Skip to content

Commit 7880260

Browse files
Merge pull request #221589 from yizha1/yizha1-patch-1
Update container-registry-tutorial-sign-build-push.md
2 parents eaa4954 + e57c78e commit 7880260

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

articles/container-registry/container-registry-tutorial-sign-build-push.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ In this tutorial:
2424
2525
## Prerequisites
2626

27-
> * Install, create and sign in to OCI artifact enabled registry ACR
27+
> * Create and sign in ACR with OCI artifact enabled
2828
> * Create or use an [Azure Key Vault](../key-vault/general/quick-create-cli.md)
2929
>* This tutorial can be run in the [Azure Cloud Shell](https://portal.azure.com/#cloudshell/)
3030
@@ -201,7 +201,7 @@ Otherwise create an x509 self-signed certificate storing it in AKV for remote si
201201
notation ls $IMAGE
202202
```
203203
204-
## [Option] View the graph of artifacts with the ORAS CLI
204+
## View the graph of artifacts with the ORAS CLI (optional)
205205
206206
ACR support for OCI artifacts enables a linked graph of supply chain artifacts that can be viewed through the ORAS CLI or the Azure CLI.
207207
@@ -212,7 +212,7 @@ ACR support for OCI artifacts enables a linked graph of supply chain artifacts t
212212
oras discover -o tree $IMAGE
213213
```
214214
215-
## [Option] View the graph of artifacts with the Azure CLI
215+
## View the graph of artifacts with the Azure CLI (optional)
216216
217217
1. List the manifest details for the container image.
218218
@@ -243,9 +243,9 @@ ACR support for OCI artifacts enables a linked graph of supply chain artifacts t
243243
244244
1. Configure trust policy before verification.
245245
246-
The trust policy is a JSON document named `trustpolicy.jsoin`, which is stored under notation configuration directory. Users who verify signed artifact from a registry use the trust policy to specify trusted identities which sign the artifacts, and level of signature verification to use.
247-
248-
Use the following command to configure trust policy for this tutorial. Upon successful execution of the command, one trust policy named `wabbit-networks-images` is created. This trust policy applies to all the artifacts stored under repository `$REGISTRY/$REPO`. The trust identity that user trusts has the x509 subject `$CERT_SUBJECT` from previous step, and stored under trust store named `$STORE_NAME` of type `$STORE_TYPE`.
246+
The trust policy is a JSON document named `trustpolicy.json`, which is stored under the notation configuration directory. Users who verify signed artifacts from a registry use the trust policy to specify trusted identities that sign the artifacts, and the level of signature verification to use.
247+
248+
Use the following command to configure trust policy for this tutorial. Upon successful execution of the command, one trust policy named `wabbit-networks-images` is created. This trust policy applies to all the artifacts stored in repositories defined in `$REGISTRY/$REPO`. The trust identity that user trusts has the x509 subject `$CERT_SUBJECT` from previous step, and stored under trust store named `$STORE_NAME` of type `$STORE_TYPE`. See [Trust store and trust policy specification](https://notaryproject.dev/docs/concepts/trust-store-trust-policy-specification/) for details.
249249
250250
```bash
251251
cat <<EOF > $HOME/.config/notation/trustpolicy.json

0 commit comments

Comments
 (0)