You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
rekor's intoto entry is kinda borked (sigstore/rekor#582): the rekor entry stores the unsigned payload in the attestation field of the entry, and then stores the hash of the entire envelope (incl sigs) in the entry along with the signing cert.
right now we can get around this by looking for IntotoObjs on rekor associated to the binary found in the Subject.Digest of the provenance, but I can't get a search by the hash of the unsigned prov to work, and search by the whole envelope is not supported either
there's a PR out for a new type to fix these issues
for now, I have the binary and the signed provenance and I can:
I'll search by the binary artifact digest to get the rekor entry. I may get multiple entries by Subject.Digest
Select the right rekor entry by (1) matching the Attestation with the unsigned provenance payload. (TODO: because of PAE stuff, I don't know how to verify the hash of the whole signed envelope against the signed provenance) or (2) iterating through each entry and verifying my signed provenance against each of the signing certs
Extract the signing certificate from the entry
Verify-blob the signed payload with the signing certificate
Then extract the workflow with the referenes from the signing certificate.
The text was updated successfully, but these errors were encountered:
rekor's intoto entry is kinda borked (sigstore/rekor#582): the rekor entry stores the unsigned payload in the attestation field of the entry, and then stores the hash of the entire envelope (incl sigs) in the entry along with the signing cert.
right now we can get around this by looking for IntotoObjs on rekor associated to the binary found in the Subject.Digest of the provenance, but I can't get a search by the hash of the unsigned prov to work, and search by the whole envelope is not supported either
there's a PR out for a new type to fix these issues
for now, I have the binary and the signed provenance and I can:
Attestation
with the unsigned provenance payload. (TODO: because of PAE stuff, I don't know how to verify the hash of the whole signed envelope against the signed provenance) or (2) iterating through each entry and verifying my signed provenance against each of the signing certsThen extract the workflow with the referenes from the signing certificate.
The text was updated successfully, but these errors were encountered: