Skip to content

Commit 9bb00e7

Browse files
authored
Merge pull request #57665 from github/repo-sync
Repo sync
2 parents e095bff + c310656 commit 9bb00e7

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

content/actions/how-tos/secure-your-work/use-artifact-attestations/enforce-artifact-attestations.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -23,7 +23,7 @@ To set up an admission controller for enforcing GitHub artifact attestations, yo
2323

2424
### Deploy the Sigstore Policy Controller
2525

26-
We have packaged the Sigstore Policy Controller as a [GitHub distributed Helm chart](https://github.com/github/artifact-attestations-helm-charts). Before you begin, ensure you have the following prerequisites:
26+
The Sigstore Policy Controller has been packaged and made available via a [Helm chart](https://github.com/sigstore/helm-charts). Before you begin, ensure you have the following prerequisites:
2727

2828
* A Kubernetes cluster with version 1.27 or later
2929
* [Helm](https://helm.sh/docs/intro/install/) 3.0 or later
@@ -34,8 +34,8 @@ First, install the Helm chart that deploys the Sigstore Policy Controller:
3434
```bash copy
3535
helm upgrade policy-controller --install --atomic \
3636
--create-namespace --namespace artifact-attestations \
37-
oci://ghcr.io/github/artifact-attestations-helm-charts/policy-controller \
38-
--version v0.12.0-github12
37+
oci://ghcr.io/sigstore/helm-charts/policy-controller \
38+
--version 0.10.5
3939
```
4040

4141
This installs the Policy Controller into the `artifact-attestations` namespace. At this point, no policies have been configured, and it will not enforce any attestations.
@@ -48,7 +48,7 @@ Once the policy controller has been deployed, you need to add the GitHub `TrustR
4848
helm upgrade trust-policies --install --atomic \
4949
--namespace artifact-attestations \
5050
oci://ghcr.io/github/artifact-attestations-helm-charts/trust-policies \
51-
--version v0.6.2 \
51+
--version v0.7.0 \
5252
--set policy.enabled=true \
5353
--set policy.organization=MY-ORGANIZATION
5454
```
@@ -86,7 +86,7 @@ For example, to enforce attestations for images that match the pattern `ghcr.io/
8686
helm upgrade trust-policies --install --atomic \
8787
--namespace artifact-attestations \
8888
oci://ghcr.io/github/artifact-attestations-helm-charts/trust-policies \
89-
--version v0.6.2 \
89+
--version v0.7.0 \
9090
--set policy.enabled=true \
9191
--set policy.organization=MY-ORGANIZATION \
9292
--set-json 'policy.exemptImages=["index.docker.io/library/busybox**"]' \
@@ -119,13 +119,13 @@ To see the full set of options you may configure with the Helm chart, you can ru
119119
For policy controller options:
120120

121121
```bash copy
122-
helm show values oci://ghcr.io/github/artifact-attestations-helm-charts/policy-controller --version v0.12.0-github12
122+
helm show values oci://ghcr.io/sigstore/helm-charts/policy-controller --version 0.10.5
123123
```
124124

125125
For trust policy options:
126126

127127
```bash copy
128-
helm show values oci://ghcr.io/github/artifact-attestations-helm-charts/trust-policies --version v0.6.2
128+
helm show values oci://ghcr.io/github/artifact-attestations-helm-charts/trust-policies --version v0.7.0
129129
```
130130

131131
For more information on the Sigstore Policy Controller, see the [Sigstore Policy Controller documentation](https://docs.sigstore.dev/policy-controller/overview/).

0 commit comments

Comments
 (0)