Codesign: Continue work on Azure Trusted Signing implementation #98
Labels
No Label
Service
Buildbot
Service
Chat
Service
Gitea
Service
Translate
Type
Bug
Type
Config
Type
Deployment
Type
Feature
Type
Setup
No Milestone
No project
No Assignees
2 Participants
Notifications
Due Date
No due date set.
Dependencies
No dependencies set.
Reference: infrastructure/blender-projects-platform#98
Loading…
Reference in New Issue
Block a user
No description provided.
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Tasks
GitHub Workflow example
Caveats
Sergey:
I'll dump some thoughts here, maybe it will simplify some integration in the future.
We already using some custom client-server solution for code-signing using Yubikey FIPS, the code is available at: https://projects.blender.org/infrastructure/codesign
Basically, on Windows builders, worker calculates digest of a file to be signed, sends it to the sever to sign, and server signs it using Yubikey. The are a couple of speculations:
server
folder in the repository toserver-yubikey
, and add another folderserver-azure
, which will use Azure Trusted Server to sign the digest. Doing so will be pretty much transparent for all the workers, and changes would need to be done on a single machine.On the implementation side, it is hopefully as easy as using some
requests.get
insteadsubprocess.check_output
in the server's implementation of sign request handler (https://projects.blender.org/infrastructure/codesign/src/branch/main/server/handler/sign.py#L93)