commit hash is signed using cosign. Signature is written to git object note.
-
Updated
Mar 23, 2021
commit hash is signed using cosign. Signature is written to git object note.
This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)
Stream, Mutate and Sign Images with AWS Lambda and ECR
Example code repo for blog post https://chainguard.dev/posts/2022-01-07-cosign-aws-codepipeline
A demonstration of how GoReleaser can help us to make software supply chain more secure by using bunch of tools such as cosign, syft, grype, slsa-provenance
Docker image for Cosign using alpine linux as base image.
AWS Pipelines utilizing Cosign to sign and verify containerized images.
Proof of concept that uses cosign and GitHub's in built OIDC for actions to sign container images, providing a proof that what is in the registry came from your GitHub action.
Demo to showcase how to build a golang application using ko. Sign and push the image to the container registry using https://sigstore.dev. Apply policy controller on Kubernetes to allow only signed images.
Deterministic container hashes and container signing using Cosign, Kaniko and Google Cloud Build
Cosign CircleCI orb. To learn more about cosign visit the GitHub repo
Sign your artifacts, source code or container images using Sigstore tools, Save the Signatures you want to use, and Validate & Control the deployments to allow only the known Sources based on Signatures, Maintainers & other payloads automatically.
Add a description, image, and links to the cosign topic page so that developers can more easily learn about it.
To associate your repository with the cosign topic, visit your repo's landing page and select "manage topics."