You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: rfcs/0000-cosign-integration.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,7 +33,7 @@ signatures to a registry so that users can ensure the chain of custody of a
33
33
generated artifact.
34
34
35
35
This proposal aims to cover specifically the flow of signing an image produced
36
-
by the `kpack Image` resource, along with its builder image, without
36
+
by the kpack `Image`, `Build`, `Builder` and `ClusterBuilder` resources, without
37
37
verification of any container images pulled in the process.
38
38
39
39
## Actions to take
@@ -44,7 +44,7 @@ verification of any container images pulled in the process.
44
44
calculates its signature and pushes it either to the registry where the image
45
45
is located, using the same credentials that were used to push the image, or
46
46
[to the registry specified in the `COSIGN_REPOSITORY` environment variable](#key-generation-and-storage).
47
-
`kpack` should sign both the user-requested image being generated and the
47
+
`kpack` should sign images produced by kpack builds and images produced by the Builder and ClusterBuilder resources, using their respective service accounts to
48
48
builder image used for the build, using their respective service accounts to
49
49
find credentials. This flow must happen after each of the images have been
50
50
pushed to the registry.
@@ -53,8 +53,8 @@ verification of any container images pulled in the process.
53
53
message in the build log, so the operator can troubleshoot the issue. The
54
54
error messages should also be added in any other places where error messages
55
55
are presented.
56
-
57
-
- Whenever `kpack` signs an image using `cosign`, it should add these
56
+
- If `cosign` fails to sign an image produced by a Builder resource the Builder should not enter a Ready status.
57
+
- Whenever `kpack` signs an image produced within a kpack build using `cosign`, it should add these
0 commit comments