publishing-tools


Namepublishing-tools JSON
Version 0.0.8 PyPI version JSON
download
home_pagehttps://github.com/rasmunk/publishing-tools
SummaryTools that can be used for publishing/releasing packages and container images.
upload_time2024-10-07 11:10:41
maintainerNone
docs_urlNone
authorRasmus Munk
requires_pythonNone
licenseMIT
keywords publishing signature checksum verification packages container images
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            ================
publishing-tools
================

.. image:: https://img.shields.io/pypi/pyversions/publishing-tools.svg
    :target: https://img.shields.io/pypi/pyversions/publishing-tools
.. image:: https://badge.fury.io/py/publishing-tools.svg
    :target: https://badge.fury.io/py/publishing-tools

A set of tools that can be used for optimizing the publishing and verification of files and container archive releases.

------------
Installation
------------

.. code-block:: bash

    pip install publishing-tools

-----
Usage
-----

The package provides a set of complementary tools that can be used as part of publishing packages and container images.
In particular, the package can help with optimizing the workflow for signing, checksumming, and verifying the integrity of artifacts to be published.
The package provides the ``publish``, ``sign``, and ``verify`` tools.

The overall ``publish`` tool can be used to publish a source to a destination, optionally with an associated checksum and signature.
The ``publish`` tool currently supports two types of ``sources``, i.e. either a file or (`Podman <https://docs.podman.io/en/latest/>`_) container image.
The selection can be controlled via the ``--publish-type`` argument that specifies what type of source should be published:

.. code-block:: bash

    $ publish.py [-h]
        [--publish-type {file,container_image_archive}]
        [--with-checksum]
        [--checksum-algorithm {sha256,sha512,md5}]
        [--with-signature]
        [--signature-source {source_input,generated_checksum_file}]
        [--signature-generator {gpg}]
        [--signature-key SIGNATURE_KEY]
        [--signature-args SIGNATURE_ARGS]
        [--signature-output SIGNATURE_OUTPUT]
        [--verbose]
        source
        destination

        positional arguments:
        source                The source input to publish.
        destination           Destination path to publish to. Either an output directory or an archive file.

        options:
        -h, --help            show this help message and exit
        --publish-type {file,container_image_archive}, -pt {file,container_image_archive}
        --with-checksum, -wc  Whether to also publish a checksum file in the destination directory. (default: False)
        --checksum-algorithm {sha256,sha512,md5}, -ca {sha256,sha512,md5}
                                Which checksum algorithm to use when --with-checksum is enabled. (default: sha256)
        --with-signature, -ws
                                Whether to also publish a signed edition of the source to the specified destination directory. (default: False)
        --signature-source {source_input,generated_checksum_file}, -ss {source_input,generated_checksum_file}
                                What should be used as input for the signature. Default is the source file. If --with-checksum is enabled, the checksum
                                file can also be used. (default: source_input)
        --signature-generator {gpg}, -sg {gpg}
                                Which signature tool to use when --with-signature is enabled. (default: gpg)
        --signature-key SIGNATURE_KEY, -sk SIGNATURE_KEY
                                Which key to sign with when --with-signature is enabled. (default: None)
        --signature-args SIGNATURE_ARGS, -sa SIGNATURE_ARGS
                                Optional arguments to give the selected --signature-generator. (default: --sign --batch)
        --signature-output SIGNATURE_OUTPUT, -so SIGNATURE_OUTPUT
                                Path of the generated signature file. Default is None, which will output to the FILE path with the --signature-generator
                                extension (default: None)
        --with-signature-key-output, -wsko
                                Flag on whether the --signature-key should be written to a file in the destination directory. (default: False)
        --signature-key-output-path SIGNATURE_KEY_OUTPUT_PATH, -skop SIGNATURE_KEY_OUTPUT_PATH
                                The path to where the --with-signature-key-output should be written. If None is set, the default is the same path as the 'file' with an `.asc` extension. (default: None)
        --signature-key-output-args SIGNATURE_KEY_OUTPUT_ARGS, -skoa SIGNATURE_KEY_OUTPUT_ARGS
                                Optional arguments to give the selected --signature-generator when generating the key. (default: --armor --export)
        --verbose, -v         Flag to enable verbose output. (default: False)

After a source has been published with a checksum and/or signature, the ``verify`` tool can be used to verify the integrity of the source.
Information on using this tool can be discovered via the usual `--help` flag:

