cosign icon indicating copy to clipboard operation
cosign copied to clipboard

Code signing and transparency for containers and binaries

Results 291 cosign issues
Sort by recently updated
recently updated
newest added
trafficstars

**Description** [`github.com/sigstore/cosign/cmd/cosign/cli/fulcio/fulcioroots`](https://pkg.go.dev/github.com/sigstore/cosign/cmd/cosign/cli/fulcio/fulcioroots) contains methods to get `x509.CertPool`s representing Fulcio's root and intermediates. To do this, it calls [`initRoots`](https://github.com/sigstore/cosign/blob/89b9e88d3e4b6f103cd3faf2124bd3dedbc82b00/cmd/cosign/cli/fulcio/fulcioroots/fulcioroots.go#L85), which based on the presence of a `SIGSTORE_ROOT_FILE` env var either loads...

enhancement

**Description** When I follow the installation instructions at https://docs.sigstore.dev/cosign/installation I get an error: ``` $ go install github.com/sigstore/cosign/cmd/cosign@latest go: downloading github.com/sigstore/cosign v1.8.0 go: github.com/sigstore/cosign/cmd/cosign@latest (in github.com/sigstore/[email protected]): The go.mod file for...

bug

I am currently focusing on cosign verify, but what I am writing probably applies to cosign sign too. I am using AWS KMS to sign images in ECR. There are...

bug

**Question** I pull images from images registry and I want verify these local images.Can I use cosign to verify local images? These images have been singed by cosign in remote...

question

**Question** Is it possible to use `upload blob` with an identity token? Looking in the documentation I found this is supported in the sign command with the `--identity-token` flag but...

question

When using a local PEM key file, a PKCS#11 key, or a KMS key a user should be able to specify `--cert` and something like `--chain` to specify the [`dev.sigstore.cosign/certificate`](https://github.com/sigstore/cosign/blob/main/specs/SIGNATURE_SPEC.md#certificate)...

enhancement

**Description** There is now a public staging instance of fulcio and rekor - https://fulcio.sigstage.dev - https://rekor.sigstage.dev To use cosign in keyless mode requires - deleting the local cosign initialization information...

enhancement

https://github.com/sigstore/cosign/commit/ac682db9511cc610d5a37704776300421d2c5e30 (CC @asraa) adds the following lines: https://github.com/sigstore/cosign/blob/e74f180ce697dcde62dbe12f48f1a6a26522ea77/cmd/cosign/cli/verify/verify_blob.go#L328-L330 Either (1) this is inverted and it should return `err` or (2) it deserves a comment as to why silence this error...

bug
good first issue

If I have an unknown flag in my CLI arguments, `cosign` fails no matter how hard I tell it that I want help: ```shell $ cosign sign --bundle foo --help...

bug

Hi! I saw @developer-guy open https://github.com/anchore/grype/issues/614. I think vulnerability scan attestations are a great idea, and I've been catching up on what exists already via these places so far: -...

question