Replies: 4 comments 2 replies
-
@jackalsh thanks for the awesome feedback 🙏 Such input is very valuable to improve Connaisseur and we always try to include it in next developments! Some notes on the points you mention:
From a focus point of view, we will continue to support notary, but as that is unlikely to change much, I expect most future features to be focused on improving integration with cosign-based signatures. We already have a couple of tickets open in that direction and are currently trying to see what is the first topic to pick up. There is for example:
Which additional features would you see? Which feature would you consider most useful to your case? Many thanks again for taking the time to provide feedback 🙏 also, always feel free to open a PR directly in case you have built any improvement that you might want to share. I might move this issue to our GitHub discussions within the next few days, as it cannot be directly tackled by a PR and I created concrete issues for each point you mentioned 🙂 |
Beta Was this translation helpful? Give feedback.
-
a discussion on the last point "dynamic configuration" and CRDs has been opened in #280 and we hope to get some community insights |
Beta Was this translation helpful? Give feedback.
-
@xopham - our companies current use of cosign is to store the signatures with the images, which allows us to use connaisseur at k8s deployment time for policy/validation of the image. However our company are currently investigating using Rekor to have an audit trail/history of the images lifecycle through our CI->CD processes. If we went this way, we'd obviously be keen to see Rekor verification support added to connaisseur (#140). |
Beta Was this translation helpful? Give feedback.
-
Thanks for the timely reply @xopham . We are too at early stages looking into Rekor. After our initial deployment of using cosign+connaisseur to meet the need of preventing images from being deployed if not signed as we expect, our conversations have gone deeper regarding the CI lifecycle and the various stages we might want to sign. That is why we are starting to look at Rekor. Similar to what you say, it looks like cosign + Rekor is "early". When I've tested cosign with the rekor variable/arg, it adds the signature to the image location (as per the default) as well as saying it has added it to the rekor log - the former shouldn't happen afaik, i.e. it is a binary choice to store the image signature in the container registry or the rekor log, but not both. For us, yes I would expect multiple signatures to be uploaded using the cosgin cli with the rekor support (e.g. one for base image verification, one for vulnerability passing, one for qa passing). Not really though about annotations at this time and we would definitely want/need to use our own private Rekor instance that we setup and maintain. |
Beta Was this translation helpful? Give feedback.
-
While playing with connaisseur I found some small issues, whose are not really bugs, but still should be improved at my opinion.
Anyway, I believe connaisseur is a great tool, which has big potential to replace other solutions. It's biggest feature is cosign support. There are not really alternative tools making what connaisseur is doing using cosign. At my opinion, you should focus on cosign support as main feature and make it usable from a box. It took me couple of days to reverse engineer the solution to feet company's needs.
Thanks you.
Beta Was this translation helpful? Give feedback.
All reactions