Release Notes


Red Hat Trusted Artifact Signer 1.2

Release notes for Red Hat's Trusted Artifact Signer 1.2

Red Hat Trusted Documentation Team

Abstract

Welcome to Red Hat Trusted Artifact Signer's official release notes for version 1.2!
The release notes describes new features, enhancements, known issues, bug fixes, and deprecation implemented for the Red Hat Trusted Artifact Signer 1.2 software release.

Chapter 1. Introduction

Red Hat’s Trusted Artifact Signer (RHTAS) service enhances software supply chain security by simplifying cryptographic signing and verifying of software artifacts, such as container images, binaries, and Git commits. Trusted Artifact Signer provides a production ready deployment of the SecureSign community project.

The Trusted Artifact Signer software Release Notes documents new features and enhancements, bug fixes, and known issues for the latest version, 1.2. We add the newest items to the top in each chapter, as we build upon the official release notes over the lifecycle of the major, and minor releases.

What is new for this release?

  • Deploying RHTAS on Red Hat Enterprise Linux 9.4 or later by using Ansible is fully supported by Red Hat for production workloads, and is no longer a Technical Preview feature.
  • The ability to monitor, and manage the RHTAS containers with Cockpit.
  • Enterprise Contract (EC) improvements and new features.

Additional resources

  • The Red Hat Trusted Artifact Signer documentation is available here.
  • Enterprise Contract is now known as Conforma.

Chapter 2. New features and enhancements

A list of all major enhancements, and new features introduced in this release of Red Hat Trusted Artifact Signer (RHTAS).

The features and enhancements added by this release are:

Ability to add OIDC providers for Ansible deployments of RHTAS

With this release, you can configure OpenID Connect (OIDC) providers under the tas_single_node_fulcio.fulcio_config section of the RHTAS Ansible Playbook. Update the playbook by adding your OIDC provider URL to the oidc_issuers variable, save your changes, and then re-run the playbook. You can have many OIDC providers defined in the oidc_issuers variable.

Monitoring for RHTAS containers

With this release, you can monitor and manage the RHTAS containers with the Cockpit web interface. This gives users a web-based user interface to simplify container management, and improves maintainability.

Expose passphrase variables for RHTAS components

When the Ansible collection creates a passphrase, they are easily guessable, and therefore a security risk. With this release, we expose the passphrase variables for each RHTAS component. This allows users to configure the passphrase as they see fit in the RHTAS Ansible Playbook.

tas_single_node_fulcio:
  ca_passphrase: TODO
  ct_log_prefix: TODO
tas_single_node_rekor:
  ca_passphrase: TODO
tas_single_node_tsa:
  signer_passphrase: TODO
  ca_passphrase: TODO
tas_single_node_ctlog_ca_passphrase: TODO

Replace each TODO with your passphrase, and run the playbook.

Producing a warning or violation dynamically for policy checks

With this release of Enterprise Contract (EC), a single policy check can be either a warning or a violation based on logic defined in the policy check. You can select the warning or violation based on dynamic criteria, such as an effective date, or other runtime logic.

Improvements to the validation output

With this release, we added more details to the output of the ec validate image command for better auditing. The output shows the Git SHA or image digest when resolving a non-permanent reference, such as a tag or Git branch, if defined in the policy source for Enterprise Contract (EC). With this additional information you can see exactly which policies and policy data used during the validation.

Support for running Enterprise Contract commands without a timeout

With this release, you can specify the --timeout 0 on Enterprise Contract (EC) commands to override the default timeout of 5 minutes. This is helpful in Continuous Integration and Continuous Deployment (CI/CD) environments where they manage their own task timeouts.

Support for policy exceptions for specific components

In earlier versions of Enterprise Contract (EC), any policy exception was applied to all components being evaluated. With this release, you can specify which component a particular policy exception applies to. This gives you more fine-grained control when applying policy exceptions.

Chapter 3. Bug fixes

In this release of Red Hat Trusted Artifact Signer (RHTAS), we fixed the following bugs. In addition to these fixes, we list the descriptions of previously known issues found in earlier versions that we fixed.

Download size limitation for artifacts

We removed a download size limit on Open Container Initiative (OCI) fetches for artifacts larger than 10 MB. This limitation was causing artifacts to become truncated, leading to an error when accessing larger Software Bill of Materials (SBOM) documents.

Rekor unable to write attestations to storage

Rekor writes the attestation to the /tmp/ directory, and then tries to move the attestation to a persistent volume claim (PVC). The moving of the attestation file is really a "rename" operation within the code base. The "rename" operation only works for locations within the same mount point, but was failing when moving between mount points. With this release, we fixed this issue so Rekor can correctly write attestations to the PVC.

Fulcio service crash when configured with the Kubernetes OIDC issuer

A missing required certificate was causing the Fulcio service to crash with a fatal error when configured with the Kubernetes OpenID Connect (OIDC) issuer, for example, https://kubernetes.default.svc. This missing certificate was preventing the Fulcio service from running, and servicing signing requests. With this release, we fixed the issue by mounting the Kubernetes API server certificate to /var/run/fulcio/ca.crt, and the Fulcio service starts successfully when configuring the Kubernetes OIDC issuer.

