Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Assess signing/provenance needs of the Rails Kubernetes Operator #36

Open
Tracked by #24
kingdonb opened this issue Jun 27, 2023 · 1 comment
Open
Tracked by #24

Comments

@kingdonb
Copy link
Owner

kingdonb commented Jun 27, 2023

Repeat of #35, but for the Ruby on Rails app stack that runs the kubernetes-operator gem.

Whatever we're calling an implementation of provenance, obviously fails the test if there isn't some alert presented about the dependency on kubernetes-operator gem that has no license or provenance

(You can refer to this issue to understand why that is the case):

https://gitlab.com/tobiaskuntzsch/kubernetes-operator/-/issues/1

@kingdonb kingdonb changed the title And all the (Ruby) technology that's used to deliver this Kubernetes operator Assess signing/provenance needs of the Rails Kubernetes Operator Jun 27, 2023
@kingdonb
Copy link
Owner Author

This may have already been implemented by #32 – I honestly don't know how to decode the SBOM information, well enough to determine if it identifies a gem that is missing a license, (or what specifically this is supposed to have told in attestations.)

This is an assessment because my understanding of this topic is currently very thin. I know there is an SBOM and I believe that's different than the provenance attestations. I'm not sure how they're related, or which one certifies the other, or even if that's how it works. I need some experts to weigh in, maybe the Flux Bug Scrub team can help out next time we meet 😁🔥

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant