/ student-intifada / node_modules / sigstore /

[ICO]NameLast modifiedSizeDescription
[PARENTDIR]Parent Directory  -  
[DIR]dist/a year ago -  
[   ]LICENSEa year ago 11K 
[TXT]README.mda year ago9.8K595aea1 more query options + view options [كارل مبارك]
[   ]package.jsona year ago1.2Kafd0ccc remove unused [كارل مبارك]
README.md

sigstore · npm version CI Status Smoke Test Status

A JavaScript library for generating and verifying Sigstore signatures. One of the intended uses is to sign and verify npm packages but it can be used to sign and verify any file.

Features

Prerequisites

Installation

npm install sigstore

Compatibility

The following table documents which combinations of Sigstore bundle versions and Rekor types can be verified by different versions of the sigstore library. It also lists which sigstore versions were shipped with different npm CLI versions.

sigstore 1.0 1.1 1.2 1.3 1.4 1.5 1.6 1.7 1.8
npm 9.5.0 9.6.2 9.6.3 9.6.5 9.6.6 9.6.7 9.7.2 9.8.0
Bundle Version Rekor Type
0.1 hashedrekord :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark:
intoto :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark:
dsse :x: :x: :x: :x: :x: :x: :white_check_mark: :white_check_mark: :white_check_mark:
0.2 hashedrekord :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark:
intoto :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark: :white_check_mark:
dsse :x: :x: :x: :x: :x: :x: :white_check_mark: :white_check_mark: :white_check_mark:

Usage

const { attest, verify } = require('sigstore');
import { attest, verify } from 'sigstore';

sign(payload[, options])

Generates a Sigstore signature for the supplied payload. Returns a Sigstore bundle containing the signature and the verification material necessary to verify the signature.

attest(payload, payloadType[, options])

Generates a Sigstore signature for the supplied in-toto statement. Returns a Sigstore bundle containing the DSSE-wrapped statement and signature as well as the verification material necessary to verify the signature.

verify(bundle[, payload][, options])

Verifies the signature in the supplied bundle.

Credential Sources

GitHub Actions

If sigstore-js detects that it is being executed on GitHub Actions, it will use ACTIONS_ID_TOKEN_REQUEST_URL and ACTIONS_ID_TOKEN_REQUEST_TOKEN environment variables to request an OIDC token with the correct scope.

Note: the id_token: write permission must be granted to the GitHub Action Job.

See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect for more details.

Environment Variables

If the SIGSTORE_ID_TOKEN environment variable is set, it will use this to authenticate to Fulcio. It is the callers responsibility to make sure that this token has the correct scopes.

Apache/2.4.38 (Debian) Server at www.karls.computer Port 80