@@ -28,15 +28,11 @@ Find your preferred operating system below.
28
28
- [ Install kubectl on macOS] ( /docs/tasks/tools/install-kubectl-macos )
29
29
- [ Install kubectl on Windows] ( /docs/tasks/tools/install-kubectl-windows )
30
30
31
- ## Container Images
31
+ ## Container images
32
32
33
33
All Kubernetes container images are deployed to the
34
34
` registry.k8s.io ` container image registry.
35
35
36
- For Kubernetes {{< param "version" >}}, the following
37
- container images are signed using [ sigstore] ( https://sigstore.dev )
38
- signatures:
39
-
40
36
| Container Image | Supported Architectures |
41
37
| ------------------------------------------------------------------------- | --------------------------------- |
42
38
| registry.k8s.io/kube-apiserver: v {{< skew currentPatchVersion >}} | amd64, arm, arm64, ppc64le, s390x |
@@ -45,6 +41,14 @@ signatures:
45
41
| registry.k8s.io/kube-scheduler: v {{< skew currentPatchVersion >}} | amd64, arm, arm64, ppc64le, s390x |
46
42
| registry.k8s.io/conformance: v {{< skew currentPatchVersion >}} | amd64, arm, arm64, ppc64le, s390x |
47
43
44
+ ### Container image architectures
45
+
46
+ All container images are available for multiple architectures, whereas the
47
+ container runtime should choose the correct one based on the underlying
48
+ platform. It is also possible to pull a dedicated architecture by suffixing the
49
+ container image name, for example
50
+ ` registry.k8s.io/kube-apiserver-arm64:v{{< skew currentPatchVersion >}} ` .
51
+
48
52
### Container image signatures
49
53
50
54
{{< feature-state for_k8s_version="v1.26" state="beta" >}}
@@ -59,16 +63,6 @@ More information about this problem is available in the corresponding
59
63
[ GitHub issue] ( https://github.com/kubernetes/registry.k8s.io/issues/187 ) .
60
64
{{< /note >}}
61
65
62
- ### Container image architectures
63
-
64
-
65
- All container images are available for multiple architectures, whereas the
66
- container runtime should choose the correct one based on the underlying
67
- platform. It is also possible to pull a dedicated architecture by suffixing the
68
- container image name, for example
69
- ` registry.k8s.io/kube-apiserver-arm64:v{{< skew currentPatchVersion >}} ` . All
70
- those derivations are signed in the same way as the multi-architecture manifest lists.
71
-
72
66
The Kubernetes project publishes a list of signed Kubernetes container images
73
67
in [ SPDX 2.3] ( https://spdx.dev/specifications/ ) format.
74
68
You can fetch that list using:
@@ -77,13 +71,12 @@ You can fetch that list using:
77
71
curl -Ls " https://sbom.k8s.io/$( curl -Ls https://dl.k8s.io/release/stable.txt) /release" | grep " SPDXID: SPDXRef-Package-registry.k8s.io" | grep -v sha256 | cut -d- -f3- | sed ' s/-/\//' | sed ' s/-v1/:v1/'
78
72
```
79
73
80
- For Kubernetes v{{< skew currentVersion >}}, the only kind of code artifact that
81
- you can verify integrity for is a container image, using the experimental
82
- signing support.
83
-
84
74
To manually verify signed container images of Kubernetes core components, refer to
85
75
[ Verify Signed Container Images] ( /docs/tasks/administer-cluster/verify-signed-artifacts ) .
86
76
77
+ If you pull a container image for a specific architecture, the single-architecture image
78
+ is signed in the same way as for the multi-architecture manifest lists.
79
+
87
80
## Binaries
88
81
89
82
{{< release-binaries >}}
0 commit comments