2. April 2024 #1830
kailun-qin
started this conversation in
Meeting notes
2. April 2024
#1830
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Agenda
(please write your proposed agenda items in comments under this discussion)
Mikko: present and discuss Gramine integration with CoCo
[ Mikko presents his work ]
Goal of work: run unmodified containers in K8s using Gramine, build on secure software supply chains; also demonstrate how CC could benefit from SBOMs (Software Bill of Materials).
GSC creates a NEW container image which must be pushed to the container registry.
Idea 1: Add Gramine LibOS as runtime overlay (during container runtime). E.g. Gramine is pre-installed on each K8s node, and Gramine files are bind-mounted into the container.
Idea 2: Rely on pre-existing container image SBOM (in-image binaries) + Gramine runtime SBOM (Gramine binaries).
sgx.trusted_files
entries from an arbitrary container image.finalize_manifest.py
code.Part of the SPDX specification includes the requirements for per-file integrity information in the SBOM.
Snapshotter for containerd runtime: an overlay mount at runtime. But an easier way is to just use
spec::volumeMounts::<Gramine files>
of Kubernetes config file.Woju: we could add the SHA256 hashes of PAL + LibOS + RA-TLS (+ ?) as part of the package build process. And publish on GitHub or on some other public web site.
Mona: what's next, what's the plan for this work?
Woju: Scaffolding project's way of building the manifest + sig:
gramine-manifest
inside of this container image to render the manifest template.gramine-sgx-sign --chroot /path/to/extracted/files
on the host, copy the final .sgx and .sig files back into container image.Mikko does a similar thing.
Dmitrii: Tracking #1785 for inclusion in v1.7
Dmitrii: Plan to sign tarballs, see [Request] Signed binary tarball as part of new releases #235
Dmitrii recalls that Woju only wanted to have the signature of the Debian/Ubuntu repo, but packages are not signed.
Dmitrii not sure if tarballs (on GitHub) are a legit target for signing.
This is all in the context of OpenSSF Best Practices silver badge.
Woju: this is a long discussion. First we should agree what "release artifacts" are. Maybe "release artifacts" are not meant to be the GitHub tarballs.
Looking at "Secure release" requirement at https://www.bestpractices.dev/en/criteria (for silver badge), we are already complying. Just need to document this. Woju is/will be working on documenting.
Beta Was this translation helpful? Give feedback.
All reactions