You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
fix: update container base images and Kyverno v3 policy configuration
This commit addresses GLIBC compatibility issues and corrects Kyverno
Cosign v3 policy configuration for proper image signature verification.
Container Updates:
- Upgrade gkm-agent and gkm-operator base images from Ubuntu 22.04 to
24.04 to resolve GLIBC 2.38 compatibility issues
- Update ROCm repository URL from 'jammy' to 'noble' for Ubuntu 24.04
- Fixes gkm-agent CrashLoopBackOff caused by GLIBC version mismatch
Kyverno Policy Updates:
- Fix Cosign v3 policy issuer: use GitHub Actions token issuer
(https://token.actions.githubusercontent.com) instead of OAuth issuer
- Replace specific subject email with regex pattern to match any GitHub
workflow (subjectRegExp: "https://github.com/.*")
- Aligns with actual signatures generated by GitHub Actions workflows
Documentation Updates:
- Add new Documentation section to main README with links to config docs
- Document gkm.io/signature-format label usage (cosign-v2 and cosign-v3)
- Add example showing how to use signature format labels
- Update Kyverno v3 policy documentation with correct issuer/subject
- Add links to Kyverno and webhook configuration READMEs
Example Updates:
- Update example files to use correct signature format labels
- Ensure consistency across namespace and cluster examples
These changes enable successful verification of Cosign v3 bundle format
signatures and resolve runtime issues in KIND deployments.
Signed-off-by: Maryam Tahhan <mtahhan@redhat.com>
GKM supports image signature verification using Kyverno for namespace-scoped `GKMCache` resources. Use the `gkm.io/signature-format` label to specify the signature format:
400
+
401
+
- **`gkm.io/signature-format: cosign-v2`** - For images signed with Cosign v2 (legacy `.sig` tag format)
402
+
- **`gkm.io/signature-format: cosign-v3`** - For images signed with Cosign v3 (OCI 1.1 bundle format)
403
+
404
+
Example:
405
+
406
+
```yaml
407
+
apiVersion: gkm.io/v1alpha1
408
+
kind: GKMCache
409
+
metadata:
410
+
name: my-cache
411
+
namespace: my-namespace
412
+
labels:
413
+
gkm.io/signature-format: cosign-v3 # Use cosign-v3 for bundle format
414
+
spec:
415
+
image: quay.io/example/my-image:tag
416
+
```
417
+
418
+
For detailed information about image verification, see:
**Note:** `ClusterGKMCache` resources have built-in signature verification and automatically detect both Cosign v2 and v3 formats without requiring labels.
423
+
390
424
## Contributing
391
425
392
426
// TODO(user): Add detailed information on how you would like others to
0 commit comments