feat(db): sign db artifact with cosign #230
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Closes #205
Introduces cosign as a signing artifact tool to sign our DB on the GHCR. The signatures are pushed to a new repo, "trivy-db-signatures" to avoid populating the db CR with signatures.
Before merging, the following steps are needed to be performed by the maintainer:
cosign
and generate a public-private key pair with the commandAdd the
cosign.pub
in our repo as cosign.pub in main dir (so that our users can fetch it to verify the builds)The password used to generate the key pair shooul be stored as:
GitHub Repo secret
key:
COSIGN_PRIVATE_KEY_PASSWORD
value:
And the provate key generated should be stored as:
GitHub Repo secret:
key:
COSIGN_PRIVATE_KEY
value:
make sure there's not an empty line at the end.
And after merging the PR and the signature being pushed, make the repo
trivy-db-signatures
public.