Dieser Inhalt ist in der von Ihnen ausgewählten Sprache nicht verfügbar.

Release Notes


Red Hat Trusted Artifact Signer 1.0

Release notes for Red Hat's Trusted Artifact Signer 1.0.2

Red Hat Trusted Documentation Team

Abstract

Welcome to Red Hat Trusted Artifact Signer's official release notes for version 1.0.2! The release notes describes new features, enhancements, known issues, bug fixes, and deprecation implemented for the Red Hat Trusted Artifact Signer 1.0.2 software release.
Red Hat is committed to replacing problematic language in our code, documentation, and web properties. We are beginning with these four terms: master, slave, blacklist, and whitelist. Because of the enormity of this endeavor, these changes will be implemented gradually over several upcoming releases. For more details, see our CTO Chris Wright's message

Chapter 1. Introduction

Red Hat’s Trusted Artifact Signer (RHTAS) service enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries, and Git commits. Trusted Artifact Signer provides a production ready deployment of the SecureSign community project.

The Trusted Artifact Signer software Release Notes documents new features and enhancements, bug fixes, and known issues for the latest version, 1.0.2. We add the newest items to the top in each chapter, as we build upon the official release notes over the lifecycle of the major, and minor releases.

The Red Hat Trusted Artifact Signer documentation is available here.

Chapter 2. New features and enhancements

A list of all major enhancements, and new features introduced in this release of Red Hat Trusted Artifact Signer (RHTAS).

The features and enhancements added by this release are:

Enterprise Contract supports inspecting multiple architecture types for container images

With this release, Enterprise Contract (EC) now supports artifact verification, and policy enforcement on multiple architecture types for container images. The ec validate image command can inspect individual container images for different system architectures from the image index.

Adding rule data by using a command line argument

With this release, you can inject additional rule data on the command line by using the --extra-rule-data argument to the ec validate image command. For example, you can use this to influence policies so that the behavior for a release pipeline can differ from the behavior in a continuous integration and continuous delivery (CICD) pipeline.

A new report format for Enterprise Contract when validating container images

With this release, the ec validate image command can generate a new report format. You can use the --output text argument with the ec validate image command to produce a new user-friendly output format. This new report format provides details about the violations and warnings only. To view additional details use the JSON or YAML formats.

Support for OpenShift 4.16 and 4.17

With this release, we added support for the Trusted Artifact Signer service running on OpenShift Container Platform 4.16 and 4.17. Customers can install the RHTAS operator from OperatorHub on currently supported releases of OpenShift Container Platform.

Auto-closing for the confirmation page

With this release, we updated the gitsign binary to version 0.10.2. This version enables the auto-closing feature for the Sigstore confirmation page. After a successful authentication, the confirmation page will close in 10 seconds.

Install Trusted Artifact Signer to different namespaces on the same OpenShift cluster

With this release, you can now install the RHTAS service in different namespaces on the same OpenShift cluster.

A new release channel for upgrades

With this release, we added the stable-v1.0 channel that users can subscribe to. Subscribing to this channel gives users automatic upgrades only to the 1.0.x release line. To receive all the latest updates for upcoming minor releases, then subscribe to the stable channel. Also, with this release, we removed the alpha channel.

Monitoring for Trillian

With this release, you can enable monitoring for the Trillian server. To enable monitoring, add the monitoring stanza underneath the trillian stanza, and set enabled to true for the Securesign instance. For example:

...
  trillian:
    monitoring:
      enabled: true
...
Copy to Clipboard Toggle word wrap

With monitoring enabled, you can view and query the collected metrics from the OpenShift web console by expanding Observe on the navigational menu, and clicking Metrics.

Monitoring for Certificate Transparency logs

With this release, you can enable monitoring for the Certificate Transparency logs (CTlog) server. To enable monitoring, add the monitoring stanza underneath the ctlog stanza, and set enabled to true for the Securesign instance. For example:

...
  ctlog:
    monitoring:
      enabled: true
...
Copy to Clipboard Toggle word wrap

With monitoring enabled, you can view and query the collected metrics from the OpenShift web console by expanding Observe on the navigational menu, and clicking Metrics.

