Skip to content

Latest commit

 

History

History
34 lines (29 loc) · 1.83 KB

verify-container.md

File metadata and controls

34 lines (29 loc) · 1.83 KB

How to verify a container signature

Senzing container image signatures are automatically verified after signing. See the sign image composite action for more details.

Verifying images outside of github actions

See the [cosign verification documentation] for more details. You will not need a key as we are using the GitHub OIDC token to sign images. See Keyless verification using OpenID Connect for more details.

  1. Install cosign
  2. Update values encased in <> in the following
    cosign verify --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
         --certificate-identity=https://github.com/<REPOSITORY_WORKFLOW_PATH>:@refs/tags/<image TAG> \
         <image URI>:<image TAG>
    Ex.
    cosign verify --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
         --certificate-identity=https://github.com/senzing-garage/test-ground/.github/workflows/docker-push-containers-to-dockerhub-and-ecr.yaml@refs/tags/0.0.19 \
         docker.io/senzing/test-ground:0.0.19
    HINT: For all community repositories the workflow file should be one of the values listed below. You can find the workflow in .github/workflows in the respective github repository for the image.
    • docker-push-containers-to-dockerhub.yaml
    • docker-push-containers-to-dockerhub-and-ecr.yaml
  3. Signature payloads created by cosign included the digest of the container image they are attached to. By default, cosign validates that this digest matches the container during cosign verify