Skip to content

Commit

Permalink
updates
Browse files Browse the repository at this point in the history
  • Loading branch information
mtcolman authored and tekton-robot committed Dec 2, 2021
1 parent e57c40e commit c1e79d0
Show file tree
Hide file tree
Showing 2 changed files with 10 additions and 4 deletions.
7 changes: 5 additions & 2 deletions docs/tutorials/getting-started-tutorial.md
Original file line number Diff line number Diff line change
Expand Up @@ -17,8 +17,6 @@ This tutorial will guide you through:
We'll be creating a `TaskRun`, signing it, and storing the signature and the payload as annotations on the `TaskRun` itself.
So, no additional authentication should be required!

![getting-started-setup](./images/getting_started.png)

You can opt to try the tutorial with either of the following key types:

* [x509 (Default)](#x509)
Expand Down Expand Up @@ -70,3 +68,8 @@ Verified OK
```

Now we have a verifiable record of the `TaskRun`!

## What you just created
This diagram shows what you just deployed:

![getting-started-setup](./images/getting_started.png)
7 changes: 5 additions & 2 deletions docs/tutorials/signed-provenance-tutorial.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,8 +18,6 @@ This tutorial will guide you through:
* Building an image with kaniko in a Tekton TaskRun
* Verifying the signed image and the signed provenance

![signed-provenance-setup](./images/signed_provenance.png)

## Prerequisites

A Kubernetes cluster with the following installed:
Expand Down Expand Up @@ -144,3 +142,8 @@ rekor-cli get --uuid [UUID] --format json | jq -r .Attestation | base64 --decode
```

Congratulations! You have officially built an image, signed it, and generated signed provenance for it with Tekton Chains 🎉

## What you just created
This diagram shows what you just deployed:

![signed-provenance-setup](./images/signed_provenance.png)

0 comments on commit c1e79d0

Please sign in to comment.