Two Rekor log entries from one signature

When configuring Rekor and Certificate Transparency log with the same tree identifier in Trillian this causes two Rekor log entries for one signature. To fix this issue, configure Rekor and Certificate Transparency log with unique tree identifier.

Health probe for Trillian not working properly

A wrongly-formatted container command was not sending health probes to the trillian-mysql pod. This was generating error messages with the "unhealthy" or "improper" tags, even though the pod was healthy. With this release, we fixed the format of the container command, and the health probe reports the correct status.

Deploying RHTAS on Red Hat Enterprise Linux was creating anonymous volumes

The Rekor manifests did not have defined volumes. This created anonymous volumes with random names, making them hard to know who they belonged to. With this release, we fixed the Rekor manifests by adding proper volume mounting. We name the volumes as follows: redis-backfill-storage and rekor-redis-storage.

Chapter 4. Known issues

A list of unresolved known issues found in this release, and earlier releases of RHTAS:

Cosign fails verification of signed timestamps after rotating the TSA certification chain

The current version of cosign expects only one single Timestamp Authority (TSA) certificate chain. When rotating the TSA certificate chain, you give the whole TSA certificate chain to The Update Framework (TUF) as an individual target. During the rotation process, setting the new TSA certificate chain as the new TUF target, and expiring the old TSA certificate chain gives the following error message.

main.go:74: error during command execution: unable to load TSA certificates: TSA certificate chain must contain exactly one leaf certificate

Currently, there is no workaround for this issue.

For information about rotating the TSA signer key and certificate chain see our procedure for Red Hat OpenShift Container Platform, or Red Hat Enterprise Linux.

The ownerReferences are lost when restoring Trusted Artifact Signer to a different OpenShift cluster

When restoring the RHTAS data to a new Red Hat OpenShift cluster, the ownerReferences for components are lost. This happens because the Securesign UUID changes when restoring on a new cluster, and the ownerReferences for each component gets deleted since they are no longer valid. To workaound this issue, run the provided script after the Securesign resource is restored. This script recreates the ownerReferences with the new Securesign UUID.

Specifying a PVC name for the TUF repository fails the initialization process

When specifying a persistent volume claim (PVC) name in The Update Framework (TUF) resource causes the RHTAS operator to fail the initialization of the TUF repository. For example:

spec:
...
  tuf:
    ...
      pvc:
        name: tuf-pvc-example-name
...

To workaround this issue, do not specify a PVC name in the TUF resource. This allows the RHTAS operator to automatically create the PVC, names it tuf, and properly initializes the TUF repository.

Rekor Search UI does not show records after upgrade

After upgrading the RHTAS operator to the latest version (1.0.1), the existing Rekor data is not found when searching by email address. The backfill-redis CronJob, which ensures that Rekor Search UI can query the transparency log only runs once per day, at midnight. To workaround this issue, you can trigger the backfill-redis job manually, instead of waiting until midnight.

To trigger the backfill-redis job from the command-line interface, run the following command:

oc create job --from=cronjob/backfill-redis backfill-redis -n trusted-artifact-signer

Doing this adds the missing data back to the Rekor Search UI.

The Trusted Artifact Signer operator does not apply configuration changes

We found a potential issue with the RHTAS operator logic that can cause an unexpected state when redeploying. This inconsistent state can happen if removing configurations from RHTAS resources and the operator tries to redeploy those resources. To workaround this potential issue, you can delete the specific resource, and then re-create that resource by using the previous instance’s configuration, such as keys, and persistent volumes. The RHTAS resources are: Securesign, Fulcio, The Update Framework (TUF), Rekor, Certificate Transparency (CT) log, or Trillian.

For example, to delete the Securesign resource:

oc delete Securesign securesing-sample

For example, to re-create the Securesign resource from a configuration file:

oc create -f ./securesign-sample.yaml

Operator does not update the component status after doing a restore to a different OpenShift cluster

When restoring the RHTAS signer data from a backup to a new OpenShift cluster, the component status links do not update as expected. Currently, you have to manually delete the securesign-sample-trillian-db-tls resource, and manually update the component status links. The RHTAS operator will automatically recreate an updated securesign-sample-trillian-db-tls resource, after it has been removed.

After the backup procedure starts, and the secrets restored, delete the securesign-sample-trillian-db-tls resource:

Example

oc delete secret securesign-sample-trillian-db-tls

Once all the pods start, then update the status files for Securesign, and TimestampAuthority:

Example

oc edit --subresource=status Securesign securesign-sample
oc edit --subresource=status TimestampAuthority securesign-sample

Trusted Artifact Signer requires cosign 2.2 or later

Because of recent changes to how we generate The Update Framework (TUF) repository, and making use of different checksum algorithms, we require the use of cosign version 2.2 or later. With this release of RHTAS, you can download cosign version 2.4 for use with Trusted Artifact Signer.

Legal Notice

Copyright © 2025 Red Hat, Inc.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.
Back to top
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2025 Red Hat, Inc.