.. code-block:: bash

    verify.py [-h]
        [--verify-with-additional-files VERIFY_WITH_ADDITIONAL_FILES [VERIFY_WITH_ADDITIONAL_FILES ...]]
        [--verify-command {gpg}]
        [--verify-args VERIFY_ARGS]
        [--with-checksum]
        [--checksum-digest-file CHECKSUM_DIGEST_FILE]
        [--checksum-original-file CHECKSUM_ORIGINAL_FILE]
        [--checksum-algorithm {sha256,sha512,md5}]
        [--verbose]
        file
        key

        positional arguments:
        file                  Path of the file to verify.
        key                   The key that the --verify-command should use to verify the file with.

        options:
        -h, --help            show this help message and exit
        --verify-with-additional-files VERIFY_WITH_ADDITIONAL_FILES [VERIFY_WITH_ADDITIONAL_FILES ...], -vwaf VERIFY_WITH_ADDITIONAL_FILES [VERIFY_WITH_ADDITIONAL_FILES ...]
                                Additional files to verify with the key. This is useful when verifying a detached signature. (default: [])
        --verify-command {gpg}, -vc {gpg}
                                Command to verify the file with. (default: gpg)
        --verify-args VERIFY_ARGS, -va VERIFY_ARGS
                                Additional arguments to pass to the verify command. (default: --verify --batch --status-fd 0 --with-colons)
        --with-checksum, -wc  Whether to also verify a checksum file. (default: False)
        --checksum-digest-file CHECKSUM_DIGEST_FILE, -cdf CHECKSUM_DIGEST_FILE
                                Path of the file containing the digest to validate against when --with-checksum is enabled. If none is provided, the checksum file will be assumed to be in the same directory as
                                the verify file with the same base name and the selected --checksum-algorithm extension. (default: None)
        --checksum-original-file CHECKSUM_ORIGINAL_FILE, -cof CHECKSUM_ORIGINAL_FILE
                                Path of the file to validate the --checksum-digest-file content against when --with-checksum is enabled. (default: None)
        --checksum-algorithm {sha256,sha512,md5}, -ca {sha256,sha512,md5}
                                Which checksum algorithm to use for verification when --with-checksum is enabled. (default: sha256)
        --verbose, -v         Flag to enable verbose output. (default: False)

--------
Examples
--------

The following examples illustrate how the tools can be used to publish a file, a container image, and how to verify the integrity of the published source.

Publishing a file
-----------------

Publishing a file with a checksum and signature requires that a valid signature key is available to sign the file with.
If GPG is used as the signature generator, the list of available keys can be discovered via the command ``gpg --list-keys``.

First we create a dummy file to publish:

.. code-block:: bash

    $ echo "Hello, World!" > /tmp/hello.txt

Then we can publish the file with a checksum and signature:

.. code-block:: bash

    $ publish --publish-type file --with-checksum --with-signature --signature-key <key_id_or_name> /tmp/hello.txt /tmp/hello_published.txt

This command will generate a checksum file and a signature file in the destination directory:

.. code-block:: bash

    $ ls /tmp/hello_published.txt*
    hello.txt
    hello.txt.gpg
    hello.txt.sha256

By default, the generated signature file is named after the original file and is a self contained signature file.
The checksum file is named after the original file and has the checksum algorithm extension appended to the file name.
However, when using the default GPG signaturer, and a detached signature is desired, the ``--signature-args`` option can be used to specify the ``--detach-sign`` argument.
An example of generating a detached signature can be seen below:

.. code-block:: bash

    $ publish --publish-type file --with-checksum --with-signature --signature-key <key_id_or_name> --signature-args "--detach-sign --batch" /tmp/hello.txt /tmp/hello_published.txt

Another common option, when publishing a file, is to use the checksum file as the source for the signature.
This can be done by setting the ``--signature-source generated_checksum_file`` flag.
In this case, the checksum file will be used as the input for the signature generation.
The following command illustrates how this can be done:

.. code-block:: bash

    publish --publish-type file --with-checksum --with-signature --signature-source generated_checksum_file --signature-key <key_id_or_name> /tmp/hello.txt /tmp/hello_published.txt

The result of this command will be the same as the previous example, but the signature will be generated based on the checksum file:

.. code-block:: bash

    $ ls /tmp/hello_published.txt*
    hello.txt
    hello.txt.sha256
    hello.txt.sha256.gpg

Furthermore, the ``publish`` tool also lets you specify a custom signature output path with the ``--signature-output`` option.
This can be useful when the signature file should be placed in another location than the default ones generated by the tool.

