Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

light tool to create/sign (via kms) fulcio/tsa certs (ca, leaf etc) #863

Closed
ianhundere opened this issue Nov 6, 2024 · 2 comments
Closed
Labels
enhancement New feature or request

Comments

@ianhundere
Copy link
Contributor

ianhundere commented Nov 6, 2024

Description

this is something we automated w/ smallstep's step-cli tool, but i've been playing with the smallstep crypto library to do the same and was curious if there'd be interest in accepting a small cloud agnostic go app to specifically create/sign (via awskms, cloudkms, or azurekms) certificates for fulcio, tsa etc either in the helm charts or elsewhere ( e.g. scaffolding).

ps tho i understand the intent in keeping the helm charts simple as mentioned by @bobcallaway.

@ianhundere ianhundere added the enhancement New feature or request label Nov 6, 2024
@vipulagarwal
Copy link
Contributor

vipulagarwal commented Nov 6, 2024

I think the community will definitely benefit with some tooling in this area. @sfox-equinix wrote a tool for us that helps with awskms fulcio pki. I am sure others might have their own tooling solving the same thing.

@ianhundere ianhundere changed the title light tool to create/sign (via awskms, cloudkms, or azurekms) fulcio/tsa certs (ca, leaf etc) light tool to create/sign (via kms) fulcio/tsa certs (ca, leaf etc) Nov 7, 2024
@ianhundere
Copy link
Contributor Author

closing this in favor of cross post.

sigstore/scaffolding#1334

@ianhundere ianhundere closed this as not planned Won't fix, can't repro, duplicate, stale Nov 9, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

2 participants