Use Cosign to verify image signatures and SBOM attestations for Minimus images
reg.mini.dev/{image}
is signed by a trusted identity (GitHub Actions workflow from minimusio/images
). If the verification is successful, you will receive a JSON with information about the signature.
Explanation:
cosign verify
instructs Cosign to verify the cryptographic signature of the specified container image.--certificate-oidc-issuer=https://token.actions.githubusercontent.com
is used for images signed by an automated GitHub Actions workflow, as in our case.--certificate-identity=https://github.com/minimusio/images/.github/workflows/build.yaml@refs/heads/main
defines the expected identity of the signer.
minimusio/images
), specifically from the build.yaml
workflow on the main
branch.| jq
formats the output in a human-readable JSON structure using the JQ JSON processor.cosign verify-attestation
command to verify the image SBOM. The SBOM is created and signed during the image build workflow and is stored along with the image in the registry.
You will need to specify the architecture-specific image digest.
cosign download attestation
command to print the SBOM attestation directly to the terminal. The SBOM is created and signed during the image build workflow and is stored along with the image in the registry.
You will need to specify the image architecture, for example linux/amd64
.