Publish the signature key as part of the publication
----------------------------------------------------

When publishing a file with a signature, it can be useful to output the signature key to a file in the destination directory.
The signature key can then be used to verify the signature at a later time.

To output the signature key to a file in the destination directory, the ``--with-signature-key-output`` flag should be set.
In addition, the ``--signature-key-output-path`` argument can be used to specify the path to the output file. If this is not set, the default path will be the same as the file with an ``.asc`` extension.
To accomplish this task, the `publish` tool uses the ``--signature-generator`` with the associated ``--signature-key-output-args`` arguments to output the signature key file.
Therefore, the ``--signature-key-output-args`` can be used to specify additional arguments to the signature generator when generating the key.

An example of outputting the signature key to a file in the destination directory can be seen below:

.. code-block:: bash

    $ publish --publish-type file --with-signature --with-signature-key-output --signature-key <key_id_or_name> /tmp/hello.txt /tmp/hello_published.txt

This command will generate a signature key file ``hello_published.txt.asc`` in the destination directory:

.. code-block:: bash

    $ ls /tmp/hello_published.txt*
    hello_published.txt
    hello_published.txt.gpg
    hello_published.txt.asc

Publishing a container image
----------------------------

To publish a container image, the publish tool expects that the ``--publish-type container_image_archive`` flag is set.
In addition, the required positional `source` argument is expected to be set to the container image name or its id.
Finally, the destination should be set to the path where the container image archive should be published:

.. code-block:: bash

    $ publish --publish-type container_image_archive --with-checksum --with-signature --signature-key <key_id_or_name> <container_image_name_or_id> /tmp/container_image.tar

The result of this command in the destination directory will be a container image archive, a checksum file calculated based on the generated container image archive file, and finally a signed version of the archived file:

.. code-block:: bash

    $ ls /tmp/container_image.tar*
    container_image.tar
    container_image.tar.gpg
    container_image.tar.sha256

Similairly to the file publishing, the checksum file can be also used as the source for the signature generation.

Verifying a file publication
----------------------------

To verify a signed file publication, the ``verify`` tool can be used.
The tool expects a path to the file to be verified and a valid key used to verify the file via the selected ``--verify-command``.
Currently the tool only supports GPG as the verification command, but that may be extended in the future.
In addition to signature verification, the tool can also verify a checksum file if the ``--with-checksum`` flag is set.
When this flag is set, the tool requires that both the signature and checksum checks will pass for the verification to be successful.

An example of a simple verification of a signed file with an associated checksum file can be seen below:

.. code-block:: bash

    $ verify --with-checksum /tmp/hello_published.txt.gpg <key_id_or_name>

With this command, the verify tool will automatically try to discover the checksum digest file and the original published file in the same directory as the file to verify.
If the expected files are not present in the same directory, then the ``--checksum-digest-file``/``--checksum-original-file`` arguments can be used to specify the paths to the required files.
The result of the verification will be a message that indicates if the verification was successful or not.

To verify a signed checksum file, the signed checksum file can be used as the input for the verification.
However, since the file layout naming of the checksum and signature file is different, the ``--checksum-digest-file <path`` argument needs to be set to the path of the checksum file.
Whereas the ``--checksum-original-file <path>`` argument needs to be set to the path of the original file that the checksum file was generated for:

.. code-block:: bash

    $ verify --with-checksum --checksum-digest-file /tmp/hello_published.txt.sha256 --checksum-original-file hello_published.txt hello_published.sha256.gpg <key_id_or_name>

Furthermore, the ``verify`` tool also lets you verify a detached signature. To accomplish this, the ``verify`` tool requires that the ``--verify-with-additional-files`` flag is set to the path of the original file that the detached signature was generated for.
An example of verifying a detached signature can be seen below:

.. code-block:: bash

    $ verify --verify-with-additional-files /tmp/hello.txt /tmp/hello.txt.gpg <key_id_or_name>


Verifying a container image publication
---------------------------------------

Similarly to the file verification, the container image verification can be done with the ``verify`` tool.
After a container image achive has been published, the verification can be done with the following command:

.. code-block:: bash

    $ verify --with-checksum /tmp/container_image.tar.gpg <key_id_or_name>

The requirements for the verification are the same as for the file verification, i.e. that the signature and checksum checks both need to pass for the verification to be successful.
As with the file verification, the generated checksum file can be used as the input for the signature verification, if it was selected to be signed as part of the publication.

