Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Verify images from tar file or local podman cache #2985

Open
muzammil786 opened this issue May 16, 2023 · 6 comments
Open

Verify images from tar file or local podman cache #2985

muzammil786 opened this issue May 16, 2023 · 6 comments
Labels
enhancement New feature or request

Comments

@muzammil786
Copy link

Currently cosign verify images from remote registries. We work in airgapped network where internet connection or connection to registry is not possible. The images are uploaded to system via tarball and loaded to locally via docker|podman load -i command.

Request to add a feature to verify the image from tar file or available locally in cache. Understand that there are many different container managers and formats but we can fix it only for OCI format images and to docker/podman/containerd managers, the ones which are most popular in the community.

@muzammil786 muzammil786 added the enhancement New feature or request label May 16, 2023
@znewman01
Copy link
Contributor

This is not quite the same as #2255 so I'm going to rename

@znewman01 znewman01 changed the title Verify images offline Verify images from tar file or local podman cache May 18, 2023
@znewman01
Copy link
Contributor

znewman01 commented May 18, 2023

I think the workaround right now would be to spin up that podman service that imitates a docker daemon.

cosign verify is a little difficult in this scenario because you'd need to get the signatures in somehow.

@muzammil786
Copy link
Author

You mean podman API service and load image to cache? How does it work?

@znewman01
Copy link
Contributor

I meant the Docker compatibility mode. But on second thought that still doesn't work. You need a full registry for the workaround at the moment ☹️

@muzammil786
Copy link
Author

Hence my feature request please 🙂

@mattdibi
Copy link

mattdibi commented Feb 8, 2024

Hello there! Resuming this discussion since I have a problem similar to @muzammil786...

cosign verify is a little difficult in this scenario because you'd need to get the signatures in somehow.

Wouldn't the cosign download signature command work in this scenario? Can, the output of that command, be used with the --payload/--signature option of the verify command?

I'm asking because I tried and things are not quite working as expected. @znewman01 am I missing something?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

3 participants