Skip to content

Conversation

@jtcarnes
Copy link
Contributor

@jtcarnes jtcarnes commented Jun 15, 2022

For security, artifact integrity and attestation are important. While a container sha takes care of integrity,
it does not satisfy attestation. The Linux foundations open source Sigstore projects are becoming the
defacto standard for container attestation. Kubernetes latest release was signed with cosign (the
sigstore signing utility).

This MR adds cosign to the release process easily. We use the github actions oidc token to authenticate
to fulcio and receive a short lived key to sign the images after we publish them. This allows
anyone to trivially check where the images have come from and their integrity.

Signing containers in this way is also the standard template for new repos that use github
actions.

Fixes #1423

@jtcarnes
Copy link
Contributor Author

@fedepaol this MR relies on #1414 to work properly. Once this is done, this should be an easy rebase.

@jtcarnes jtcarnes changed the title WIP: Cosign images during publish Cosign images during publish Jun 23, 2022
@jtcarnes
Copy link
Contributor Author

jtcarnes commented Jul 6, 2022

@fedepaol whenever you get the chance, lmk

@mattmoor
Copy link

I came here to suggest y'all sign stuff with cosign, and found this PR! FWIW, I use metallb a fair amount and would love to see this land.

@jtcarnes jtcarnes force-pushed the add-cosign branch 2 times, most recently from 249ae06 to 70dcd90 Compare July 15, 2022 07:36
To enable artifact attestation, the images are signed with cosign using
the github pipelines oidc token. This makes it easy for artifacts to be
verified by external users and is a standard that kubernetes is centering
on.

Signed-off-by: Joshua Carnes <56089764+jtcarnes@users.noreply.github.com>
@fedepaol
Copy link
Member

LGTM, I am gonna test the full release process against my fork tomorrow before merging

@fedepaol
Copy link
Member

Tested on my fork: https://github.com/fedepaol/metallb/actions/runs/2689838188
Images are published and quay shows them as cosigned.

@fedepaol fedepaol merged commit 6fdd197 into metallb:main Jul 18, 2022
fedepaol added a commit to fedepaol/metallb that referenced this pull request Jul 18, 2022
Adding a mention to metallb#1437

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
fedepaol added a commit that referenced this pull request Jul 19, 2022
Adding a mention to #1437

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
fedepaol added a commit that referenced this pull request Jul 20, 2022
Adding a mention to #1437

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
pperiyasamy pushed a commit to pperiyasamy/metallb that referenced this pull request Aug 17, 2022
Adding a mention to metallb#1437

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
pperiyasamy pushed a commit to pperiyasamy/metallb that referenced this pull request Sep 6, 2022
Adding a mention to metallb#1437

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
pperiyasamy pushed a commit to pperiyasamy/metallb that referenced this pull request Sep 7, 2022
Adding a mention to metallb#1437

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
novad03 pushed a commit to novad03/k8s-meta that referenced this pull request Nov 25, 2023
Adding a mention to metallb/metallb#1437

Signed-off-by: Federico Paolinelli <fpaoline@redhat.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Suggestion: Sign published images with Sigstore/Cosign

3 participants