-
Notifications
You must be signed in to change notification settings - Fork 547
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Verify SCTs returned by fulcio #600
Conversation
898e092
to
435f59f
Compare
We should have at least one place where "SCT" is explained :p |
Added a comment :) |
// some defined time period | ||
func verifySCT(fr Resp) error { | ||
buf := tuf.ByteDestination{Buffer: &bytes.Buffer{}} | ||
if err := tuf.GetTarget(context.TODO(), ctPublicKeyStr, &buf); err != nil { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
not really sure if we should error out on this -- because it will fail if you haven't run cosign init and i don't think we want that to be failure behavior (rather preferrable behavior)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
sure, i can add in a warning that SCTs won't be verified if the user doesn't run cosign init
in the future i wonder if we could just automatically run cosign init
for someone if they have experimental mode set!
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Maybe a silly question, but If we have all the info to validate against in the binary to run "cosign init", could we just validate it there before putting it on disk?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
"there"?
i think i'm having trouble parsing the question! do you mean if you haven't run cosign init at this point, go ahead and run it?
Added in the CT log public key for this verification. Signed-off-by: Priya Wadhwa <priyawadhwa@google.com>
Added in the CT log public key for this verification.
up next, adding it to the bundle!
closes #591
Signed-off-by: Priya Wadhwa priyawadhwa@google.com