Skip to content

Commit

Permalink
Add Chainguard Enforce configuration (#41)
Browse files Browse the repository at this point in the history
This is meant to configure the Chainguard Enforce GitHub app which will
enforce sigstore-powered commit signatures. To enable it, install
gitsign [1] and enable it for this repo:

```bash
cd /path/to/this/repository
git config --local commit.gpgsign true  # Sign all commits
git config --local tag.gpgsign true  # Sign all tags
git config --local gpg.x509.program gitsign  # Use gitsign for signing
git config --local gpg.format x509  # gitsign expects x509 args
```

Note that this won't be enforcing as of yet. I'll do that separately.
This is just the configuration.

[1] https://github.com/sigstore/gitsign

Signed-off-by: Juan Antonio Osorio <[email protected]>

Signed-off-by: Juan Antonio Osorio <[email protected]>
  • Loading branch information
JAORMX authored Sep 22, 2022
1 parent 72b6696 commit ad8959c
Showing 1 changed file with 10 additions and 0 deletions.
10 changes: 10 additions & 0 deletions .chainguard/source.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
---
spec:
authorities:
# Accept all keyless signatures validated from the public sigstore instance.
# This is open source software after all. All we want to know is that the
# person that did the commit has control over their email address.
- keyless: {}
# Add this if you also want to allow commits signed by GitHub.
- key:
kms: https://github.com/web-flow.gpg

0 comments on commit ad8959c

Please sign in to comment.