Skip to content
New issue

Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? # to your account

Assess signing/provenance needs of the Rails Kubernetes Operator #36

Open
Tracked by #24
kingdonb opened this issue Jun 27, 2023 · 1 comment
Open
Tracked by #24

Comments

@kingdonb
Copy link
Owner

kingdonb commented Jun 27, 2023

Repeat of #35, but for the Ruby on Rails app stack that runs the kubernetes-operator gem.

Whatever we're calling an implementation of provenance, obviously fails the test if there isn't some alert presented about the dependency on kubernetes-operator gem that has no license or provenance

(You can refer to this issue to understand why that is the case):

https://gitlab.com/tobiaskuntzsch/kubernetes-operator/-/issues/1

@kingdonb kingdonb changed the title And all the (Ruby) technology that's used to deliver this Kubernetes operator Assess signing/provenance needs of the Rails Kubernetes Operator Jun 27, 2023
@kingdonb
Copy link
Owner Author

This may have already been implemented by #32 – I honestly don't know how to decode the SBOM information, well enough to determine if it identifies a gem that is missing a license, (or what specifically this is supposed to have told in attestations.)

This is an assessment because my understanding of this topic is currently very thin. I know there is an SBOM and I believe that's different than the provenance attestations. I'm not sure how they're related, or which one certifies the other, or even if that's how it works. I need some experts to weigh in, maybe the Flux Bug Scrub team can help out next time we meet 😁🔥

# for free to join this conversation on GitHub. Already have an account? # to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant