Skip to content

Commit cc630e5

Browse files
authored
Merge pull request #41776 from saschagrunert/container-image-signature-verification-blog-updates
Update blog: Verifying Container Image Signatures Within CRI Runtimes
2 parents 6ee423d + 5f5a2de commit cc630e5

File tree

3 files changed

+9
-8
lines changed

3 files changed

+9
-8
lines changed
Binary file not shown.
Lines changed: 1 addition & 0 deletions
Loading

content/en/blog/_posts/2023-06-29-container-image-signature-verification/index.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
layout: blog
3-
title: "Verifying container image signatures within CRI runtimes"
3+
title: "Verifying Container Image Signatures Within CRI Runtimes"
44
date: 2023-06-29
55
slug: container-image-signature-verification
66
---
@@ -40,7 +40,7 @@ the signatures.
4040

4141
The general usage flow for an admission controller based verification is:
4242

43-
![flow](flow.png "Admission controller flow")
43+
{{< figure src="/blog/2023/06/29/container-image-signature-verification/flow.svg" alt="Create an instance of the policy and annotate the namespace to validate the signatures. Then create the pod. The controller evaluates the policy and if it passes, then it does the image pull if necessary. If the policy evaluation fails, then it will not admit the pod." >}}
4444

4545
A key benefit of this architecture is simplicity: A single instance within the
4646
cluster validates the signatures before any image pull can happen in the
@@ -289,17 +289,17 @@ maintain and define the policies to provide a good user experience around that
289289
feature. The CRDs of the policy-controller are great, while we could imagine that
290290
a daemon within the cluster can write the policies for CRI-O per namespace. This
291291
would make any additional hook obsolete and moves the responsibility of
292-
verifying the image signature to the actual instance which pulls the image. [We
292+
verifying the image signature to the actual instance which pulls the image. [I
293293
evaluated][thread] other possible paths toward a better container image
294-
signature verification within plain Kubernetes, but we could not find a great fit
295-
for a native API. This means that we believe that a CRD is the way to go, but we
296-
still need an instance which actually serves it.
294+
signature verification within plain Kubernetes, but I could not find a great fit
295+
for a native API. This means that I believe that a CRD is the way to go, but
296+
users still need an instance which actually serves it.
297297

298298
[thread]: https://groups.google.com/g/kubernetes-sig-node/c/kgpxqcsJ7Vc/m/7X7t_ElsAgAJ
299299

300300
Thank you for reading this blog post! If you're interested in more, providing
301-
feedback or asking for help, then feel free to get in touch with us directly via
302-
[Slack (#crio)][slack] or the [SIG node mailing list][mail].
301+
feedback or asking for help, then feel free to get in touch with me directly via
302+
[Slack (#crio)][slack] or the [SIG Node mailing list][mail].
303303

304304
[slack]: https://kubernetes.slack.com/messages/crio
305305
[mail]: https://groups.google.com/forum/#!forum/kubernetes-sig-node

0 commit comments

Comments
 (0)