sigstore
is a tool for signing and verifying Python package distributions.
- Support for signing Python package distributions using an OpenID Connect identity
- Support for publishing signatures to a Rekor instance
- Support for verifying signatures on Python package distributions
sigstore
requires Python 3.7 or newer, and can be installed directly via pip
:
python -m pip install sigstore
You can run sigstore
as a standalone program, or via python -m
:
sigstore --help
python -m sigstore --help
Top-level:
Usage: sigstore [OPTIONS] COMMAND [ARGS]...
Options:
--version Show the version and exit.
--help Show this message and exit.
Commands:
sign
verify
Signing:
Usage: sigstore sign [OPTIONS] FILE [FILE ...]
Options:
--identity-token TOKEN the OIDC identity token to use
--ctfe FILENAME A PEM-encoded public key for the CT log
(conflicts with --staging)
--oidc-client-id ID The custom OpenID Connect client ID to use
--oidc-client-secret SECRET The custom OpenID Connect client secret to
use
--oidc-issuer URL The custom OpenID Connect issuer to use
(conflicts with --staging)
--staging Use the sigstore project's staging
instances, instead of the default production
instances
--oidc-disable-ambient-providers
Disable ambient OIDC detection (e.g. on
GitHub Actions)
--output-signature FILE With a value, write a single signature to
the given file; without a value, write each
signing result to {input}.sig
--output-certificate FILE With a value, write a single signing
certificate to the given file; without a
value, write each signing certificate to
{input}.cert
--fulcio-url URL The Fulcio instance to use (conflicts with
--staging) [default:
https://fulcio.sigstore.dev]
--rekor-url URL The Rekor instance to use (conflicts with
--staging) [default:
https://rekor.sigstore.dev]
--help Show this message and exit.
Verifying:
Usage: sigstore verify [OPTIONS] FILE [FILE ...]
Options:
--cert FILENAME [required]
--signature FILENAME [required]
--cert-email TEXT
--staging Use the sigstore project's staging instances, instead
of the default production instances
--rekor-url URL The Rekor instance to use (conflicts with --staging)
[default: https://rekor.sigstore.dev]
--help Show this message and exit.
For environments that support OIDC natively, sigstore
supports automatic ambient credential detection:
- GitHub:
- Actions: requires setting the
id-token
permission, see https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect. An example is here.
- Actions: requires setting the
- Google Cloud:
- Compute Engine: automatic
- Cloud Build: requires setting
GOOGLE_SERVICE_ACCOUNT_NAME
to an appropriately configured service account name, see https://cloud.google.com/iam/docs/creating-short-lived-service-account-credentials#sa-credentials-direct. An example is here
- GitLab: planned, see sigstore#31
- CircleCI: planned, see sigstore#31
sigstore
is licensed under the Apache 2.0 License.
See the contributing docs for details.
Everyone interacting with this project is expected to follow the sigstore Code of Conduct.
Should you discover any security issues, please refer to sigstore's security process.
sigstore-python
is developed as part of the sigstore
project.
We also use a slack channel! Click here for the invite link.