You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/getting-started/docker.mdx
+5-1Lines changed: 5 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,6 +11,10 @@ Details on how to install Docker can be found on the [official Docker website](h
11
11
Refer to [Configuring Databases](/extending-jellyseerr/database-config#postgresql-options) for details on how to configure your database.
12
12
:::
13
13
14
+
:::info
15
+
An alternative Docker image is available on Docker Hub for this project. You can find it at [Docker Hub Repository Link](https://hub.docker.com/r/seerr/seerr)
16
+
:::
17
+
14
18
## Unix (Linux, macOS)
15
19
:::warning
16
20
Be sure to replace `/path/to/appdata/config` in the below examples with a valid host directory path. If this volume mount is not configured correctly, your Jellyseerr settings/data will not be persisted when the container is recreated (e.g., when updating the image or rebooting your machine).
@@ -71,7 +75,7 @@ docker run -d ...
71
75
:::info
72
76
All official Seerr images are cryptographically signed and include a verified [Software Bill of Materials (SBOM)](https://cyclonedx.org/).
73
77
74
-
To confirm that the container image you are using is authentic and unmodified, please refer to the [Verifying Signed Images](/using-jellyseerr/advanced/verifying-signed-images) guide.
78
+
To confirm that the container image you are using is authentic and unmodified, please refer to the [Verifying Signed Artifacts](/using-jellyseerr/advanced/verifying-signed-artifacts) guide.
Copy file name to clipboardExpand all lines: docs/using-jellyseerr/advanced/verifying-signed-artifacts.mdx
+32-27Lines changed: 32 additions & 27 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,19 +1,21 @@
1
1
---
2
-
id: verifying-signed-images
3
-
title: Verifying Signed Images
4
-
sidebar_label: Verify Signed Images
5
-
description: Learn how to verify Seerr's signed container images and SBOM attestations using Cosign, Docker, Podman, or Skopeo.
2
+
id: verifying-signed-artifacts
3
+
title: Verifying Signed Artifacts
4
+
sidebar_label: Verify Signed Artifacts
5
+
description: Learn how to verify Seerr's signed artifacts and SBOM attestations.
6
6
---
7
7
8
8
importTabsfrom'@theme/Tabs';
9
9
importTabItemfrom'@theme/TabItem';
10
10
11
-
# Verifying Signed Images
11
+
# Verifying Signed Artifacts
12
+
13
+
These artifacts are cryptographically signed using [Sigstore Cosign](https://docs.sigstore.dev/quickstart/quickstart-cosign/):
14
+
- Container images
12
15
13
-
All Seerr container images published to GitHub Container Registry (GHCR) are cryptographically signed using [Sigstore Cosign](https://docs.sigstore.dev/quickstart/quickstart-cosign/).
14
16
This ensures that the images you pull are authentic, tamper-proof, and built by the official Seerr release pipeline.
15
17
16
-
Each image also includes a CycloneDX SBOM (Software Bill of Materials) attestation, generated with [Trivy](https://aquasecurity.github.io/trivy/), providing transparency about all dependencies included in the image.
18
+
Additionally each container image also includes a CycloneDX SBOM (Software Bill of Materials) attestation, generated with [Trivy](https://aquasecurity.github.io/trivy/), providing transparency about all dependencies included in the image.
17
19
18
20
---
19
21
@@ -22,37 +24,40 @@ Each image also includes a CycloneDX SBOM (Software Bill of Materials) attestati
If using **Podman**, ensure `skopeo` is available:
35
+
# Verifying Signed Images
33
36
34
-
```bash
35
-
skopeo --version
36
-
```
37
+
All Seerr container images published to GitHub Container Registry (GHCR) are cryptographically signed using [Sigstore Cosign](https://docs.sigstore.dev/quickstart/quickstart-cosign/).
38
+
This ensures that the images you pull are authentic, tamper-proof, and built by the official Seerr release pipeline.
39
+
40
+
Each image also includes a CycloneDX SBOM (Software Bill of Materials) attestation, generated with [Trivy](https://aquasecurity.github.io/trivy/), providing transparency about all dependencies included in the image.
0 commit comments