@@ -5,7 +5,7 @@ gh-action-sigstore-python
55[ ![ Self-test] ( https://github.com/sigstore/gh-action-sigstore-python/actions/workflows/selftest.yml/badge.svg )] ( https://github.com/sigstore/gh-action-sigstore-python/actions/workflows/selftest.yml )
66
77A GitHub Action that uses [ ` sigstore-python ` ] ( https://github.com/sigstore/sigstore-python )
8- to sign Python packages .
8+ to generate Sigstore signatures .
99
1010## Index
1111
@@ -23,24 +23,22 @@ Simply add `sigstore/gh-action-sigstore-python` to one of your workflows:
2323jobs :
2424 selftest :
2525 runs-on : ubuntu-latest
26+ permissions :
27+ id-token : write
2628 steps :
2729 - uses : actions/checkout@v3
2830 - name : install
2931 run : python -m pip install .
30- - uses : sigstore/gh-action-sigstore-python@v0.2 .0
32+ - uses : sigstore/gh-action-sigstore-python@v0.3 .0
3133 with :
3234 inputs : file.txt
3335` ` `
3436
35- Your workflow must have permission to request the OIDC token to authenticate with. This can be done
36- by having a top-level ` permission` setting for your workflow.
37+ Note: Your workflow ** must** have permission to request the OIDC token to authenticate with.
38+ This can be done by setting ` id-token: write` on your job (as above) or workflow.
3739
38- ` ` ` yaml
39- permissions:
40- id-token: write
41- ` ` `
42-
43- More information about permission settings can be found [here](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#adding-permissions-settings).
40+ More information about permission settings can be found
41+ [here](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect#adding-permissions-settings).
4442
4543# # Configuration
4644
@@ -55,15 +53,15 @@ provided.
5553To sign one or more files :
5654
5755` ` ` yaml
58- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
56+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
5957 with:
6058 inputs: file0.txt file1.txt file2.txt
6159` ` `
6260
6361The `inputs` argument also supports file globbing :
6462
6563` ` ` yaml
66- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
64+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
6765 with:
6866 inputs: ./path/to/inputs/*.txt
6967` ` `
@@ -76,7 +74,7 @@ The `identity-token` setting controls the OpenID Connect token provided to Fulci
7674workflow will use the credentials found in the GitHub Actions environment.
7775
7876` ` ` yaml
79- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
77+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
8078 with:
8179 inputs: file.txt
8280 identity-token: ${{ IDENTITY_TOKEN }} # assigned elsewhere
@@ -92,7 +90,7 @@ Server during OAuth2.
9290Example :
9391
9492` ` ` yaml
95- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
93+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
9694 with:
9795 inputs: file.txt
9896 oidc-client-id: alternative-sigstore-id
@@ -108,7 +106,7 @@ Connect Server during OAuth2.
108106Example :
109107
110108` ` ` yaml
111- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
109+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
112110 with:
113111 inputs: file.txt
114112 oidc-client-secret: alternative-sigstore-secret
@@ -124,7 +122,7 @@ when signing multiple input files.
124122Example :
125123
126124` ` ` yaml
127- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
125+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
128126 with:
129127 inputs: file.txt
130128 signature: custom-signature-filename.sig
@@ -133,7 +131,7 @@ Example:
133131However, this example is invalid :
134132
135133` ` ` yaml
136- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
134+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
137135 with:
138136 inputs: file0.txt file1.txt file2.txt
139137 signature: custom-signature-filename.sig
@@ -149,7 +147,7 @@ work when signing multiple input files.
149147Example :
150148
151149` ` ` yaml
152- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
150+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
153151 with:
154152 inputs: file.txt
155153 certificate: custom-certificate-filename.crt
@@ -158,7 +156,7 @@ Example:
158156However, this example is invalid :
159157
160158` ` ` yaml
161- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
159+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
162160 with:
163161 inputs: file0.txt file1.txt file2.txt
164162 certificate: custom-certificate-filename.crt
@@ -174,7 +172,7 @@ from. This setting cannot be used in combination with the `staging` setting.
174172Example :
175173
176174` ` ` yaml
177- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
175+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
178176 with:
179177 inputs: file.txt
180178 fulcio-url: https://fulcio.sigstage.dev
@@ -190,7 +188,7 @@ cannot be used in combination with the `staging` setting.
190188Example :
191189
192190` ` ` yaml
193- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
191+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
194192 with:
195193 inputs: file.txt
196194 rekor-url: https://rekor.sigstage.dev
@@ -206,7 +204,7 @@ in combination with the `staging` setting.
206204Example :
207205
208206` ` ` yaml
209- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
207+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
210208 with:
211209 inputs: file.txt
212210 ctfe: ./path/to/ctfe.pub
@@ -222,7 +220,7 @@ be used in combination with `staging` setting.
222220Example :
223221
224222` ` ` yaml
225- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
223+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
226224 with:
227225 inputs: file.txt
228226 ctfe: ./path/to/rekor.pub
@@ -238,7 +236,7 @@ instead of the default production instances.
238236Example :
239237
240238` ` ` yaml
241- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
239+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
242240 with:
243241 inputs: file.txt
244242 staging: true
@@ -261,7 +259,7 @@ and `verify-oidc-issuer` settings. Failing to pass these will produce an error.
261259Example :
262260
263261` ` ` yaml
264- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
262+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
265263 with:
266264 inputs: file.txt
267265 verify: true
@@ -284,7 +282,7 @@ This setting may only be used in conjunction with `verify-oidc-issuer`.
284282Supplying it without `verify-oidc-issuer` will produce an error.
285283
286284` ` ` yaml
287- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
285+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
288286 with:
289287 inputs: file.txt
290288 verify: true
@@ -309,7 +307,7 @@ Supplying it without `verify-cert-identity` will produce an error.
309307Example :
310308
311309` ` ` yaml
312- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
310+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
313311 with:
314312 inputs: file.txt
315313 verify: true
@@ -331,7 +329,7 @@ workflow artifact retention period is used.
331329Example :
332330
333331` ` ` yaml
334- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
332+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
335333 with:
336334 inputs: file.txt
337335 upload-signing-artifacts: true
@@ -356,7 +354,7 @@ permissions:
356354
357355# ...
358356
359- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
357+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
360358 with:
361359 inputs: file.txt
362360 release-signing-artifacts: true
@@ -383,7 +381,7 @@ permissions:
383381 Example :
384382
385383 ` ` ` yaml
386- - uses: sigstore/gh-action-sigstore-python@v0.2 .0
384+ - uses: sigstore/gh-action-sigstore-python@v0.3 .0
387385 with:
388386 inputs: file.txt
389387 internal-be-careful-debug: true
0 commit comments