Fix idempotency error with signing #2940
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Copyright 2022 The Sigstore Authors. | |
# | |
# Licensed under the Apache License, Version 2.0 (the "License"); | |
# you may not use this file except in compliance with the License. | |
# You may obtain a copy of the License at | |
# | |
# http://www.apache.org/licenses/LICENSE-2.0 | |
# | |
# Unless required by applicable law or agreed to in writing, software | |
# distributed under the License is distributed on an "AS IS" BASIS, | |
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. | |
# See the License for the specific language governing permissions and | |
# limitations under the License. | |
name: Test attest / verify-attestation | |
on: | |
pull_request: | |
branches: [ 'main', 'release-*' ] | |
workflow_dispatch: | |
defaults: | |
run: | |
shell: bash | |
permissions: read-all | |
jobs: | |
cip-test: | |
name: attest / verify-attestation test | |
runs-on: ubuntu-latest | |
strategy: | |
matrix: | |
k8s-version: | |
- v1.25.x | |
tuf-root: | |
- remote | |
- air-gap | |
env: | |
KO_DOCKER_REPO: "registry.local:5000/policy-controller" | |
SCAFFOLDING_RELEASE_VERSION: "v0.6.8" | |
GO111MODULE: on | |
GOFLAGS: -ldflags=-s -ldflags=-w | |
KOCACHE: ~/ko | |
COSIGN_YES: "true" | |
steps: | |
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1 | |
- uses: actions/setup-go@93397bea11091df50f3d7e59dc26a7711a8bcfbe # v4.1.0 | |
with: | |
go-version: '1.21' | |
check-latest: true | |
# will use the latest release available for ko | |
- uses: ko-build/setup-ko@ace48d793556083a76f1e3e6068850c1f4a369aa # v0.6 | |
- name: Install yq | |
uses: mikefarah/yq@5f4c1fbd0ab1f7c1c97c23deb355a9a4d5077f66 # v4.40.1 | |
- name: build cosign | |
run: | | |
make cosign | |
- name: Install cluster + sigstore | |
uses: sigstore/scaffolding/actions/setup@main | |
with: | |
legacy-variables: "false" | |
k8s-version: ${{ matrix.k8s-version }} | |
version: ${{ env.SCAFFOLDING_RELEASE_VERSION }} | |
- name: Create sample image - demoimage | |
run: | | |
pushd $(mktemp -d) | |
go mod init example.com/demo | |
cat <<EOF > main.go | |
package main | |
import "fmt" | |
func main() { | |
fmt.Println("hello world") | |
} | |
EOF | |
demoimage=`ko publish -B example.com/demo` | |
echo "demoimage=$demoimage" >> $GITHUB_ENV | |
echo Created image $demoimage | |
popd | |
- name: Initialize with our custom TUF root pointing to remote root | |
if: ${{ matrix.tuf-root == 'remote' }} | |
run: | | |
TUF_MIRROR=$(kubectl -n tuf-system get ksvc tuf -ojsonpath='{.status.url}') | |
./cosign initialize --mirror $TUF_MIRROR --root ./root.json | |
- name: Initialize with custom TUF root pointing to local filesystem | |
if: ${{ matrix.tuf-root == 'air-gap' }} | |
run: | | |
# Grab the compressed repository for airgap testing. | |
kubectl -n tuf-system get secrets tuf-root -ojsonpath='{.data.repository}' | base64 -d > ./repository.tar.gz | |
tar -zxvf ./repository.tar.gz | |
PWD=$(pwd) | |
ROOT=${PWD}/repository/1.root.json | |
REPOSITORY=${PWD}/repository | |
./cosign initialize --root ${ROOT} --mirror file://${REPOSITORY} | |
- name: Sign demoimage with cosign | |
run: | | |
./cosign sign --rekor-url ${{ env.REKOR_URL }} --fulcio-url ${{ env.FULCIO_URL }} --yes --allow-insecure-registry ${{ env.demoimage }} --identity-token ${{ env.OIDC_TOKEN }} | |
- name: Create attestation for it | |
run: | | |
echo -n 'foobar e2e test' > ./predicate-file | |
./cosign attest --predicate ./predicate-file --fulcio-url ${{ env.FULCIO_URL }} --rekor-url ${{ env.REKOR_URL }} --allow-insecure-registry --yes ${{ env.demoimage }} --identity-token ${{ env.OIDC_TOKEN }} | |
- name: Sign a blob | |
run: | | |
