cosign icon indicating copy to clipboard operation
cosign copied to clipboard

Code signing and transparency for containers and binaries

Results 291 cosign issues
Sort by recently updated
recently updated
newest added

**Description** A lot of the signing logic is currently in the `cmd` package. https://github.com/sigstore/cosign/blob/main/cmd/cosign/cli/sign/sign.go It would be great if more of this logic can be moved into the `pkg` package...

enhancement

**Description** I've created an in-toto attestation and uploaded it to a image registry. When I tried to use `cosign verify-attestation --policy my.cue ...` the policy written in CUE was not...

bug

Goal is to be able to successfully sign and verify container images without having to communicate with tlog when `--upload=false` Status: - [ ] - Disable uploading to tlog -...

This is some WIP TUF code. The major thing I want to do is to not rely on my hand-grown store. I'd like to remove a lot of it in...

Getting `MANIFEST_UNKNOWN: manifest unknown` error ```sh cosign download sbom ghcr.io/xmlking/grpc-starter-kit/greeter:latest --output-file=sbom.spdx ``` Error ``` Error: GET https://ghcr.io/v2/xmlking/grpc-starter-kit/greeter/manifests/sha256-4ae72f03d893bae528ae69048360d9cf674552688f76fc59940132d4175a90fc.sbom: MANIFEST_UNKNOWN: manifest unknown main.go:46: error during command execution: GET https://ghcr.io/v2/xmlking/grpc-starter-kit/greeter/manifests/sha256-4ae72f03d893bae528ae69048360d9cf674552688f76fc59940132d4175a90fc.sbom: MANIFEST_UNKNOWN: manifest unknown...

bug

**Description** Currently, cosign is not able to leverage the existing trust established by container runtime engines such as Docker or Containerd against private registries signed with an internally-trusted certificate authority....

enhancement

When using `COSIGN_DOCKER_MEDIA_TYPES=1 cosign attest`, the generated manifest contains a nested non-docker entity: ``` $ COSIGN_DOCKER_MEDIA_TYPES=1 cosign -d attest --predicate /tmp/predicate.json --key /tmp/signing-key quay.io/lucarval/festoji:latest ... {"schemaVersion":2,"mediaType":"application/vnd.docker.distribution.manifest.v2+json","config":{"mediaType":"application/vnd.docker.container.image.v1+json","size":233,"digest":"sha256:cb978855b77b57c23449c4bbaa36fcd9c4c390ead881eb0eb485681756dcb644"},"layers":[{"mediaType":"application/vnd.dsse.envelope.v1+json","size":4516,"digest":"sha256:da0941eb5616c32607785d97f8a619acd5e46bffeb711f98c8086d9795795534","annotations":{"dev.cosignproject.cosign/signature":""}}]} 2022/03/22 10:00:16

bug

**Description** https://github.com/philips-labs/slsa-provenance-action generates provenance where each tag is captured as a subject in the provenance. ```json { "_type": "https://in-toto.io/Statement/v0.1", "subject": [ { "name": "philipssoftware/slsa-provenance:dddb40e199ae28d4cd2f17bad7f31545556fdd3d", "digest": { "sha256": "e3378aef23821fd6e210229e5b98b5bead2858581b2d590d9e3b49d53c3f71e7" } },...

enhancement

When I try to list tokens, I am given the unhelpful error "Error: flag: help requested" # Expected behaviour ```bash export COSIGN_PKCS11_MODULE_PATH=/usr/local/lib/libykcs11.dylib ./cosign pkcs11-tool list-tokens Listing tokens of PKCS11 module...

bug

**Description** As a follow on to the #1610 we should keep track of Rekor tree state and complain loudly (just like rekor-cli does) if things change.

enhancement