Skip to content

MONGOCRYPT-837 sign libmongocrypt-all.tar.gz#1143

Merged
kevinAlbs merged 4 commits intomongodb:masterfrom
kevinAlbs:M837
Mar 31, 2026
Merged

MONGOCRYPT-837 sign libmongocrypt-all.tar.gz#1143
kevinAlbs merged 4 commits intomongodb:masterfrom
kevinAlbs:M837

Conversation

@kevinAlbs
Copy link
Copy Markdown
Contributor

Summary

Add sign-all task to sign libmongocrypt-all.tar.gz.

Background & Motivation

See MONGOCRYPT-837 for motivation. I would like to eventually remove libmongocrypt-all.tar.gz. But providing a signature seemed like a low-effort way to address this concern in the short-term.

Tested in an Evergreen patch including the upload-all task listing libmongocrypt-all.tar.gz and a new sign-all task listing libmongocrypt-all.asc.

To verify the signature:

curl https://pgp.mongodb.com/libmongocrypt.asc | gpg --import
gpg --verify libmongocrypt-all.asc libmongocrypt-all.tar.gz

Signing credentials are stored in the Evergreen repo settings as "Admin Only". I think "Admin Only" was requested by the Server Security team to limit exposure, but I did not find a reference.

The new sign-all task is marked with patchable: false. Quoting Evergreen docs:

Patches and PRs activated by non-admin users will not have access to these variables.

To test in a patch, I temporarily unselected "Admin Only".


The Publish variant is migrated to use ubuntu2404-latest. This was motivated by an observed error on docker login:

Error saving credentials: open /home/ubuntu/.docker/config.json2722102583: permission denied

Add a sign-all task. Use a separate task that can be marked not patchable. The Garasign credentials are (by request) marked "Admin only" to reduce exposure during patches.
@kevinAlbs kevinAlbs requested a review from rcsanchez97 March 31, 2026 16:36
@kevinAlbs kevinAlbs marked this pull request as ready for review March 31, 2026 16:36
@kevinAlbs kevinAlbs requested a review from a team as a code owner March 31, 2026 16:36
@kevinAlbs kevinAlbs merged commit 2b1ea0b into mongodb:master Mar 31, 2026
54 of 56 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants