Skip to content
This repository has been archived by the owner on Nov 5, 2024. It is now read-only.

Commit

Permalink
Merge pull request #207 from Roming22/public-key
Browse files Browse the repository at this point in the history
Update proc_inspect-slsa-provenance.adoc
  • Loading branch information
Chr1st1anSears authored Oct 20, 2023
2 parents 3d54c9a + 0766ca7 commit d299679
Showing 1 changed file with 1 addition and 1 deletion.
Original file line number Diff line number Diff line change
Expand Up @@ -137,5 +137,5 @@ Example output:
== Additional resources
* Learn about the SLSA framework and xref:../concepts/slsa/con_slsa-conformity.adoc[how {ProductName} meets the requirements of SLSA Build Level 3].
* Red Hat's Enterprise Contract (EC) is a powerful tool that you can also use to verify your SLSA provenance; visit link:https://enterprisecontract.dev/posts/introducing-the-enterprise-contract/[this page] to learn how to use the EC CLI tool to verify your provenance.
* Red Hat's Enterprise Contract (EC) is a powerful tool that you can also use to verify your SLSA provenance; visit link:https://enterprisecontract.dev/posts/introducing-the-enterprise-contract/[this page] to learn how to use the EC CLI tool to verify your provenance. You will need the public key used by Tekton Chains, which is available as the *public-key* secret in the *openshift-pipelines* namespace and readable to all authenticated users.

0 comments on commit d299679

Please sign in to comment.