-
Notifications
You must be signed in to change notification settings - Fork 502
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
cosign: Add a public key for testing #2226
Conversation
Signed-off-by: Stephen Augustus <[email protected]>
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: justaugustus The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/lgtm |
/hold cancel |
thanks! |
What type of PR is this?
/kind feature
What this PR does / why we need it:
(Part of #2227)
cosign: Add a public key for testing
Preliminary steps to sign/verify artifacts via
cosign
.The process or needs will evolve over time, so we've opted to generate
a "test" key to start.
Signed-off-by: Stephen Augustus [email protected]
ref: kubernetes/k8s.io#2614
cc: @kubernetes/sig-release-admins
Which issue(s) this PR fixes:
Special notes for your reviewer:
/hold will add in details about key generation when I'm back at the laptopSteps (adapted from https://github.com/sigstore/cosign#installation and https://github.com/sigstore/cosign/blob/main/KMS.md):
Get
cosign
:go install github.com/sigstore/cosign/cmd/[email protected]
Check which account you're operating over:
Generate
GOOGLE_APPLICATION_CREDENTIALS
:Generate a signing key on GCP KMS
I did this via the console using these instructions.
Here are the specs on the key:
Generate
cosign.pub
:(Special step)
Make sure you actually have permissions to sign/verify on GCP KMS: infra/gcp: Grant Release Manager Admins
roles/cloudkms.signerVerifier
k8s.io#2614Check the key:
Does this PR introduce a user-facing change?