Skip to content
This repository was archived by the owner on Jun 10, 2025. It is now read-only.

Commit b7c4985

Browse files
committed
chore: cosign command + bump version
Signed-off-by: r3drun3 <simone.ragonesi@sighup.io>
1 parent 2d65fa3 commit b7c4985

File tree

3 files changed

+22
-4
lines changed

3 files changed

+22
-4
lines changed

README.md

Lines changed: 19 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -840,7 +840,7 @@ Warning FailedScheduling 63s default-scheduler 0/4 nodes are available: 1 n
840840
This repo contains a [github action](https://github.com/stackzoo/khaos/blob/main/.github/workflows/release.yaml) to publish the operator *oci image* to *github registry* when new release tags are pushed to the main branch.
841841
In order to install the operator as a pod in the cluster you can leverage one of the *make* targets:
842842
```console
843-
make deploy IMG=ghcr.io/stackzoo/khaos:0.0.15
843+
make deploy IMG=ghcr.io/stackzoo/khaos:0.0.19
844844
```
845845

846846
This command will install all the required *CRDs* and *RBAC manifests* and then start the operator as a pod:
@@ -855,6 +855,24 @@ khaos-controller-manager-8887957bf-5b8g9 2/2 Running 0
855855
> If you encounter RBAC errors, you may need to grant yourself cluster-admin privileges or be logged in as admin.
856856

857857

858+
## Operator Image Signature Verification
859+
The `realease` pipeline sign the operator's OCI image with cosign.
860+
In order to verify the signature, use the following command:
861+
```console
862+
cosign verify --key cosign/cosign.pub ghcr.io/stackzoo/khaos:0.0.19
863+
```
864+
Verification output:
865+
```console
866+
867+
Verification for ghcr.io/stackzoo/khaos:0.0.19 --
868+
The following checks were performed on each of these signatures:
869+
- The cosign claims were validated
870+
- Existence of the claims in the transparency log was verified offline
871+
- The signatures were verified against the specified public key
872+
873+
[{"critical":{"identity":{"docker-reference":"ghcr.io/stackzoo/khaos"},"image":{"docker-manifest-digest":"sha256:3b6d72f646820225943d401a6bea795925e0714d75d6c5c5b7e0de0a3c9178b2"},"type":"cosign container image signature"},"optional":{"Bundle":{"SignedEntryTimestamp":"MEUCIQCLufLLbhbHa+rawlztjHOP7goS30ekP25Q4wtmflob/gIgMGBIVWMeSMgJEfBbPXPd+YV4Ep17RAWkqza6qJXugDY=","Payload":{"body":"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","integratedTime":1707833345,"logIndex":71110514,"logID":"c0d23d6ad406973f9559f3ba2d1ca01f84147d8ffc5b8445c224f98b9591801d"}}}}]
874+
```
875+
858876

859877

860878
## Useful References

SECURITY.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,8 +6,8 @@ The following versions are currently being supported with security updates.
66

77
| Version | Supported |
88
| ------- | ------------------ |
9-
| 0.0.15 | :white_check_mark: |
10-
| < 0.0.15 | :x: |
9+
| 0.0.19 | :white_check_mark: |
10+
| < 0.0.19 | :x: |
1111

1212
## Reporting a Vulnerability
1313

config/manager/kustomization.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,4 +5,4 @@ kind: Kustomization
55
images:
66
- name: controller
77
newName: ghcr.io/stackzoo/khaos
8-
newTag: 0.0.15
8+
newTag: 0.0.19

0 commit comments

Comments
 (0)