Transparency Log Support

Chains supports automatic binary uploads to a transparency log and defaults to using Rekor. If enabled, all signatures and attestations will be logged. The entry ID will be appended as an annotation on a TaskRun or a PipelineRun once Chains has uploaded it:

Enabling Transparency Log Support

To enable, run:

kubectl patch configmap chains-config -n tekton-chains -p='{"data":{"transparency.enabled": "true"}}'

Right now, Chains default to storing entries in the public Rekor instance ( To customize where entries are stored, run:

kubectl patch configmap chains-config -n tekton-chains -p='{"data":{"transparency.url": "<YOUR URL>"}}'

Keyless Signing Mode

Chains also supports a keyless signing mode with Fulcio, Sigstore’s free root certificate authority.

In this mode, instead of setting up a signing key, Chains would request an identity token from the cluster it is running in. This identity token will be used to authorize a Fulcio certificate for a Tekton artifact (OCI image, TaskRun, or PipelineRun). This feature has been tested on GKE, EKS, and AKS, but should work on any environment that supports Cosign OIDC signing.

Once Chains has successfully requested a certificate, it will store the cert as a base64 encoded annotation on the TaskRun or PipelineRun , along with the payload and signature.

This can look like:


Enabling Keyless Signing Mode

To enable singing with Fulcio, run:

kubectl patch configmap chains-config -n tekton-chains -p='{"data":{"signers.x509.fulcio.enabled": "true"}}'

Better Way Of Navigating in Transparency Log with rekor-search-ui

The annotation on TaskRun and PipelineRun resources holds the URL to access the transparency log entry via Rekor’s API. It is also possible to view the log entry via Rekor’s web interface.

There is already a public good instance of the Rekor Search UI provided by the Chainguard team running at, which you can use to display the details of the log entry within the transparency log.

If you want to search your entry via logIndex, you can use the following URL:

But the logIndex is not the only option. You could also use email, hash, commit SHA, and UUID as an option to search the transparency log entry.

For example, you can search via email: