Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/sigstore/sigstore
Common go library shared across sigstore services and clients
https://github.com/sigstore/sigstore
cosign go golang security sigstore supply-chain
Last synced: 3 months ago
JSON representation
Common go library shared across sigstore services and clients
- Host: GitHub
- URL: https://github.com/sigstore/sigstore
- Owner: sigstore
- License: apache-2.0
- Created: 2021-02-13T17:48:28.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2024-10-22T07:49:52.000Z (4 months ago)
- Last Synced: 2024-10-23T09:37:13.733Z (4 months ago)
- Topics: cosign, go, golang, security, sigstore, supply-chain
- Language: Go
- Homepage: https://sigstore.dev
- Size: 3.97 MB
- Stars: 444
- Watchers: 16
- Forks: 122
- Open Issues: 43
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Code of conduct: CODE_OF_CONDUCT.md
- Codeowners: CODEOWNERS
Awesome Lists containing this project
README
# sigstore framework
[![Fuzzing Status](https://oss-fuzz-build-logs.storage.googleapis.com/badges/sigstore.svg)](https://bugs.chromium.org/p/oss-fuzz/issues/list?sort=-opened&can=1&q=proj:sigstore) [![CII Best Practices](https://bestpractices.coreinfrastructure.org/projects/5716/badge)](https://bestpractices.coreinfrastructure.org/projects/5716)sigstore/sigstore contains common [Sigstore](https://www.sigstore.dev/) code: that is, code shared by infrastructure (e.g., [Fulcio](https://github.com/sigstore/fulcio) and [Rekor](https://github.com/sigstore/rekor)) and Go language clients (e.g., [Cosign](https://github.com/sigstore/cosign) and [Gitsign](https://github.com/sigstore/gitsign)).
This library currently provides:
* A signing interface (support for ecdsa, ed25519, rsa, DSSE (in-toto))
* OpenID Connect fulcio client codeThe following KMS systems are available:
* AWS Key Management Service
* Azure Key Vault
* HashiCorp Vault
* Google Cloud Platform Key Management ServiceFor example code, look at the relevant test code for each main code file.
## Fuzzing
The fuzzing tests are within https://github.com/sigstore/sigstore/tree/main/test/fuzz## Security
Should you discover any security issues, please refer to sigstores [security
process](https://github.com/sigstore/.github/blob/main/SECURITY.md)For container signing, you want [cosign](https://github.com/sigstore/cosign)