-
-
Notifications
You must be signed in to change notification settings - Fork 204
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Identify fingerprint of, and sign, key used to sign packages #17
Comments
Hello!
It is actually mentioned in the release script.
It is signed with both of my PGP keys that I use for signing commits: (screenshot from gpg-tui)
Hmm, can you give me a hand about that? Seeing some examples would really help.
No worries! |
Ah, so it is. Thanks for pointing that out. 👍 Thanks!
Yes it is, sorry for the trouble.
Creating a detached signature ( Thanks for your response! |
I recently switched to build-push-action for building/pushing Docker images (for CI) and realized GHCR shows SHA checksums for the images. e.g: Isn't that enough for verifying the images that have been built in an automated environment? Either way, I think I can update the CD workflow in the future to upload the "Docker signatures". (Feel free to do it if you're interested 🙂) |
It's possible I've missed it somewhere, but I cannot find where you've identified the key used to sign your release tarballs.
gpg
identifies the signature as having been made by key1D2D410A741137EBC544826F4A92FA17B6619297
, but aside from that key sharing a name with this project, I have no way of knowing whether I should trust it.Describe the solution you'd like
Identify the key fingerprint in your readme. Better yet, sign/trust your signing key with Orhun's key,
165E0FF7C48C226E1EC363A7F83424824B3E4B90
, which is identified on their github profile.Additional context
Having signatures for your Docker images would be nice as well.
Apologies if you've already put this somewhere and I've missed it!
The text was updated successfully, but these errors were encountered: