You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -113,3 +123,82 @@ shasum -a 256 -c terraform-provider-github_${version}_SHA256SUMS --ignore-missin
113
123
```
114
124
115
125
This will verify that your downloaded artifact matches the signed checksum, confirming its integrity and authenticity.
126
+
127
+
## Verifying SLSA Provenance Attestations with Cosign
128
+
129
+
In addition to using the GitHub CLI, you can verify SLSA provenance attestations using Cosign by downloading the attestation and verifying it against your local artifact.
130
+
131
+
### Prerequisites
132
+
133
+
1. Install `cosign` for verifying attestations. See the [installation instructions](https://docs.sigstore.dev/cosign/system_config/installation/).
134
+
2. Install `gh` (GitHub CLI) if you haven't already. See the [installation instructions](https://github.com/cli/cli#installation).
135
+
136
+
### Download and verify attestation
137
+
138
+
> [!NOTE]
139
+
> Make sure to replace x.y.z with the actual release tag you want to verify.
140
+
141
+
> [!CAUTION]
142
+
> The attestations are available only for the releases created since the version `v6.9.0` of this project.
A successful verification will output `Verified OK`, confirming that the artifact was built by the trusted GitHub Actions workflow and its provenance is securely recorded.
175
+
176
+
### Verifying all release artifacts
177
+
178
+
To verify all release artifacts for a specific version:
This approach calculates the digest for each artifact and uses the corresponding specific bundle file, ensuring each artifact is verified against its own attestation.
0 commit comments