-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use SIGSTORE_REKOR_PUBLIC_KEY, remove SIGSTORE_TRUST_REKOR_API_PUBLIC_KEY #211
Comments
@k4leung4 @vaikas Would one of you be able to help me here? I think another alternative is to create a TUF root inside scaffolding to point as a mirror for TUF. Happy to add some code to (sigstore/sigstore) to create a simple TUF root with a single root keyholder. That way scaffolding doesn't need to set so many env variables. |
Hey there, sorry for the tardy reply. Was OOO & traveling. The one other thing that I would like to chat about that may be related is that if folks want to verify against multiple sigstores in the policy_controller on how that should be handled. For example, if customer wanted to have a private sigstore as well as trust the public one, how that might be best dealt with. |
I could support this! Could you create an issue for this in sigstore/sigstore? We can have the sigstore TUF client pull from all TUF repositories initialized in the |
perfetto! Yes, I think that would be great, then I think if we can support that, as well as have scaffolding create this as part of standing things up, and then having an e2e test that we could have using a custom image (like today) against a private one, and then to test against a known good one in the public sigstore. Sound good? |
Hey! I've been trying to work on this issue, and each week I get a little closer to debugging why I couldn't run the setup scripts locally. It turns out that I probably have some firewall enabled on my work machine so I can't run local setup. Do you know anyone else who's run into websocket problems running the knative activators? Or how I can workaround?
|
Have you tried just running it on gke? I seem to recall running things on kind while at Google, but it's been awhile :) I'd be happy to try your new bits on my local machine running kind tmw if that would help however :) |
@asraa now that Scaffolding creates the TUF root, I think that's better solution than SIGSTORE_REKOR_PUBLIC_KEY? |
I believe we can close this issue, i don't have permission for that. |
Thanks @hectorj2f ! |
Description
Users should be using verification material out of band, and we should deprecate SIGSTORE_TRUST_REKOR_API_PUBLIC_KEY.
Instead, the scaffolding setup should export
SIGSTORE_REKOR_PUBLIC_KEY
with the location of the public key file, similar to the CT log public key.The text was updated successfully, but these errors were encountered: