Who Are You Building For: Pipelines Have a Purpose

Andrew McNamara & Julen Landa Alustiza, Red Hat

OpenSSF Community Day North America 2025


Pipelines serve dual purposes

๐Ÿ”’ Security Controls

  • Supply chain protection
  • Establish organizational trust
  • Policy compliance

๐Ÿ› ๏ธ Developer Flexibility

  • Customizable workflows
  • Innovation enablement
  • Community contribution

Pipelines serve dual purposes

๐Ÿ”’ Security Controls

  • Supply chain protection
  • Establish organizational trust
  • Policy compliance

๐Ÿ› ๏ธ Developer Flexibility

  • Customizable workflows
  • Innovation enablement
  • Community contribution
Konflux Banner

Our Approach: Progressive Trust Model

placeholder
placeholder
placeholder
placeholder
placeholder
K8s + Tekton

Isolated builds

Kubernetes provides RBAC, containerization, and namespace isolation. Tekton provides the pipeline execution framework.

Tekton

Building Trust: Trusted Task Library

placeholder
placeholder
placeholder
placeholder
Trusted Task Library
K8s + Tekton

Curated and Verified Tasks

Tasks that have been reviewed, tested, and approved for broader use.

  • Build process standardization
  • Security scanning integration
pipelines as code

Building Trust: Trusted Artifacts

placeholder
placeholder
placeholder
Trusted Artifacts
Trusted Task Library
K8s + Tekton

Tamper-Proof Data Flow

Secure artifact sharing between tasks with integrity verification.

  • Tamper detection
  • Build reproducibility
open container initiative

Building Trust: Observer Generated Attestations

placeholder
placeholder
Observer Generated Attestations
Trusted Artifacts
Trusted Task Library
K8s + Tekton

Independent Verification

Tekton Chains generates signed SLSA provenance separately from the build.

  • Unforgeable provenance
  • Complete record of build steps
  • SLSA Build Level 3
tekton chains

Building Trust: Policy Engine

placeholder
Policy Engine
Observer Generated Attestations
Trusted Artifacts
Trusted Task Library
K8s + Tekton

Policy-Driven Development

Automated policy evaluation guides developers toward compliance.

  • Real-time violation feedback
  • PR-based policy guidance
  • Conforma policy engine
conforma

Complete Trust Model: Release Service

Release Service
Policy Engine
Observer Generated Attestations
Trusted Artifacts
Trusted Task Library
K8s + Tekton

Build Once, Release Everywhere

Policy compliance is a required gate before protected releases.

  • Environment-specific policies
  • Automated release gating
konflux

Community Contribution Workflow

Personal Sandbox
โ†’
Establish trust
โ†’
Community Sharing

๐Ÿงช Experiment

Start with custom tasks in your own namespace

โœ… Promote

Push to trusted task bundles

๐Ÿค Share

Others can leverage your work


Demo: Customizing the build pipeline

Custom task to build execution environments

Sandbox custom task resolver
Custom build pipeline using ansible-builder
  • Policy violations
  • Trust model gaps
  • Compliance issues
Non-compliant Conforma policy result Task are trusted rule failure

Demo: From Personal Task to Community Asset

Generic Dynamic Containerfile generation

# From specific implementation...
ansible-builder create
buildah build -t $IMAGE context/

# To generalized implementation
exec $MY_SCRIPT
buildah build -t $IMAGE $CONTEXT_DIRECTORY

Benefits of Generalization


Generic task

# My custom task
- name: run-ansible-builder
  params:
    - name: SCRIPT_RUNNER_IMAGE
      value: ghcr.io/ansible/community-ansible-dev-tools:latest
    - name: SCRIPT
      value: ansible-builder create
    - name: HERMETIC
      value: 'true'
# Later on the pipeline the full reference of the script runner image
# is injected to the SBOM
- name: ADDITIONAL_BASE_IMAGES
  value:
    - $(tasks.run-ansible-builder.results.SCRIPT_RUNNER_IMAGE_REFERENCE)

Demo: From Personal Task to Community Asset

Community contributed trusted task

Sandbox custom task resolver
Trusted task resolver
Custom build pipeline using ansible-builder
  • No more blocking policy violations
  • Trust model extended to include this task
  • Adheres to policy requirements
Compliant Conforma policy result Tasks are trusted rule pass

Demo: From Personal Task to Community Asset

Reusability

Ansible Execution Environments
ansible-builder pipeline
Red Hat Developer Hub (Backstage) dynamic plugins
dynamic-plugins pipeline
Generic make target
make pipeline

github.com/Zokormazo/oss-na-2025-demo


The Developer Experience

Before Konflux

  • Rigid pipeline
  • Slow innovation

After Konflux

  • Customizable pipeline
  • Immediate feedback
  • Continuous innovation
  • Community task library

Thank you!

GitHub @arewm
arewm@redhat.com
GitHub @Zokormazo
julen@redhat.com
Konflux CI QR Code
konflux-ci.dev
Hermeto QR Code
hermetoproject.github.io/hermeto
Conforma QR Code
conforma.dev