Improvements to the segment backup jobs

With this release, the Trusted Artifact Signer service has several improvements to the segment backup jobs. Because of existing vulnerabilities, the segment backup jobs have been rewritten in Python, and verifies if cluster-level metrics are allowable.

Chapter 3. Bug fixes

In this release of Red Hat Trusted Artifact Signer (RHTAS), we fixed the following bugs. In addition to these fixes, we list the descriptions of previously known issues found in earlier versions that we fixed.

An update to operator logic when detecting the OpenShift environment

During OpenShift cluster reboots, the RHTAS operator logic to detect the OpenShift environment was unreliable. The operator would mistakenly believe it was running in a non-OpenShift environment, and configured the system improperly. This was causing the APIs to be unavailable, and the Trillian database pods failing to start. This was also causing violations of the OpenShift Security Context Constraints (SCC).

With this release, we removed the dynamic detection of the OpenShift environment in the RHTAS operator. The target environment must be explicitly configured during the installation of the RHTAS operator by using the new OPENSHIFT environment variable. Doing this ensure that the RHTAS operator consistently applies the correct configuration for the deployment. Deploying the RHTAS operator by using the Operator Lifecycle Manager (OLM) has the OPENSHIFT environment variable set to true by default. As a result, the RHTAS operator consistently configures the system properly preventing service startup issues on reboot, and no longer violates the OpenShift SCC.

Enterprise Contract is faster and more efficient

Before this update, Enterprise Contract (EC) would download the policy and policy data from a configured source for validating each component. This caused the ec validate image command to run longer by downloading more data than it needed. For this release, when the ec validate image command detects the same policy source to validate different container images, it no longer downloads the policy data more than once.

The operator terminates on a nil pointer exception

When the Certificate Transparency logs' (CTlog) password for fulcio.spec.privateKeyPasswordRef is set incorrectly, the RHTAS operator terminates with no meaningful error messages. With this release, we added more robust error handling for this scenario, and more meaningful operator error messages when the CTlog is not set correctly.

Wrong common name for Fulcio certificates

The sigstore.issuer field was hard-coded to use the common name value specified in spec.certificate.commonName for Fulcio certificates. With this release, we added logic to set the sigstore.issuer field properly. If spec.certificate.commonName is empty, then we set sigstore.issuer based on the spec.externalAccess.host value. If spec.certificate.commonName and spec.externalAccess.host is empty, then we set sigstore.issuer to the OpenShift cluster’s domain name. As a result, we have a properly set common name for Fulcio certificates.

Removed kube-rbac-proxy from the operator

With the deprecating of the --tls-cert-file and --tls-private-key-file flags for kube-rbac-proxy, we removed the role-based access controls (RBAC) HTTP proxy resource when installing the RHTAS operator. Because of this, you need to have a predefined certificate and private key in the namespace of the operator. The default operator namespace is openshift-operators. As a result of this, we no longer use this RBAC HTTP proxy resource to protect the /metrics API endpoint for the operator controller.

Enabled the Rekor search UI by default

With this release, the user is no longer required to manually install the Rekor search user interface (UI). We enable the Rekor search UI by default.

The CreateTree task continues running after a failed installation

When deleting and then reinstalling the RHTAS service, the CreateTree task could continuously run in some scenarios, therefore preventing later installations from succeeding. With this release, if the RHTAS installation process detects the CreateTree task running, then it cleans up the task without any user intervention. See GitHub issue #230 for more details.

Replaced the upstream version of kube-rbac-proxy with the supported version

Red Hat Trusted Artifact Signer 1.0 shipped with the upstream version of the Role-base access controls (RBAC) proxy container, gcr.io/kubebuilder/kube-rbac-proxy. With this release, we replaced the upstream version with the official, supported Red Hat version, registry.redhat.io/openshift4/ose-kube-rbac-proxy.

