Skip to content
Working from home
Working from home


@opencontainers @buildpacks @knative @tektoncd @shipwright-io @sigstore @chainguard-dev @chainguard-images
Block or Report

Block or report imjasonh

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Add an optional note:
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Hi, I'm Jason H 👋


I work at ChainguardChainguard, securing software supply chains by default

Before that I was at Red HatRed Hat, and before that Google CloudGoogle Cloud, where I cofounded Google Cloud BuildGoogle Cloud Build and TektonTekton.

You can also find me on TwitterTwitter.

I contribute to ko and go-containerregistry, and a number of other things.

I build fun toys like and


My resume is a CRD you can install on your Kubernetes cluster:

kubectl apply -f

(You wouldn't install something off the internet without reading it first, would you?!)

Talks, etc.


  1. Public

    Container image registry that serves images built fresh when you ask for them

    Go 141 10

  2. ko-build/ko Public

    Build and deploy Go applications on Kubernetes

    Go 5k 275

  3. Go library and CLIs for working with container registries

    Go 2k 366

  4. 1
    * {
        font-size: 12pt;
        font-family: monospace;
        font-weight: normal;
        font-style: normal;

Contribution activity

September 2022

Created 2 repositories

Created a pull request in tektoncd/pipeline that received 21 comments

Change image refs: ->

These images are equivalent, and both redirect to exactly the same backend location, but we're trying to move away from the distroless "brand" in f…

+10 −10 21 comments
Opened 25 other pull requests in 15 repositories
chainguard-dev/registry-redirect 6 merged
docker/cli 1 open 2 merged
google/go-containerregistry 2 merged
chainguard-dev/terraform-provider-ko 2 merged
ko-build/ko 1 open 1 merged
chainguard-dev/melange 1 closed
chainguard-dev/wolfi-os 1 open
chainguard-images/.github 1 merged
chainguard-dev/apko 1 open
chainguard-dev/edu 1 merged
chainguard-images/ko 1 merged
GoogleContainerTools/skaffold 1 open
sigstore/policy-controller 1 merged
sigstore/cosign 1 merged
imjasonh/setup-ko 1 merged
Reviewed 65 pull requests in 32 repositories
ko-build/ko 15 pull requests
GoogleContainerTools/kaniko 5 pull requests
chainguard-dev/terraform-provider-ko 4 pull requests
google/go-containerregistry 3 pull requests
docker/cli 3 pull requests
chainguard-images/busybox 3 pull requests
chainguard-dev/registry-redirect 3 pull requests
kyverno/kyverno 2 pull requests
sigstore/cosign 2 pull requests
chainguard-dev/edu 2 pull requests
sigstore/gitsign 2 pull requests
chainguard-dev/wolfi-os 1 pull request
chainguard-images/python 1 pull request
chainguard-images/glibc-dynamic 1 pull request
chainguard-images/wolfi-base 1 pull request
chainguard-images/sdk 1 pull request
chainguard-images/jdk 1 pull request
chainguard-images/php 1 pull request
chainguard-images/ko 1 pull request
chainguard-images/gcc-musl 1 pull request
chainguard-images/go 1 pull request
chainguard-images/melange 1 pull request
chainguard-images/apko 1 pull request
chainguard-images/nginx 1 pull request
chainguard-images/git 1 pull request
7 repositories not shown

Created an issue in slsa-framework/slsa-github-generator that received 2 comments

question: allow provenance generation workflow to hash artifacts?

Sorry if this has already been discussed and rejected, but reading and based on my u…

Opened 4 other issues in 4 repositories
google/yamlfmt 1 open
chainguard-dev/terraform-provider-ko 1 open
chainguard-dev/apko 1 open
anchore/kubernetes-admission-controller 1 open

Joined the Chainguard Images organization

Chainguard Images

Minimal Container images from Chainguard

Seeing something unexpected? Take a look at the GitHub profile guide.