Skip to content

Commit 50ce02d

Browse files
malancascodysoyland
authored andcommitted
Update README to include required open source sections and temporary fork status information (#168)
* add open source required sections Signed-off-by: Meredith Lancaster <[email protected]> * small wording updates, update installation directions Signed-off-by: Meredith Lancaster <[email protected]> --------- Signed-off-by: Meredith Lancaster <[email protected]>
1 parent 6d26cd4 commit 50ce02d

File tree

1 file changed

+40
-56
lines changed

1 file changed

+40
-56
lines changed

README.md

+40-56
Original file line numberDiff line numberDiff line change
@@ -1,26 +1,20 @@
1-
<p align="center">
2-
<img style="max-width: 100%;width: 300px;" src="https://raw.githubusercontent.com/sigstore/community/main/artwork/policy-controller/Horizontal/Full%20Color/sigstore_policycontroller-horizontal-color.svg" alt="Cosign logo"/>
3-
</p>
1+
# GitHub Managed Policy Controller
42

5-
# Policy Controller
3+
This repository hosts a temporary GitHub owned
4+
fork of the [Sigstore Policy Controller repository](https://github.com/sigstore/policy-controller). Once functionality only present in this fork is merged upstream to [sigstore/policy-controller](https://github.com/sigstore/policy-controller), this
5+
fork will be archived.
66

7-
The `policy-controller` admission controller can be used to enforce policy on a Kubernetes cluster based on verifiable supply-chain metadata from `cosign`.
7+
The `policy-controller` admission controller can be used to enforce policy on a Kubernetes cluster based on verifiable supply-chain metadata from `cosign` and
8+
artifacts attestations produced by the [attest-build-provenance GitHub Action](https://github.com/actions/attest-build-provenance).
89

9-
[![Go Report Card](https://goreportcard.com/badge/github.com/sigstore/policy-controller)](https://goreportcard.com/report/github.com/sigstore/policy-controller)
10-
[![e2e-tests](https://github.com/sigstore/policy-controller/actions/workflows/kind-e2e-cosigned.yaml/badge.svg)](https://github.com/sigstore/policy-controller/actions/workflows/kind-e2e-cosigned.yaml)
11-
[![OpenSSF Scorecard](https://api.securityscorecards.dev/projects/github.com/sigstore/policy-controller/badge)](https://api.securityscorecards.dev/projects/github.com/sigstore/policy-controller)
10+
For more information about the `policy-controller`, have a look at the Sigstore documentation
11+
[here](https://docs.sigstore.dev/policy-controller/overview).
1212

13-
`policy-controller` also resolves the image tags to ensure the image being ran is not different from when it was admitted.
13+
## Background
1414

15-
See the [installation instructions](https://docs.sigstore.dev/policy-controller/installation) for more information.
16-
17-
Today, `policy-controller` can automatically validate signatures and
18-
attestations on container images.
19-
Enforcement is configured on a per-namespace basis, and multiple keys are supported.
20-
21-
We're actively working on more features here.
22-
23-
For more information about the `policy-controller`, have a look at our documentation website [here](https://docs.sigstore.dev/policy-controller/overview).
15+
See the [official documentation](https://docs.github.com/en/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds) on
16+
using artifact attestations to establish build provenance and
17+
the [blog post](https://github.blog/2024-05-02-introducing-artifact-attestations-now-in-public-beta/) introducing Artifact Attestations.
2418

