Skip to content

Try signature extensions in registry before using the docker sigstore #384

@runcom

Description

@runcom

Now that the docker:// transport transparently uses the registry extension for signature (in OpenShift), I think it's better to first try to push the signature on the registry before using the sigstore in the default.yaml file.
This came out on fedora, we have a default-docker for /var/lib/atomic/sigstore shipped in the os, but when pushing to the openshift registry which supports signatures storage remotely, I expected to use that instead of the sigstore in the default-docker sigstore.

@mtrmac wdyt? I think we have to first 1) check if the registry support signatures storage, 2) push signatures if it supports them 3) fall back to sigstore if it's not an openshift registry. Right now it's very misleading to have signatures on the host when I expected signatures to be pushed to the registry.

# This is the default signature write location for docker registries.
default-docker:
  sigstore: file:///var/lib/atomic/sigstore
#  sigstore-staging: file:///var/lib/atomic/sigstore

I have to comment the above to push signature to the openshift integrated registry using the docker:// transport.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type
    No fields configured for issues without a type.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions