I am out of office right now, but will give some detailed explanation once i am at work.
Thanks
Tejal
Yes, it makes sense.Will let you know when it's done.TejalOn Wed, Feb 13, 2019, 7:14 PM Ryuzo YAMAMOTO <dra...@mercari.com wrote:Hi Tejal,> Sounds good. i will try to upload the branch tomorrow.Cool :)> Before that, want to know more about your usecase.> Are you creating Image attestation for a verified image?Yes, correct.There are many microservice teams in my company, and each team has their own namespace and different policies.For example, a team needs to get their docker images approved by their manager and QA team to deploy the images to Kubernetes clusters.So I'm now trying image attestation (PGP sign) for verified (approved) image.Does that make sense?Thank you!On Thu, Feb 14, 2019 at 11:56 AM Tejal Desai <tejal...@google.com> wrote:Sounds good. i will try to upload the branch tomorrow.Before that, want to know more about your usecase.Are you creating Image attestation for a verified image?ThanksTejalOn Wed, Feb 13, 2019 at 6:46 PM Ryuzo YAMAMOTO <dra...@mercari.com> wrote:Hi Tejal,Thank you for the quick response!> Yes that is correct. I think i have a branch out with some changes for the same. I can check it in early next week.>> would you be able to work with that timeline?Sounds good.But my schedule of PoC is actually very tight ( end of this week... ) so it would be great if you push the branch so that I can see and try it.Of course, I can work with that next week :)Thank you!On Thu, Feb 14, 2019 at 11:34 AM Tejal Desai <tejal...@google.com> wrote:Yes that is correct. I think i have a branch out with some changes for the same. I can check it in early next week.would you be able to work with that timeline?ThanksTejalOn Wed, Feb 13, 2019 at 6:09 PM Ryuzo YAMAMOTO <dra...@mercari.com> wrote:Hi Tejal,
Thank you for the reply!Your explanation makes sense.So I misunderstood that Kritis has a feature to check attestations which come from outside of Kritis (e.g. PGP sign attestation from our side), but it doesn't.Current Kritis's policy is only for package vulnerability, but I need another policy to enforce PGP sign attestation from our side like Binary Authorization.The reason why I'm now trying to use Kritis instead of Binary Authorization is that Binary Authorization only support "cluster-level" policies, I'd like to have "namespace-level" policies to enforce both PGP signing and vulnerability check.Do you have any recommendations for my use case?Now I'm thinking of extending the "ImageSecurityPolicy" for our use case, for example:- Add new "Attestor" CRD to define user's attestor (outside Kritis) which has the followings:- Name- PGP public key- Add "AttestationRequirements" to ImageSecurityPolicySpec which has "requireAttestationsBy" list (Attestor.Name) like Binary Authorization- Extend the admission hook to validate the "AttestationRequirements" (PGP sign) and deny images if the validation fail.What do you think?BestRyuzo
--
You received this message because you are subscribed to the Google Groups "Kritis users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kritis-users...@googlegroups.com.
To post to this group, send email to kritis...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kritis-users/f956ddd3-e6db-4797-9810-b5ded5163468%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
--
You received this message because you are subscribed to the Google Groups "Kritis users" group.
To unsubscribe from this group and stop receiving emails from it, send an email to kritis-users...@googlegroups.com.
To post to this group, send email to kritis...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/kritis-users/f956ddd3-e6db-4797-9810-b5ded5163468%40googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Just sending this to you!I have pushed a branch to my fork, https://github.com/tejal29/kritis/commits/add_builder_flowHere is the commit that contains all of the diffPlease check it out and hopefully your prototype will be completed.Feel free to reach out to me if you have any questions.ThanksTejal
--