2519
## Examples
2620

@@ -44,33 +38,6 @@ Then run it pointing to a YAML file containing a ClusterImagePolicy, and an imag
4438
--image=ghcr.io/sigstore/cosign/cosign:v1.9.0 | jq)
4539
```
4640

47-
## Local Development
48-
49-
You can spin up a local [Kind](https://kind.sigs.k8s.io/) K8s cluster to test local changes to the policy controller using the `local-dev`
50-
CLI tool. Build the tool with `make local-dev` and then run it with `./bin/local-dev setup`.
51-
52-
It optionally accepts the following:
53-
54-
```
55-
--cluster-name
56-
--k8s-version
57-
--registry-url
58-
```
59-
60-
You can clean up the cluster with `./bin/local-dev clean --cluster-name=<my cluster name>`.
61-
62-
You will need to have the following tools installed to use this:
63-
- [Docker](https://docs.docker.com/get-docker/)
64-
- [kind](https://kind.sigs.k8s.io/)
65-
- [ko](https://ko.build/install/)
66-
- [kubectl](https://kubernetes.io/docs/tasks/tools/)
67-
68-
### Use local registry
69-
70-
If you would like to use the local Kind registry instead of a live one,
71-
do not include the `registry-url` flag when calling the CLI. It will default to using the local registry. But before running the CLI, you must add the following line to your `/etc/hosts` file first:
72-
`127.0.0.1 registry.local`
73-
7441
## Using Policy Controller with Azure Container Registry (ACR)
7542

7643
To allow the webhook to make requests to ACR, you must use one of the following
@@ -114,8 +81,9 @@ You can provide the managed identity's client ID as a custom environment
11481
variable when installing the Helm chart:
11582

11683
```bash
117-
helm install policy-controller sigstore/policy-controller --version 0.9.0 \
118-
--set webhook.env.AZURE_CLIENT_ID=my-managed-id-client-id,webhook.env.AZURE_TENANT_ID=tenant-id
84+
helm install policy-controller oci://ghcr.io/artifact-attestations-helm-charts/policy-controller \
85+
--version 0.9.0 \
86+
--set webhook.env.AZURE_CLIENT_ID=my-managed-id-client-id,webhook.env.AZURE_TENANT_ID=tenant-id
11987
```
12088

12189
### Service Principals for AKS Clusters
@@ -126,11 +94,25 @@ You should be able to provide the service principal client ID and tenant ID
12694
as a workload identity annotations:
12795

12896
```bash
129-
helm upgrade --install policy-controller sigstore/policy-controller --version 0.9.0 \
130-
--set-json webhook.serviceAccount.annotations="{\"azure.workload.identity/client-id\": \"${SERVICE_PRINCIPAL_CLIENT_ID}\", \"azure.workload.identity/tenant-id\": \"${TENANT_ID}\"}"
97+
helm install policy-controller oci://ghcr.io/artifact-attestations-helm-charts/policy-controller \
98+
--version 0.9.0 \
99+
--set-json webhook.serviceAccount.annotations="{\"azure.workload.identity/client-id\": \"${SERVICE_PRINCIPAL_CLIENT_ID}\", \"azure.workload.identity/tenant-id\": \"${TENANT_ID}\"}"
131100
```
132101

133-
## Support Policy
102+
## License
103+
104+
This project is licensed under the terms of the Apache 2.0 open source license. Please refer to [Apache 2.0](./LICENSE) for the full terms.
105+
106+
## Maintainers
107+
108+
See [CODEOWNERS](./CODEOWNERS) for a list of maintainers.
109+
110+
## Support
111+
112+
If you have any questions or issues following examples outlined in this repository,
113+
please file an [issue](https://github.com/github/policy-controller-helm/issues/new?template=Blank+issue) and we will assist you.
114+
115+
## K8s Support Policy
134116

135117
This policy-controller's versions are able to run in the following versions of Kubernetes:
136118

@@ -145,7 +127,14 @@ This policy-controller's versions are able to run in the following versions of K
145127

146128
note: not fully tested yet, but can be installed
147129

148-
## Cutting a new release
130+
## Security
131+
132+
Should you discover any security issues, please refer to Sigstore's [security
133+
policy](https://github.com/sigstore/policy-controller/security/policy).
134+
135+
## Maintainer Documentation
136+
137+
### Cutting a new release
149138

150139
The branch `release` on the private fork is used for customer-facing released code.
151140

@@ -155,8 +144,3 @@ In order to push a new release, follow these steps:
155144
1. Tag as `v0.9.0+githubX` (incrementing the `X` as needed).
156145
1. Push the tag to the private fork.
157146
1. The [Release GitHub Action workflow](https://github.com/github/policy-controller/actions/workflows/release.yaml) will triggered automatically when the tag is pushed
158-
159-
## Security
160-
161-
Should you discover any security issues, please refer to Sigstore's [security
162-
policy](https://github.com/sigstore/policy-controller/security/policy).

0 commit comments

Comments
 (0)