You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using cosign to sign container images, a standalone object is push to the registry. Our image scanner thinks this is a valid container image tag (GHCR thinks that too) and could potentially crash live system if an image policy matches the cosign object.
For example I've signed flagger-loadtester, GHCR shows the signature object as a container image tag:
As expected Flux adds this tag to its database:
$ flux create image repository flagger-loadtester --image ghcr.io/fluxcd/flagger-loadtester --interval 20m
$ flux get images allNAME READY MESSAGE LAST SCAN SUSPENDED imagerepository/flagger-loadtester True successful scan, found 2 tags 2021-08-24T16:08:15+03:00 False
To avoid deploying cosign signatures as container images onto clusters, I propose we add a field to the ImageRepository API to allow people to exclude tags based on regex expression, e.g.:
When using cosign to sign container images, a standalone object is push to the registry. Our image scanner thinks this is a valid container image tag (GHCR thinks that too) and could potentially crash live system if an image policy matches the cosign object.
For example I've signed flagger-loadtester, GHCR shows the signature object as a container image tag:
As expected Flux adds this tag to its database:
To avoid deploying cosign signatures as container images onto clusters, I propose we add a field to the
ImageRepository
API to allow people to exclude tags based on regex expression, e.g.:The text was updated successfully, but these errors were encountered: