You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fork of the [Sigstore Policy Controller repository](https://github.com/sigstore/policy-controller). Once functionality only present in this fork is merged upstream to [sigstore/policy-controller](https://github.com/sigstore/policy-controller), this
5
+
fork will be archived.
6
6
7
-
The `policy-controller` admission controller can be used to enforce policy on a Kubernetes cluster based on verifiable supply-chain metadata from `cosign`.
7
+
The `policy-controller` admission controller can be used to enforce policy on a Kubernetes cluster based on verifiable supply-chain metadata from `cosign` and
8
+
artifacts attestations produced by the [attest-build-provenance GitHub Action](https://github.com/actions/attest-build-provenance).
`policy-controller` also resolves the image tags to ensure the image being ran is not different from when it was admitted.
13
+
## Background
14
14
15
-
See the [installation instructions](https://docs.sigstore.dev/policy-controller/installation) for more information.
16
-
17
-
Today, `policy-controller` can automatically validate signatures and
18
-
attestations on container images.
19
-
Enforcement is configured on a per-namespace basis, and multiple keys are supported.
20
-
21
-
We're actively working on more features here.
22
-
23
-
For more information about the `policy-controller`, have a look at our documentation website [here](https://docs.sigstore.dev/policy-controller/overview).
15
+
See the [official documentation](https://docs.github.com/en/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds) on
16
+
using artifact attestations to establish build provenance and
17
+
the [blog post](https://github.blog/2024-05-02-introducing-artifact-attestations-now-in-public-beta/) introducing Artifact Attestations.
24
18
25
19
## Examples
26
20
@@ -44,33 +38,6 @@ Then run it pointing to a YAML file containing a ClusterImagePolicy, and an imag
If you would like to use the local Kind registry instead of a live one,
71
-
do not include the `registry-url` flag when calling the CLI. It will default to using the local registry. But before running the CLI, you must add the following line to your `/etc/hosts` file first:
72
-
`127.0.0.1 registry.local`
73
-
74
41
## Using Policy Controller with Azure Container Registry (ACR)
75
42
76
43
To allow the webhook to make requests to ACR, you must use one of the following
@@ -114,8 +81,9 @@ You can provide the managed identity's client ID as a custom environment
The branch `release` on the private fork is used for customer-facing released code.
151
140
@@ -155,8 +144,3 @@ In order to push a new release, follow these steps:
155
144
1. Tag as `v0.9.0+githubX` (incrementing the `X` as needed).
156
145
1. Push the tag to the private fork.
157
146
1. The [Release GitHub Action workflow](https://github.com/github/policy-controller/actions/workflows/release.yaml) will triggered automatically when the tag is pushed
158
-
159
-
## Security
160
-
161
-
Should you discover any security issues, please refer to Sigstore's [security
0 commit comments