Skip to content
Draft
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .github/workflows/release.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ on:

permissions:
contents: write
id-token: write # cosign keyless signing via Sigstore OIDC

Comment on lines 9 to 12
jobs:
release:
Expand All @@ -17,6 +18,8 @@ jobs:
with:
fetch-depth: 0

- uses: sigstore/cosign-installer@v4

- uses: jdx/mise-action@v4

- name: Generate Homebrew Tap token
Expand Down
11 changes: 11 additions & 0 deletions .goreleaser.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -61,6 +61,17 @@ archives:
checksum:
name_template: "checksums.txt"

signs:
- cmd: cosign
certificate: "${artifact}.pem"
args:
- sign-blob
- "--output-certificate=${certificate}"
- "--output-signature=${signature}"
- "${artifact}"
- "--yes" # keyless signing (Sigstore/Fulcio OIDC)
artifacts: checksum


homebrew_casks:
- name: entire
Expand Down
34 changes: 34 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -57,6 +57,40 @@ cd your-project && entire enable
entire status
```

### Download & Verify (manual install)

Pre-built binaries are available from the [GitHub Releases](https://github.com/entireio/cli/releases) page. All release checksums are signed with [cosign](https://docs.sigstore.dev/cosign/overview/) using keyless (ephemeral) signing via Sigstore, so you can verify that artifacts haven't been tampered with.

Comment on lines +60 to +63
```bash
# 1. Set the version and platform
VERSION="0.5.0" # replace with desired version
OS="linux" # linux or darwin
ARCH="amd64" # amd64 or arm64

# 2. Download the archive, checksums, signature and certificate
BASE_URL="https://github.com/entireio/cli/releases/download/v${VERSION}"
curl -fsSLO "${BASE_URL}/entire_${OS}_${ARCH}.tar.gz"
curl -fsSLO "${BASE_URL}/checksums.txt"
curl -fsSLO "${BASE_URL}/checksums.txt.sig"
curl -fsSLO "${BASE_URL}/checksums.txt.pem"

# 3. Verify the signature on the checksums file
cosign verify-blob checksums.txt \
--certificate checksums.txt.pem \
--signature checksums.txt.sig \
--certificate-oidc-issuer https://token.actions.githubusercontent.com \
--certificate-identity-regexp 'github\.com/entireio/cli'
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Verification regexp matches unintended repositories in same org

Low Severity

The --certificate-identity-regexp 'github\.com/entireio/cli' pattern is an unanchored substring match, so it matches any Fulcio certificate SAN containing that string — including repos like entireio/client or entireio/cli-tools, since client starts with cli. The Sigstore best practice (per cosign issue #2804) is to use an anchored, path-specific pattern like 'https://github\.com/entireio/cli/\.github/workflows/release\.yml@refs/tags/v' to prevent unintended matches from other workflows or repositories.

Fix in Cursor Fix in Web


# 4. Verify the archive against the signed checksums
sha256sum --check --ignore-missing checksums.txt

# 5. Extract and install
tar xzf "entire_${OS}_${ARCH}.tar.gz"
sudo install -m 755 entire /usr/local/bin/entire
```

> **Note:** On macOS, use `shasum -a 256 --check --ignore-missing checksums.txt` instead of `sha256sum`.

## Typical Workflow

### 1. Enable Entire in Your Repository
Expand Down
Loading