sh4d0wup 0.11.0

Signing-key abuse and update exploitation framework
Documentation
---

upstreams:
  cgr:
    url: https://cgr.dev/

tls:
  names: ["cgr.dev", "example.com"]

check:
  image: quay.io/podman/stable
  install_certs: ['tee', '-a', '/etc/ssl/certs/ca-certificates.crt']
  register_hosts:
    # redirecting cgr.dev to localhost breaks the auth-token retrieval from `https://cgr.dev/token`
    # use a different domain instead
    - example.com
  expose_fuse: true
  cmds:
    - "sudo -u podman podman run --rm example.com:${SH4D0WUP_BOUND_PORT}/chainguard/apko:latest --help"

artifacts:
  manifest_upstream:
    type: url
    url: https://cgr.dev/v2/chainguard/apko/manifests/latest
    oci_auth:
      url: https://cgr.dev/v2/
      scopes:
        - repository:chainguard/apko:pull
    headers:
      Accept: application/vnd.docker.distribution.manifest.v1+json,application/vnd.docker.distribution.manifest.v1+prettyjws,application/vnd.docker.distribution.manifest.v2+json,application/vnd.oci.image.manifest.v1+json,application/vnd.docker.distribution.manifest.list.v2+json,application/vnd.oci.image.index.v1+json

routes:
  - path: /v2/chainguard/apko/manifests/latest
    type: static
    args:
      headers:
        Content-Type: application/vnd.oci.image.index.v1+json
      artifact: manifest_upstream
  - type: proxy
    args:
      upstream: cgr