ci: sign RPM packages before pushing to GCP Artifact Registry#4392
ci: sign RPM packages before pushing to GCP Artifact Registry#4392PrzemekZglinicki wants to merge 1 commit intomainfrom
Conversation
|
Przemek Zglinicki seems not to be a GitHub user. You need a GitHub account to be able to sign the CLA. If you have already a GitHub account, please add the email address used for this commit to your account. You have signed the CLA already but the status is still pending? Let us recheck it. |
1 similar comment
|
Przemek Zglinicki seems not to be a GitHub user. You need a GitHub account to be able to sign the CLA. If you have already a GitHub account, please add the email address used for this commit to your account. You have signed the CLA already but the status is still pending? Let us recheck it. |
e9d288b to
59ae745
Compare
|
@claude review once |
|
Commits
Review
|
59ae745 to
6b00c86
Compare
|
Commits Review LGTM |
6b00c86 to
75ddf01
Compare
|
Commits Review LGTM |
- Add sign_rpm() to push_pkg_to_gcp_ar.sh: fetches the Redpanda GPG private key from AWS Secrets Manager (sdlc/prod/github/rpm_signing_key_private), signs each RPM with rpmsign --resign, verifies the signature using a temp RPM database, then uploads to GCP AR - Fix signature verification to use rpm --dbpath <tmpdb> so the GPG check actually validates the signature (plain rpm --checksig ignores GNUPGHOME and checks the system keyring, returning exit 0 even for NOKEY) - Add test-push-to-gcp-ar CI job: generates a throwaway GPG key, builds a minimal RPM, mocks aws and gcloud, and asserts signing + routing for GA (redpanda-yum), RC (redpanda-unstable-yum), DEB (redpanda-apt), and missing-region error cases Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com>
75ddf01 to
05fc4b6
Compare
|
Commits Review LGTM |
Summary
sign_rpm()topush_pkg_to_gcp_ar.sh: fetches the Redpanda GPG private key from AWS Secrets Manager (sdlc/prod/github/rpm_signing_key_private), signs each RPM withrpmsign --resign, verifies the signature using a temp RPM database, then uploads to GCP ARrpm --dbpath <tmpdb>so the GPG check actually validates the signature (plainrpm --checksigignoresGNUPGHOMEand checks the system keyring, returning exit 0 even for NOKEY)test-push-to-gcp-arCI job: generates a throwaway GPG key, builds a minimal RPM, mocksawsandgcloud, and asserts signing + routing for GA (redpanda-yum), RC (redpanda-unstable-yum), DEB (redpanda-apt), and missing-region error cases🤖 Generated with Claude Code