-
(This message was written by someone else) I'm currently running ext.rpm-ostree.destructive.cached-sigs which I'm pretty sure checks whether or not an unsigned ostree commit can successfully be signed by checking the journal logs for a cached signature. However, the following code which checks for a signature:
still outputs null even after the commit is signed with the the following commands:
This makes me think that the signing didn't work and is why the test can't find a cached signature in the logs. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 6 replies
-
This is a complex topic. First, the ostree-container stack does support verifying GPG signatures on ostree commit objects embedded in container images. For example, do this:
However in the container flow we always end up on a "merge commit" which also contains the container metadata - so the booted state will be a different commit object, and the core ostree (and rpm-ostree) doesn't understand this. Ultimately, I think the main direction to go here is sigstore - and we want an API to verify the transport signature. This relates to...an issue I can't find that also the podman (c/storage, c/image) doesn't record any information about its verification persistently either.
The problem may simply be that rpm-ostree caches its state, and |
Beta Was this translation helpful? Give feedback.
I don't think we want to reimplement those no...signing for sure should happen using existing container tools.
Verification is a bit tricker. We today don't copy the signatures fetched when we pull an image; we may want to add that into the ostree storage.
This topic overlaps a bit with the thread around here openshift/enhancements#1402 (comment)