-
Notifications
You must be signed in to change notification settings - Fork 580
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Generate SBOM and sign release artefacts #3325
Comments
@richardcase: GuidelinesPlease ensure that the issue body includes answers to the following questions:
For more details on the requirements of such an issue, please see here and ensure that they are met. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Do you have any example how other projects in Kubernetes ecosystem does this? |
We use it in FluxCD |
Relevant to this, there is an effort going on in K8s kubernetes/release#2383 Looks like sigstore is being used there: https://github.com/kubernetes/website/pull/31610/files |
Might worth to come up with a common workflow for cluster-api and other providers too. |
I agree @sedefsavas . We'll probably have to make changes to image-builder / the image promoter stuff which would touch all the providers (probably) |
There is a nice TGIK talk about what's being done in Kubernetes about this: https://www.youtube.com/watch?v=H1D0fk9sZ8I |
Hey I just saw this issue referenced in SIG Release, I'm happy to help out! |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/remove-lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close |
@k8s-triage-robot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This is important for the future, so /reopen |
@richardcase: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hi @richardcase , I'd like to split the SBOM generation ticket into a separate issue because we can take care of that easily once Sigstore is in place. |
I wonder if there is already infrastructure in place in the kubernetes community that we can just use? e.g. I noticed that our container images are already signed because signing was added to the Kubernetes image promotion process. |
I think you are referring to this, right? That's the same mechanism I would love to use :) |
Ah perfect. Thx for the info, I"m not really familar with how it works :) |
/assign @flxw |
@sedefsavas - I saw that your name is on most of the releases. Could you kindly give me context on how those are authored? I couldn't find a Github Actions workflow that created the release, so I am assuming it's manual? |
@flxw - we follow these steps when doing a release: https://github.com/kubernetes-sigs/cluster-api-provider-aws/blob/main/docs/book/src/development/releasing.md So manual with some automation. |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
/reopen |
@richardcase: Reopened this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hi! My apologies for the long lead time, but I finally got around to making some time for this. However, I've also seen that there is a larger movement for Kubernetes artifact signing underway: I'll link up with the people on that issue, as I hope to solve this a bit more elegantly and with benefits for the other projects. |
Thanks for the update @flxw. It would be good to be aligned with the wider Kubernetes community effort on artifact signing. |
Hey! We have a similar tracking issue in CAPI to have this in place, and +1 from my side to have a common workflow for it. But going through the discussion quickly, it seems to me only the signing part of the SBoM was discussed, however how about the SBoM generation itself? |
@furkatgofurov7 - thanks for input and the link to the k8s community bom is really helpful. |
This issue is labeled with You can:
For more details on the triage process, see https://www.kubernetes.dev/docs/guide/issue-triage/ /remove-triage accepted |
This is still relevant, so /triage accepted @flxw hi!
Just wanted to check on the status of this work since this is needed not only in CAPA but in CAPI also. Would be great to hear your and others opinion on this one, and probably we can already start laying a foundation for the SBOM generation using the bom tool to start with and later improve it with cosign. Thoughts? |
@furkatgofurov7 - this would be good to discuss at the next CAPA office hours. |
/remove-lifecycle rotten |
@richardcase sure, I will try to make it to the upcoming office hours. |
This issue is labeled with You can:
For more details on the triage process, see https://www.kubernetes.dev/docs/guide/issue-triage/ /remove-triage accepted |
/kind feature
/area release
/area security
/help
/priority important-soon
/triage accepted
Describe the solution you'd like
We should be generating a SBOM for CAPA and also signing this and any other release artefacts.
Anything else you would like to add:
We should probably use sigstore
Environment:
kubectl version
):/etc/os-release
):The text was updated successfully, but these errors were encountered: