Replies: 1 comment 1 reply
-
|
It's fine, you can use cosign keyless in GitHub Actions for private OCI registries and artifacts. I use it for private ECR repositories. We push and sign them with an IAM Role in the GitHub Action and do the same in-cluster to pull and verify. In the |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Hi,
I'm testing out keyless signing of OCI artefacts with GitHub actions. We use private repositories, and our OCI artefacts are not public. Flux OCI repository docs say:
Are there any risks involved using keyless signing/verification for private OCI artefacts? I'm aware that cosign uses public Rekor server and that those entries are publicly available, but that's just signature and a bit of related metadata, right?
I tried examining
Body.HashedRekordObj.signature.contentfor our entries and it looks like binary base64-encoded data. There is noBody.HashedRekordObj.signature.formatfield, mentioned in some of Cosign/Rekor examples.Thank you!
Beta Was this translation helpful? Give feedback.
All reactions