Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Assess SPDX inclusion for k8s release BOM implementation #156

Closed
lukehinds opened this issue Feb 11, 2021 · 5 comments
Closed

Assess SPDX inclusion for k8s release BOM implementation #156

lukehinds opened this issue Feb 11, 2021 · 5 comments

Comments

@lukehinds
Copy link
Member

lukehinds commented Feb 11, 2021

Related to the following in k8s release SIG : kubernetes/release#1837 (comment)

Explore inclusion of SPDX manifests (XML 😦 ) , namely:

  • What sort of values would be critical (place in the t-log) and what could go in ExtraData.
  • What sort of signing system is used, how would we ensure non-repudiation.
  • How would k8s release display entry and make it valuable, perhaps an inclusion URL pointing to the UUID?
@nishakm
Copy link

nishakm commented Feb 11, 2021

👋 I can help answer SPDX questions (XML is only one of the supported formats)

@lukehinds
Copy link
Member Author

great, sounds good @nishakm , look forward to collaborating with you.

I guess a key question to kick off is if you do any sort of key signing(s) of either the SPDX manifest or the artifacts listed in the manifest, if so what is used (GPG, x509,..)?

@nishakm
Copy link

nishakm commented Feb 11, 2021

great, sounds good @nishakm , look forward to collaborating with you.

I guess a key question to kick off is if you do any sort of key signing(s) of either the SPDX manifest or the artifacts listed in the manifest, if so what is used (GPG, x509,..)?

You can sign a SPDX document/blob just like you would sign any artifact. At this time, the document itself doesn't support a "signature" metadata, but the community is working on adding it in SPDX 3.0.

@lukehinds
Copy link
Member Author

@nishakm sent you slack invite if that's ok

@haydentherapper
Copy link
Contributor

Closing as something we won't tackle due to keeping the API minimal and not increasing types - Hashedrekord should be used, ecosystems should determine how to canonicalize an artifact into a digest.

@haydentherapper haydentherapper closed this as not planned Won't fix, can't repro, duplicate, stale Aug 21, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants