-
Notifications
You must be signed in to change notification settings - Fork 506
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New Check: Add Sigstore, other tools use check for signed tags, releases #298
Comments
Check code here - Docs needs updating here - |
@dlorenc How can I identify if a packaged/container is signed by cosign? |
See the spec here: https://github.com/sigstore/cosign/blob/main/SPEC.md You'd have to check the registry itself. Since you don't really care about verifying for this check, it should be pretty simple. |
@asraa - do you have cycles to give this a try, see comment from @dlorenc - #298 (comment) At this point, we just care on seeing if sigstore is used (verifying can come later). |
Looking into this, my main problem is figuring out where the github project is uploading their containers/packages. |
I'm happy to keep this assigned, but given that there's no canonical place to look for artifact signing, I think we should hold off for about a quarter until there is one. Cosign itself doesn't have a good location to check for images. |
hello @naveensrinivasan @inferno-chromium, this is not a perfect solution but we are working on a project called |
For scorecard to check if a given GitHub release has been signed using cosign, how can getting public key help? Can you explain further? Also, scorecard runs in a cron mode where it checks against s 200,000 repositories gets results. There isn't an interactive mode. |
I think it is possible to do it.
@asraa Thoughts on this? |
On a related note #1200 |
@dlorenc Confirmed it is possible on slack https://sigstore.slack.com/archives/C01DGF0G8U9/p1635628124084900 @asraa I have cycles to take this and would like to implement this. Please let me know. Thanks |
Sounds good to me. We already look for the presence of |
This feature does not align with the short term project focus and has not had movement in some time. If there is no feedback in the next 7 days to the contrary, then this issue will be closed. |
This issue is pretty critical as Sigstore is now the OSS's leading code signing solution. @spencerschrock @raghavkaul - this one should be easy to knock out, probably should check the sigstore transparency log for signature. |
I believe signed releases was implemented as part of #2144, but we don't check the tlog. |
I imagine we'd use something similar to what What about other generators/file formats that scorecard should be looking for? Are there generators other than |
This request needs more discussion to be fully scoped out and potentially broken into smaller issues. |
Describe the bug
Currently signed tags and releases check don't detect use of signing tools like Sigstore.
Reproduction steps
Signed releases using sigstore are not detected.
Expected behavior
Signed releases using sigstore should be detected.
Additional context
Add any other context about the problem here.
The text was updated successfully, but these errors were encountered: