Skip to main content
Version: v1.8

Verify Artifacts

verify images

Karmada has introduced cosign to verify the released images since version v1.7. The specific operation is as follows:


You need to install the following tools:

Verify image signature

Verify image with cosign CLI

Karmada introduced the cosign verification tool since release 1.7. For a list of published mirrors, see karmada mirrors.

Select an image from these images and verify its signature using cosign verify command:

cosign verify \
--certificate-oidc-issuer= \
--certificate-identity-regexp=^*$ | jq

If the echo is as follows, the verification is successful:

Verification for --
The following checks were performed on each of these signatures:
- The cosign claims were validated
- Existence of the claims in the transparency log was verified offline
- The code-signing certificate was verified using trusted certificate authority certificates
"critical": {
"identity": {
"docker-reference": ""
"image": {
"docker-manifest-digest": "sha256:c6d85e111e1ca4da234e87fb48f8ff170c918a0e6893d9ac9e888a4e7cc0056f"
"type": "cosign container image signature"
"optional": {
"": "",
"": "push",
"": "e5277b6317ac1a4717f5fac4057caf51a5d248fc",
"": "latest image to DockerHub",
"": "karmada-io/karmada",
"": "refs/heads/master",
"Bundle": {
"SignedEntryTimestamp": "MEYCIQD4R9XlhgQkjVAg4XuW857iqkNrSxbQB9k3x4Ie8IshgAIhAILn8m+eOAjYxxcpFU42ghoiiuMnyY+Xda2CBE5WZruq",
"Payload": {

When you are done validating an image, you can specify that image in your Pod manifest by a digest value, for example:


For more information, please refer to k8s image pull policy chapter how to specify the image summary to pull the image.

Use the admission controller to verify the image signature

The image verification process can also be implemented using the sigstore policy-controller controller during deployment. Here are some resources to help you get started with policy-controller: