-
Notifications
You must be signed in to change notification settings - Fork 410
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable RH Registry signature verification by default #1349
Comments
Are there any negative implications of turning on verification? Would it fail for images that don’t have signatures for some reason (and are we certain all of them have signatures)? |
This almost may merit an enhancement but I'd also be fine just trying it out in master (4.4) for a bit... |
Would we want builds to perform similar signature checks for the base/builder images? |
According to DELIVERY-5889 and DELIVERY-6699 they should all be signed. If an image doesn't have a signature and your pulling from one of the Red Hat repos (registry.access.redhat.com), or (registry.redhat.io) the pull will fail. |
Sure, why not. |
@cgwalters I'd like to see an enhancement so we can discuss what to do in builds. It's unclear to me how frequently customers use non-Red Hat images in their build pipelines. |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
Stale issues rot after 30d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle rotten |
Rotten issues close after 30d of inactivity. Reopen the issue by commenting /close |
@openshift-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
just for posterity: today the catalog images consumed by OLM are not signed. We're working on fixing that, though it looks like they'll be signed w/ a different key than the standard release key. So any effort to enable signature verification by default needs to take into account how the olm catalog images can be verified (or exempt them from verification) |
Is this still the case? Are even redhat-provided catalog images unsigned? |
yes. should be resolved soon. Here's some more info on how you can enable verification for everything else (the content the catalog references is still signed): |
I do think we should do this by default when we're ready. |
@cgwalters: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Description
All images in the Red Hat registry are signed. We have the GPG key on disk to enable verification of these images when pulling, all that's left to do is configure Cri-o to verify the signatures when pulling those images.
Steps to reproduce the issue:
See: https://access.redhat.com/verify-images-ocp4
Describe the results you received:
Signatures are not verified
Describe the results you expected:
Verification steps from the reproduction article are met
Output of
oc adm release info --commits | grep machine-config-operator
:Additional environment details (platform, options, etc.):
OCP 4.2.12
The text was updated successfully, but these errors were encountered: