asdf download cache reuse for buildkit --mount=type=cache
mounts with optional keyless signing
#2012
Labels
--mount=type=cache
mounts with optional keyless signing
#2012
Is your feature request related to a problem? Please describe
It's possible to reuse architecture specific download caches via custom
--mount=type=cache
mounts.I'd like to speed up
asdf install
in container builds by reusing mounted buildkit cache volume.It would be nice to check hashes / sums, if any were provided by the plugin.
But ideally the whole installation process should be covered by in-toto attestation instrumentation, with further supply of provenance data on per-project basis. This way it's possible to self-sign specific plugin provided artifacts and the build process as a whole, there won't be any poisoning and binary hashes will be traceable for the whole install.
Describe the proposed solution
cosign
compatibility layer for keyless signing, to approve plugin provided binaries and downloaded archives manually. Should work as a temp PGP certs replacement, if there's no hashsums or existing certs.Describe similar
asdf
features and why they are not sufficientThere is some form of artifacts management and cleanups, but the actual tracking of the installation state is somewhat insufficient - it's possible to leave installs partially installed if interrupted, and there's no way to track their completeness.
It's better to start with stable caching and introduce signed reproducible builds afterwards, to omit cache poisoning. Ideally, it should follow some form of attestation and provenance e.g. in-toto slsa with keyless git signing.
Describe other workarounds you've considered
It's a security measure, if there are no hashes/certs/attestation provided - organization relying on asdf should be able to self-sign specific provenance / attestation manually.
The text was updated successfully, but these errors were encountered: