Replies: 1 comment 1 reply
-
It should be allowed to sign any descriptor. That descriptor may or may not be already pushed to a registry, and can point to a variety of media types.
No.
Yes.
Yes, there will be needs to sign in an isolated environment, possibly without docker or registry access, outputting either the blob or preferably the OCI Layout tar. The ability to push directly to the registry should also be included since many users will want the easy option for online use cases.
Yes. For disconnected support.
Yes to all. I may have a key accessible only from an external system (e.g. HSM, Vault Transit iplugin) that I perform the signing with my own API (I may need to feed in other data to that API to get the approval, e.g. Spire workload attestation, in-toto link files, etc).
There needs to be some way to transfer the certificate chain, and I'd prefer this was included directly in Notary. The client should have a root certificate (or intermediate) in their local trust store transmitted separately, outside of Notary. Having an additional way to add other ways to retrieve that chain may be useful for some organizations.
Extending makes sense as long as the core capability is built into Notary. |
Beta Was this translation helpful? Give feedback.
-
Discussion points to help with scoping and design of signing and verification flows.
Separation of concern between Docker CLI, Notary V2 and signing providers.
Extensibility points
Beta Was this translation helpful? Give feedback.
All reactions