            

Raw data

            {
    "_id": null,
    "home_page": "https://github.com/rasmunk/publishing-tools",
    "name": "publishing-tools",
    "maintainer": null,
    "docs_url": null,
    "requires_python": null,
    "maintainer_email": null,
    "keywords": "Publishing, Signature, Checksum, Verification, Packages, Container Images",
    "author": "Rasmus Munk",
    "author_email": "munk1@live.dk",
    "download_url": "https://files.pythonhosted.org/packages/e0/84/97c79b4f65c194a1f3e608172be29140ae35553a78165633408fc0948c65/publishing_tools-0.0.8.tar.gz",
    "platform": null,
    "description": "================\npublishing-tools\n================\n\n.. image:: https://img.shields.io/pypi/pyversions/publishing-tools.svg\n    :target: https://img.shields.io/pypi/pyversions/publishing-tools\n.. image:: https://badge.fury.io/py/publishing-tools.svg\n    :target: https://badge.fury.io/py/publishing-tools\n\nA set of tools that can be used for optimizing the publishing and verification of files and container archive releases.\n\n------------\nInstallation\n------------\n\n.. code-block:: bash\n\n    pip install publishing-tools\n\n-----\nUsage\n-----\n\nThe package provides a set of complementary tools that can be used as part of publishing packages and container images.\nIn particular, the package can help with optimizing the workflow for signing, checksumming, and verifying the integrity of artifacts to be published.\nThe package provides the ``publish``, ``sign``, and ``verify`` tools.\n\nThe overall ``publish`` tool can be used to publish a source to a destination, optionally with an associated checksum and signature.\nThe ``publish`` tool currently supports two types of ``sources``, i.e. either a file or (`Podman <https://docs.podman.io/en/latest/>`_) container image.\nThe selection can be controlled via the ``--publish-type`` argument that specifies what type of source should be published:\n\n.. code-block:: bash\n\n    $ publish.py [-h]\n        [--publish-type {file,container_image_archive}]\n        [--with-checksum]\n        [--checksum-algorithm {sha256,sha512,md5}]\n        [--with-signature]\n        [--signature-source {source_input,generated_checksum_file}]\n        [--signature-generator {gpg}]\n        [--signature-key SIGNATURE_KEY]\n        [--signature-args SIGNATURE_ARGS]\n        [--signature-output SIGNATURE_OUTPUT]\n        [--verbose]\n        source\n        destination\n\n        positional arguments:\n        source                The source input to publish.\n        destination           Destination path to publish to. Either an output directory or an archive file.\n\n        options:\n        -h, --help            show this help message and exit\n        --publish-type {file,container_image_archive}, -pt {file,container_image_archive}\n        --with-checksum, -wc  Whether to also publish a checksum file in the destination directory. (default: False)\n        --checksum-algorithm {sha256,sha512,md5}, -ca {sha256,sha512,md5}\n                                Which checksum algorithm to use when --with-checksum is enabled. (default: sha256)\n        --with-signature, -ws\n                                Whether to also publish a signed edition of the source to the specified destination directory. (default: False)\n        --signature-source {source_input,generated_checksum_file}, -ss {source_input,generated_checksum_file}\n                                What should be used as input for the signature. Default is the source file. If --with-checksum is enabled, the checksum\n                                file can also be used. (default: source_input)\n        --signature-generator {gpg}, -sg {gpg}\n                                Which signature tool to use when --with-signature is enabled. (default: gpg)\n        --signature-key SIGNATURE_KEY, -sk SIGNATURE_KEY\n                                Which key to sign with when --with-signature is enabled. (default: None)\n        --signature-args SIGNATURE_ARGS, -sa SIGNATURE_ARGS\n                                Optional arguments to give the selected --signature-generator. (default: --sign --batch)\n        --signature-output SIGNATURE_OUTPUT, -so SIGNATURE_OUTPUT\n                                Path of the generated signature file. Default is None, which will output to the FILE path with the --signature-generator\n                                extension (default: None)\n        --with-signature-key-output, -wsko\n                                Flag on whether the --signature-key should be written to a file in the destination directory. (default: False)\n        --signature-key-output-path SIGNATURE_KEY_OUTPUT_PATH, -skop SIGNATURE_KEY_OUTPUT_PATH\n                                The path to where the --with-signature-key-output should be written. If None is set, the default is the same path as the 'file' with an `.asc` extension. (default: None)\n        --signature-key-output-args SIGNATURE_KEY_OUTPUT_ARGS, -skoa SIGNATURE_KEY_OUTPUT_ARGS\n                                Optional arguments to give the selected --signature-generator when generating the key. (default: --armor --export)\n        --verbose, -v         Flag to enable verbose output. (default: False)\n\nAfter a source has been published with a checksum and/or signature, the ``verify`` tool can be used to verify the integrity of the source.