Secure Container Image Signing with Cosign and OPA

แชร์
ฝัง
  • เผยแพร่เมื่อ 25 ส.ค. 2024

ความคิดเห็น • 3

  • @keka406
    @keka406 5 หลายเดือนก่อน

    I see in the policies you have hardcoded the image digest values. But, Lets say the pipeline has triggers. Which can be triggered up on a new image. Then the image digest will be different. In this case, how do you ensure it pass the policy enforcement knowingly the image is signed and verified but the image digest will not be matching to the one hardcoded?

    • @DewanAhmed-Harness
      @DewanAhmed-Harness 5 หลายเดือนก่อน

      Hi @keka406, great question! You'll need to update the JSON payload like this (expectedDigest is the SHA coming from each trigger):
      ```
      {
      "expectedDigest": "",
      "actualDigest": "",
      "env": ""
      }
      ```
      and then update the image digest policy as follows:
      ```
      package main
      deny {
      not input.actualDigest == input.expectedDigest
      }
      ```

  • @palanisamy-dl9qe
    @palanisamy-dl9qe 3 หลายเดือนก่อน

    Can we create free account in sigstore?