From 8ae1b016bc8a7d71f2475b6537a89b3ff0a6c7e9 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Batuhan=20Apayd=C4=B1n?= Date: Thu, 15 Sep 2022 18:46:36 +0300 Subject: [PATCH] fix: add COSIGN_EXPERIMENTAL=1 for verify-blob MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Signed-off-by: Batuhan Apaydın --- cmd/cosign/cli/verify.go | 17 ++++++----------- doc/cosign_verify-blob.md | 17 ++++++----------- 2 files changed, 12 insertions(+), 22 deletions(-) diff --git a/cmd/cosign/cli/verify.go b/cmd/cosign/cli/verify.go index 08a4fe9bfcb..b010ef63ad6 100644 --- a/cmd/cosign/cli/verify.go +++ b/cmd/cosign/cli/verify.go @@ -218,28 +218,23 @@ You may specify either a key, a certificate or a kms reference to verify against The signature may be specified as a path to a file or a base64 encoded string. The blob may be specified as a path to a file or - for stdin.`, - Example: ` cosign verify-blob (--key ||)|(--cert ) --signature + Example: ` cosign verify-blob (--key ||)|(--certificate ) --signature # Verify a simple blob and message - cosign verify-blob --key cosign.pub --signature sig msg - - # Verify a simple blob with remote signature URL, both http and https schemes are supported - cosign verify-blob --key cosign.pub --signature http://host/my.sig + cosign verify-blob --key cosign.pub (--signature | msg) # Verify a signature from an environment variable cosign verify-blob --key cosign.pub --signature $sig msg # verify a signature with public key provided by URL - cosign verify-blob --key https://host.for/ --signature $sig msg + cosign verify-blob --key https://host.for/ --signature $sig msg COSIGN_EXPERIMENTAL=1 cosign verify-blob --key https://host.for/ --signature $sig msg - # Verify a signature against a payload from another process using process redirection - cosign verify-blob --key cosign.pub --signature $sig <(git rev-parse HEAD) # Verify a signature against Azure Key Vault - cosign verify-blob --key azurekms://[VAULT_NAME][VAULT_URI]/[KEY] --signature $sig + cosign verify-blob --key azurekms://[VAULT_NAME][VAULT_URI]/[KEY] --signature $sig # Verify a signature against AWS KMS - cosign verify-blob --key awskms://[ENDPOINT]/[ID/ALIAS/ARN] --signature $sig + Ccosign verify-blob --key awskms://[ENDPOINT]/[ID/ALIAS/ARN] --signature $sig # Verify a signature against Google Cloud KMS cosign verify-blob --key gcpkms://projects/[PROJECT ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY] --signature $sig @@ -254,7 +249,7 @@ The blob may be specified as a path to a file or - for stdin.`, cosign verify-blob --key gitlab://[PROJECT_ID] --signature $sig # Verify a signature against a certificate - cosign verify-blob --cert --signature $sig + COSIGN_EXPERIMENTAL=1 cosign verify-blob --certificate --signature $sig `, Args: cobra.ExactArgs(1), diff --git a/doc/cosign_verify-blob.md b/doc/cosign_verify-blob.md index 2793bbb6a55..c03672da1d4 100644 --- a/doc/cosign_verify-blob.md +++ b/doc/cosign_verify-blob.md @@ -18,28 +18,23 @@ cosign verify-blob [flags] ### Examples ``` - cosign verify-blob (--key ||)|(--cert ) --signature + cosign verify-blob (--key ||)|(--certificate ) --signature # Verify a simple blob and message - cosign verify-blob --key cosign.pub --signature sig msg - - # Verify a simple blob with remote signature URL, both http and https schemes are supported - cosign verify-blob --key cosign.pub --signature http://host/my.sig + cosign verify-blob --key cosign.pub (--signature | msg) # Verify a signature from an environment variable cosign verify-blob --key cosign.pub --signature $sig msg # verify a signature with public key provided by URL - cosign verify-blob --key https://host.for/ --signature $sig msg + cosign verify-blob --key https://host.for/ --signature $sig msg COSIGN_EXPERIMENTAL=1 cosign verify-blob --key https://host.for/ --signature $sig msg - # Verify a signature against a payload from another process using process redirection - cosign verify-blob --key cosign.pub --signature $sig <(git rev-parse HEAD) # Verify a signature against Azure Key Vault - cosign verify-blob --key azurekms://[VAULT_NAME][VAULT_URI]/[KEY] --signature $sig + cosign verify-blob --key azurekms://[VAULT_NAME][VAULT_URI]/[KEY] --signature $sig # Verify a signature against AWS KMS - cosign verify-blob --key awskms://[ENDPOINT]/[ID/ALIAS/ARN] --signature $sig + Ccosign verify-blob --key awskms://[ENDPOINT]/[ID/ALIAS/ARN] --signature $sig # Verify a signature against Google Cloud KMS cosign verify-blob --key gcpkms://projects/[PROJECT ID]/locations/[LOCATION]/keyRings/[KEYRING]/cryptoKeys/[KEY] --signature $sig @@ -54,7 +49,7 @@ cosign verify-blob [flags] cosign verify-blob --key gitlab://[PROJECT_ID] --signature $sig # Verify a signature against a certificate - cosign verify-blob --cert --signature $sig + COSIGN_EXPERIMENTAL=1 cosign verify-blob --certificate --signature $sig ```