Skip to content

Commit 692d138

Browse files
author
jkylekelly
committed
remove policy-controller chart and use sigstore's
1 parent ee7ea74 commit 692d138

31 files changed

+15
-2357
lines changed

.github/workflows/release.yml

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ name: Release
33
on:
44
push:
55
tags:
6-
- policy-controller-v*
76
- trust-policies-v*
87

98
jobs:

.github/workflows/test.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -37,8 +37,10 @@ jobs:
3737

3838
- name: Install policy-controller
3939
run: |
40-
helm install policy-controller charts/policy-controller \
41-
--create-namespace --namespace artifact-attestations --atomic
40+
helm install policy-controller --atomic \
41+
--create-namespace --namespace artifact-attestations \
42+
oci://ghcr.io/sigstore/helm-charts/policy-controller \
43+
--version v0.13.1
4244
4345
- name: Install trust-policies
4446
run: |

README.md

Lines changed: 9 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -3,16 +3,15 @@
33
This repository hosts GitHub's Helm charts for deploying [a Kubernetes admission controller for Artifact Attestations](https://docs.github.com/en/actions/security-guides/enforcing-artifact-attestations-with-a-kubernetes-admission-controller). This admission controller allows you to enforce the provenance of artifacts deployed to your cluster by verifying their [Artifact Attestations](https://docs.github.com/en/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds#verifying-artifact-attestations-with-the-github-cli).
44

55
The admission controller consists of:
6-
- The [`policy-controller` chart](https://github.com/github/artifact-attestations-helm-charts/tree/main/charts/policy-controller), which is used to deploy [our temporary fork](https://github.com/github/policy-controller) of the [Sigstore Policy Controller](https://github.com/sigstore/policy-controller)
76
- The [`trust-policies` chart](https://github.com/github/artifact-attestations-helm-charts/tree/main/charts/trust-policies), which is used to deploy GitHub's `TrustRoot` and a default `ClusterImagePolicy`. This policy ensures that images installed on a cluster must have provenance attestations generated with the [Attest Build Provenance GitHub Action](https://github.com/actions/attest-build-provenance).
87

9-
These charts are published to GitHub Container Registry (GHCR) as OCI images. Every release is attested with
10-
the [Attest Build Provenance Action](https://github.com/github/artifact-attestations-helm-charts/blob/a50f0ad3880a562892156ab8f4ed01a349807bb3/.github/workflows/release.yml#L50).
8+
This chart is published to GitHub Container Registry (GHCR) as an OCI images. Every release is attested with
9+
the [Attest Build Provenance Action](https://github.com/github/artifact-attestations-helm-charts/blob/a50f0ad3880a562892156ab8f4ed01a349807bb3/.github/workflows/release.yml#L49).
1110

1211
You can verify these releases using the [`gh` CLI](https://cli.github.com/manual/gh_attestation_verify):
1312
```bash
1413
gh attestation verify --owner github \
15-
oci://ghcr.io/github/artifact-attestations-helm-charts/policy-controller:v0.12.0-github12
14+
oci://ghcr.io/github/artifact-attestations-helm-charts/trust-policies:v0.7.0
1615
```
1716

1817
For more information, see [our documentation](https://docs.github.com/en/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds) on using artifact attestations to establish build provenance and [our blog post](https://github.blog/2024-05-02-introducing-artifact-attestations-now-in-public-beta/) introducing Artifact Attestations.
@@ -25,8 +24,8 @@ You will need to install two charts. First, install the Sigstore policy controll
2524
```bash
2625
helm install policy-controller --atomic \
2726
--create-namespace --namespace artifact-attestations \
28-
oci://ghcr.io/github/artifact-attestations-helm-charts/policy-controller \
29-
--version v0.12.0-github12
27+
oci://ghcr.io/sigstore/helm-charts/policy-controller \
28+
--version v0.13.1
3029
```
3130

3231
The `--atomic` flag will delete the installation if failure occurs.
@@ -40,7 +39,7 @@ Next, install the GitHub `TrustRoot` and our default `ClusterImagePolicy`:
4039
helm install trust-policies --atomic \
4140
--namespace artifact-attestations \
4241
oci://ghcr.io/github/artifact-attestations-helm-charts/trust-policies \
43-
--version v0.6.2 \
42+
--version v0.7.0 \
4443
--set policy.enabled=true \
4544
--set policy.organization=MY-ORGANIZATION
4645
```
@@ -91,8 +90,8 @@ please file an [issue](https://github.com/github/artifact-attestations-helm-char
9190
When you are ready to cut a new release for a given Helm chart
9291

9392
1. Update the chart's `AppVersion` and `Version` to the appropriate values
94-
1. Create a new tag prefixed with the targeted chart name in the format <my-chart-name>-v0.1.2, ex: `git tag -s "policy-controller-v0.12.0-github12" -m "policy-controller-v0.12.0-github12"`
95-
1. Push the tag, ex: `git push origin "policy-controller-v0.12.0-github12"`
96-
1. The [release workflow](.github/workflows/release.yml) will be triggered if
93+
2. Create a new tag prefixed with the targeted chart name in the format <my-chart-name>-v0.1.2, ex: `git tag -s "trust-policies-v0.7.0" -m "trust-policies-v0.7.0"`
94+
3. Push the tag, ex: `git push origin "trust-policies-v0.7.0"`
95+
4. The [release workflow](.github/workflows/release.yml) will be triggered if
9796
the chart's tag format is included in the list of tags that trigger the workflow.
9897
The tag must follow the format `<my-chart-name>-v<semantic-version>`

charts/policy-controller/.helmignore

Lines changed: 0 additions & 20 deletions
This file was deleted.

charts/policy-controller/Chart.yaml

Lines changed: 0 additions & 16 deletions
This file was deleted.

charts/policy-controller/README.md

Lines changed: 0 additions & 176 deletions
This file was deleted.

0 commit comments

Comments
 (0)