You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Here's what's included:
- Support for the -regexp versions of the keyless verification
params. Prefer the non-regexp param if (for some reason) both are
present.
- Make it so we never use --ignore-rekor when doing keyless
verification even if IGNORE_REKOR is true. This is because you
need a transparency log entry from Rekor to do keyless
verification.
- Some minor bash env var handling logic tweaks related to handling
of unlikely edge cases. Note that we're still trying not to add a
layer of bash logic for param sanitizing as per the comment there.
This could be broken up into multiple commits, and originally it
was, but I've been working on a previous version of PR too long and
I don't think it's worth the effort right now.
Ref: https://redhat.atlassian.net/browse/EC-1652
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/verify-conforma-konflux-ta.adoc
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,6 +25,8 @@ You can also specify a policy configuration using a git url, e.g.
25
25
*REKOR_HOST* (`string`):: Rekor host for transparency log lookups
26
26
*CERTIFICATE_IDENTITY* (`string`):: Expected identity in the signing certificate for keyless verification. This should be the email or URI that was used when signing. You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification. The PUBLIC_KEY param will be ignored if this is provided.
27
27
*CERTIFICATE_OIDC_ISSUER* (`string`):: Expected OIDC issuer in the signing certificate for keyless verification. This should match the issuer that provided the identity token used for signing. You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification. The PUBLIC_KEY param will be ignored if this is provided.
28
+
*CERTIFICATE_IDENTITY_REGEXP* (`string`):: Similar to CERTIFICATE_IDENTITY but the value is a regexp that will be matched. Note that CERTIFICATE_IDENTITY takes precendence over this if both are present.
29
+
*CERTIFICATE_OIDC_ISSUER_REGEXP* (`string`):: Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched. Note that CERTIFICATE_OIDC_ISSUER takes precendence over this if both are present.
28
30
*IGNORE_REKOR* (`string`):: Skip Rekor transparency log checks during validation.
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/verify-enterprise-contract.adoc
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -36,6 +36,8 @@ You can also specify a policy configuration using a git url, e.g.
36
36
*REKOR_HOST* (`string`):: Rekor host for transparency log lookups
37
37
*CERTIFICATE_IDENTITY* (`string`):: Expected identity in the signing certificate for keyless verification. This should be the email or URI that was used when signing. You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification. The PUBLIC_KEY param will be ignored if this is provided.
38
38
*CERTIFICATE_OIDC_ISSUER* (`string`):: Expected OIDC issuer in the signing certificate for keyless verification. This should match the issuer that provided the identity token used for signing. You should provide both CERTIFICATE_OIDC_ISSUER and CERTIFICATE_IDENTITY for keyless verification. The PUBLIC_KEY param will be ignored if this is provided.
39
+
*CERTIFICATE_IDENTITY_REGEXP* (`string`):: Similar to CERTIFICATE_IDENTITY but the value is a regexp that will be matched. Note that CERTIFICATE_IDENTITY takes precendence over this if both are present.
40
+
*CERTIFICATE_OIDC_ISSUER_REGEXP* (`string`):: Similar to CERTIFICATE_OIDC_ISSUER but a regexp that will be matched. Note that CERTIFICATE_OIDC_ISSUER takes precendence over this if both are present.
39
41
*IGNORE_REKOR* (`string`):: Skip Rekor transparency log checks during validation.
"description": "Verify that the predicateType field of the attestation indicates the in-toto SLSA Provenance format was used to attest the PipelineRun.",
519
+
"title": "Expected attestation predicate type found"
"msg": "Image attestation check failed: no matching attestations: failed to verify certificate identity: no matching CertificateIdentity found, last error: expected SAN value to match regex \"^konformakommunity@\", got \"conformacommunity@gmail.com\"\nfailed to verify certificate identity: no matching CertificateIdentity found, last error: expected SAN value to match regex \"^konformakommunity@\", got \"conformacommunity@gmail.com\"",
612
+
"metadata": {
613
+
"code": "builtin.attestation.signature_check",
614
+
"description": "The attestation signature matches available signing materials.",
615
+
"title": "Attestation signature check passed"
616
+
}
617
+
},
618
+
{
619
+
"msg": "Image signature check failed: no matching attestations: failed to verify certificate identity: no matching CertificateIdentity found, last error: expected SAN value to match regex \"^konformakommunity@\", got \"conformacommunity@gmail.com\"\nfailed to verify certificate identity: no matching CertificateIdentity found, last error: expected SAN value to match regex \"^konformakommunity@\", got \"conformacommunity@gmail.com\"",
620
+
"metadata": {
621
+
"code": "builtin.image.signature_check",
622
+
"description": "The image signature matches available signing materials.",
0 commit comments