Skip to content

Commit

Permalink
docs: add ratify on alibabacloud and add rrsa auth provider into oras…
Browse files Browse the repository at this point in the history
… doc

Signed-off-by: dahu.kdh <[email protected]>
  • Loading branch information
DahuK committed Dec 20, 2024
1 parent f16e196 commit d67a3ab
Show file tree
Hide file tree
Showing 8 changed files with 720 additions and 0 deletions.
Binary file added docs/imgs/alibabacloud-policy-governance.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added docs/imgs/ratify-alibabacloud-marketplace.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
7 changes: 7 additions & 0 deletions docs/plugins/store/oras.md
Original file line number Diff line number Diff line change
Expand Up @@ -141,6 +141,7 @@ NOTE: ORAS will attempt to use anonymous access if the authentication provider f
1. [Kubernetes Secrets](#kubernetes-secrets)
1. [AWS IAM Roles for Service Accounts (IRSA)](#aws-iam-roles-for-service-accounts-irsa)
1. Azure Managed Identity
1. [Alibaba Cloud RAM Roles for Service Accounts (RRSA)](#alibaba-cloud-ram-roles-for-service-accounts-rrsa)

#### Docker Config

Expand Down Expand Up @@ -410,6 +411,12 @@ kubectl -n ratify get cm ratify-configuration -oyaml
...
```

#### Alibaba Cloud RAM Roles for Service Accounts (RRSA)

Ratify pulls artifacts from a private AlibabaCloud Container Registry (ACR) using an ACR authorization token. This token is accessed using the federated workload identity assigned to pods via [RAM Roles for Service Accounts](https://www.alibabacloud.com/help/en/ack/serverless-kubernetes/user-guide/use-rrsa-to-authorize-pods-to-access-different-cloud-services). The AlibabaCloud RRSA Auth provider uses the [Alibaba SDK V2.0 GO SDK](https://www.alibabacloud.com/help/en/sdk/developer-reference/v2-manage-go-access-credentials#ec8021b053aqe) to retrieve basic auth credentials based on a role assigned to a Kubernetes Service Account referenced by a pod specification. For an overview on how to enable and work with RAM Roles for Service Accounts, a.k.a. RRSA, please refer to [official document](https://www.alibabacloud.com/help/en/ack/serverless-kubernetes/user-guide/use-rrsa-to-authorize-pods-to-access-different-cloud-services#section-rmr-eeh-878).

Please refer to [quick start](../../quickstarts/ratify-on-alibabacloud.md#pulling-acr-private-image-signature-manifest-with-rrsa) to configure Ratify for pulling from ACR private repository using RRSA.

## Notational Conventions

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" are to be interpreted as described in [RFC 2119](http://tools.ietf.org/html/rfc2119).
Expand Down
353 changes: 353 additions & 0 deletions docs/quickstarts/ratify-on-alibabacloud.md

Large diffs are not rendered by default.

Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
7 changes: 7 additions & 0 deletions versioned_docs/version-1.3/plugins/store/oras.md
Original file line number Diff line number Diff line change
Expand Up @@ -141,6 +141,7 @@ NOTE: ORAS will attempt to use anonymous access if the authentication provider f
1. [Kubernetes Secrets](#kubernetes-secrets)
1. [AWS IAM Roles for Service Accounts (IRSA)](#aws-iam-roles-for-service-accounts-irsa)
1. Azure Managed Identity
1. [Alibaba Cloud RAM Roles for Service Accounts (RRSA)](#alibaba-cloud-ram-roles-for-service-accounts-rrsa)

#### Docker Config

Expand Down Expand Up @@ -410,6 +411,12 @@ kubectl -n ratify get cm ratify-configuration -oyaml
...
```

#### Alibaba Cloud RAM Roles for Service Accounts (RRSA)

Ratify pulls artifacts from a private AlibabaCloud Container Registry (ACR) using an ACR authorization token. This token is accessed using the federated workload identity assigned to pods via [RAM Roles for Service Accounts](https://www.alibabacloud.com/help/en/ack/serverless-kubernetes/user-guide/use-rrsa-to-authorize-pods-to-access-different-cloud-services). The AlibabaCloud RRSA Auth provider uses the [Alibaba SDK V2.0 GO SDK](https://www.alibabacloud.com/help/en/sdk/developer-reference/v2-manage-go-access-credentials#ec8021b053aqe) to retrieve basic auth credentials based on a role assigned to a Kubernetes Service Account referenced by a pod specification. For an overview on how to enable and work with RAM Roles for Service Accounts, a.k.a. RRSA, please refer to [official document](https://www.alibabacloud.com/help/en/ack/serverless-kubernetes/user-guide/use-rrsa-to-authorize-pods-to-access-different-cloud-services#section-rmr-eeh-878).

Please refer to [quick start](../../quickstarts/ratify-on-alibabacloud.md#pulling-acr-private-image-signature-manifest-with-rrsa) to configure Ratify for pulling from ACR private repository using RRSA.

## Notational Conventions

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and "OPTIONAL" are to be interpreted as described in [RFC 2119](http://tools.ietf.org/html/rfc2119).
Expand Down
353 changes: 353 additions & 0 deletions versioned_docs/version-1.3/quickstarts/ratify-on-alibabacloud.md

Large diffs are not rendered by default.

0 comments on commit d67a3ab

Please sign in to comment.