cert-manager Signature Verification
To help prevent supply chain attacks, some cert-manager release artifacts are cryptographically signed so you can be sure that the version of cert-manager you're about to install is actually built by and provided by the cert-manager maintainers.
This signing is vitally important if for any reason you need to use a mirrored version of cert-manager; it allows you to confirm that the mirror hasn't tampered with the code you're about to install.
Signing keys required for verification are all available on this website, but the actual key that you need might depend on the artifact you're trying to validate in the future. At the time of writing, all signing is done using the same underlying key.
For all cert-manager versions from
v1.6.0 and later, Helm charts are signed and verifiable through the Helm CLI.
The easiest way to verify is to grab the GPG keyring directly, which can then be passed into
helm verify like so:
curl -sSL https://cert-manager.io/public-keys/cert-manager-keyring-2021-09-20-1020CF3C033D4F35BAE1C19E1226061C665DF13E.gpg > cert-manager-keyring-2021-09-20-1020CF3C033D4F35BAE1C19E1226061C665DF13E.gpghelm verify --keyring cert-manager-keyring-2021-09-20-1020CF3C033D4F35BAE1C19E1226061C665DF13E.gpg /path/to/cert-manager-vx.y.z.tgz
If you know what you're doing and you want the signing key in a format that's easy to import into GPG, it's available in an ASCII armored version:
- ASCII-armored signing key:
Soon, all container images which make up cert-manager will be verifiable using
Unfortunately, this isn't possible today because the images are hosted on
quay.io which doesn't have the proper support for cosign signatures yet. When signatures are
added, this section will contain details of how to verify them.