-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Don't fail on Rekor entry verification for untrusted entries #47
Don't fail on Rekor entry verification for untrusted entries #47
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Generally looks good to me! Looking for other folk's opinion about debug statements / a debug mode.
Looks good, and I agree with @steiza that we may want to have some option to get details on ignored signatures. I'm fine to merge this then track that as a separate issue as it would be a larger refactor (to cover TSAs too). |
Like sigstore#45, as long as the threshold of expected timestamps is met, then verification should succeed. Otherwise, entries without trust root material should be skipped. One benefit of having the log key ID be used to look up the correct trust root material is that we can still error out if the signature is invalid. Ref: sigstore#43 Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
82b05ba
to
dc51253
Compare
Also add more tests Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice work! The test to ensure we don't "fall through" and verify if there's no inclusion proof and no inclusion promise is great.
Like #45, as long as the threshold of expected timestamps is met, then verification should succeed. Otherwise, entries without trust root material should be skipped.
One benefit of having the log key ID be used to look up the correct trust root material is that we can still error out if the signature is invalid.
Fixes #43
Summary
Release Note
Documentation