Skip to content

Commit d25b256

Browse files
authored
Merge pull request #61 from github/phillmv-patch-1
Tweak `githubTrustDomain` documentation comment.
2 parents 7a50a47 + c8455e0 commit d25b256

File tree

3 files changed

+7
-6
lines changed

3 files changed

+7
-6
lines changed

Diff for: README.md

+1-1
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ Next, install the GitHub `TrustRoot` and our default `ClusterImagePolicy`:
4040
helm install trust-policies --atomic \
4141
--namespace artifact-attestations \
4242
oci://ghcr.io/github/artifact-attestations-helm-charts/trust-policies \
43-
--version v0.6.0 \
43+
--version v0.6.1 \
4444
--set policy.enabled=true \
4545
--set policy.organization=MY-ORGANIZATION
4646
```

Diff for: charts/trust-policies/Chart.yaml

+2-2
Original file line numberDiff line numberDiff line change
@@ -8,8 +8,8 @@ sources:
88
type: application
99

1010
name: trust-policies
11-
version: "v0.6.0"
12-
appVersion: "v0.6.0"
11+
version: "v0.6.1"
12+
appVersion: "v0.6.1"
1313

1414
maintainers:
1515
- name: codysoyland

Diff for: charts/trust-policies/values.yaml

+4-3
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,11 @@ policy:
2525
trust:
2626
# trust the GitHub signing authority
2727
github: true
28-
# githubTrustDomain may be set to the trust domain applicable for some GitHub Enterprise Cloud accounts.
29-
# If applicable, this may be set to the output of the following command:
28+
# githubTrustDomain is determined by where your GitHub enterprise account is hosted.
29+
# If your enterprise is on GitHub.com, leave this field blank.
30+
# If your enterprise is on GHE.com, then githubTrustDomain must be set to the output of the following command:
3031
# $ gh api meta --jq .domains.artifact_attestations.trust_domain
31-
# See documentation for more details: https://docs.github.com/en/actions/security-for-github-actions/using-artifact-attestations/enforcing-artifact-attestations-with-a-kubernetes-admission-controller
32+
# For more information, see: https://docs.github.com/en/actions/security-for-github-actions/using-artifact-attestations/enforcing-artifact-attestations-with-a-kubernetes-admission-controller
3233
githubTrustDomain: ''
3334
# trust the Sigstore public-good signing authority
3435
sigstorePublic: true

0 commit comments

Comments
 (0)