comments
Labels
area/behavior all bugs related to kaniko behavior like running in as root area/usability For all bugs related to how people use kaniko, option and feature flags, etc feat/provenance kind/feature-request priority/p2 High impact feature/bug. Will get a lot of users happy

Comments

@ahmet2mir
Copy link

Hello,

We use kaniko and cosign to build/sign our images and I see that Kaniko uses cosign too.

Also cosign is not "integrated" in Kaniko, you use it separatly in your CI.

As kaniko doesn't embed cosign, it will be very helpful if we could, at least, "dump" a kind of depedency images graph with a depth size?

So then we could run cosign verify easily to ensure that base images are also signed?

From security perspective it will ensure that we don't build a production image based on hijacked image.
It's impossible to guarentee that an image wasn't overrided on registries.
At least with the signature we could verify it and set annotation on signatures to "trace" the build (like pipelines id, git sha etc)

Let me know if i'm not clear.

Thanks!

@imjasonh
Copy link
Collaborator

This would be another use case for sigstore/cosign#666

@mattmoor
Copy link
Collaborator

I too want kaniko to support verifying FROM images, but another take on this would be: sigstore/cosign#648

If a workflow could verify and resolve a Dockerfile, then what's handed to kaniko is by digest and pre-verified.

I opened the issue Jason linked based on discussion that ensued around similar aims in ko: ko-build/ko#436

So big +1 from me, and I'd be happy to discuss more stuff in this vein.

@aaron-prindle aaron-prindle added kind/feature-request feat/provenance priority/p2 High impact feature/bug. Will get a lot of users happy area/behavior all bugs related to kaniko behavior like running in as root area/usability For all bugs related to how people use kaniko, option and feature flags, etc labels Jun 22, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/behavior all bugs related to kaniko behavior like running in as root area/usability For all bugs related to how people use kaniko, option and feature flags, etc feat/provenance kind/feature-request priority/p2 High impact feature/bug. Will get a lot of users happy
Projects
None yet
Development

No branches or pull requests

4 participants