Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Documentation on how to use sig files for release binaries #1134

Closed
lf-hernandez opened this issue May 8, 2024 · 1 comment
Closed

Documentation on how to use sig files for release binaries #1134

lf-hernandez opened this issue May 8, 2024 · 1 comment

Comments

@lf-hernandez
Copy link

Summary

Can the docs have a amendment on how to use the .sig files to verify the integrity of a release binary?

The checksum verification is fairly straightforward:

$ cat gosec_2.19.0_checksums.txt
...
78ec94e2d726d939ac0cb77082b00528e3aec3c68f3b94b41405f21a88a06fe7  gosec_2.19.0_darwin_arm64.tar.gz
...
$ echo "78ec94e2d726d939ac0cb77082b00528e3aec3c68f3b94b41405f21a88a06fe7  gosec_2.19.0_darwin_arm64.tar.gz" | shasum -a 256 -c
gosec_2.19.0_darwin_arm64.tar.gz: OK

But it's not clear to me how to verify via the sig files:

$ gpg --verify gosec_2.19.0_darwin_arm64.tar.gz.sig gosec_2.19.0_darwin_arm64.tar.gz
gpg: no valid OpenPGP data found.
gpg: the signature could not be verified.

Steps to reproduce the behavior

Utilize gpg --verify [signature_file] [file]

gosec version

v2.19.0

Go version (output of 'go version')

go version go1.22.2 darwin/arm64

Operating system / Environment

macOS Sonoma 14.4.1 arm64

Expected behavior

Succesful verification

Actual behavior

gpg seems to fail to verify. The file itself is verified via the checksum.

@ccojocar
Copy link
Member

This is already documented in the README in the Release section. You need the cosign tool in order to verify the signature.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants