-
Notifications
You must be signed in to change notification settings - Fork 58
Use signingconfig from "--trust-config" #1347
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hmm, I might be wrong, but I think we do use the signing config if the user explicitly passes it. For example, the signing flow: sigstore-python/sigstore/_cli.py Line 651 in 69b3740
and then in sigstore-python/sigstore/sign.py Lines 349 to 363 in 69b3740
(and a similar thing happens in the verify flow.) OTOH, you're right that we don't use the signing config from staging/prod TUF by default; we should probably do that rather than hard-baking those URLs/states 🙂 |
Yeah you are right, the missing bits seem to be:
I think the first point I will need to fix... |
maybe this is not as critical as I thought: every client including sigstore-python supports something like |
Uh oh!
There was an error while loading. Please reload this page.
Currently I believe we don't use all of the information in the signingconfig part of
--trust-config
(or the signingconfig from TUF). It would be useful for #1340 if we did as we can then try to provide a "sigstore-in-a-box" test setup that comes with a trustedroot and signingconfig.Basically, if we have signingconfig we should select the used services from there when signing
In addition:
To fix these issues:
_internal.trust
has to contain a SigningConfig implementation and should use a method provided by_internal.tuf
to fetch it (special casing is currently needed for production since there is no signingconfig yet). I have an almost ready branch for this.The text was updated successfully, but these errors were encountered: