Skip to content

Commit

Permalink
OIDC identity matching for keyless verification
Browse files Browse the repository at this point in the history
Signed-off-by: Stefan Prodan <[email protected]>
  • Loading branch information
stefanprodan committed Nov 7, 2023
1 parent 3c8072d commit 0156974
Showing 1 changed file with 14 additions and 2 deletions.
16 changes: 14 additions & 2 deletions rfcs/0003-kubernetes-oci/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@

**Creation date:** 2022-03-31

**Last update:** 2023-02-20
**Last update:** 2023-11-07

## Summary

Expand Down Expand Up @@ -232,14 +232,26 @@ spec:
```

For verifying public artifacts which are signed using the keyless method,
the `spec.verify.secretRef` field must be omitted:
the `.spec.verify.matchOIDCIdentity` field must be used instead of
`spec.verify.secretRef`.

```yaml
spec:
verify:
provider: cosign
matchOIDCIdentity:
- issuer: "^https://token.actions.githubusercontent.com$"
subject: "^https://github.com/org/app-repository.*$"
```

The `matchOIDCIdentity` entries must contain the following fields:

- `.issuer`, regexp that matches against the OIDC issuer.
- `.subject`, regexp that matches against the subject identity in the certificate.

The entries are evaluated in an OR fashion, i.e. the identity is deemed to be
verified if any one entry successfully matches against the identity.

When using the keyless method, Flux will verify the signatures in the Rekor
transparency log instance hosted at [rekor.sigstore.dev](https://rekor.sigstore.dev/).

Expand Down

0 comments on commit 0156974

Please sign in to comment.