\nInformation on using this tool can be discovered via the usual `--help` flag:\n\n.. code-block:: bash\n\n    verify.py [-h]\n        [--verify-with-additional-files VERIFY_WITH_ADDITIONAL_FILES [VERIFY_WITH_ADDITIONAL_FILES ...]]\n        [--verify-command {gpg}]\n        [--verify-args VERIFY_ARGS]\n        [--with-checksum]\n        [--checksum-digest-file CHECKSUM_DIGEST_FILE]\n        [--checksum-original-file CHECKSUM_ORIGINAL_FILE]\n        [--checksum-algorithm {sha256,sha512,md5}]\n        [--verbose]\n        file\n        key\n\n        positional arguments:\n        file                  Path of the file to verify.\n        key                   The key that the --verify-command should use to verify the file with.\n\n        options:\n        -h, --help            show this help message and exit\n        --verify-with-additional-files VERIFY_WITH_ADDITIONAL_FILES [VERIFY_WITH_ADDITIONAL_FILES ...], -vwaf VERIFY_WITH_ADDITIONAL_FILES [VERIFY_WITH_ADDITIONAL_FILES ...]\n                                Additional files to verify with the key. This is useful when verifying a detached signature. (default: [])\n        --verify-command {gpg}, -vc {gpg}\n                                Command to verify the file with. (default: gpg)\n        --verify-args VERIFY_ARGS, -va VERIFY_ARGS\n                                Additional arguments to pass to the verify command. (default: --verify --batch --status-fd 0 --with-colons)\n        --with-checksum, -wc  Whether to also verify a checksum file. (default: False)\n        --checksum-digest-file CHECKSUM_DIGEST_FILE, -cdf CHECKSUM_DIGEST_FILE\n                                Path of the file containing the digest to validate against when --with-checksum is enabled. If none is provided, the checksum file will be assumed to be in the same directory as\n                                the verify file with the same base name and the selected --checksum-algorithm extension. (default: None)\n        --checksum-original-file CHECKSUM_ORIGINAL_FILE, -cof CHECKSUM_ORIGINAL_FILE\n                                Path of the file to validate the --checksum-digest-file content against when --with-checksum is enabled. (default: None)\n        --checksum-algorithm {sha256,sha512,md5}, -ca {sha256,sha512,md5}\n                                Which checksum algorithm to use for verification when --with-checksum is enabled. (default: sha256)\n        --verbose, -v         Flag to enable verbose output. (default: False)\n\n--------\nExamples\n--------\n\nThe following examples illustrate how the tools can be used to publish a file, a container image, and how to verify the integrity of the published source.\n\nPublishing a file\n-----------------\n\nPublishing a file with a checksum and signature requires that a valid signature key is available to sign the file with.\nIf GPG is used as the signature generator, the list of available keys can be discovered via the command ``gpg --list-keys``.\n\nFirst we create a dummy file to publish:\n\n.. code-block:: bash\n\n    $ echo \"Hello, World!\" > /tmp/hello.txt\n\nThen we can publish the file with a checksum and signature:\n\n.. code-block:: bash\n\n    $ publish --publish-type file --with-checksum --with-signature --signature-key <key_id_or_name> /tmp/hello.txt /tmp/hello_published.txt\n\nThis command will generate a checksum file and a signature file in the destination directory:\n\n.. code-block:: bash\n\n    $ ls /tmp/hello_published.txt*\n    hello.txt\n    hello.txt.gpg\n    hello.txt.sha256\n\nBy default, the generated signature file is named after the original file and is a self contained signature file.\nThe checksum file is named after the original file and has the checksum algorithm extension appended to the file name.\nHowever, when using the default GPG signaturer, and a detached signature is desired, the ``--signature-args`` option can be used to specify the ``--detach-sign`` argument.