You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/container-registry/container-registry-tutorial-sign-build-push.md
+29-21Lines changed: 29 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -33,18 +33,18 @@ In this tutorial:
33
33
> [!NOTE]
34
34
> The tutorial uses early released versions of notation and notation plugins.
35
35
36
-
1. Install notation with plugin support from the [release version](https://github.com/notaryproject/notation/releases/)
36
+
1. Install notation 0.11.0-alpha.4 with plugin support on a Linux environment. You can also download the package for other environments from the [release page](https://github.com/notaryproject/notation/releases/tag/v0.11.0-alpha.4).
tar xvzf notation-azure-kv.tar.gz -C ~/.config/notation/plugins/azure-kv notation-azure-kv
63
63
```
64
64
65
-
3. List the available plugins and verify that the plugin is available
65
+
3. List the available plugins and verify that the plugin is available.
66
66
67
67
```bash
68
68
notation plugin ls
@@ -73,7 +73,7 @@ In this tutorial:
73
73
> [!NOTE]
74
74
> For easy execution of commands in the tutorial, provide values for the Azure resources to match the existing ACR and AKV resources.
75
75
76
-
1. Configure AKV resource names
76
+
1. Configure AKV resource names.
77
77
78
78
```bash
79
79
# Name of the existing Azure Key Vault used to store the signing keys
@@ -84,7 +84,7 @@ In this tutorial:
84
84
CERT_PATH=./${KEY_NAME}.pem
85
85
```
86
86
87
-
2. Configure ACR and image resource names
87
+
2. Configure ACR and image resource names.
88
88
89
89
```bash
90
90
# Name of the existing registry example: myregistry.azurecr.io
@@ -106,7 +106,7 @@ Otherwise create an x509 self-signed certificate storing it in AKV for remote si
106
106
107
107
### Create a self-signed certificate (Azure CLI)
108
108
109
-
1. Create a certificate policy file
109
+
1. Create a certificate policy file.
110
110
111
111
Once the certificate policy file is executed as below, it creates a valid signing certificate compatible with **notation**in AKV. The EKU listed is for code-signing, but isn't required for notation to sign artifacts.
112
112
@@ -128,32 +128,32 @@ Otherwise create an x509 self-signed certificate storing it in AKV for remote si
128
128
EOF
129
129
```
130
130
131
-
1. Create the certificate
131
+
1. Create the certificate.
132
132
133
133
```azure-cli
134
134
az keyvault certificate create -n $KEY_NAME --vault-name $AKV_NAME -p @my_policy.json
- Sign the container image with the default JWS signature envelope:
188
+
181
189
```bash
182
190
notation sign --key $KEY_NAME $IMAGE
183
191
```
184
-
192
+
185
193
## View the graph of artifacts with the ORAS CLI
186
194
187
-
ACR support for ORAS artifacts enables a linked graph of supply chain artifacts that can be viewed through the ORAS CLI or the Azure CLI
195
+
ACR support for ORAS artifacts enables a linked graph of supply chain artifacts that can be viewed through the ORAS CLI or the Azure CLI.
188
196
189
-
1. Signed images can be view with the ORAS CLI
197
+
1. Signed images can be view with the ORAS CLI.
190
198
191
199
```bash
192
200
oras login -u $USER_NAME -p $PASSWORD $REGISTRY
@@ -195,7 +203,7 @@ ACR support for ORAS artifacts enables a linked graph of supply chain artifacts
195
203
196
204
## View the graph of artifacts with the Azure CLI
197
205
198
-
1. List the manifest details for the container image
206
+
1. List the manifest details for the container image.
199
207
200
208
```azure-cli
201
209
az acr manifest show-metadata $IMAGE -o jsonc
@@ -248,4 +256,4 @@ notation verify $IMAGE
248
256
249
257
## Next steps
250
258
251
-
[Enforce policy to only deploy signed container images to Azure Kubernetes Service (AKS) utilizing **ratify** and **gatekeeper**.](https://github.com/Azure/notation-azure-kv/blob/main/docs/nv2-sign-verify-aks.md)
259
+
See [Enforce policy to only deploy signed container images to Azure Kubernetes Service (AKS) utilizing **ratify** and **gatekeeper**.](https://github.com/Azure/notation-azure-kv/blob/main/docs/nv2-sign-verify-aks.md)
0 commit comments