Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -23,7 +23,7 @@ To set up an admission controller for enforcing GitHub artifact attestations, yo

### Deploy the Sigstore Policy Controller

We have packaged the Sigstore Policy Controller as a [GitHub distributed Helm chart](https://github.com/github/artifact-attestations-helm-charts). Before you begin, ensure you have the following prerequisites:
The Sigstore Policy Controller has been packaged and made available via a [Helm chart](https://github.com/sigstore/helm-charts). Before you begin, ensure you have the following prerequisites:

* A Kubernetes cluster with version 1.27 or later
* [Helm](https://helm.sh/docs/intro/install/) 3.0 or later
Expand All @@ -34,8 +34,8 @@ First, install the Helm chart that deploys the Sigstore Policy Controller:
```bash copy
helm upgrade policy-controller --install --atomic \
--create-namespace --namespace artifact-attestations \
oci://ghcr.io/github/artifact-attestations-helm-charts/policy-controller \
--version v0.12.0-github12
oci://ghcr.io/sigstore/helm-charts/policy-controller \
--version 0.10.5
```

This installs the Policy Controller into the `artifact-attestations` namespace. At this point, no policies have been configured, and it will not enforce any attestations.
Expand All @@ -48,7 +48,7 @@ Once the policy controller has been deployed, you need to add the GitHub `TrustR
helm upgrade trust-policies --install --atomic \
--namespace artifact-attestations \
oci://ghcr.io/github/artifact-attestations-helm-charts/trust-policies \
--version v0.6.2 \
--version v0.7.0 \
--set policy.enabled=true \
--set policy.organization=MY-ORGANIZATION
```
Expand Down Expand Up @@ -86,7 +86,7 @@ For example, to enforce attestations for images that match the pattern `ghcr.io/
helm upgrade trust-policies --install --atomic \
--namespace artifact-attestations \
oci://ghcr.io/github/artifact-attestations-helm-charts/trust-policies \
--version v0.6.2 \
--version v0.7.0 \
--set policy.enabled=true \
--set policy.organization=MY-ORGANIZATION \
--set-json 'policy.exemptImages=["index.docker.io/library/busybox**"]' \
Expand Down Expand Up @@ -119,13 +119,13 @@ To see the full set of options you may configure with the Helm chart, you can ru
For policy controller options:

```bash copy
helm show values oci://ghcr.io/github/artifact-attestations-helm-charts/policy-controller --version v0.12.0-github12
helm show values oci://ghcr.io/sigstore/helm-charts/policy-controller --version 0.10.5
```

For trust policy options:

```bash copy
helm show values oci://ghcr.io/github/artifact-attestations-helm-charts/trust-policies --version v0.6.2
helm show values oci://ghcr.io/github/artifact-attestations-helm-charts/trust-policies --version v0.7.0
```

For more information on the Sigstore Policy Controller, see the [Sigstore Policy Controller documentation](https://docs.sigstore.dev/policy-controller/overview/).
4 changes: 2 additions & 2 deletions src/search/components/input/AskAIResults.tsx
Original file line number Diff line number Diff line change
Expand Up @@ -417,7 +417,7 @@ export function AskAIResults({
className={'btn-octicon'}
aria-label={t('ai.thumbs_up')}
sx={{
border: 'none',
border: feedbackSelected === 'up' ? '1px solid var(--color-btn-text)' : 'none',
backgroundColor: feedbackSelected === 'up' ? '' : 'unset',
boxShadow: 'unset',
color: feedbackSelected === 'up' ? 'var(--fgColor-accent) !important;' : '',
Expand All @@ -439,7 +439,7 @@ export function AskAIResults({
className={'btn-octicon'}
aria-label={t('ai.thumbs_down')}
sx={{
border: 'none',
border: feedbackSelected === 'down' ? '1px solid var(--color-btn-text)' : 'none',
backgroundColor: feedbackSelected === 'down' ? '' : 'unset',
boxShadow: 'unset',
color: feedbackSelected === 'down' ? 'var(--fgColor-accent) !important;' : '',
Expand Down
Loading