./cosign sign-blob README.md --fulcio-url ${{ env.FULCIO_URL }} --rekor-url ${{ env.REKOR_URL }} --output-certificate cert.pem --output-signature sig --yes --identity-token ${{ env.OIDC_TOKEN }} | |
- name: Verify with cosign | |
run: | | |
./cosign verify --rekor-url ${{ env.REKOR_URL }} --allow-insecure-registry ${{ env.demoimage }} --certificate-identity https://kubernetes.io/namespaces/default/serviceaccounts/default --certificate-oidc-issuer "https://kubernetes.default.svc.cluster.local" | |
- name: Verify custom attestation with cosign, works | |
run: | | |
echo '::group:: test custom verify-attestation success' | |
if ! ./cosign verify-attestation --certificate-identity https://kubernetes.io/namespaces/default/serviceaccounts/default --certificate-oidc-issuer "https://kubernetes.default.svc.cluster.local" --policy ./test/testdata/policies/cue-works.cue --rekor-url ${{ env.REKOR_URL }} --allow-insecure-registry ${{ env.demoimage }} ; then | |
echo Failed to verify attestation with a valid policy | |
exit 1 | |
else | |
echo Successfully validated custom attestation with a valid policy | |
fi | |
echo '::endgroup::' | |
- name: Verify custom attestation with cosign, fails | |
run: | | |
echo '::group:: test custom verify-attestation success' | |
if ./cosign verify-attestation --policy ./test/testdata/policies/cue-fails.cue --rekor-url ${{ env.REKOR_URL }} --allow-insecure-registry ${{ env.demoimage }} --certificate-identity https://kubernetes.io/namespaces/default/serviceaccounts/default --certificate-oidc-issuer "https://kubernetes.default.svc.cluster.local" ; then | |
echo custom verify-attestation succeeded with cue policy that should not work | |
exit 1 | |
else | |
echo Successfully failed a policy that should not work | |
fi | |
echo '::endgroup::' | |
- name: Verify a blob | |
run: | | |
./cosign verify-blob README.md --rekor-url ${{ env.REKOR_URL }} --certificate ./cert.pem --signature sig --certificate-identity https://kubernetes.io/namespaces/default/serviceaccounts/default --certificate-oidc-issuer "https://kubernetes.default.svc.cluster.local" | |
- name: Collect diagnostics | |
if: ${{ failure() }} | |
uses: chainguard-dev/actions/kind-diag@84c993eaf02da1c325854fb272a4df9184bd80fc # main | |
- name: Create vuln attestation for it | |
run: | | |
./cosign attest --predicate ./test/testdata/attestations/vuln-predicate.json --type vuln --fulcio-url ${{ env.FULCIO_URL }} --rekor-url ${{ env.REKOR_URL }} --allow-insecure-registry --yes ${{ env.demoimage }} --identity-token ${{ env.OIDC_TOKEN }} | |
- name: Verify vuln attestation with cosign, works | |
run: | | |
echo '::group:: test vuln verify-attestation success' | |
if ! ./cosign verify-attestation --type vuln --policy ./test/testdata/policies/cue-vuln-works.cue --rekor-url ${{ env.REKOR_URL }} --allow-insecure-registry ${{ env.demoimage }} --certificate-identity https://kubernetes.io/namespaces/default/serviceaccounts/default --certificate-oidc-issuer "https://kubernetes.default.svc.cluster.local" ; then | |
echo Failed to verify attestation with a valid policy | |
exit 1 | |
else | |
echo Successfully validated vuln attestation with a valid policy | |
fi | |
echo '::endgroup::' | |
- name: Verify vuln attestation with cosign, fails | |
run: | | |
echo '::group:: test vuln verify-attestation success' | |
if ./cosign verify-attestation --type vuln --policy ./test/testdata/policies/cue-vuln-fails.cue --rekor-url ${{ env.REKOR_URL }} --allow-insecure-registry ${{ env.demoimage }} --certificate-identity https://kubernetes.io/namespaces/default/serviceaccounts/default --certificate-oidc-issuer "https://kubernetes.default.svc.cluster.local" ; then | |
echo verify-attestation succeeded with cue policy that should not work | |
exit 1 | |
else | |
echo Successfully failed a policy that should not work | |
fi | |
echo '::endgroup::' |