Skip to content

feat(RELEASE-2031): use pubtools-sign to sign in blob-signing-pipeline#1671

Open
midnightercz wants to merge 1 commit intodevelopmentfrom
pubtools-sign-blob
Open

feat(RELEASE-2031): use pubtools-sign to sign in blob-signing-pipeline#1671
midnightercz wants to merge 1 commit intodevelopmentfrom
pubtools-sign-blob

Conversation

@midnightercz
Copy link
Contributor

@midnightercz midnightercz commented Nov 26, 2025

Describe your changes

Currently we use pubtools-sign tool to sign containers in rh-sign-image and

quay.io/redhat-isv/tkn-signing-bundle:7059415075

bundle to sign blobs. Pubtools-sign now supports blob signing. In order to make things easier it would be better to use same tooling. Pubtools-sign also supports batch signing which significantly improves performance and supports signing with two or more keys (used in PQC).

Relevant Jira

Checklist before requesting a review

  • I have marked as draft or added do not merge label if there's a dependency PR
    • If you want reviews on your draft PR, you can add reviewers or add the release-service-maintainers handle if you are unsure who to tag
  • My commit message includes Signed-off-by: My name <email>
  • I read CONTRIBUTING.MD and commit formatting
  • I have run the README.md generator script in .github/scripts/readme_generator.sh and verified the results using .github/scripts/check_readme.sh

@snyk-io
Copy link

snyk-io bot commented Nov 27, 2025

Snyk checks have passed. No issues have been found so far.

Status Scanner Critical High Medium Low Total (0)
Code Security 0 0 0 0 0 issues

💻 Catch issues earlier using the plugins for VS Code, JetBrains IDEs, Visual Studio, and Eclipse.

@midnightercz midnightercz force-pushed the pubtools-sign-blob branch 2 times, most recently from 11d01b0 to 2f2a139 Compare November 27, 2025 10:53
@seanconroy2021
Copy link
Member

Hey would you mind adding a description to the PR :)

@midnightercz
Copy link
Contributor Author

Hey would you mind adding a description to the PR :)
fixed

@midnightercz
Copy link
Contributor Author

/retest

@midnightercz midnightercz force-pushed the pubtools-sign-blob branch 5 times, most recently from 5b0af50 to bb687aa Compare December 3, 2025 08:37
@midnightercz
Copy link
Contributor Author

/retest

@midnightercz midnightercz force-pushed the pubtools-sign-blob branch 3 times, most recently from f28c414 to 35c81b5 Compare December 5, 2025 09:39
FilipNikolovski
FilipNikolovski previously approved these changes Dec 5, 2025
Copy link
Contributor

@FilipNikolovski FilipNikolovski left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@seanconroy2021
Copy link
Member

/retest

@midnightercz
Copy link
Contributor Author

/retest

@midnightercz
Copy link
Contributor Author

/retest

@midnightercz
Copy link
Contributor Author

/retest

@midnightercz
Copy link
Contributor Author

/retest

@midnightercz
Copy link
Contributor Author

/retest

@midnightercz midnightercz force-pushed the pubtools-sign-blob branch 3 times, most recently from f6656ce to c4666cb Compare February 23, 2026 16:59
@midnightercz
Copy link
Contributor Author

/retest

@midnightercz midnightercz force-pushed the pubtools-sign-blob branch 2 times, most recently from 8d04540 to c4b7ca8 Compare February 24, 2026 08:54
@midnightercz
Copy link
Contributor Author

/retest

@midnightercz midnightercz marked this pull request as ready for review February 24, 2026 12:46
@midnightercz midnightercz force-pushed the pubtools-sign-blob branch 2 times, most recently from af75c2f to a26f8d2 Compare February 25, 2026 16:51
- name: CA_BUNDLE
value: /etc/pki/tls/certs/ca-bundle.crt
script: |
#!/usr/bin/env /bin/bash
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Why cat the cert and key into vars and then echo them back out to temp files? The files already exist at the path you can pass them directly to openssl s_client. This is also better than storing secrets in variables, which infose has some convo about. Also missing set -eo pipefail here, so if the connection check fails the step exits 0 and the pipeline continues silently.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

it was meant to be rather check for what could have potentially happened then permanent stop. But I guess yeah, we can put there set -e as there are retries for internalrequests.

echo "$PY_SCRIPT" > /tmp/validate_ssl.py

umb_cert="$(cat "/mnt/umb_ssl_cert_secret/$(params.umb_ssl_cert_file_name)")"
umb_key="$(cat "/mnt/umb_ssl_cert_secret/$(params.umb_ssl_key_file_name)")"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Use the mount paths directly instead of writing to temp files

echo $(context.taskRun.uid)
fi
}
PY_SCRIPT=$(cat <<'END_HEREDOC'
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could we move the Python script into utils rather than defining it in the task? It would make it easier to maintain rather then inline.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'm not against it. I guess it can be used in other places as well

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We’ll be moving the IR scripts to Python anyway 🙂 so this well help that.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@midnightercz midnightercz force-pushed the pubtools-sign-blob branch 3 times, most recently from 4c6d29f to c826f72 Compare February 27, 2026 10:46
Also removed sig_key_ids as they are not actively used by radas
and unused pyxis attributes

Signed-off-by: Jindrich Luza <jluza@redhat.com>
@seanconroy2021
Copy link
Member

This ready for re-review @midnightercz :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants