Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

sign nerdctl binaries and container images with cosign #592

Closed
developer-guy opened this issue Dec 3, 2021 · 4 comments
Closed

sign nerdctl binaries and container images with cosign #592

developer-guy opened this issue Dec 3, 2021 · 4 comments

Comments

@developer-guy
Copy link
Contributor

Let's sign nerdctl binaries with cosign, and make them verifiable for the end-users by providing clear text on the releases page about how they can do it. AFAIK, nerdctl uses GitHub Actions and GoReleaser to make a new release, so, it is easy to integrate the signing process into the workflow because there is already GitHub action for installing cosign.

But, the question is should we consider using keyless mode or using public/private key pairs while signing binaries/images?

Similar efforts:

cc: @Dentrax @AkihiroSuda

@AkihiroSuda
Copy link
Member

I've been already signing (the SHA256SUMS of) the binaries with my GPG key

https://github.com/containerd/nerdctl/releases/download/v0.14.0/SHA256SUMS.asc
https://github.com/AkihiroSuda.gpg

@developer-guy
Copy link
Contributor Author

yep, I know, but IMHO, signing them with cosign, especially keyless, is a more proper way of doing this. With this approach, we don't need keys to manage or remember their passwords or don't need to be afraid of having them stolen. WDYT?

@AkihiroSuda
Copy link
Member

With this approach, we don't need keys to manage or remember their passwords or don't need to be afraid of having them stolen.

I still need to manage my key, remember its password, and be afraid of having them stolen because I use the same key for signing git commits and other stuffs.

@AkihiroSuda
Copy link
Member

I intend to continue using GPG, so let me close this, but we can revisit this again later.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants