tekton.dev group
VerificationPolicy defines the rules to verify Tekton resources. VerificationPolicy can config the mapping from resources to a list of public keys, so when verifying the resources we can use the corresponding public keys.
v1alpha1 versionobject requiredSpec holds the desired state of the VerificationPolicy.
[]object requiredThe Authority block defines the keys for validating signatures.
objectKey contains the public key to validate the resource.
stringData contains the inline public key.
stringHashAlgorithm always defaults to sha256 if the algorithm hasn't been explicitly set
stringKMS contains the KMS url of the public key Supported formats differ based on the KMS system used. One example of a KMS url could be: gcpkms://projects/[PROJECT]/locations/[LOCATION]>/keyRings/[KEYRING]/cryptoKeys/[KEY]/cryptoKeyVersions/[KEY_VERSION] For more examples please refer https://docs.sigstore.dev/cosign/kms_support. Note that the KMS is not supported yet.
objectSecretRef sets a reference to a secret with the key.
stringname is unique within a namespace to reference a secret resource.
stringnamespace defines the space within which the secret name must be unique.
string requiredName is the name for this authority.
stringMode controls whether a failing policy will fail the taskrun/pipelinerun, or only log the warnings enforce - fail the taskrun/pipelinerun if verification fails (default) warn - don't fail the taskrun/pipelinerun if verification fails but log warnings
[]object requiredResourcePattern defines the pattern of the resource source
string requiredPattern defines a resource pattern. Regex is created to filter resources based on Pattern
Example patterns:
GitHub resource: https://github.com/tektoncd/catalog.git, https://github.com/tektoncd/*
Bundle resource: gcr.io/tekton-releases/catalog/upstream/git-clone, gcr.io/tekton-releases/catalog/upstream/*
Hub resource: https://artifacthub.io/*,