-
Notifications
You must be signed in to change notification settings - Fork 27
test that we support image signatures #163
Comments
In this issue, the great thing about the new ostree-native-container flow is that if you have a setup to sign container images, that exact same setup can be used to sign OS updates. See https://docs.podman.io/en/latest/markdown/podman-image-sign.1.html and https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux_atomic_host/7/html/managing_containers/signing_container_images for some old-style GPG signatures. As of recently the containers/image stack gained support for "cosign", see containers/skopeo#1701 |
To test the recent changes for policy verification:
Since we do not currently sign Initially it was thought this can be done locally by doing Instead we need to be able to push this to some ephemeral testing Docker image registry. The perfect candidate was ttl.sh as mentioned in sigstore doumentation, but unfortunately |
So CI on this repository mainly uses GHA, for which there is https://docs.github.com/en/actions/using-containerized-services/about-service-containers But that's just sugar for running a container...we can run any registry (quay.io, docker/distribution or whatever) inside a GHA job right? |
xref containers/skopeo#1482
We should validate that we're doing image signatures via the proxy correctly.
The text was updated successfully, but these errors were encountered: