From ccd61711264d60db29d504547afbf0dcadd347dd Mon Sep 17 00:00:00 2001 From: Zach Steindler Date: Wed, 3 Jul 2024 14:06:05 -0400 Subject: [PATCH] Fix lint; docs Signed-off-by: Zach Steindler --- cmd/cosign/cli/attest/attest_blob.go | 2 +- doc/cosign_attest-blob.md | 2 +- doc/cosign_sign-blob.md | 2 +- 3 files changed, 3 insertions(+), 3 deletions(-) diff --git a/cmd/cosign/cli/attest/attest_blob.go b/cmd/cosign/cli/attest/attest_blob.go index 64a0cacb58fe..b4688b23aec7 100644 --- a/cmd/cosign/cli/attest/attest_blob.go +++ b/cmd/cosign/cli/attest/attest_blob.go @@ -312,7 +312,7 @@ func makeNewBundle(rekorEntry *models.LogEntryAnon, payload, sig, signer, timest }, } - contents, err := protojson.Marshal(bundle) + contents, err := protojson.Marshal(bundle) if err != nil { return nil, err } diff --git a/doc/cosign_attest-blob.md b/doc/cosign_attest-blob.md index b2091dcbf0b2..4849bb932878 100644 --- a/doc/cosign_attest-blob.md +++ b/doc/cosign_attest-blob.md @@ -43,6 +43,7 @@ cosign attest-blob [flags] --identity-token string identity token to use for certificate from fulcio. the token or a path to a file containing the token is accepted. --insecure-skip-verify skip verifying fulcio published to the SCT (this should only be used for testing). --key string path to the private key file, KMS URI or Kubernetes Secret + --new-bundle-format output bundle in new format that contains all verification material --oidc-client-id string OIDC client ID for application (default "sigstore") --oidc-client-secret-file string Path to file containing OIDC client secret for application --oidc-disable-ambient-providers Disable ambient OIDC providers. When true, ambient credentials will not be read @@ -53,7 +54,6 @@ cosign attest-blob [flags] --output-certificate string write the certificate to FILE --output-signature string write the signature to FILE --predicate string path to the predicate file. - --new-bundle-format output bundle in sigstore/protobuf-specs format --rekor-entry-type string specifies the type to be used for a rekor entry upload. Options are intoto or dsse (default). (default "dsse") --rekor-url string address of rekor STL server (default "https://rekor.sigstore.dev") --rfc3161-timestamp-bundle string path to an RFC 3161 timestamp bundle FILE diff --git a/doc/cosign_sign-blob.md b/doc/cosign_sign-blob.md index 0ad79a8f2ea2..d78f9fb250e5 100644 --- a/doc/cosign_sign-blob.md +++ b/doc/cosign_sign-blob.md @@ -45,6 +45,7 @@ cosign sign-blob [flags] --insecure-skip-verify skip verifying fulcio published to the SCT (this should only be used for testing). --issue-certificate issue a code signing certificate from Fulcio, even if a key is provided --key string path to the private key file, KMS URI or Kubernetes Secret + --new-bundle-format output bundle in new format that contains all verification material --oidc-client-id string OIDC client ID for application (default "sigstore") --oidc-client-secret-file string Path to file containing OIDC client secret for application --oidc-disable-ambient-providers Disable ambient OIDC providers. When true, ambient credentials will not be read @@ -54,7 +55,6 @@ cosign sign-blob [flags] --output string write the signature to FILE --output-certificate string write the certificate to FILE --output-signature string write the signature to FILE - --new-bundle-format output bundle in sigstore/protobuf-specs format --rekor-url string address of rekor STL server (default "https://rekor.sigstore.dev") --rfc3161-timestamp string write the RFC3161 timestamp to a file --sk whether to use a hardware security key