Now that the docker:// transport transparently uses the registry extension for signature (in OpenShift), I think it's better to first try to push the signature on the registry before using the sigstore in the default.yaml file.
This came out on fedora, we have a default-docker for /var/lib/atomic/sigstore shipped in the os, but when pushing to the openshift registry which supports signatures storage remotely, I expected to use that instead of the sigstore in the default-docker sigstore.
@mtrmac wdyt? I think we have to first 1) check if the registry support signatures storage, 2) push signatures if it supports them 3) fall back to sigstore if it's not an openshift registry. Right now it's very misleading to have signatures on the host when I expected signatures to be pushed to the registry.
# This is the default signature write location for docker registries.
default-docker:
sigstore: file:///var/lib/atomic/sigstore
# sigstore-staging: file:///var/lib/atomic/sigstore
I have to comment the above to push signature to the openshift integrated registry using the docker:// transport.
Now that the
docker://transport transparently uses the registry extension for signature (in OpenShift), I think it's better to first try to push the signature on the registry before using the sigstore in thedefault.yamlfile.This came out on fedora, we have a
default-dockerfor/var/lib/atomic/sigstoreshipped in the os, but when pushing to the openshift registry which supports signatures storage remotely, I expected to use that instead of the sigstore in thedefault-dockersigstore.@mtrmac wdyt? I think we have to first 1) check if the registry support signatures storage, 2) push signatures if it supports them 3) fall back to sigstore if it's not an openshift registry. Right now it's very misleading to have signatures on the host when I expected signatures to be pushed to the registry.
I have to comment the above to push signature to the openshift integrated registry using the
docker://transport.