Description
@hectorj2f I have one question. Generally, the policy controller looks for the digest to validate the image right?
In the documentation, there is an option to add additional details like a tag while signing
https://docs.sigstore.dev/cosign/other_types/#tag-signing.
https://github.com/sigstore/helm-charts/tree/main/charts/policy-controller#testing-the-webhook
So if we sign the image with additional details like a tag then we can deploy the image with tag details, right?
Why I am asking is I used to get the below error when I tried to deploy the image with tag where the policy controller only expects digest and throws an error like below
admission webhook "policy.sigstore.dev" denied the request: validation failed: invalid value: <IMAGE> must be an image digest: spec.template.spec.containers[0].image
Please let me know If my below three understandings are right and if there are only three possible scenarios. Let me know if any other scenario exists
- When we deploy an image with digest details validation is done as usual
- If we signed an image with tag details as well then we can deploy the image with a tag ( !!! I AM TRYING TO ACHIEVE THIS )
- We cannot deploy an unsigned image with tag details because we will get the above error right?
Today I tried deploying the changes to achieve point 2 but got the same error requesting the digest. Do I need to do any special configuration for that?