Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Review GCP configuration for tuf-on-ci #1262

Closed
jku opened this issue Jun 6, 2024 · 3 comments
Closed

Review GCP configuration for tuf-on-ci #1262

jku opened this issue Jun 6, 2024 · 3 comments
Labels
enhancement New feature or request

Comments

@jku
Copy link
Member

jku commented Jun 6, 2024

Part of #1247: Make sure GCP allows tuf-on-ci to work

  • online-sign workflow runs on the main branch and needs access to this key/account (the same one used by current workflows)
    • SA: [email protected]
    • provider: projects/163070369698/locations/global/workloadIdentityPools/github-actions-pool/providers/github-actions-provider
    • key: projects/sigstore-root-signing/locations/global/keyRings/root/cryptoKeys/timestamp
  • online-sign dispatches the publish workflow which calls deploy-to-gcs workflow which uses gcloud with this account (the same one used by current workflows):
    • SA: [email protected]
    • provider: projects/306323169285/locations/global/workloadIdentityPools/github-actions-pool/providers/github-actions-provider

CC @haydentherapper let's review that this is all going to work

@jku jku added the enhancement New feature or request label Jun 6, 2024
@haydentherapper
Copy link
Contributor

haydentherapper commented Jun 10, 2024

For the second one, https://github.com/sigstore/public-good-instance/pull/2269. Adding publish branch. I've left main since that will be needed if/once we sign using the managed KMS key.

Edit: Merged and applied

@haydentherapper
Copy link
Contributor

For the first, I don't believe any changes are needed, the restriction is for the repo, not the workflow

  • principalSet://iam.googleapis.com/projects/163070369698/locations/global/workloadIdentityPools/github-actions-pool/attribute.repository/sigstore/root-signing

Signing running off main should also be fine, with the WLI pool condition assertion.ref == "refs/heads/main" && assertion.ref_type == "branch"

@haydentherapper
Copy link
Contributor

Closing as complete.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants