How to verify notation signed images in container build tools? #984
Unanswered
cospeedster
asked this question in
Q&A
Replies: 1 comment
-
@cospeedster Docker Content Trust cannot be used to verify notation signed images, as they are different solutions. May I know which pipeline you are using, as we have notation GitHub actions which can be used for signing and verification. Would you mind sharing any thoughts or work you may have related to the integration with these build tools? Are you willing to contribute to this work? |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hey together,
I'm wondering if someone else stubled over the "problem" to verify image signatures from base images during build with tools like Docker, Podman, Buildah and so on?
In my use case the build tool has to verify the container signature against provided policies or other trust anchors.
For exploration of this I used your Quickstart Guide. I was able to show and verify the signature with notation:
Docker seems not to be able to verify notation signed images with Docker Content Trust:
docker trust inspect --pretty $IMAGE no signatures or cannot access localhost:5001/net-monitor@sha256:9c00e8f3ff2cf04bc47ceb80d83988fae1ee2db8d6905b03bc773e90654107b7
For Podman and Buildah it seems that they use the policy.json which currently support only GPG keys to verify against (source)
Is there any chance to get this working or are there features planned to be compatible to these tools?
Beta Was this translation helpful? Give feedback.
All reactions