-
Notifications
You must be signed in to change notification settings - Fork 103
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Security]: Provide Helm Provenance to mitigate supply chain attacks #163
Comments
We would probably need to switch GitHub action we use for publishing releases, https://github.com/marketplace/actions/helm-chart-releaser could be a good candidate. We should also consider pushing the chart to an OCI registry instead of gh pages. |
Agreed, it would be best to just refactor that part of the CI all in one go. |
Here is our setup, including provnance: |
Can this and the OCI push please be given more attention? |
@itay-grudev is actually on it, but you should definitely think about contributing one of your mornings worth of work to those "slow projects" next time, if it's so important to you, @Ornias1993. |
Would be nice to have that in an issue comment next time, that would definately have sufficed :)
That agressive remark is not needed at all.
Acting like I don't contribute anything for the improvement/adoption of CNPG or this issue is not a reasonable statement in any way. |
@itay-grudev took the chance to address this too as part of the rework to the release process for the Cluster Chart after we discussed it yesterday. See the changes to the workflows in #188.
As you can see in the above PR the "mostly copy-pastable" code was not so "copy-pastable". And @itay-grudev doesn't have access to repositories secret either.
Sorry to hear you read it as aggressive, that wasn't my intention, it was just a sincere suggestion. Thanks for your valuable contribution :) |
Ahh that explains why it wasn't linked back here, as it's so fresh.
Well, it's pretty-much the standard chart-releaser setup most helm repos use.
No offense taken or bad intent assumed at all, nor worries :) |
It would be nice if automated Helm-Provenance is provided with the Chart.
This ensures users can verify the origin of the Helm-Charts and prevents some supply chain attacks.
More info: https://helm.sh/docs/topics/provenance/
Even more so when bundled with signing the images as well.
--
As a downstream, the current unsecure distribution prevents us from directly referencing these Helm charts, as it doesn't qualify our security policy. Which requires correct signing of images and provenance on helm charts.
The text was updated successfully, but these errors were encountered: