You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
cmd.Flags().StringVarP(&ko.KeyPath, "key", "k", "", "Path to the signing key")
31
31
cmd.Flags().StringVar(&ko.CertPath, "certificate", "", "Path to the signing key's certificate")
32
-
cmd.Flags().StringSliceVarP(&ko.IntermediatePaths, "intermediates", "i", []string{}, "Intermediates that link trust back to a root in the policy")
32
+
cmd.Flags().StringSliceVarP(&ko.IntermediatePaths, "intermediates", "i", []string{}, "Intermediates that link trust back to a root of trust in the policy")
33
33
cmd.Flags().StringVar(&ko.SpiffePath, "spiffe-socket", "", "Path to the SPIFFE Workload API socket")
34
34
cmd.Flags().StringVar(&ko.FulcioURL, "fulcio", "", "Fulcio address to sign with")
35
35
cmd.Flags().StringVar(&ko.OIDCIssuer, "fulcio-oidc-issuer", "", "OIDC issuer to use for authentication")
The AWS Instance Identity Attestor communicates with the AWS Instance Metadata to collect
4
-
information about the instance Witness is being executed on. The documents signature is
3
+
The AWS (Amazon Web Services) Instance Identity Attestor communicates with the AWS Instance Metadata to collect
4
+
information about the AWS instance Witness on which executing. The document signature is
5
5
verified with the AWS RSA public certificate available [here](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/verify-signature.html).
6
-
This currently does not work for the Hong Kong, Bahrain, Cape Town, Milan, China, or
6
+
This verification method currently does not work for the Hong Kong, Bahrain, Cape Town, Milan, China, or
7
7
GovCloud regions.
8
8
9
9
## Subjects
10
10
11
11
| Subject | Description |
12
12
| ------- | ----------- |
13
-
|`instanceid`| The ID of the instance Witness was executed on|
13
+
|`instanceid`| The ID of the AWS instance where Witness was executed |
14
14
|`accountid`| ID of the account that owns the AWS instance |
15
-
|`imageid`| ID of the AMI the instance was running at time of execution |
16
-
|`privateip`| IP of the instance at time of execution |
15
+
|`imageid`| ID of the AMI ([Amazon Machine Image](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/AMIs.html)) the instance was running at time of execution |
16
+
|`privateip`| IP address of the instance at time of execution |
The GCP Instance Identity Attestor communicates with the GCP metadata server to collect information
4
-
about the instance Witness is being exected on. The instance identity JWT's signature is validated
5
-
against Google's JWKS to ensure authenticity.
3
+
The [Google Cloud Platform](https://console.cloud.google.com/getting-started?supportedpurview=project) (GCP) Instance Identity Attestor communicates with the [GCP metadata server](https://cloud.google.com/appengine/docs/standard/java/accessing-instance-metadata) to collect information
4
+
about the instance on which TestifySec Witness is being exected. The instance identity JSON Web Token signature is validated
5
+
against Google's JWKS ([JSON Web Key Set](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets)) to ensure authenticity.
6
6
7
7
## Subjects
8
8
9
9
| Subject | Description |
10
10
| ------- | ----------- |
11
-
|`instanceid`| ID of the Google Compute instance Witness was executed on|
12
-
|`instancename`| Name of the Compute instance Witness was executed on|
13
-
|`projectid`| The ID of the project that the instance belonged to|
14
-
|`projectnumber`| Number of the project that the instance belonged to|
15
-
|`clusteruid`| UID of the cluster if the execution enviornment was a GKE clister|
11
+
|`instanceid`| ID of the Google Compute instance on which Witness was executed |
12
+
|`instancename`| Name of the Compute instance on which Witness was executed |
13
+
|`projectid`| The ID of the project to which the instance belonged |
14
+
|`projectnumber`| Number of the project to which the instance belonged |
15
+
|`clusteruid`| UID of the cluster if the execution environment was a [Google Kubernetes Engine](https://cloud.google.com/kubernetes-engine) (GKE) cluster|
The Gitlab attestor records information about the Gitlab CI/CD job execution that
4
-
Witness was run in. Witness verifies the JWT provided in `CI_JOB_JWT` against the
5
-
instance's JWKS to ensure authenticity at execution time.
3
+
The [GitLab](https://about.gitlab.com/) Attestor records information about the GitLab CI/CD job execution in which
4
+
TestifySec Witness was run. Witness verifies the JWT ([JSON Web Token](https://en.wikipedia.org/wiki/JSON_Web_Token)) provided in `CI_JOB_JWT` against the
5
+
instance's JWKS ([JSON Web Key Set](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets)) to ensure authenticity at execution time.
6
6
7
7
## Subjects
8
8
9
9
| Subject | Description |
10
10
| ------- | ----------- |
11
-
|`pipelineurl`|Url of the CI/CD pipeline that this job belonged to|
12
-
|`joburl`|Url of the CI/CD job that this attestor describes |
13
-
|`projecturl`|Url of the project that owns the CI/CD pipeline and job |
11
+
|`pipelineurl`|URL of the CI/CD pipeline to which this job belonged |
12
+
|`joburl`|URL of the CI/CD job that this attestor describes |
13
+
|`projecturl`|URL of the project that owns the CI/CD pipeline and job |
The JWT attestor verifies a JWT against a JWKS and records information about the
3
+
The JWT ([JSON Web Token](https://en.wikipedia.org/wiki/JSON_Web_Token)) Attestor verifies a JWT against a JWKS ([JSON Web Key Set](https://auth0.com/docs/secure/tokens/json-web-tokens/json-web-key-sets)) and records information about the
4
4
claims of the JWT. The JWK that was used to verify the JWT is also recorded.
0 commit comments