Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support broking confidential resources which image-rs needs. #17

Closed
Tracked by #68
jialez0 opened this issue Nov 21, 2022 · 5 comments
Closed
Tracked by #68

Support broking confidential resources which image-rs needs. #17

jialez0 opened this issue Nov 21, 2022 · 5 comments

Comments

@jialez0
Copy link
Member

jialez0 commented Nov 21, 2022

This generic KBS will replace simple-kbs and verdictd as the default recommended component of the CoCo solution, so it needs to support providing existing secret resources. Currently, in the confidential containers architecture, the component requesting resources from KBS through the Attestation Agent is image-rs, so our generic KBS needs to support the provision of the following kinds of resources required by image-rs:

  1. Container image decryption key.
  2. Registry pulling policy file.
  3. Container image signature verification key, including cosign and simple signing.
  4. Registry authentication informations.

This work is based on #16.

@Xynnn007
Copy link
Member

I wonder whether we have or will have an API which can be used to "registry" a resource in the KBS? Here "registry" means

If so, maybe we can flexibly add new resources in need for test and for production

@fitzthum
Copy link
Member

I think it's still an open question how exactly we should handle client resources. There is a huge range of options. We could do something really simple where every resource is just an opaque blob with an ID. On the other hand we could have the KBS automatically generate certain resources (such as signature policy files) based on which workload is running. I think we probably should have some kind of workload-level abstraction (i.e. a workload ID), but I'm not sure what is optimal. Looking forward to discussing with everyone.

I think a lot of @Xynnn007's issues like confidential-containers/guest-components#50 are somewhat connected to this.

@Xynnn007
Copy link
Member

Hi @fitzthum , to deal with this, we've proposed a scheme here confidential-containers/documentation#85. I think this scheme can be fit with permission control and authentication design for KBS

@Xynnn007
Copy link
Member

This issue could be covered by #25

@jialez0
Copy link
Member Author

jialez0 commented Feb 24, 2023

Now cc-kbc of AA and KBS can support broking resources described in this issue, so this issue can be closed now.

As for how exactly we should handle client resources, we can discuss the improvement in detail in a new issue in the future.

@jialez0 jialez0 closed this as completed Feb 24, 2023
spotlesstofu added a commit to spotlesstofu/trustee that referenced this issue Jul 18, 2024
…references/main

chore(deps): update konflux references
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants