You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Let's sign nerdctl binaries with cosign, and make them verifiable for the end-users by providing clear text on the releases page about how they can do it. AFAIK, nerdctl uses GitHub Actions and GoReleaser to make a new release, so, it is easy to integrate the signing process into the workflow because there is already GitHub action for installing cosign.
But, the question is should we consider using keyless mode or using public/private key pairs while signing binaries/images?
yep, I know, but IMHO, signing them with cosign, especially keyless, is a more proper way of doing this. With this approach, we don't need keys to manage or remember their passwords or don't need to be afraid of having them stolen. WDYT?
With this approach, we don't need keys to manage or remember their passwords or don't need to be afraid of having them stolen.
I still need to manage my key, remember its password, and be afraid of having them stolen because I use the same key for signing git commits and other stuffs.
Let's sign nerdctl binaries with cosign, and make them verifiable for the end-users by providing clear text on the releases page about how they can do it. AFAIK, nerdctl uses GitHub Actions and GoReleaser to make a new release, so, it is easy to integrate the signing process into the workflow because there is already GitHub action for installing cosign.
But, the question is should we consider using keyless mode or using public/private key pairs while signing binaries/images?
Similar efforts:
cc: @Dentrax @AkihiroSuda
The text was updated successfully, but these errors were encountered: