-
Notifications
You must be signed in to change notification settings - Fork 64
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add cosign trust policies #1381
feat: add cosign trust policies #1381
Conversation
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## dev #1381 +/- ##
======================================
Coverage ? 66.27%
======================================
Files ? 112
Lines ? 5901
Branches ? 0
======================================
Hits ? 3911
Misses ? 1609
Partials ? 381 ☔ View full report in Codecov by Sentry. |
{{- range $i, $scope := .Values.cosign.scopes }} | ||
- "{{$scope}}" | ||
{{- end }} | ||
keys: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
record a demo and get experience feedback
wondering do we plan to release the trust policy for Cosign under "experimental", do we anticipate changes in the cosign trust policy on user feedback? |
e30b51a
to
b43d46b
Compare
charts/ratify/README.md
Outdated
| cosign.enabled | Enables/disables cosign tag-based signature lookup in ORAS store. MUST be set to true for cosign verification. | `true` | | ||
| cosign.key | Public certificate used by cosign verifier | `` | | ||
| cosign.scopes | An array of scopes relevant to the single trust policy configured in Cosign verifier | `["*"]` | |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
need to add link to docs to explain supported scopes syntax once docs are published on website
fb91db1
to
50f9fdc
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a impressive set of changes Akash. Wondering if you think we should do some buddy testing to have more eyes on different scenarios before we release. Maybe we could list out the main scenarios and have Yi, Binbin and I to cover a few each.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm, thanks for enhancing cosign experience!
Description
What this PR does / why we need it:
This is the fourth in a series of PRs to expand cosign support in Ratify.
*
wild characterghcr.io/deislabs/ratify:v1
ghcr.io/deislabs*
file
specification for specifying keys from file path. useful for CLI in futurekey
andrekorURL
fieldsWhich issue(s) this PR fixes (optional, using
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when the PR gets merged):Fixes #1191
Fixes #1190
Fixes #861
Fixes #1189
Type of change
Please delete options that are not relevant.
main
branch)How Has This Been Tested?
Please describe the tests that you ran to verify your changes. Please also list any relevant details for your test configuration
Checklist:
Post Merge Requirements
Helm Chart Change