File: doc.go

package info (click to toggle)
golang-github-sylabs-sif 2.21.0-1
  • links: PTS, VCS
  • area: main
  • in suites: forky, sid, trixie
  • size: 5,200 kB
  • sloc: makefile: 6
file content (46 lines) | stat: -rw-r--r-- 1,508 bytes parent folder | download | duplicates (4)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
// Copyright (c) 2020-2022, Sylabs Inc. All rights reserved.
// This software is licensed under a 3-clause BSD license. Please consult the LICENSE.md file
// distributed with the sources of this project regarding your rights to use or distribute this
// software.

/*
Package integrity implements functions to add, examine, and verify digital signatures in a SIF
image.

# Sign

To add one or more digital signatures to a SIF, create a Signer, and supply a signing PGP entity:

	s, err := integrity.NewSigner(f, OptSignWithEntity(e))

By default, the returned Signer will add one digital signature per group of objects in f. To
override this behavior, supply additional options. For example, to apply a signature to object
group 1 only:

	s, err := integrity.NewSigner(f, OptSignWithEntity(e), OptSignGroup(1))

Finally, to apply the signature(s):

	err := s.Sign()

# Verify

To examine and/or verify digital signatures in a SIF, create a Verifier:

	v, err := NewVerifier(f)

If you intend to perform cryptographic verification, you must provide a source of key material:

	v, err := NewVerifier(f, OptVerifyWithKeyRing(kr))

By default, the returned Verifier will consider non-legacy signatures for all object groups. To
override this behavior, supply additional options. For example, to consider non-legacy signatures
on object group 1 only:

	v, err := NewVerifier(f, OptVerifyWithKeyRing(kr), OptVerifyGroup(1))

Finally, to perform cryptographic verification:

	err := v.Verify()
*/
package integrity