\nAn example of generating a detached signature can be seen below:\n\n.. code-block:: bash\n\n    $ publish --publish-type file --with-checksum --with-signature --signature-key <key_id_or_name> --signature-args \"--detach-sign --batch\" /tmp/hello.txt /tmp/hello_published.txt\n\nAnother common option, when publishing a file, is to use the checksum file as the source for the signature.\nThis can be done by setting the ``--signature-source generated_checksum_file`` flag.\nIn this case, the checksum file will be used as the input for the signature generation.\nThe following command illustrates how this can be done:\n\n.. code-block:: bash\n\n    publish --publish-type file --with-checksum --with-signature --signature-source generated_checksum_file --signature-key <key_id_or_name> /tmp/hello.txt /tmp/hello_published.txt\n\nThe result of this command will be the same as the previous example, but the signature will be generated based on the checksum file:\n\n.. code-block:: bash\n\n    $ ls /tmp/hello_published.txt*\n    hello.txt\n    hello.txt.sha256\n    hello.txt.sha256.gpg\n\nFurthermore, the ``publish`` tool also lets you specify a custom signature output path with the ``--signature-output`` option.\nThis can be useful when the signature file should be placed in another location than the default ones generated by the tool.\n\nPublish the signature key as part of the publication\n----------------------------------------------------\n\nWhen publishing a file with a signature, it can be useful to output the signature key to a file in the destination directory.\nThe signature key can then be used to verify the signature at a later time.\n\nTo output the signature key to a file in the destination directory, the ``--with-signature-key-output`` flag should be set.\nIn addition, the ``--signature-key-output-path`` argument can be used to specify the path to the output file. If this is not set, the default path will be the same as the file with an ``.asc`` extension.\nTo accomplish this task, the `publish` tool uses the ``--signature-generator`` with the associated ``--signature-key-output-args`` arguments to output the signature key file.\nTherefore, the ``--signature-key-output-args`` can be used to specify additional arguments to the signature generator when generating the key.\n\nAn example of outputting the signature key to a file in the destination directory can be seen below:\n\n.. code-block:: bash\n\n    $ publish --publish-type file --with-signature --with-signature-key-output --signature-key <key_id_or_name> /tmp/hello.txt /tmp/hello_published.txt\n\nThis command will generate a signature key file ``hello_published.txt.asc`` in the destination directory:\n\n.. code-block:: bash\n\n    $ ls /tmp/hello_published.txt*\n    hello_published.txt\n    hello_published.txt.gpg\n    hello_published.txt.asc\n\nPublishing a container image\n----------------------------\n\nTo publish a container image, the publish tool expects that the ``--publish-type container_image_archive`` flag is set.\nIn addition, the required positional `source` argument is expected to be set to the container image name or its id.\nFinally, the destination should be set to the path where the container image archive should be published:\n\n.. code-block:: bash\n\n    $ publish --publish-type container_image_archive --with-checksum --with-signature --signature-key <key_id_or_name> <container_image_name_or_id> /tmp/container_image.tar\n\nThe result of this command in the destination directory will be a container image archive, a checksum file calculated based on the generated container image archive file, and finally a signed version of the archived file:\n\n.. code-block:: bash\n\n    $ ls /tmp/container_image.tar*\n    container_image.tar\n    container_image.tar.gpg\n    container_image.tar.sha256\n\nSimilairly to the file publishing, the checksum file can be also used as the source for the signature generation.\n\nVerifying a file publication\n----------------------------\n\nTo verify a signed file publication, the ``verify`` tool can be used.\nThe tool expects a path to the file to be verified and a valid key used to verify the file via the selected ``--verify-command``.\nCurrently the tool only supports GPG as the verification command, but that may be extended in the future.\nIn addition to signature verification, the tool can also verify a checksum file if the ``--with-checksum`` flag is set.\nWhen this flag is set, the tool requires that both the signature and checksum checks will pass for the verification to be successful.\n\nAn example of a simple verification of a signed file with an associated checksum file can be seen below:\n\n.. code-block:: bash\n\n    $ verify --with-checksum /tmp/hello_published.txt.gpg <key_id_or_name>\n\nWith this command, the verify tool will automatically try to discover the checksum digest file and the original published file in the same directory as the file to verify.