Verifying a release binary
Releases are signed with cosign
as part of the release
process. The build produces additional attestation bundles during this process,
which can be used to verify both binaries and Docker images.
For binaries, bundles are present in the tar.gz
archive created by the
release. For images, bundles are stored in the OCI registry alongside the image
itself.
Obtaining cosign
Download from the sigstore/cosign
project on GitHub, and
verify the release as you prefer.
Release identity
The certificates issued by the release are issued for the GitHub Actions OIDC provider, and the identity is the executed workflow, referenced by the Git tag being built.
Field | Format |
---|---|
Issuer | https://token.actions.githubusercontent.com |
Identity | https://github.com/chinmina/chinmina-bridge/.github/workflows/release.yaml@refs/tags/<tag name> |
Verifying an image release
Images are published to Docker Hub in the chinmina
repository. The images are
named chinmina-bridge
and are labelled with their release tag (vX.Y.Z
).
An image can be verified with the following cosign
command:
The path .[].optional.Bundle.Payload.logIndex
is the index entry in the public
transparency log, recording the details of the signing event. The details of the
event can be found at: https://search.sigstore.dev/.
For a concrete example, check out the log entry for v0.7.0.
Verifying the binary releases
Download and extract the tar.gz
of the binary you’re interested in. The
artifacts present include both the binary itself (named chinmina-bridge
) and
the signing bundle (chinmina-bridge.cosign.bundle
).