-
Notifications
You must be signed in to change notification settings - Fork 52
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Idea: alias --cert-email
as --cert-identity
/--cert-san
#108
Comments
Related: Github workflow certificate uses six other extensions in addition to SAN -- they must think verifying those have value, and the extensions there do seem useful. Other systems likely have different extensions they include. So observations:
|
Yep. We've added the OIDs for those extensions in #117. We need to figure out which set of CLI options we should expose for them, which will involve some coordination with |
Opened sigstore/cosign#1964 for |
I think this is a good idea, although we probably want to think about the UX -- having |
You must have noticed this already but since it's not written anywhere: We previously discussed that |
Yeah, this is an unfortunate case where We won't make any movement here until we get some consensus with cosign on sigstore/cosign#1964, so I'll follow up with some design thoughts there. |
It looks like See: sigstore/cosign#2056 |
Closes #108. Signed-off-by: William Woodruff <william@trailofbits.com>
* Add raises() contextmanager This allows managing the "unexpected success" case, and printing the same details as in "unexpected failure" case. Signed-off-by: Jussi Kukkonen <jkukkonen@google.com> * Change the failure output slightly Try to print a usable shell command: * use str() so that we don't get "PosixPath()" in the args list * join the arguments into a single string This means that I can now copy paste the command and reproduce the problem by just being in the same directory with assets. Signed-off-by: Jussi Kukkonen <jkukkonen@google.com> --------- Signed-off-by: Jussi Kukkonen <jkukkonen@google.com>
Breaking this out for discussion from #107:
--cert-email
can be misleading when the OIDC identity in question isn't an email, but rather a GitHub workflow or other URL. We could provide CLI aliases that make this clearer.cc @di for thoughts.
The text was updated successfully, but these errors were encountered: