Skip to content

Backport of cli: ignore expired provider signing keys from registry during init into v1.6#34011

Merged
jbardin merged 2 commits intov1.6from
backport/jbardin/openpgp-key-expiration/suitably-chief-squirrel
Oct 6, 2023
Merged

Backport of cli: ignore expired provider signing keys from registry during init into v1.6#34011
jbardin merged 2 commits intov1.6from
backport/jbardin/openpgp-key-expiration/suitably-chief-squirrel

Conversation

@ghost
Copy link
Copy Markdown

@ghost ghost commented Oct 6, 2023

Backport

This PR is auto-generated from #34004 to be assessed for backporting due to the inclusion of the label 1.6-backport.

The below text is copied from the body of the original PR.


The community fork of the openpgp package chosen by Terraform added unconditional verification of key expiration when validating signatures, which under normal circumstances is a welcome hardening of the API. This impact of this change however was overlooked when migrating to the new package, and it interfered with the current workflow set by the Terraform Registry.

Provider developers are not currently required to keep the signing keys stored in the Registry up to date, and older releases may be signed with a key which has since expired. For our purposes here however, we are validating the key and signature used at the time of publishing, and given that the Registry has previously vouched for the validity of the key used, we can continue to trust that key returned by the Registry for installation.

This reverts the signature handling to that of the prior Terraform release, but new workflows with more fine-grained key handling may be developed in future versions of Terraform and the Registry.

Fixes #33984


Overview of commits

@ghost ghost self-requested a review as a code owner October 6, 2023 18:47
@ghost ghost force-pushed the backport/jbardin/openpgp-key-expiration/suitably-chief-squirrel branch from 0918886 to 35de016 Compare October 6, 2023 18:47
@ghost ghost assigned jbardin Oct 6, 2023
@ghost ghost requested a review from jbardin October 6, 2023 18:47
@hashicorp-cla
Copy link
Copy Markdown

hashicorp-cla commented Oct 6, 2023

CLA assistant check
All committers have signed the CLA.

Provider developers are not currently required to keep the signing keys
stored in the registry up to date, and older releases may be signed with
a key which has since expired.

For our purposes here however, we are validating the key and signature
used at the time of publishing, and given that the registry has
previously vouched for the validity of the key used, we can continue to
trust that key returned by the registry for installation.
@jbardin jbardin force-pushed the backport/jbardin/openpgp-key-expiration/suitably-chief-squirrel branch from 35de016 to b68e4b3 Compare October 6, 2023 18:55
@jbardin jbardin merged commit fa3e246 into v1.6 Oct 6, 2023
@jbardin jbardin deleted the backport/jbardin/openpgp-key-expiration/suitably-chief-squirrel branch October 6, 2023 19:06
@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Oct 6, 2023

Reminder for the merging maintainer: if this is a user-visible change, please update the changelog on the appropriate release branch.

@github-actions
Copy link
Copy Markdown
Contributor

github-actions bot commented Dec 8, 2023

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions.
If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Dec 8, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants