Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SBOMs and Artifact Signing for Releases #417

Open
0xE282B0 opened this issue Dec 5, 2023 · 3 comments
Open

SBOMs and Artifact Signing for Releases #417

0xE282B0 opened this issue Dec 5, 2023 · 3 comments
Assignees
Labels
enhancement New feature or request

Comments

@0xE282B0
Copy link
Contributor

0xE282B0 commented Dec 5, 2023

My favorite cite about KWasm:

"So Kwasm operator breaks into the host node and sets up some containerd configuration imports of binary from wherever — this is not production ready" -@kingdonb

As the ecosystem has become more stable and mature, we have moved to the officially released shims, but it would be nice to be able to prove that the binaries are not compromised.

I would suggest providing SBOMs and signatures for the releases. WDYT?

@kingdonb
Copy link

kingdonb commented Dec 5, 2023

I learned a new term that day, "ATO" - the reference is from our newbie-level OpenGovCon talk about WASM (and I'm so happy to hear it mentioned!) the recap article wherein you can find that quote, (context for those who don't wish to suffer through the video but wanted to get the gist of this talk anyway.)

@devigned
Copy link
Contributor

devigned commented Dec 5, 2023

Perhaps, we could package OCI artifacts with SBOMs that contain a shim. By doing that, we can have integrity hashes through the content registry, SBOMs to provide transparency about contents, and easy distribution via OCI. Thoughts?

@0xE282B0
Copy link
Contributor Author

0xE282B0 commented Dec 5, 2023

I generally like distributing artifacts via OCI, pulling artifacts for a specific platform is quite convenient and it is easy to sign using cosign.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

4 participants