Open achrinza opened 2 years ago
A potential (though not yet tested) alternative is to leverage the Sigstore project, which provides a suite of tools, a free x.509 certificate authority, and a certificate transparency log,
It claims to provide the following benefits:
Currently, we do not enforce PGP-signed Git Commits or Tags. This means that those who expect their contributions to be PGP-signed cannot enforce this policy across the
loopbackio
Git Repositories. Instead, each Pull Request would need to be manually reviewed for the respective Git Commits and Git Signatures.This poses a potential security risk as:
GitHub does provide a mechanism to enforce signed Git Commits and Tags. However:
rebase and merge
workflow, which we leverage (i.e. the GitHub check mechanism does not pass). Exact reasons are unclear since the resulting Git Commits and Git Tags still have a valid PGP Signature.To combat this issue, LoopBack Maintainers who want to enforce valid, PGP-signed Git Commits and Git Tags should publish their PGP Public Key in this Git Repository, which will then be leveraged by a shared GitHub Action Workflow across the
loopbackio
Git Repositories to enforce this policy.This issue is to track:
loopbackio
Git Repositories