Skip to content

Conversation

@mobileoverlord
Copy link
Contributor

Adds initial support for signing runtime binaries using managed key files or hardware backed keys via pkcs:11 supporting TPM2 and yubikey. This includes new commands for managing global signing keys on the system:

  • avocado signing-keys create: Create new signing keys
  • avocado signing-keys list: list all signing keys
  • avocado signing-keys remove remove signing keys, pass --delete to remove the key file or token from the HW store.

Signing keys are associated with runtimes via new config options

signing_keys:
  - dev-key: sha256-069beb292983492c
  - yubikey: sha256-51d3f5bbbbde5b8d
  - tpm2: sha256-f26976a17c9bdce1

runtime:
   dev:
     signing:
       key: tpm2

Runtime images are signed with a separate step

avocado sign -r <runtime-name>
#or
avocado runtime sign -r <runtime-name>

@mobileoverlord mobileoverlord merged commit 167475d into main Dec 18, 2025
5 checks passed
@mobileoverlord mobileoverlord deleted the jschneck/signing branch December 18, 2025 14:30
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants