-
Notifications
You must be signed in to change notification settings - Fork 0
Open
Description
Objective
Support enterprise-grade code signing using hardware tokens or Cloud HSMs (Azure Key Vault, AWS KMS) instead of local PFX files.
Rationale
Local file-based certificates are becoming insecure/deprecated. Automation requires headless signing via cloud providers.
Strategy
- Abstraction: Update
tools/sign-dev.sh(rename tosign-provider.sh) to act as a dispatcher. - Providers:
local: Existing behavior (PFX file).azure: Usesaz signorjsignwith Azure Key Vault credentials.pkcs11: Usesosslsigncodewith hardware token drivers.
- Config: Driven by env vars (
WBAB_SIGN_PROVIDER,WBAB_AZURE_CLIENT_ID, etc.).
Acceptance Criteria
- Signing script supports at least one Cloud HSM provider (Azure preferred).
- Local signing remains the default for development.
- Secrets are securely injected via environment variables, never stored.
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels