Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

GPG signed release artifacts/sha256sums #2962

Closed
jcpunk opened this issue Oct 10, 2022 · 7 comments
Closed

GPG signed release artifacts/sha256sums #2962

jcpunk opened this issue Oct 10, 2022 · 7 comments
Labels
kind/feature Categorizes issue or PR as related to a new feature.

Comments

@jcpunk
Copy link

jcpunk commented Oct 10, 2022

What would you like to be added:
Can the binary releases or sha sums be signed with a GPG key?

Why is this needed:
For folks who are pulling down these artifacts, having a signature they can check against would be helpful for verifying the supply chain.

@jcpunk jcpunk added the kind/feature Categorizes issue or PR as related to a new feature. label Oct 10, 2022
@BenTheElder
Copy link
Member

BenTheElder commented Oct 10, 2022

The binary builds are reproducible and cheap to perform.

The sha256 are available for integrity checking of downloads.

We do not have a GPG key and there is not precedent in the Kubernetes project for doing this.

@jcpunk
Copy link
Author

jcpunk commented Oct 10, 2022

There is some mention of SIG Security up at kubernetes/enhancements#3031 but I'm really not super familiar with this whole ecosystem....

@BenTheElder
Copy link
Member

That is not GPG signing.

@aojea
Copy link
Contributor

aojea commented Oct 10, 2022

this one kubernetes/release#914

@BenTheElder
Copy link
Member

BenTheElder commented Oct 11, 2022

To elaborate: GPG signing things has been a long thread in Kubernetes that has not, as of yet, landed anywhere.

I do not want to sidetrack into developing key management infrastructure or evaluating signing ecosystems ahead of other high-priority issues in Kubernetes that we can directly improve (the KIND maintainers are also Kubernetes maintainers because kind exists first and foremost so SIG Testing can test Kubernetes more easily: https://kind.sigs.k8s.io/docs/contributing/project-scope/, however we do not lead the Release SIG).

If and when the rest of the organization has a better answer for signing binaries, we will consider steps to adopt it.

@BenTheElder
Copy link
Member

There is a current thread regarding the dependency on Googlers and Google-internal package signing for Kubernetes' Debian + RPM packages and active recent discussion about how to replace that, but it remains to be seen where that lands and if it's easily reusable. kubernetes/release#913

@BenTheElder
Copy link
Member

We're not going to deviate from SIG release on new signing mechanisms, when sigstore signing is mature in Kubernetes we'll look into this route.

As is the binaries are reproducible and it's quick and straightforward to build kind from source.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature Categorizes issue or PR as related to a new feature.
Projects
None yet
Development

No branches or pull requests

3 participants