Skip to content

Commit

Permalink
chore: rename insecure-skip-tlog-verify to insecure-ignore-tlog
Browse files Browse the repository at this point in the history
Signed-off-by: Hector Fernandez <[email protected]>
  • Loading branch information
hectorj2f committed Jan 11, 2023
1 parent 172300e commit 3ec7863
Show file tree
Hide file tree
Showing 15 changed files with 52 additions and 52 deletions.
6 changes: 3 additions & 3 deletions cmd/cosign/cli/options/verify.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,7 +22,7 @@ import (
type CommonVerifyOptions struct {
Offline bool // Force offline verification
TSACertChainPath string
SkipTlogVerify bool
IgnoreTlog bool
}

func (o *CommonVerifyOptions) AddFlags(cmd *cobra.Command) {
Expand All @@ -33,8 +33,8 @@ func (o *CommonVerifyOptions) AddFlags(cmd *cobra.Command) {
"path to PEM-encoded certificate chain file for the RFC3161 timestamp authority. Must contain the root CA certificate. "+
"Optionally may contain intermediate CA certificates, and may contain the leaf TSA certificate if not present in the timestamp")

cmd.Flags().BoolVar(&o.SkipTlogVerify, "insecure-skip-tlog-verify", false,
"skip transparency log verification, to be used when an artifact signature has not been uploaded to the transparency log. Artifacts "+
cmd.Flags().BoolVar(&o.IgnoreTlog, "insecure-ignore-tlog", false,
"ignore transparency log verification, to be used when an artifact signature has not been uploaded to the transparency log. Artifacts "+
"cannot be publicly verified when not included in a log")
}

Expand Down
10 changes: 5 additions & 5 deletions cmd/cosign/cli/verify.go
Original file line number Diff line number Diff line change
Expand Up @@ -118,14 +118,14 @@ against the transparency log.`,
LocalImage: o.LocalImage,
Offline: o.CommonVerifyOptions.Offline,
TSACertChainPath: o.CommonVerifyOptions.TSACertChainPath,
SkipTlogVerify: o.CommonVerifyOptions.SkipTlogVerify,
IgnoreTlog: o.CommonVerifyOptions.IgnoreTlog,
}

if o.Registry.AllowInsecure {
v.NameOptions = append(v.NameOptions, name.Insecure)
}

if o.CommonVerifyOptions.SkipTlogVerify {
if o.CommonVerifyOptions.IgnoreTlog {
fmt.Fprintln(os.Stderr, "**Warning** Skipping tlog verification is an insecure practice that lacks of transparency and auditability verification for the signature.")
}

Expand Down Expand Up @@ -210,7 +210,7 @@ against the transparency log.`,
NameOptions: o.Registry.NameOptions(),
Offline: o.CommonVerifyOptions.Offline,
TSACertChainPath: o.CommonVerifyOptions.TSACertChainPath,
SkipTlogVerify: o.CommonVerifyOptions.SkipTlogVerify,
IgnoreTlog: o.CommonVerifyOptions.IgnoreTlog,
}

return v.Exec(cmd.Context(), args)
Expand Down Expand Up @@ -295,7 +295,7 @@ The blob may be specified as a path to a file or - for stdin.`,
IgnoreSCT: o.CertVerify.IgnoreSCT,
SCTRef: o.CertVerify.SCT,
Offline: o.CommonVerifyOptions.Offline,
SkipTlogVerify: o.CommonVerifyOptions.SkipTlogVerify,
IgnoreTlog: o.CommonVerifyOptions.IgnoreTlog,
}
if err := verifyBlobCmd.Exec(cmd.Context(), args[0]); err != nil {
return fmt.Errorf("verifying blob %s: %w", args, err)
Expand Down Expand Up @@ -354,7 +354,7 @@ The blob may be specified as a path to a file.`,
IgnoreSCT: o.CertVerify.IgnoreSCT,
SCTRef: o.CertVerify.SCT,
Offline: o.CommonVerifyOptions.Offline,
SkipTlogVerify: o.CommonVerifyOptions.SkipTlogVerify,
IgnoreTlog: o.CommonVerifyOptions.IgnoreTlog,
}
if len(args) != 1 {
return fmt.Errorf("no path to blob passed in, run `cosign verify-blob-attestation -h` for more help")
Expand Down
6 changes: 3 additions & 3 deletions cmd/cosign/cli/verify/verify.go
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ type VerifyCommand struct {
NameOptions []name.Option
Offline bool
TSACertChainPath string
SkipTlogVerify bool
IgnoreTlog bool
}

// Exec runs the verification command
Expand Down Expand Up @@ -121,7 +121,7 @@ func (c *VerifyCommand) Exec(ctx context.Context, images []string) (err error) {
SignatureRef: c.SignatureRef,
Identities: identities,
Offline: c.Offline,
SkipTlogVerify: c.SkipTlogVerify,
IgnoreTlog: c.IgnoreTlog,
}
if c.CheckClaims {
co.ClaimVerifier = cosign.SimpleClaimVerifier
Expand Down Expand Up @@ -152,7 +152,7 @@ func (c *VerifyCommand) Exec(ctx context.Context, images []string) (err error) {
co.TSARootCertificates = roots
}

if !c.SkipTlogVerify {
if !c.IgnoreTlog {
if c.RekorURL != "" {
rekorClient, err := rekor.NewClient(c.RekorURL)
if err != nil {
Expand Down
6 changes: 3 additions & 3 deletions cmd/cosign/cli/verify/verify_attestation.go
Original file line number Diff line number Diff line change
Expand Up @@ -64,7 +64,7 @@ type VerifyAttestationCommand struct {
NameOptions []name.Option
Offline bool
TSACertChainPath string
SkipTlogVerify bool
IgnoreTlog bool
}

