You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
// +kubebuilder:validation:XValidation:rule="size(self.split('/')[0].split('.')) == 1 ? self.split('/')[0].split('.')[0].split(':')[0] == 'localhost' : true",message="invalid image scope format, scope must contain a fully qualified domain name or 'localhost'"
@@ -60,8 +60,8 @@ type ImagePolicySpec struct {
60
60
// +kubebuilder:validation:MaxLength=512
61
61
typeImageScopestring
62
62
63
-
// Policy defines the verification policy for the items in the scopes list.
64
-
typePolicystruct {
63
+
// ImageSigstoreVerificationPolicy defines the verification policy for the items in the scopes list.
64
+
typeImageSigstoreVerificationPolicystruct {
65
65
// rootOfTrust is a required field that defines the root of trust for verifying image signatures during retrieval.
66
66
// This allows image consumers to specify policyType and corresponding configuration of the policy, matching how the policy was generated.
67
67
// +required
@@ -89,18 +89,18 @@ type PolicyRootOfTrust struct {
89
89
// publicKey defines the root of trust configuration based on a sigstore public key. Optionally include a Rekor public key for Rekor verification.
90
90
// publicKey is required when policyType is PublicKey, and forbidden otherwise.
// pki defines the root of trust configuration based on Bring Your Own Public Key Infrastructure (BYOPKI) Root CA(s) and corresponding intermediate certificates.
100
100
// pki is required when policyType is PKI, and forbidden otherwise.
// fulcioCAData is a required field contains inline base64-encoded data for the PEM format fulcio CA.
138
138
// fulcioCAData must be at most 8192 characters.
139
139
// +required
@@ -172,8 +172,8 @@ type PolicyFulcioSubject struct {
172
172
SignedEmailstring`json:"signedEmail"`
173
173
}
174
174
175
-
// PKI defines the root of trust based on Root CA(s) and corresponding intermediate certificates.
176
-
typePKIstruct {
175
+
// ImagePolicyPKIRootOfTrust defines the root of trust based on Root CA(s) and corresponding intermediate certificates.
176
+
typeImagePolicyPKIRootOfTruststruct {
177
177
// caRootsData contains base64-encoded data of a certificate bundle PEM file, which contains one or more CA roots in the PEM format. The total length of the data must not exceed 8192 characters.
// +kubebuilder:validation:XValidation:rule="size(self.split('/')[0].split('.')) == 1 ? self.split('/')[0].split('.')[0].split(':')[0] == 'localhost' : true",message="invalid image scope format, scope must contain a fully qualified domain name or 'localhost'"
@@ -59,8 +59,8 @@ type ImagePolicySpec struct {
59
59
// +kubebuilder:validation:MaxLength=512
60
60
typeImageScopestring
61
61
62
-
// Policy defines the verification policy for the items in the scopes list.
63
-
typePolicystruct {
62
+
// ImageSigstoreVerificationPolicy defines the verification policy for the items in the scopes list.
63
+
typeImageSigstoreVerificationPolicystruct {
64
64
// rootOfTrust specifies the root of trust for the policy.
65
65
// +required
66
66
RootOfTrustPolicyRootOfTrust`json:"rootOfTrust"`
@@ -84,16 +84,16 @@ type PolicyRootOfTrust struct {
84
84
PolicyTypePolicyType`json:"policyType"`
85
85
// publicKey defines the root of trust based on a sigstore public key.
// fulcioCAData contains inline base64-encoded data for the PEM format fulcio CA.
126
126
// fulcioCAData must be at most 8192 characters.
127
127
// +required
@@ -151,8 +151,8 @@ type PolicyFulcioSubject struct {
151
151
SignedEmailstring`json:"signedEmail"`
152
152
}
153
153
154
-
// PKI defines the root of trust based on Root CA(s) and corresponding intermediate certificates.
155
-
typePKIstruct {
154
+
// ImagePolicyPKIRootOfTrust defines the root of trust based on Root CA(s) and corresponding intermediate certificates.
155
+
typeImagePolicyPKIRootOfTruststruct {
156
156
// caRootsData contains base64-encoded data of a certificate bundle PEM file, which contains one or more CA roots in the PEM format. The total length of the data must not exceed 8192 characters.
0 commit comments