Skip to content

Commit

Permalink
small wording updates, update installation directions
Browse files Browse the repository at this point in the history
Signed-off-by: Meredith Lancaster <[email protected]>
  • Loading branch information
malancas committed Jun 18, 2024
1 parent b66c044 commit 1e20d38
Showing 1 changed file with 8 additions and 5 deletions.
13 changes: 8 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,8 @@ fork will be archived.
The `policy-controller` admission controller can be used to enforce policy on a Kubernetes cluster based on verifiable supply-chain metadata from `cosign` and
artifacts attestations produced by the [attest-build-provenance GitHub Action](https://github.com/actions/attest-build-provenance).

For more information about the `policy-controller`, have a look at our documentation website [here](https://docs.sigstore.dev/policy-controller/overview).
For more information about the `policy-controller`, have a look at the Sigstore documentation
[here](https://docs.sigstore.dev/policy-controller/overview).

## Background

Check failure on line 13 in README.md

View workflow job for this annotation

GitHub Actions / Check Whitespace

[trailing whitespace] reported by reviewdog 🐶 Space at end of line Raw Output: README.md:13:Space at end of line

Expand Down Expand Up @@ -80,8 +81,9 @@ You can provide the managed identity's client ID as a custom environment
variable when installing the Helm chart:

```bash
helm install policy-controller sigstore/policy-controller --version 0.9.0 \
--set webhook.env.AZURE_CLIENT_ID=my-managed-id-client-id,webhook.env.AZURE_TENANT_ID=tenant-id
helm install policy-controller oci://ghcr.io/artifact-attestations-helm-charts/policy-controller \
--version 0.9.0 \
--set webhook.env.AZURE_CLIENT_ID=my-managed-id-client-id,webhook.env.AZURE_TENANT_ID=tenant-id
```

### Service Principals for AKS Clusters
Expand All @@ -92,8 +94,9 @@ You should be able to provide the service principal client ID and tenant ID
as a workload identity annotations:

```bash
helm upgrade --install policy-controller sigstore/policy-controller --version 0.9.0 \
--set-json webhook.serviceAccount.annotations="{\"azure.workload.identity/client-id\": \"${SERVICE_PRINCIPAL_CLIENT_ID}\", \"azure.workload.identity/tenant-id\": \"${TENANT_ID}\"}"
helm install policy-controller oci://ghcr.io/artifact-attestations-helm-charts/policy-controller \

Check failure on line 97 in README.md

View workflow job for this annotation

GitHub Actions / Check Whitespace

[trailing whitespace] reported by reviewdog 🐶 Space at end of line Raw Output: README.md:97:Space at end of line
--version 0.9.0 \
--set-json webhook.serviceAccount.annotations="{\"azure.workload.identity/client-id\": \"${SERVICE_PRINCIPAL_CLIENT_ID}\", \"azure.workload.identity/tenant-id\": \"${TENANT_ID}\"}"
```

## License

Check failure on line 102 in README.md

View workflow job for this annotation

GitHub Actions / Check Whitespace

[trailing whitespace] reported by reviewdog 🐶 Space at end of line Raw Output: README.md:102:Space at end of line
Expand Down

0 comments on commit 1e20d38

Please sign in to comment.