mirror of
https://github.com/rsteube/carapace-bin.git
synced 2025-05-05 15:32:53 +00:00
gh: updates from v2.71.0
This commit is contained in:
parent
4a45b2ad47
commit
42d1c35cd0
@ -21,9 +21,9 @@ func init() {
|
||||
|
||||
attestation_verifyCmd.Flags().StringP("bundle", "b", "", "Path to bundle on disk, either a single bundle in a JSON file or a JSON lines file with multiple bundles")
|
||||
attestation_verifyCmd.Flags().Bool("bundle-from-oci", false, "When verifying an OCI image, fetch the attestation bundle from the OCI registry instead of from GitHub")
|
||||
attestation_verifyCmd.Flags().String("cert-identity", "", "Enforce that the certificate's subject alternative name matches the provided value exactly")
|
||||
attestation_verifyCmd.Flags().StringP("cert-identity-regex", "i", "", "Enforce that the certificate's subject alternative name matches the provided regex")
|
||||
attestation_verifyCmd.Flags().String("cert-oidc-issuer", "", "Issuer of the OIDC token")
|
||||
attestation_verifyCmd.Flags().String("cert-identity", "", "Enforce that the certificate's SubjectAlternativeName matches the provided value exactly")
|
||||
attestation_verifyCmd.Flags().StringP("cert-identity-regex", "i", "", "Enforce that the certificate's SubjectAlternativeName matches the provided regex")
|
||||
attestation_verifyCmd.Flags().String("cert-oidc-issuer", "", "Enforce that the issuer of the OIDC token matches the provided value")
|
||||
attestation_verifyCmd.Flags().String("custom-trusted-root", "", "Path to a trusted_root.jsonl file; likely for offline verification")
|
||||
attestation_verifyCmd.Flags().Bool("deny-self-hosted-runners", false, "Fail verification for attestations generated on self-hosted runners")
|
||||
attestation_verifyCmd.Flags().StringP("digest-alg", "d", "", "The algorithm used to compute a digest of the artifact: {sha256|sha512}")
|
||||
@ -33,13 +33,13 @@ func init() {
|
||||
attestation_verifyCmd.Flags().StringP("limit", "L", "", "Maximum number of attestations to fetch")
|
||||
attestation_verifyCmd.Flags().Bool("no-public-good", false, "Do not verify attestations signed with Sigstore public good instance")
|
||||
attestation_verifyCmd.Flags().StringP("owner", "o", "", "GitHub organization to scope attestation lookup by")
|
||||
attestation_verifyCmd.Flags().String("predicate-type", "", "Filter attestations by provided predicate type")
|
||||
attestation_verifyCmd.Flags().String("predicate-type", "", "Enforce that verified attestations' predicate type matches the provided value")
|
||||
attestation_verifyCmd.Flags().StringP("repo", "R", "", "Repository name in the format <owner>/<repo>")
|
||||
attestation_verifyCmd.Flags().String("signer-digest", "", "Digest associated with the signer workflow")
|
||||
attestation_verifyCmd.Flags().String("signer-repo", "", "Repository of reusable workflow that signed attestation in the format <owner>/<repo>")
|
||||
attestation_verifyCmd.Flags().String("signer-workflow", "", "Workflow that signed attestation in the format [host/]<owner>/<repo>/<path>/<to>/<workflow>")
|
||||
attestation_verifyCmd.Flags().String("source-digest", "", "Digest associated with the source workflow")
|
||||
attestation_verifyCmd.Flags().String("source-ref", "", "Ref associated with the source workflow")
|
||||
attestation_verifyCmd.Flags().String("signer-digest", "", "Enforce that the digest associated with the signer workflow matches the provided value")
|
||||
attestation_verifyCmd.Flags().String("signer-repo", "", "Enforce that the workflow that signed the attestation's repository matches the provided value (<owner>/<repo>)")
|
||||
attestation_verifyCmd.Flags().String("signer-workflow", "", "Enforce that the workflow that signed the attestation matches the provided value ([host/]<owner>/<repo>/<path>/<to>/<workflow>)")
|
||||
attestation_verifyCmd.Flags().String("source-digest", "", "Enforce that the digest associated with the source repository matches the provided value")
|
||||
attestation_verifyCmd.Flags().String("source-ref", "", "Enforce that the git ref associated with the source repository matches the provided value")
|
||||
attestation_verifyCmd.Flags().StringP("template", "t", "", "Format JSON output using a Go template; see \"gh help formatting\"")
|
||||
attestationCmd.AddCommand(attestation_verifyCmd)
|
||||
|
||||
|
@ -6,7 +6,7 @@ import (
|
||||
)
|
||||
|
||||
var gist_createCmd = &cobra.Command{
|
||||
Use: "create [<filename>... | -]",
|
||||
Use: "create [<filename>... | <pattern>... | -]",
|
||||
Short: "Create a new gist",
|
||||
Aliases: []string{"new"},
|
||||
Run: func(cmd *cobra.Command, args []string) {},
|
||||
|
@ -7,7 +7,7 @@ import (
|
||||
)
|
||||
|
||||
var release_createCmd = &cobra.Command{
|
||||
Use: "create [<tag>] [<files>...]",
|
||||
Use: "create [<tag>] [<filename>... | <pattern>...]",
|
||||
Short: "Create a new release",
|
||||
GroupID: "General commands",
|
||||
Aliases: []string{"new"},
|
||||
|
Loading…
x
Reference in New Issue
Block a user