Trusted Artifact Signer operator can crash when not enough memory is available

During the installation of the RHTAS operator, if there was not enough memory allocated this would cause a CrashLoopBackoff status. This crashing prevented the RHTAS operator from installing properly.

With this release, we increased the memory allocation for the RHTAS operator, allowing it to install successfully.

The Enterprise Contract binary download was missing

When a user tried to download the Enterprise Contract (EC) binary, they received a 404 page. Because the path to the EC binary for Windows was set incorrectly, this generated the 404 page. With this release, the path to the EC binary for Windows is set correctly, and no longer gives a 404 page.

The cosign Windows executable was missing the .exe extension

The cosign binary for Windows was missing the .exe file name extension when downloading the binary. Missing the .exe file name extension would not allow the cosign binary to run on Windows. With this release, the cosign binary has the .exe file name extension, and runs as expected on Windows.

Upgrading the Technical Preview version of the Trusted Artifact Signer operator fails

Previously, the Technical Preview version (0.0.2) of the RHTAS operator was automatically upgraded to the generally available version (1.0.0), causing an upgrade failure. Upgrading from the Technical Preview version no longer fails if the Securesign instance, and its custom resources (CR) already exist.

Cluster permissions for segment backup jobs

Previously, a misconfiguration of the role-based access controls (RBAC) for the segment backup service account responsible for gathering Rekor and Fulcio metrics had elevated privileges. When enabling the segment backup jobs, these elevated privileges could read cluster-wide secrets.

With this release of RHTAS, we fixed the misconfiguration by limiting the privileges for the segment backup service account. We now enable the gathering of these metrics by default.

Chapter 4. Known issues

Previous known issues that have been resolved:

A list of known issues found in this release of Red Hat Trusted Artifact Signer (RHTAS):

Rekor Search UI does not show records after upgrade

After upgrading the RHTAS operator to the latest version (1.0.1), the existing Rekor data is not found when searching by email address. The backfill-redis CronJob, which ensures that Rekor Search UI can query the transparency log only runs once per day, at midnight. To workaround this issue, you can trigger the backfill-redis job manually, instead of waiting until midnight.

To trigger the backfill-redis job from the command-line interface, run the following command:

oc create job --from=cronjob/backfill-redis backfill-redis -n trusted-artifact-signer
Copy to Clipboard Toggle word wrap

Doing this adds the missing data back to the Rekor Search UI.

Version number is reported incorrectly on OpenShift 4.13

The installation of the RHTAS operator on OpenShift Container Platform 4.13 incorrectly shows version 0.0.2, when version 1.0.1 is actually installed. Currently, there is no workaround to resolve this issue.

Chapter 5. Deprecated functionality

An overview of deprecated functionality in all supported releases up to this release of Red Hat Trusted Artifact Signer.

Deprecating the Helm deployment of the Red Hat Trusted Artifact Signer software stack

With this release, Red Hat is deprecating the deployment of Red Hat’s Trusted Artifact Signer product by using a Helm chart. Deploying Trusted Artifact Signer with Helm is no longer supported.

Legal Notice

Copyright © 2025 Red Hat, Inc.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.
Red Hat logoGithubredditYoutubeTwitter

Lernen

Testen, kaufen und verkaufen

Communitys

Über Red Hat Dokumentation

Wir helfen Red Hat Benutzern, mit unseren Produkten und Diensten innovativ zu sein und ihre Ziele zu erreichen – mit Inhalten, denen sie vertrauen können. Entdecken Sie unsere neuesten Updates.

Mehr Inklusion in Open Source

Red Hat hat sich verpflichtet, problematische Sprache in unserem Code, unserer Dokumentation und unseren Web-Eigenschaften zu ersetzen. Weitere Einzelheiten finden Sie in Red Hat Blog.

Über Red Hat

Wir liefern gehärtete Lösungen, die es Unternehmen leichter machen, plattform- und umgebungsübergreifend zu arbeiten, vom zentralen Rechenzentrum bis zum Netzwerkrand.

Theme

© 2026 Red Hat
Nach oben