File tree 2 files changed +30
-0
lines changed
2 files changed +30
-0
lines changed Original file line number Diff line number Diff line change @@ -307,6 +307,18 @@ For publicly available HelmCharts, which are signed using the
307
307
[Cosign Keyless](https://github.com/sigstore/cosign/blob/main/KEYLESS.md) procedure,
308
308
you can enable the verification by omitting the `.verify.secretRef` field.
309
309
310
+ To verify the identity subject and the OIDC issuer present in the Fulcio
311
+ certificate, you can specify a list of OIDC identity matchers using
312
+ `.spec.verify.matchOIDCIdentity`. The matcher provides two required fields :
313
+
314
+ - ` .issuer` , to specify a regexp that matches against the OIDC issuer.
315
+ - ` .subject` , to specify a regexp that matches against the subject identity in
316
+ the certificate.
317
+ Both values should follow the [Go regular expression syntax](https://golang.org/s/re2syntax).
318
+
319
+ The matchers are evaluated in an OR fashion, i.e. the identity is deemed to be
320
+ verified if any one matcher successfully matches against the identity.
321
+
310
322
Example of verifying HelmCharts signed by the
311
323
[Cosign GitHub Action](https://github.com/sigstore/cosign-installer) with GitHub OIDC Token :
312
324
@@ -325,6 +337,9 @@ spec:
325
337
version: ">=6.1.6"
326
338
verify:
327
339
provider: cosign
340
+ matchOIDCIdentity:
341
+ - issuer: "^https://token.actions.githubusercontent.com$"
342
+ subject: "^https://github.com/stefanprodan/podinfo.*$"
328
343
` ` `
329
344
330
345
` ` ` yaml
Original file line number Diff line number Diff line change @@ -555,6 +555,18 @@ For publicly available OCI artifacts, which are signed using the
555
555
[Cosign Keyless](https://github.com/sigstore/cosign/blob/main/KEYLESS.md) procedure,
556
556
you can enable the verification by omitting the `.verify.secretRef` field.
557
557
558
+ To verify the identity subject and the OIDC issuer present in the Fulcio
559
+ certificate, you can specify a list of OIDC identity matchers using
560
+ `.spec.verify.matchOIDCIdentity`. The matcher provides two required fields :
561
+
562
+ - ` .issuer` , to specify a regexp that matches against the OIDC issuer.
563
+ - ` .subject` , to specify a regexp that matches against the subject identity in
564
+ the certificate.
565
+ Both values should follow the [Go regular expression syntax](https://golang.org/s/re2syntax).
566
+
567
+ The matchers are evaluated in an OR fashion, i.e. the identity is deemed to be
568
+ verified if any one matcher successfully matches against the identity.
569
+
558
570
Example of verifying artifacts signed by the
559
571
[Cosign GitHub Action](https://github.com/sigstore/cosign-installer) with GitHub OIDC Token :
560
572
@@ -568,6 +580,9 @@ spec:
568
580
url: oci://ghcr.io/stefanprodan/manifests/podinfo
569
581
verify:
570
582
provider: cosign
583
+ matchOIDCIdentity:
584
+ - issuer: "^https://token.actions.githubusercontent.com$"
585
+ subject: "^https://github.com/stefanprodan/podinfo.*$"
571
586
` ` `
572
587
573
588
The controller verifies the signatures using the Fulcio root CA and the Rekor
You can’t perform that action at this time.
0 commit comments