diff --git a/docs/tutorials/getting-started-tutorial.md b/docs/tutorials/getting-started-tutorial.md index 9a1f4f13a9..63d10d6cd4 100644 --- a/docs/tutorials/getting-started-tutorial.md +++ b/docs/tutorials/getting-started-tutorial.md @@ -17,8 +17,6 @@ This tutorial will guide you through: We'll be creating a `TaskRun`, signing it, and storing the signature and the payload as annotations on the `TaskRun` itself. So, no additional authentication should be required! -![getting-started-setup](./images/getting_started.png) - You can opt to try the tutorial with either of the following key types: * [x509 (Default)](#x509) @@ -70,3 +68,8 @@ Verified OK ``` Now we have a verifiable record of the `TaskRun`! + +## What you just created +This diagram shows what you just deployed: + +![getting-started-setup](./images/getting_started.png) \ No newline at end of file diff --git a/docs/tutorials/signed-provenance-tutorial.md b/docs/tutorials/signed-provenance-tutorial.md index f74acab635..79f2da342a 100644 --- a/docs/tutorials/signed-provenance-tutorial.md +++ b/docs/tutorials/signed-provenance-tutorial.md @@ -18,8 +18,6 @@ This tutorial will guide you through: * Building an image with kaniko in a Tekton TaskRun * Verifying the signed image and the signed provenance -![signed-provenance-setup](./images/signed_provenance.png) - ## Prerequisites A Kubernetes cluster with the following installed: @@ -144,3 +142,8 @@ rekor-cli get --uuid [UUID] --format json | jq -r .Attestation | base64 --decode ``` Congratulations! You have officially built an image, signed it, and generated signed provenance for it with Tekton Chains 🎉 + +## What you just created +This diagram shows what you just deployed: + +![signed-provenance-setup](./images/signed_provenance.png)