Skip to content

Conversation

@priyawadhwa
Copy link
Contributor

I filled in the last section of this doc! Let me know if I didn't do this the intended way 😅

2djlcXFUJb1xFwO5
-----END CERTIFICATE-----
tlog entry created with index: 782549

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Related feedback: it seems like Cosign should emit an immutable https:// link to rekor for the tlog entry here.

Now find it from the log:

```
$ uuid=$(rekor-cli search --artifact <(git rev-parse HEAD) | tail -n 1)

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I assume tail -n 1 retrieves the most recent signature for a given hash. I suppose a real world example would already know the git hash that it wanted to check...

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yah we're just checking out the most recent signature here. realistically you might get a list & have to go through each entry to see if a trusted identity signed off on the commit.

@priyawadhwa priyawadhwa force-pushed the keyless-sign-git-commit branch from ab20430 to 3abd1e0 Compare October 20, 2021 20:13
@dlorenc dlorenc merged commit b2351d3 into sigstore:main Oct 20, 2021
@github-actions github-actions bot added this to the v1.3.0 milestone Oct 20, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants