Skip to content

Define the Margo application image and component signing strategy #138

@ajcraig

Description

@ajcraig

Feature description

Goal: Define the application image and component signing strategy required in Margo.

This feature is critical in a Multi vendor ecosystem and will enable trust and authenticity between the participants.

Category

  • Trust

Provide adequate technical acceptance criteria(s) associated with this feature below:

  • Define how application components are signed within Margo
    • app package / Helm chart / compose packages
  • Define how oci images are signed within Margo
  • Define how WFMs and Devices are able to verify the signature during application deployment
  • Define, if necessary, any Margo infrastructure required to enable this verification between vendors
  • Describe how these signatures live on even if the end user replicates the artifacts to a local repository

Although not required, it is highly encouraged to provide feature use-cases below:

  1. Enables end user to verify the authenticity of the Application from the supplier
  2. Device to verify authenticity during deployment activities
  3. Ensure artifacts have not been tampered with while moving through the margo enabled ecosystem.

Additional information

Discussions have taken place on this topic in various locations.

https://www.signstore.dev
https://github.com/sigstore/cosign
https://github.com/scitt-community

Notes from minimum scope definition exercise:

There are multiple ways OCI artifacts can be signed (Cosign, Notary V2, GPG, etc.), and each one works differently. If we do not specify a single approach, interoperability will be difficult to achieve on the device side because the device vendor will not know what approach to take to validate signatures.

Metadata

Metadata

Assignees

No one assigned

    Projects

    Status

    PR2 Core Scope Features

    Milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions