Skip to content

Conversation

@martinemde
Copy link
Contributor

Summary

  • Add cosign binary signing to release workflow using GitHub OIDC
  • Sign all release artifacts with keyless signing via sigstore
  • Upload .sig signature files alongside release binaries

Changes

  • .github/workflows/ci.yml: Add cosign installation and signing steps
  • Sign pks-mac.tar.gz, x86_64-unknown-linux-gnu.tar.gz, aarch64-unknown-linux-gnu.tar.gz

Security Benefits

  • Supply chain security via cryptographic signatures
  • Keyless signing leverages GitHub's identity for verification
  • Compatible with cosign verify toolchain

Test Plan

  • Local workflow validation passes
  • CI artifact signing verification
  • End-to-end signature validation

Part of PKS release process modernization (atomic PR #2/4).

🤖 Generated with Claude Code

Co-Authored-By: Claude noreply@anthropic.com

Uses sigstore/cosign-installer@v3 with keyless signing via GitHub OIDC.
Both upload-mac-universal-bin and upload-linux-bin jobs now:
- Install cosign
- Sign release artifacts with cosign sign-blob
- Upload .sig signature files alongside tarballs

Artifacts signed:
- pks-mac.tar.gz (macOS universal)
- x86_64-unknown-linux-gnu.tar.gz
- aarch64-unknown-linux-gnu.tar.gz
@martinemde
Copy link
Contributor Author

These all overlap too much. Closing.

@martinemde martinemde closed this Jan 9, 2026
@github-project-automation github-project-automation bot moved this from Triage to Done in Modularity Jan 9, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

Status: Done

Development

Successfully merging this pull request may close these issues.

2 participants