<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Blog on Conforma</title><link>/posts/</link><description>Recent content in Blog on Conforma</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><copyright>Red Hat, Inc. All rights reserved.</copyright><lastBuildDate>Wed, 22 Jan 2025 12:24:00 -0500</lastBuildDate><atom:link href="/posts/index.xml" rel="self" type="application/rss+xml"/><item><title>Presenting "Conforma"</title><link>/posts/whats-in-a-name/</link><pubDate>Wed, 22 Jan 2025 12:24:00 -0500</pubDate><guid>/posts/whats-in-a-name/</guid><description>&lt;p>To make a long story short, this project has a new name. &amp;ldquo;Enterprise Contract&amp;rdquo;
is now &amp;ldquo;Conforma&amp;rdquo;. Read on for some background information about the name and
why we decided to change it.&lt;/p></description></item><item><title>Gating Image Promotion on GitLab</title><link>/posts/gating-image-promotion-on-gitlab/</link><pubDate>Wed, 12 Jun 2024 18:54:00 +0000</pubDate><guid>/posts/gating-image-promotion-on-gitlab/</guid><description>&lt;p>Once you have a container image ready for promotion, it is important to first verify the image meets
a certain criteria before it is made available to consumers. In this blog post, we look at how to
achieve this in a &lt;a href="https://gitlab.com/">GitLab&lt;/a> pipeline.&lt;/p></description></item><item><title>Policies Polyglot: Evaluating Custom Predicates</title><link>/posts/evaluating-custom-predicates/</link><pubDate>Wed, 20 Mar 2024 15:02:00 -0400</pubDate><guid>/posts/evaluating-custom-predicates/</guid><description>&lt;p>Attestations are a wonderful way to attach metadata to container images in a secure manner. One of
the most popular formats is &lt;a href="https://slsa.dev/spec/v0.1/provenance#schema">SLSA Provenance&lt;/a> which is
used to provide information on how the image was created. Our &lt;a href="https://conforma.dev/docs/user-guide/hitchhikers-guide.html">Hitchhiker’s
Guide&lt;/a> demonstrates how
to write policies to assert the contents of the SLSA Provenance. Here, we expand on that approach to
assert the contents of &lt;em>any&lt;/em> attestation format, even completely made up ones.&lt;/p></description></item><item><title>Introducing Action Validate for GitHub</title><link>/posts/introducing-action-validate-image/</link><pubDate>Tue, 24 Oct 2023 13:02:00 -0400</pubDate><guid>/posts/introducing-action-validate-image/</guid><description>&lt;p>You may already be familiar
with using the &lt;code>EC-CLI Validate&lt;/code> command for local container image validation.
Now, you can seamlessly integrate this functionality directly into your build
processes or any other automated workflow in GitHub.&lt;/p></description></item><item><title>A Taste of Policies</title><link>/posts/a-taste-of-policies/</link><pubDate>Tue, 15 Aug 2023 12:34:56 -0400</pubDate><guid>/posts/a-taste-of-policies/</guid><description>&lt;p>In a &lt;a href="https://conforma.dev/posts/introducing-the-enterprise-contract/">previous blog
post&lt;/a>, we introduced the
basic concepts of the Enterprise Contract. This time, we explore it further to showcase the usage of
policies.&lt;/p></description></item><item><title>Introducing the Enterprise Contract</title><link>/posts/introducing-the-enterprise-contract/</link><pubDate>Mon, 24 Apr 2023 12:56:35 -0400</pubDate><guid>/posts/introducing-the-enterprise-contract/</guid><description>&lt;p>You may have heard of &lt;a href="https://www.sigstore.dev/how-it-works">sigstore&lt;/a> and its container image
verification tool, &lt;a href="https://docs.sigstore.dev/cosign/overview/">cosign&lt;/a>. This blog post introduces a
policy-driven workflow, &lt;a href="https://conforma.dev/docs/">Enterprise Contract&lt;/a>,
built on those technologies.&lt;/p></description></item></channel></rss>