Skip to content

Commit b397a8f

Browse files
authored
Merge pull request #44066 from sftim/20231124_revise_download_page
Revise detail about container image downloads
2 parents dcfbe0d + d8e55f2 commit b397a8f

File tree

1 file changed

+12
-19
lines changed

1 file changed

+12
-19
lines changed

content/en/releases/download.md

Lines changed: 12 additions & 19 deletions
Original file line numberDiff line numberDiff line change
@@ -28,15 +28,11 @@ Find your preferred operating system below.
2828
- [Install kubectl on macOS](/docs/tasks/tools/install-kubectl-macos)
2929
- [Install kubectl on Windows](/docs/tasks/tools/install-kubectl-windows)
3030

31-
## Container Images
31+
## Container images
3232

3333
All Kubernetes container images are deployed to the
3434
`registry.k8s.io` container image registry.
3535

36-
For Kubernetes {{< param "version" >}}, the following
37-
container images are signed using [sigstore](https://sigstore.dev)
38-
signatures:
39-
4036
| Container Image | Supported Architectures |
4137
| ------------------------------------------------------------------------- | --------------------------------- |
4238
| registry.k8s.io/kube-apiserver:v{{< skew currentPatchVersion >}} | amd64, arm, arm64, ppc64le, s390x |
@@ -45,6 +41,14 @@ signatures:
4541
| registry.k8s.io/kube-scheduler:v{{< skew currentPatchVersion >}} | amd64, arm, arm64, ppc64le, s390x |
4642
| registry.k8s.io/conformance:v{{< skew currentPatchVersion >}} | amd64, arm, arm64, ppc64le, s390x |
4743

44+
### Container image architectures
45+
46+
All container images are available for multiple architectures, whereas the
47+
container runtime should choose the correct one based on the underlying
48+
platform. It is also possible to pull a dedicated architecture by suffixing the
49+
container image name, for example
50+
`registry.k8s.io/kube-apiserver-arm64:v{{< skew currentPatchVersion >}}`.
51+
4852
### Container image signatures
4953

5054
{{< feature-state for_k8s_version="v1.26" state="beta" >}}
@@ -59,16 +63,6 @@ More information about this problem is available in the corresponding
5963
[GitHub issue](https://github.com/kubernetes/registry.k8s.io/issues/187).
6064
{{< /note >}}
6165

62-
### Container image architectures
63-
64-
65-
All container images are available for multiple architectures, whereas the
66-
container runtime should choose the correct one based on the underlying
67-
platform. It is also possible to pull a dedicated architecture by suffixing the
68-
container image name, for example
69-
`registry.k8s.io/kube-apiserver-arm64:v{{< skew currentPatchVersion >}}`. All
70-
those derivations are signed in the same way as the multi-architecture manifest lists.
71-
7266
The Kubernetes project publishes a list of signed Kubernetes container images
7367
in [SPDX 2.3](https://spdx.dev/specifications/) format.
7468
You can fetch that list using:
@@ -77,13 +71,12 @@ You can fetch that list using:
7771
curl -Ls "https://sbom.k8s.io/$(curl -Ls https://dl.k8s.io/release/stable.txt)/release" | grep "SPDXID: SPDXRef-Package-registry.k8s.io" | grep -v sha256 | cut -d- -f3- | sed 's/-/\//' | sed 's/-v1/:v1/'
7872
```
7973

80-
For Kubernetes v{{< skew currentVersion >}}, the only kind of code artifact that
81-
you can verify integrity for is a container image, using the experimental
82-
signing support.
83-
8474
To manually verify signed container images of Kubernetes core components, refer to
8575
[Verify Signed Container Images](/docs/tasks/administer-cluster/verify-signed-artifacts).
8676

77+
If you pull a container image for a specific architecture, the single-architecture image
78+
is signed in the same way as for the multi-architecture manifest lists.
79+
8780
## Binaries
8881

8982
{{< release-binaries >}}

0 commit comments

Comments
 (0)