8000 Support for verifying executables within archives · Issue #3754 · aquaproj/aqua · GitHub
[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content
Support for verifying executables within archives #3754
Open
@scop

Description

@scop

Feature Overview

Would be nice to have support for verifying signatures/provenance for executables coming from inside archives. Currently it seems aqua can verify only the downloaded assets as-is.

Why is the feature needed?

Example case in https://github.com/kubewarden/kwctl: GH artifact attestations are generated, but only for executables that are put within archives, not the archives themselves.

This practice is not that widespread at the moment at least with GH attestations I believe (kwctl is the first I met it with), but coincidentally I happened to think of it being a good practice already some time ago: it enables re-verification of already installed binaries afterwards.

I suppose this would be applicable at least some other signing/provenance types besides GH attestations as well.

Known projects using this type of attestations:

Example Code

Configuration

# maybe files could be used/extended for this?
    files:
      - name: example
        github_artifact_attestations:
          signer_workflow: ...

Note

No response

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions

      0