\nIf the expected files are not present in the same directory, then the ``--checksum-digest-file``/``--checksum-original-file`` arguments can be used to specify the paths to the required files.\nThe result of the verification will be a message that indicates if the verification was successful or not.\n\nTo verify a signed checksum file, the signed checksum file can be used as the input for the verification.\nHowever, since the file layout naming of the checksum and signature file is different, the ``--checksum-digest-file <path`` argument needs to be set to the path of the checksum file.\nWhereas the ``--checksum-original-file <path>`` argument needs to be set to the path of the original file that the checksum file was generated for:\n\n.. code-block:: bash\n\n    $ verify --with-checksum --checksum-digest-file /tmp/hello_published.txt.sha256 --checksum-original-file hello_published.txt hello_published.sha256.gpg <key_id_or_name>\n\nFurthermore, the ``verify`` tool also lets you verify a detached signature. To accomplish this, the ``verify`` tool requires that the ``--verify-with-additional-files`` flag is set to the path of the original file that the detached signature was generated for.\nAn example of verifying a detached signature can be seen below:\n\n.. code-block:: bash\n\n    $ verify --verify-with-additional-files /tmp/hello.txt /tmp/hello.txt.gpg <key_id_or_name>\n\n\nVerifying a container image publication\n---------------------------------------\n\nSimilarly to the file verification, the container image verification can be done with the ``verify`` tool.\nAfter a container image achive has been published, the verification can be done with the following command:\n\n.. code-block:: bash\n\n    $ verify --with-checksum /tmp/container_image.tar.gpg <key_id_or_name>\n\nThe requirements for the verification are the same as for the file verification, i.e. that the signature and checksum checks both need to pass for the verification to be successful.\nAs with the file verification, the generated checksum file can be used as the input for the signature verification, if it was selected to be signed as part of the publication.\n",
    "bugtrack_url": null,
    "license": "MIT",
    "summary": "Tools that can be used for publishing/releasing packages and container images.",
    "version": "0.0.8",
    "project_urls": {
        "Homepage": "https://github.com/rasmunk/publishing-tools"
    },
    "split_keywords": [
        "publishing",
        " signature",
        " checksum",
        " verification",
        " packages",
        " container images"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "f3099449fa157a0e78142c509daaa47319589a8fa836800b438ce38d1cfd5c1f",
                "md5": "1b2b32c3e46e4dfc2c518d6874b4492e",
                "sha256": "402e2c55f8c75a0151262cc306954ea149e39c0bc4b565aca87d33a937a0e5a8"
            },
            "downloads": -1,
            "filename": "publishing_tools-0.0.8-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "1b2b32c3e46e4dfc2c518d6874b4492e",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": null,
            "size": 31356,
            "upload_time": "2024-10-07T11:10:39",
            "upload_time_iso_8601": "2024-10-07T11:10:39.208347Z",
            "url": "https://files.pythonhosted.org/packages/f3/09/9449fa157a0e78142c509daaa47319589a8fa836800b438ce38d1cfd5c1f/publishing_tools-0.0.8-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "e08497c79b4f65c194a1f3e608172be29140ae35553a78165633408fc0948c65",
                "md5": "4bf8b6f0dae5387a34887591feeaa031",
                "sha256": "96a4276a52d4cda4c9857c94b3e737a3f8f7bec5a6ec27730800ba5aac106254"
            },
            "downloads": -1,
            "filename": "publishing_tools-0.0.8.tar.gz",
            "has_sig": false,
            "md5_digest": "4bf8b6f0dae5387a34887591feeaa031",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 24047,
            "upload_time": "2024-10-07T11:10:41",
            "upload_time_iso_8601": "2024-10-07T11:10:41.014789Z",
            "url": "https://files.pythonhosted.org/packages/e0/84/97c79b4f65c194a1f3e608172be29140ae35553a78165633408fc0948c65/publishing_tools-0.0.8.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2024-10-07 11:10:41",
    "github": true,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "github_user": "rasmunk",
    "github_project": "publishing-tools",
    "travis_ci": false,
    "coveralls": false,
    "github_actions": false,
    "requirements": [],
    "lcname": "publishing-tools"
}
        
Elapsed time: 1.64317s