-
Notifications
You must be signed in to change notification settings - Fork 1.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security Self-Assessment: [STRIDE-TAMPER-1] Produce a SBoM #6153
Comments
Thanks for creating this Naadir. Automated SBoM generation as part of container image building with We could explore if its a good option for generating SBoMs for cluster-api container images. |
/milestone v1.2 |
Similar CAPA issue: kubernetes-sigs/cluster-api-provider-aws#3325 |
/retitle Security Self-Assessment: [STRIDE-TAMPER-1] Produce a SBoM |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
/lifecycle frozen Still a valid point to implement, but IMO we should rely on the same tooling used for k/k whatever it is |
@fabriziopandini: GuidelinesPlease ensure that the issue body includes answers to the following questions:
For more details on the requirements of such an issue, please see here and ensure that they are met. If this request no longer meets these requirements, the label can be removed In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
@furkatgofurov7 , according #8418 you are at this. Is there already any process or plans? Upstream makes use of https://github.com/kubernetes-sigs/bom via their krel tool. |
I would like to work on this task. |
I was working on it during the last release and tried completing it in the last phase of the release. xref: https://kubernetes.slack.com/archives/C2C40FMNF/p1701928413351249 @sbueringer Should we still go forward with this given after Q1 (as per sig-release), we will get it natively supported with the existing release tooling that we use for releasing? Happy to pair up on this one if this needs to be done now or at any point in the future. |
If we can choose between building a custom solution or waiting a few months. Let's wait |
Oh, I didn't know about this slack thread. @kranurag7 Do we have an issue or PR that we can add here for tracking? |
from reading through the linked thread it doesn't seem like the goal stated in this current issue has changed -- we will still need to put in the work on our end to have the SBOM attached to the staging images so they can be picked up by the promo tool. have just bumped the thread to make sure this is still the intention. or am i reading the rec incorrectly?
|
👋 @kranurag7 -- are you still interested in working on this? |
I am interested in working on this. I will go through relevant discussions and get back here for next steps. |
I am unable to find time for this. 😞 |
/triage accepted |
I would like to take this up. Will go through the relevant docs. |
Ref: https://kubernetes.slack.com/archives/C2C40FMNF/p1701928413351249 I see according to this thread, there were talks about redesigning SBOMs for Kubernetes, and attaching the SBOM to the staging registry was one of the suggestions. Are we going with this suggestion? Any other suggestions folks? |
This should still be valid unless there is some changes on k/release side regarding tooling, you can inform in the same slack thread that you are starting work on it and attaching SBOM to staging images, lets see is they have any helpful suggestion. I would say check k8s release workflow and try to reuse any script that they are already using for creating sboms. |
User Story
As a cluster operator, i want to know the list of dependencies Cluster API brings for assurance within our organisation's software supply chain.
Detailed Description
cc @PushkarJ for adding more details.
/kind feature
/area security
The text was updated successfully, but these errors were encountered: