@@ -147,8 +147,8 @@ interpreted as described in RFC 2119__.
147
147
__ http://www.ietf.org/rfc/rfc2119.txt
148
148
149
149
This PEP focuses on integrating TUF with PyPI; however, the reader is
150
- encouraged to read about TUF's design principles [2]_. It is also RECOMMENDED
151
- that the reader be familiar with the TUF specification [16]_.
150
+ encouraged to read about TUF's design principles [2]_ and SHOULD be
151
+ familiar with the TUF specification [16]_.
152
152
153
153
Terms used in this PEP are defined as follows:
154
154
@@ -385,7 +385,7 @@ client library inside the package manager then loads the *root* metadata and dow
385
385
the rest of the roles, including updating the *root* metadata if it has changed.
386
386
An `outline of the update process`__ is available.
387
387
388
- __ https://github.com/theupdateframework/specification/blob/master/tuf-spec.md#5-detailed-workflows.
388
+ __ https://github.com/theupdateframework/specification/blob/master/tuf-spec.md#5-detailed-workflows
389
389
390
390
391
391
Minimum Security Model
@@ -473,9 +473,9 @@ PyPI and Key Requirements
473
473
474
474
In this section, the kinds of keys required to sign for TUF roles on PyPI are
475
475
examined. TUF is agnostic with respect to choices of digital signature
476
- algorithms. For the purpose of discussion, it is assumed that most digital
477
- signatures will be produced the ed25519 algorithm [25]_ as this algorithm has
478
- native and well-tested Python support.
476
+ algorithms. For the purpose of discussion, it is assumed that all digital
477
+ signatures will be produced with the Ed25519 algorithm [25]_ as this algorithm
478
+ has native and well-tested Python support.
479
479
Nevertheless, we do NOT recommend any particular digital signature algorithm in
480
480
this PEP because there are a few important constraints: first, cryptography
481
481
changes over time; and second, TUF
0 commit comments