Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix the local verification using certificates docs. #306

Merged
merged 1 commit into from May 1, 2024

Conversation

dhaus67
Copy link
Contributor

@dhaus67 dhaus67 commented Apr 22, 2024

Summary

Verification using certificates requires also the validation of the certificate's issuer and identity.

The previous example was missing those flag values, which have been added now.

Fixes sigstore/cosign#3671.

Release Note

Fixed the documentation for local verification using certificates.

Documentation

Verification using certificates requires also the
validation of the certificate's issuer and identity.

Signed-off-by: Daniel Haus <dhaus@redhat.com>
Copy link

netlify bot commented Apr 22, 2024

Deploy Preview for docssigstore ready!

Name Link
🔨 Latest commit 68f1ee5
🔍 Latest deploy log https://app.netlify.com/sites/docssigstore/deploys/66264863932fdf0008191102
😎 Deploy Preview https://deploy-preview-306--docssigstore.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify site configuration.

Copy link
Member

@lukehinds lukehinds left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

thanks

@lukehinds lukehinds merged commit af04701 into sigstore:main May 1, 2024
6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

cosign verify with certificates requires the --certificate-identity and --certificate-oidc-issuer flags
2 participants