-
Notifications
You must be signed in to change notification settings - Fork 321
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[eks] [request]: Sign release artifacts with Sigstore #1733
Comments
I'd love to see this happen and would be willing to help out! Sorry I missed the ping @stevehipwell. |
I think there are a number of repo types which would need to be covered by this; AWS internal (e.g. kube-proxy), AWS open source (e.g. AWS VPC CNI) & Kubernetes SIGs (e.g. AWS EBS CSI Driver). @dlorenc is there a reference repo for doing this correctly? And is there an implementation in kubernetes-sigs so Prow is being used? I've got a reference implementation based purely on GitHub Actions but I didn't get the attestation working correctly. |
@stevehipwell lets talk :) some examples are in the sigstore repos itself, but we see how you are using GH actions so we can adapt. :) in k8s we dont use prow, we have |
@cpanato are there any repos in kubernetes (not |
I think the following containers would be in scope for this (based on my own clusters), with each group potentially needing slightly different tooling and the core images signing needing to be done directly by AWS. EKS Core Images
AWS Images
AWS Kubernetes SIGS Images
|
sorry for the delay In K8s organization, we use the promo-tools (https://github.com/kubernetes-sigs/promo-tools), which promote the images from staging to the production registry, and during this process, it signs the image. How are your images being built? In GitHub actions or using something internal? |
@cpanto the SIGs images are likely the best place to start and could then be used as a template for the images with private builds which would need to be implemented by AWS employees. |
+1 to this very useful request! Is there any estimated delivery for the feature? Thank you! |
Community Note
Tell us about your request
I'd like all artifacts created for EKS to be signed with Sigstore so we can verify that they are what they say they are. This would align EKS with upstream Kubernetes which as of v1.24.0 is using Sigstore for all release artifacts.
Which service(s) is this request for?
EKS.
Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
I'd like to be able to verify the EKS artifacts with the same tools as for upstream Kubernetes, other OSS projects and internal services; Sigstore is the OpenSSF solution for this.
Are you currently working around this issue?
n/a
Additional context
This is related to #43 for storing the signatures.
Attachments
n/a
The text was updated successfully, but these errors were encountered: