The verifying sigstore bundles section of the documentation is specific to public GitHub repositories where the official Sigstore instance is used.
If the attestation is produced from a private GitHub repo (and for a private artifact), the GitHub Sigstore instance is used and there are no transparency logs as stated here.
For kyverno to be able to verify such attestations, its helm values.yaml must have this override:
features:
tuf:
enabled: true
mirror: https://tuf-repo.github.com
rootRaw: <set to https://github.com/github/artifact-attestations-helm-charts/blob/main/charts/trust-policies/templates/trustroot-github.yaml#L8-L9>
In the ClusterPolicy, the attestation keyless attestor entry's rekor value must be updated to point to the GitHub Signstore Fulcio instance and set to ignore the transparency logs:
Description
The verifying sigstore bundles section of the documentation is specific to public GitHub repositories where the official Sigstore instance is used.
If the attestation is produced from a private GitHub repo (and for a private artifact), the GitHub Sigstore instance is used and there are no transparency logs as stated here.
For kyverno to be able to verify such attestations, its helm values.yaml must have this override:
In the ClusterPolicy, the attestation keyless attestor entry's rekor value must be updated to point to the GitHub Signstore Fulcio instance and set to ignore the transparency logs:
Slack discussion
https://kubernetes.slack.com/archives/CLGR9BJU9/p1720769654925739