Skip to content

Conversation

@dallasd1
Copy link
Contributor

This proposal discusses adding per-layer container image signing using the PKCS#7 format. This will enable signing individual container image layers that are later verified by the kernel at runtime.

Runtime verification also depends on milestone 1 of this RFC for code integrity in containerd. At the time of writing, milestone 1.2 is in PR review and milestone 1.3 remains.

Copy link
Contributor

@yizha1 yizha1 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @dallasd1. LGTM. The proposal strengthens the secure supply chain by extending image integrity from image pull to runtime and offline scenario. We will need to create separate issues to track additional work, such as spec releated work including the Notation CLI specs, the new signature evenlope PKCS#7, the thread model.

You will need to fix the DCO and sign the comments. You can follow this guide https://github.com/notaryproject/.github/blob/main/CONTRIBUTING.md#commit

Signed-off-by: Dallas Delaney <dadelan@microsoft.com>
Signed-off-by: Dallas Delaney <dadelan@microsoft.com>
Signed-off-by: Dallas Delaney <dadelan@microsoft.com>
Add perf metrics
Comment on OCI format and multi-arch scenarios

Signed-off-by: Dallas Delaney <dadelan@microsoft.com>
Copy link
Member

@FeynmanZhou FeynmanZhou left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM to make this proposal as the initial version. Thanks @dallasd1 .

@codecov
Copy link

codecov bot commented Dec 29, 2025

Codecov Report

✅ All modified and coverable lines are covered by tests.
✅ Project coverage is 79.22%. Comparing base (e49f07c) to head (b4efd40).
⚠️ Report is 1 commits behind head on main.

Additional details and impacted files
@@            Coverage Diff             @@
##             main    #1335      +/-   ##
==========================================
+ Coverage   77.00%   79.22%   +2.21%     
==========================================
  Files          68       68              
  Lines        3853     3066     -787     
==========================================
- Hits         2967     2429     -538     
+ Misses        682      433     -249     
  Partials      204      204              

☔ View full report in Codecov by Sentry.
📢 Have feedback on the report? Share it here.

🚀 New features to boost your workflow:
  • ❄️ Test Analytics: Detect flaky tests, report on failures, and find test suite problems.

@yizha1
Copy link
Contributor

yizha1 commented Dec 29, 2025

Hi @NiazFK @vaninrao10 @priteshbandi @rgnote @gokarnm Would you mind take a look at this PR? Thanks.

Copy link

@flora-taagen flora-taagen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks @dallasd1!

@DahuK
Copy link

DahuK commented Jan 7, 2026

Really looking forward to runtime integrity verification support!

@NiazFK
Copy link
Contributor

NiazFK commented Jan 9, 2026

LGTM! This will be a great add.

Copy link
Contributor

@NiazFK NiazFK left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM.

@FeynmanZhou FeynmanZhou merged commit a71c2d9 into notaryproject:main Jan 12, 2026
7 checks passed
dallasd1 added a commit to dallasd1/notation that referenced this pull request Jan 13, 2026
This proposal discusses adding per-layer container image signing using
the PKCS#7 format. This will enable signing individual container image
layers that are later verified by the kernel at runtime.

Runtime verification also depends on milestone 1 of this [RFC for code
integrity](containerd/containerd#12081) in
containerd. At the time of writing, milestone 1.2 is in PR review and
milestone 1.3 remains.

---------

Signed-off-by: Dallas Delaney <dadelan@microsoft.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

6 participants