Skip to content

Commit

Permalink
keyless: Disable by default.
Browse files Browse the repository at this point in the history
Keyless signing exposes information to the Chainguard-hosted
Sigstore infrastructure. The previous default behavior made
it possible to accidentally sign an artifact using the public
Sigstore infrastructure.

Now, users must explicitly opt-in to keyless signing. This also
protects against misconfigured CI systems that would ordinarily
use a private Sigstore instance for keyless signing.
  • Loading branch information
sfox-equinix committed Jun 25, 2024
1 parent 04e3e24 commit 036ece3
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 3 deletions.
3 changes: 2 additions & 1 deletion README.md
Original file line number Diff line number Diff line change
Expand Up @@ -40,7 +40,8 @@ References the image to sign
### `keyless` (Optional, boolean)

If set to `true`, the plugin will use keyless signatures. If set to `false`, the
plugin will use a keypair. If not specified, the plugin will default to `true`.
plugin will use a keypair. If not specified, the plugin will default to `false`
to avoid accidentally exposing information to the public Sigstore infrastructure.

### `keyless-config` (Optional, object)

Expand Down
2 changes: 1 addition & 1 deletion hooks/post-command
Original file line number Diff line number Diff line change
Expand Up @@ -43,7 +43,7 @@ if [[ -z "${image}" ]]; then
fail_with_message "cosign" "No image specified"
fi

is_keyless=${BUILDKITE_PLUGIN_COSIGN_KEYLESS:-true}
is_keyless=${BUILDKITE_PLUGIN_COSIGN_KEYLESS:-false}

# Hook functions
################
Expand Down
2 changes: 1 addition & 1 deletion plugin.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@ configuration:
keyless:
type: boolean
description: "Use keyless signing"
default: true
default: false
keyless-config:
type: object
properties:
Expand Down

0 comments on commit 036ece3

Please sign in to comment.