Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Refactor the kind e2e test. #215

Merged
merged 1 commit into from Oct 27, 2021
Merged

Refactor the kind e2e test. #215

merged 1 commit into from Oct 27, 2021

Conversation

mattmoor
Copy link
Member

This starts to refactor the KinD e2e test with a custom cluster configuration to use a local registry and enable Kubernetes OIDC based on: https://github.com/mattmoor/kind-oidc/blob/main/.github/workflows/kind-oidc.yml

This is a precursor to enabling Kubernetes OIDC in Fulcio, and e2e tests running on-cluster that can actually verify keyless signing e2e presubmit!

Signed-off-by: Matt Moore mattomata@gmail.com

Related: #212

Release Note

NONE

@mattmoor mattmoor force-pushed the fulcio-kind branch 2 times, most recently from 712e149 to 2ba1c75 Compare October 27, 2021 02:16
This starts to refactor the KinD e2e test with a custom cluster configuration to use a local registry and enable Kubernetes OIDC based on: https://github.com/mattmoor/kind-oidc/blob/main/.github/workflows/kind-oidc.yml

This is a precursor to enabling Kubernetes OIDC in Fulcio, and e2e tests running on-cluster that can actually verify keyless signing e2e presubmit!

Signed-off-by: Matt Moore <mattomata@gmail.com>
@mattmoor mattmoor changed the title [WIP] Refactor the kind e2e test. Refactor the kind e2e test. Oct 27, 2021
@mattmoor
Copy link
Member Author

cc @dlorenc @bobcallaway @lukehinds

Laying the groundwork here, but this should be largely functionally equivalent to the test being run today (with a more capable environment). In a follow-on change, I'm going to try to run a job that does a keyless cosign sign -identity-token $(cat /some/oidc/token) ${DIGEST} (where the digest is in the local registry this sets up).

That'll require:

  • a workable SoftHSM setup on KinD (for the CA)
  • support for linking the K8s CA into the system certs for OIDC validation
  • support for K8s as an OIDC provider
  • Finally: the job from above.

The piece I'm least certain of is the SoftHSM setup, so if folks have pointers, or want to help massage this to use SoftHSM, I'd greatly appreciate it!

@mattmoor mattmoor mentioned this pull request Oct 27, 2021
@mattmoor
Copy link
Member Author

I think the linked [DNM] PR above handles most of the remaining action items aside from the SoftHSM bit.

I'll plan to try and sit down and figure that stuff out tomorrow, but I think this is getting very close 😁

@dlorenc dlorenc merged commit f176811 into sigstore:main Oct 27, 2021
@mattmoor mattmoor deleted the fulcio-kind branch October 27, 2021 15:33
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

2 participants