Skip to content

Commit 2256b0d

Browse files
committed
Replaced "we"
1 parent 3801cf1 commit 2256b0d

File tree

1 file changed

+2
-2
lines changed

1 file changed

+2
-2
lines changed

modules/tutorials/pages/enabling_verification_of_image_signatures.adoc

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ The default settings might not be appropriate for your environment, please refer
2020

2121
== Creating a policy to verify image signatures
2222

23-
Now that the Policy Controller is installed, we can create a policy that verifies that all images provided by Stackable are signed by Stackable's CI pipeline (Github Actions):
23+
Now that the Policy Controller is installed, you can create a policy that verifies that all images provided by Stackable are signed by Stackable's CI pipeline (Github Actions):
2424

2525
[source,yaml]
2626
include::example$verify-signatures/stackable-image-policy.yaml[]
@@ -67,7 +67,7 @@ python3 -m http.server 8081
6767
+
6868
Now you can provide the host's IP address and port (8081 in the example) as the mirror URL. For how to do this exactly, we refer to the https://docs.sigstore.dev/policy-controller/overview/#configuring-trustroot-for-custom-tuf-root[Policy Controller's documentation].
6969
+
70-
NOTE: Since we're using Sigstore's TUF repository, you don't have to provide the `.spec.root` attribute in the `TrustRoot` resource, `.spec.mirror` is sufficient.
70+
NOTE: Since Sigstore's TUF repository is used, you don't have to provide the `.spec.root` attribute in the `TrustRoot` resource, `.spec.mirror` is sufficient.
7171

7272
2. Packing the files into an archive, serializing them and putting them directly into a the `TrustRoot` resource. This is explained in the https://docs.sigstore.dev/policy-controller/overview/#configuring-trustroot-for-custom-tuf-repository[Policy Controller's documentation].
7373

0 commit comments

Comments
 (0)