Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Roadmap for removing skopeo - image-rs signature verification gap for the first release #57

Open
9 of 11 tasks
stevenhorsman opened this issue Aug 12, 2022 · 2 comments
Open
9 of 11 tasks
Assignees

Comments

@stevenhorsman
Copy link
Member

stevenhorsman commented Aug 12, 2022

On the Confidential containers call on 4th August there was a discussion about what we had remaining to cut the first release. This mostly came down to creating an e2e CI/CD process for the operator and the removal of skopeo, which this issue is going to talk about.

Current status

At the moment we have some Kata CI signature verification tests, but they only work when skopeo is installed in the Kata guest. We also have the get_resource endpoint implementation for the sample_kbc in the attestation-agent, but there aren't any integration tests of this yet to show/test how it works with image-rs. It sounds like this kbc implementation, should be very similar to the offline_fs_kbc that we want to implement as that's what our Kata CC CI/CD pipeline uses at the moment, so it's a good base to start from.

There is also the gap of skopeo supporting authenticated container registries, which we can't currently do with image-rs in and e2e scenario, but that's part of kata-containers/kata-containers#4601 and not been agreed and broken down to the same detail yet.

Goal

Our goal for the first release (with respected to signature verification), is to get the Kata CC tests of signature verification using local attestation working without skopeo needing to be installed in the guest image and then remove the skopeo and umoci binaries from the operator payload.

Roadmap for achieving this

This is my proposed path of how we can get to the goal. I'm still fleshing out the detail on some of the issues, but feel free to add comments or questions:

At this point I think we've met the MVP of removing and testing the skopeo - image-rs gap of support signature verification e2e, but there are some further things we might like to do

@sameo sameo moved this to 🆕 New in CoCo Releases Aug 18, 2022
@sameo sameo moved this from 🆕 New to 🏗 In progress in CoCo Releases Aug 24, 2022
@stevenhorsman stevenhorsman changed the title Roadmap from removing skopeo - image-rs signature verification gap for the first release Roadmap for removing skopeo - image-rs signature verification gap for the first release Sep 1, 2022
@stevenhorsman stevenhorsman self-assigned this Sep 7, 2022
@ariel-adam ariel-adam moved this from 🏗 In progress to 👀 In review in CoCo Releases Sep 22, 2022
@ariel-adam ariel-adam moved this from 👀 In review to ✅ Done in CoCo Releases Sep 29, 2022
@ariel-adam
Copy link
Member

@stevenhorsman is this issue still relevant or can be closed?
If it's still relevant to what release do you think we should map it to (mid-November, end-December, mid-February etc...)?

@stevenhorsman
Copy link
Member Author

It's worth noting that we have at least one defect/gap between skopeo and image-rs:

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Status: Done
Development

No branches or pull requests

3 participants