sigstore / root-signing

TUF repository for Sigstore trust root
Apache License 2.0
80 stars 77 forks source link

Review GCP configuration for tuf-on-ci #1262

Closed jku closed 1 week ago

jku commented 3 weeks ago

Part of #1247: Make sure GCP allows tuf-on-ci to work

CC @haydentherapper let's review that this is all going to work

haydentherapper commented 3 weeks ago

For the second one, https://github.com/sigstore/public-good-instance/pull/2269. Adding publish branch. I've left main since that will be needed if/once we sign using the managed KMS key.

Edit: Merged and applied

haydentherapper commented 2 weeks ago

For the first, I don't believe any changes are needed, the restriction is for the repo, not the workflow

Signing running off main should also be fine, with the WLI pool condition assertion.ref == "refs/heads/main" && assertion.ref_type == "branch"

haydentherapper commented 1 week ago

Closing as complete.