-
Notifications
You must be signed in to change notification settings - Fork 52
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CLI: Expose verification for GitHub-specific claims #322
Comments
Yep! These should map 1-1 to their equivalent policies. Since CC @znewman01 and @jku for thoughts (and particularly Zack to make sure we're aligned with |
I still think a usable CLI for this probably requires a service specific "endpoint" (whether it's a separate binary that just uses sigstore-python API or a mode in this cli app) that is somewhat opinionated about what it's doing. So I don't think adding options like this will make the generic CLI better for actually verifying GitHub releases. Alignment with cosign may be a good reason though. A couple of reasons for my opinion:
A custom CLI endpoint on the other hand can A) make the inputs simpler and B) can require things that a "generic sigstore client" can not. So just as an example |
Yeah, I tend to agree (and, given that This would be a little more invasive of a change, but I think turning every kind of verification operation into a discrete subcommand of # equivalent to the current sigstore verify
sigstore verify identity --cert-identity ...
# enables the functionality discussed in this PR
sigstore verify github --workflow-sha ... This allows us to keep the Thoughts? |
I don't believe it is 😄 Cosign has a few design warts
Please do so, sigstore-python is much less calcified and so can do a better job figuring out what this "should" look like. We can then slowly make Cosign look more like that over time if we like it. Overall I like the plan of specific endpoints for common use cases. I wouldn't hate having an "advanced user escape hatch" for cases where sigstore-python hasn't caught up to some new application, but it doesn't need to be in a first draft. |
I'm beginning working on this. At this point, I'm liking @woodruffw's design as it leaves us room to extend with more "endpoints" by adding new subcommands after the What do you think @di? |
I like it! As long as we can keep the 'default' endpoint around for a while to maintain backwards compatibility. |
N.B.: It might be a little tricky to do "default" subcommands with |
I guess what I'm concerned about is current 'bare' invocations of |
--certificate-github-workflow-
flags
Posting our latest resolution: we're going to see if we can glue together a compatibility layer with sigstore verify [args ...]
sigstore verify identity [args ...] ...where the former is an alias/default for the latter. |
Doing this today. |
#379 has the first part of this: it enables |
Description
I noticed that Cosign has a series of flags for checking the signing certificate extensions. From the help text:
This should be a good fit for @woodruffw's policy API.
The text was updated successfully, but these errors were encountered: