-
Notifications
You must be signed in to change notification settings - Fork 95
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add runtime attestation support in image rs #636
base: main
Are you sure you want to change the base?
Add runtime attestation support in image rs #636
Conversation
Signed-off-by: Wang, Arron <[email protected]>
Extend image full name with digest to measurement register. Signed-off-by: Wang, Arron <[email protected]>
runtime-attestation feature is not enabled by default, but need enable in CI tests. Signed-off-by: Wang, Arron <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Cool! It is nice to see that we can support such feature in image-pulling.
I think we might need to make a spec for event/domain/operations for CoCo. In this PR, image-rs pull_image xxx
is used. An possible ideal format would be github.com/confidential-containers imagePulling xxx
in my mind.
Secondly, once we have move image pulling things into CDH, I suggest that the event record calling things be also moved to CDH. Thus a successfully image-pull event responsed in CDH will call AA to record. This would help to prevent image-rs -- as an underlying dependency to leverage RPC client to connect to AA again, though image-rs is doing so now by fetching keys from CDH.
wdyt?
I'd agree with @Xynnn007 on both points (eventlog spec and avoiding another AA rpc client) |
We're starting to have a few different options for verifying images (this, signatures, policy). That's fine, but we should document them all with some comparisons at some point. |
Yes, Agree, I can add this in current image-rs security document, currently the integrity of image pull inside by TEE is covered by signature or runtime attestation, image shared by host is covered by policy |
Yes, agree, I create a issue to propose create a unified link for CoCo specific data format: confidential-containers/confidential-containers#225
Yes, agree, after image pulling is integrated into CDH and kata-agent also switch to use CDH to pull image, I'll switch to move this part to CDH. |
Is |
good point. I think it makes sense if you look at it as extension to a vm launch-measurement, but from a container perspective the image pull phase is not runtime strictly. |
No description provided.