-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
wip: notation implementation #1885
base: develop
Are you sure you want to change the base?
Conversation
b483276
to
ccdd4f5
Compare
b9e7a27
to
cc68f82
Compare
# simple test cases for notation | ||
- id: unsigned | ||
txt: Testing unsigned image... | ||
ref: ghcr.io/sse-secure-systems/testimage:notation-unsign |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ref: ghcr.io/sse-secure-systems/testimage:notation-unsign | |
ref: ghcr.io/sse-secure-systems/testimage:notation-unsigned |
expected_msg: error during notation validation | ||
- id: signed | ||
txt: Testing signed image... | ||
ref: ghcr.io/sse-secure-systems/testimage:notation-sign |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
ref: ghcr.io/sse-secure-systems/testimage:notation-sign | |
ref: ghcr.io/sse-secure-systems/testimage:notation-signed |
install "make" | ||
multi_test "notation/cases.yaml" | ||
uninstall "make" | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
nit: missing EOF newline
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
also for other files below
type InMemoryTrustStore struct { | ||
trustRoots []auth.TrustRoot | ||
certs map[string][]*x509.Certificate | ||
truststore.X509TrustStore |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Where is this used, isn't the interface already satisfied?
SignatureVerification: trustpolicy.SignatureVerification{ | ||
VerificationLevel: trustpolicy.LevelStrict.Name, | ||
}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What about VerifyTimestamp
? Without having looked at it this looks like something we want to have an opinion on
VerificationLevel: trustpolicy.LevelStrict.Name, | ||
}, | ||
TrustStores: utils.Map(trs, func(tr auth.TrustRoot) string { return fmt.Sprintf("ca:%s", tr.Name) }), | ||
TrustedIdentities: []string{"*"}, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Without knowing anything, this looks weird 🤔
func TestNewInMemoryTrustStore(t *testing.T) { | ||
// already tested in notation_validator_test.go | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why have this test case here then?
[]string{}, | ||
"no trust roots provided for validator", | ||
}, | ||
{ // 3: unmarschal error |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
{ // 3: unmarschal error | |
{ // 3: unmarshal error |
Implementation for notation
Checklist
develop
Chart.yaml
(if necessary)