Skip to content

Instantly share code, notes, and snippets.

@mattmoor
Created September 15, 2021 17:45
Show Gist options
  • Save mattmoor/6d0345d99575b23271b6cdb55f9458a5 to your computer and use it in GitHub Desktop.
Save mattmoor/6d0345d99575b23271b6cdb55f9458a5 to your computer and use it in GitHub Desktop.
Tekton task to sign with ambient creds
apiVersion: tekton.dev/v1beta1
kind: Task
metadata:
name: sign-with-ambient
spec:
params:
- name: digest
description: The digest to sign
steps:
# The Goal:
# - name: sign-result
# image: gcr.io/projectsigstore/cosign
# args: [sign, -f, -upload, $(params.digest)]
- name: sign-result
# Produced with:
# docker-credential-magician mutate \
# gcr.io/projectsigstore/cosign/ci/cosign:3f83940d3f3d97075d606af1e0793051cc6fc19b \
# -t ghcr.io/mattmoor/cosign:magic
image: ghcr.io/mattmoor/cosign:magic
env:
# Enable keyless signing using the identity token for OIDC
- name: COSIGN_EXPERIMENTAL
value: "1"
args: [sign, -f, -upload, $(params.digest)]
---
apiVersion: v1
kind: ServiceAccount
metadata:
name: kaniko
annotations:
# Allow the workloads run as kaniko to impersonate this robot, created with:
# gcloud iam service-accounts create kaniko-workload
# gcloud iam service-accounts add-iam-policy-binding --role roles/iam.workloadIdentityUser --member "serviceAccount:mattmoor-credit.svc.id.goog[default/kaniko]" kaniko-workload@mattmoor-credit.iam.gserviceaccount.com
# gcloud projects add-iam-policy-binding mattmoor-credit --member=serviceAccount:kaniko-workload@mattmoor-credit.iam.gserviceaccount.com --role=roles/storage.admin
iam.gke.io/gcp-service-account: kaniko-workload@mattmoor-credit.iam.gserviceaccount.com
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment