-
-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support signing releases #40
Comments
Ok, here is experimental support for signing with PGP: main...pgp Here is a workflow example: - uses: taiki-e/upload-rust-binary-action@pgp
with:
bin: ...
# Public key used for PGP signing.
#
# This must be an armored key or path to it.
# For example, the file output by the following command:
#
# > gpg --output <output-path> --armor --export <key-id>
#
# This key is not strictly needed for signing, but is used to verify that
# signing was done correctly with the private key corresponding to this key.
pgp_public_key: path/to/public-key.asc # or ${{ secrets.PGP_PUBLIC_KEY }}
# Private key used for PGP signing.
#
# This must be an armored key. Unlike pgp_public_key, path is not allowed.
# For example, the contents of the file output by the following command:
#
# > gpg --output <output-file> --armor --export-secret-key <key-id>
#
# If you have already imported the private key, you do not need to specify this.
pgp_private_key: ${{ secrets.PGP_PRIVATE_KEY }}
# Passphrase of PGP private key. Default to empty string.
pgp_passphrase: ${{ secrets.PGP_PASSPHRASE }}
# Comma-separated list of file kinds to be signed with PGP.
#
# List can contains any of the followings:
# - checksum: .<checksum> files
# - asset: all assets to be uploaded except for .<checksum> files.
#
# Signing files inside the asset (e.g., rust binaries contained in the
# archive) is not yet supported.
pgp_sign_target: checksum,asset
token: ${{ secrets.GITHUB_TOKEN }} |
Binstall now has the ability to verify signatures generated by |
Yeah, install-action also supports that. Its interface is simple, so could probably be implemented with only a few adjustments and simplification of the implementation for PGP. |
UPD: codesign on macOS was supported in 1.18.0 (#61) about a month ago. |
I'm trying to add minisign to a repo that uses this action, and struggling: The action does both the compilation, and the upload, but I need to insert code signing steps in between. Any tips on how to proceed? |
I believe we can support minisign by tweaking my PGP patch above a bit, so that would be the best way to do it. |
Sigstore support could now possibly be added using GitHub's own Artifact Attestations (currently in beta). |
Things that appear to be the standard for each platform:
Other interesting things:
Refs:
The text was updated successfully, but these errors were encountered: