Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add fulcio-grpc as knative service #463

Merged
merged 4 commits into from
Nov 8, 2022
Merged

Conversation

bobcallaway
Copy link
Member

Signed-off-by: Bob Callaway bcallaway@google.com

Summary

Release Note

Documentation

Signed-off-by: Bob Callaway <bcallaway@google.com>
Signed-off-by: Bob Callaway <bcallaway@google.com>
Signed-off-by: Bob Callaway <bcallaway@google.com>
Signed-off-by: Bob Callaway <bcallaway@google.com>
@bobcallaway bobcallaway marked this pull request as ready for review November 8, 2022 03:22
@bobcallaway
Copy link
Member Author

@vaikas I think once this is merged (assuming you're OK with it), we'll need to cut 0.4.13 release and then bump the references inline up to 0.4.13 and then cut another release or update the tag?

@vaikas
Copy link
Contributor

vaikas commented Nov 8, 2022

Thanks @bobcallaway I have no problem at all running parallel Fulcio, though shortly I'd like to still investigate the use the same port for both grpc/http :)

Something like this (that just doesn't rely on HTTP/2 for muxing):
https://github.com/chainguard-dev/go-grpc-kit

Copy link
Contributor

@vaikas vaikas left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks! What's the best way for us to test this?

@@ -20,7 +20,7 @@ spec:
# This doesn't actually use Kubernetes credentials, so don't mount them in.
automountServiceAccountToken: false
containers:
- image: gcr.io/projectsigstore/fulcio@sha256:61081295a8f75ed7537b5d1f8c7320e078dc00e4562c0bf605fbefa062c690de # v0.5.3
- image: gcr.io/projectsigstore/fulcio@sha256:27c6e4fe64a72a537c133452d9c8e0518944d1d69aeee5e7ef8a9fbe70b8b5d3 # v1.0.0
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thank you :)

@vaikas vaikas merged commit 7b3c867 into sigstore:main Nov 8, 2022
# This doesn't actually use Kubernetes credentials, so don't mount them in.
automountServiceAccountToken: false
containers:
- image: gcr.io/projectsigstore/fulcio@sha256:27c6e4fe64a72a537c133452d9c8e0518944d1d69aeee5e7ef8a9fbe70b8b5d3 # v1.0.0
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why not use gcr.io/projectsigstore/fulcio:v1.0.0@sha256:27c6e4fe64a72a537c133452d9c8e0518944d1d69aeee5e7ef8a9fbe70b8b5d3 and drop the comment

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants