mirror of
https://github.com/edgelesssys/constellation.git
synced 2025-05-25 09:21:11 -04:00
docs: fix broken links (#3359)
* Update cosign installation guide link * Update cosign overview link * Update cosign sbom link --------- Signed-off-by: Daniel Weiße <dw@edgeless.systems>
This commit is contained in:
parent
d2cbc0adef
commit
7bb6ad6cc2
36 changed files with 55 additions and 55 deletions
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -37,7 +37,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
||||||
:::
|
:::
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
# Verify the CLI
|
# Verify the CLI
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -25,7 +25,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
|
|
||||||
## Verify the signature
|
## Verify the signature
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
# Verify the CLI
|
# Verify the CLI
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -25,7 +25,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
|
|
||||||
## Verify the signature
|
## Verify the signature
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -37,7 +37,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
||||||
:::
|
:::
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -37,7 +37,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
||||||
:::
|
:::
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -37,7 +37,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
||||||
:::
|
:::
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -37,7 +37,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
||||||
:::
|
:::
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -37,7 +37,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
||||||
:::
|
:::
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -37,7 +37,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
||||||
:::
|
:::
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -37,7 +37,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
||||||
:::
|
:::
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -37,7 +37,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
This guide assumes Linux on an amd64 processor. The exact steps for other platforms differ slightly.
|
||||||
:::
|
:::
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -36,7 +36,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
# Verify the CLI
|
# Verify the CLI
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -25,7 +25,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
|
|
||||||
## Verify the signature
|
## Verify the signature
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -36,7 +36,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
# Verify the CLI
|
# Verify the CLI
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -25,7 +25,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
|
|
||||||
## Verify the signature
|
## Verify the signature
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -36,7 +36,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
# Verify the CLI
|
# Verify the CLI
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -25,7 +25,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
|
|
||||||
## Verify the signature
|
## Verify the signature
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -36,7 +36,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,6 @@
|
||||||
# Verify the CLI
|
# Verify the CLI
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -25,7 +25,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
|
|
||||||
## Verify the signature
|
## Verify the signature
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -33,7 +33,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
|
|
||||||
## Verify the signature
|
## Verify the signature
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -33,7 +33,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
|
|
||||||
## Verify the signature
|
## Verify the signature
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -33,7 +33,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
|
|
||||||
## Verify the signature
|
## Verify the signature
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
|
@ -40,7 +40,7 @@ cosign verify-blob --key cosign.pub --signature constellation.spdx.sbom.sig cons
|
||||||
|
|
||||||
### Container Images
|
### Container Images
|
||||||
|
|
||||||
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/signing/other_types#sboms-software-bill-of-materials) and uploaded to the same registry.
|
SBOMs for container images are [attached to the image using Cosign](https://docs.sigstore.dev/cosign/signing/other_types/#sboms-software-bill-of-materials) and uploaded to the same registry.
|
||||||
|
|
||||||
As a consumer, use cosign to download and verify the SBOM:
|
As a consumer, use cosign to download and verify the SBOM:
|
||||||
|
|
||||||
|
|
|
@ -8,7 +8,7 @@ This recording presents the essence of this page. It's recommended to read it in
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/signing/quickstart), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
Edgeless Systems uses [sigstore](https://www.sigstore.dev/) and [SLSA](https://slsa.dev) to ensure supply-chain security for the Constellation CLI and node images ("artifacts"). sigstore consists of three components: [Cosign](https://docs.sigstore.dev/cosign/signing/overview/), [Rekor](https://docs.sigstore.dev/logging/overview), and Fulcio. Edgeless Systems uses Cosign to sign artifacts. All signatures are uploaded to the public Rekor transparency log, which resides at `https://rekor.sigstore.dev`.
|
||||||
|
|
||||||
:::note
|
:::note
|
||||||
The public key for Edgeless Systems' long-term code-signing key is:
|
The public key for Edgeless Systems' long-term code-signing key is:
|
||||||
|
@ -33,7 +33,7 @@ You don't need to verify the Constellation node images. This is done automatical
|
||||||
|
|
||||||
## Verify the signature
|
## Verify the signature
|
||||||
|
|
||||||
First, [install the Cosign CLI](https://docs.sigstore.dev/system_config/installation). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
First, [install the Cosign CLI](https://docs.sigstore.dev/cosign/system_config/installation/). Next, [download](https://github.com/edgelesssys/constellation/releases) and verify the signature that accompanies your CLI executable, for example:
|
||||||
|
|
||||||
```shell-session
|
```shell-session
|
||||||
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
$ cosign verify-blob --key https://edgeless.systems/es.pub --signature constellation-linux-amd64.sig constellation-linux-amd64
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue