Conversation
ⓘ Your approaching your monthly quota for Qodo. Upgrade your plan PR Compliance Guide 🔍Below is a summary of compliance checks for this PR:
Compliance status legend🟢 - Fully Compliant🟡 - Partial Compliant 🔴 - Not Compliant ⚪ - Requires Further Human Verification 🏷️ - Compliance label |
||||||||||||||||||||||||||
ⓘ Your approaching your monthly quota for Qodo. Upgrade your plan PR Code Suggestions ✨Explore these optional code suggestions:
|
|||||||||||||||||
7041699 to
f79b9e6
Compare
|
/review |
ⓘ Your monthly quota for Qodo has expired. Upgrade your plan ⓘ Paying users. Check that your Qodo account is linked with this Git user account |
3f7a493 to
ec2fe48
Compare
Add ability to sign and verify OCI container images directly in registries without requiring model files on disk. New features: - Sign images directly: `model_signing sign sigstore quay.io/user/model:latest` - Verify images: `model_signing verify sigstore quay.io/user/model:latest` - Signature attachment via OCI 1.1 Referrers API or tag-based (--attachment-mode) - Verify local files match signed image with --local-model option - New Python API: sign_image() and verify_image() methods Registry auth uses existing Docker/Podman credentials from config.json/auth.json. Depends on: oras>=0.2.30 Signed-off-by: SequeI <asiek@redhat.com>
Signed-off-by: SequeI <asiek@redhat.com>
jonburdo
left a comment
There was a problem hiding this comment.
As far as I can tell image signing will work with a small change
Signed-off-by: SequeI <asiek@redhat.com>
Summary
Add ability to sign and verify OCI container images directly in registries
without requiring model files on disk.
New features:
model_signing sign sigstore quay.io/user/model:latestmodel_signing verify sigstore quay.io/user/model:latestRegistry auth uses existing Docker/Podman credentials from config.json/auth.json.
New modules:
Depends on: oras>=0.2.30
Checklist