forked from repo-mirrors/cnpg-postgres-containers
Compare commits
1 Commits
Author | SHA1 | Date | |
---|---|---|---|
|
1af4edac02 |
18
README.md
18
README.md
@@ -192,7 +192,9 @@ and [`ClusterImageCatalog-bookworm.yaml`](Debian/ClusterImageCatalog-bookworm.ya
|
|||||||
manifests, please migrate to the new catalogs as soon as possible. These legacy
|
manifests, please migrate to the new catalogs as soon as possible. These legacy
|
||||||
manifests are deprecated and will be removed along with the `system` image.
|
manifests are deprecated and will be removed along with the `system` image.
|
||||||
|
|
||||||
## Build Attestations
|
## Security
|
||||||
|
|
||||||
|
### Build Attestations
|
||||||
|
|
||||||
CNPG PostgreSQL Container Images are built with the following attestations to
|
CNPG PostgreSQL Container Images are built with the following attestations to
|
||||||
ensure transparency and traceability:
|
ensure transparency and traceability:
|
||||||
@@ -216,7 +218,7 @@ docker buildx imagetools inspect <IMAGE> --format "{{ json .SBOM.SPDX }}"
|
|||||||
This command outputs the SBOM in JSON format, providing a detailed view of the
|
This command outputs the SBOM in JSON format, providing a detailed view of the
|
||||||
software components and build dependencies.
|
software components and build dependencies.
|
||||||
|
|
||||||
## Image Signatures
|
### Image Signatures
|
||||||
|
|
||||||
The [`minimal`](#minimal-images) and [`standard`](#standard-images) CloudNativePG container images are securely signed using
|
The [`minimal`](#minimal-images) and [`standard`](#standard-images) CloudNativePG container images are securely signed using
|
||||||
[cosign](https://github.com/sigstore/cosign), a tool within the
|
[cosign](https://github.com/sigstore/cosign), a tool within the
|
||||||
@@ -239,6 +241,18 @@ cosign verify IMAGE \
|
|||||||
--certificate-oidc-issuer="https://token.actions.githubusercontent.com"
|
--certificate-oidc-issuer="https://token.actions.githubusercontent.com"
|
||||||
```
|
```
|
||||||
|
|
||||||
|
## Image Scanning in CI/CD
|
||||||
|
|
||||||
|
To further strengthen the security of our container images, we perform
|
||||||
|
automated image scanning as part of our CI/CD workflows. These scans help
|
||||||
|
ensure that our images adhere to best practices and remain free of known
|
||||||
|
vulnerabilities before they are published or deployed:
|
||||||
|
|
||||||
|
- **Dockle**: Verifies configuration best practices for container images. Runs
|
||||||
|
during the build stage; critical failures can block the build.
|
||||||
|
- **Snyk**: Detects vulnerabilities in OS packages, libraries, and dependencies
|
||||||
|
within the container. Runs after image build.
|
||||||
|
|
||||||
## Building Images
|
## Building Images
|
||||||
|
|
||||||
For detailed instructions on building PostgreSQL container images, refer to the
|
For detailed instructions on building PostgreSQL container images, refer to the
|
||||||
|
Reference in New Issue
Block a user