// Exec runs the verification command
Expand Down Expand Up @@ -101,7 +101,7 @@ func (c *VerifyAttestationCommand) Exec(ctx context.Context, images []string) (e
IgnoreSCT: c.IgnoreSCT,
Identities: identities,
Offline: c.Offline,
SkipTlogVerify: c.SkipTlogVerify,
IgnoreTlog: c.IgnoreTlog,
}
if c.CheckClaims {
co.ClaimVerifier = cosign.IntotoSubjectClaimVerifier
Expand Down Expand Up @@ -137,7 +137,7 @@ func (c *VerifyAttestationCommand) Exec(ctx context.Context, images []string) (e
co.TSAIntermediateCertificates = intermediates
co.TSARootCertificates = roots
}
if !c.SkipTlogVerify {
if !c.IgnoreTlog {
if c.RekorURL != "" {
rekorClient, err := rekor.NewClient(c.RekorURL)
if err != nil {
Expand Down
6 changes: 3 additions & 3 deletions cmd/cosign/cli/verify/verify_blob.go
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,7 @@ type VerifyBlobCmd struct {
IgnoreSCT bool
SCTRef string
Offline bool
SkipTlogVerify bool
IgnoreTlog bool
}

// nolint
Expand Down Expand Up @@ -108,7 +108,7 @@ func (c *VerifyBlobCmd) Exec(ctx context.Context, blobRef string) error {
IgnoreSCT: c.IgnoreSCT,
Identities: identities,
Offline: c.Offline,
SkipTlogVerify: c.SkipTlogVerify,
IgnoreTlog: c.IgnoreTlog,
}
if c.RFC3161TimestampPath != "" && c.KeyOpts.TSACertChainPath == "" {
return fmt.Errorf("timestamp-certificate-chain is required to validate a RFC3161 timestamp")
Expand Down Expand Up @@ -138,7 +138,7 @@ func (c *VerifyBlobCmd) Exec(ctx context.Context, blobRef string) error {
co.TSARootCertificates = roots
}

if !c.SkipTlogVerify {
if !c.IgnoreTlog {
if c.RekorURL != "" {
rekorClient, err := rekor.NewClient(c.RekorURL)
if err != nil {
Expand Down
12 changes: 6 additions & 6 deletions cmd/cosign/cli/verify/verify_blob_attestation.go
Original file line number Diff line number Diff line change
Expand Up @@ -61,10 +61,10 @@ type VerifyBlobAttestationCommand struct {
CertGithubWorkflowRepository string
CertGithubWorkflowRef string

IgnoreSCT bool
SCTRef string
Offline bool
SkipTlogVerify bool
IgnoreSCT bool
SCTRef string
Offline bool
IgnoreTlog bool

CheckClaims bool
PredicateType string
Expand Down Expand Up @@ -106,7 +106,7 @@ func (c *VerifyBlobAttestationCommand) Exec(ctx context.Context, artifactPath st
CertGithubWorkflowRef: c.CertGithubWorkflowRef,
IgnoreSCT: c.IgnoreSCT,
Offline: c.Offline,
SkipTlogVerify: c.SkipTlogVerify,
IgnoreTlog: c.IgnoreTlog,
}
if c.CheckClaims {
co.ClaimVerifier = cosign.IntotoSubjectClaimVerifier
Expand Down Expand Up @@ -159,7 +159,7 @@ func (c *VerifyBlobAttestationCommand) Exec(ctx context.Context, artifactPath st
co.TSARootCertificates = roots
}

if !c.SkipTlogVerify {
if !c.IgnoreTlog {
if c.RekorURL != "" {
rekorClient, err := rekor.NewClient(c.RekorURL)
if err != nil {
Expand Down
10 changes: 5 additions & 5 deletions cmd/cosign/cli/verify/verify_blob_attestation_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -104,11 +104,11 @@ func TestVerifyBlobAttestation(t *testing.T) {
sigRef := writeBlobFile(t, td, string(decodedSig), "signature")

cmd := VerifyBlobAttestationCommand{
KeyOpts: options.KeyOpts{KeyRef: keyRef},
SignaturePath: sigRef,
SkipTlogVerify: true,
CheckClaims: true,
PredicateType: test.predicateType,
KeyOpts: options.KeyOpts{KeyRef: keyRef},
SignaturePath: sigRef,
IgnoreTlog: true,
CheckClaims: true,
PredicateType: test.predicateType,
}
err = cmd.Exec(ctx, test.blobPath)

Expand Down
6 changes: 3 additions & 3 deletions cmd/cosign/cli/verify/verify_blob_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -573,9 +573,9 @@ func TestVerifyBlob(t *testing.T) {
CertIdentity: identity,
CertOidcIssuer: issuer,
},
IgnoreSCT: true,
CertChain: chainPath,
SkipTlogVerify: tt.skipTlogVerify,
IgnoreSCT: true,
CertChain: chainPath,
IgnoreTlog: tt.skipTlogVerify,
}
blobPath := writeBlobFile(t, td, string(blobBytes), "blob.txt")
if tt.signature != "" {
Expand Down
2 changes: 1 addition & 1 deletion doc/cosign_dockerfile_verify.md

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion doc/cosign_manifest_verify.md

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion doc/cosign_verify-attestation.md

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion doc/cosign_verify-blob-attestation.md

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion doc/cosign_verify-blob.md

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion doc/cosign_verify.md

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading

0 comments on commit 3ec7863

Please sign in to comment.