Image signing
CalebSchwartz opened this issue · 5 comments
Hi,
Would this team be responsible for signing the image? We have an admission controller finding stating that the image is not signed and utilizing the docker trust inspect that appears accurate.
docker trust inspect signalfx/splunk-otel-collector:0.77.0-amd64
[]
no signatures or cannot access signalfx/splunk-otel-collector:0.77.0-amd64
We can look into this. Our docker image is typically hosted on quay.io, so the whole image URI is quay.io/signalfx/splunk-otel-collector:0.78.1
.
This is not something we'd be looking to do at this time. Please discuss with your account representative and file a Splunk idea to follow up on this request.
is there an explanation as to why? this seems like an easy security addition to validate the integrity of the image that a client would including in their environment. There should not be any regression testing needed as its just adding a notary signature just like you would expect to add to a website certificate authority.
Setting this up requires us to manage the signing architecture, such as managing the private key effectively, which requires a bit of work internally. If you want this, it's best to work with us through Splunk ideas to raise this.