Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Minor refactor to verify SCT and Rekor entry with multiple keys #1396

Merged
merged 1 commit into from
Feb 4, 2022

Conversation

haydentherapper
Copy link
Contributor

This will be used to verify old entries using a set of trusted
keys. No changes are needed for Fulcio, since the underlying
verification library already accepts multiple trusted roots.

Ref #1273

Signed-off-by: Hayden Blauzvern [email protected]

Summary

Ticket Link

Fixes

Release Note

NONE

This will be used to verify old entries using a set of trusted
keys. No changes are needed for Fulcio, since the underlying
verification library already accepts multiple trusted roots.

Ref sigstore#1273

Signed-off-by: Hayden Blauzvern <[email protected]>
@dlorenc
Copy link
Member

dlorenc commented Feb 4, 2022

Nice!

@dlorenc
Copy link
Member

dlorenc commented Feb 4, 2022

Looks like another Windows flake. Reran it. #1389

@haydentherapper
Copy link
Contributor Author

Thanks Dan, what a strange flake.

@dlorenc dlorenc merged commit 78fb2dc into sigstore:main Feb 4, 2022
@github-actions github-actions bot added this to the v1.6.0 milestone Feb 4, 2022
haydentherapper added a commit to haydentherapper/cosign that referenced this pull request Feb 7, 2022
Introduced in sigstore#1396, this incorrectly checked err instead
of verifySctErr. This resulted in no error being printed
when SCT validation failed. Verified this is working
correctly now with local testing.

Signed-off-by: Hayden Blauzvern <[email protected]>
dlorenc pushed a commit that referenced this pull request Feb 8, 2022
Introduced in #1396, this incorrectly checked err instead
of verifySctErr. This resulted in no error being printed
when SCT validation failed. Verified this is working
correctly now with local testing.

Signed-off-by: Hayden Blauzvern <[email protected]>
hatmarch pushed a commit to hatmarch/cosign that referenced this pull request Apr 19, 2022
…tore#1396)

This will be used to verify old entries using a set of trusted
keys. No changes are needed for Fulcio, since the underlying
verification library already accepts multiple trusted roots.

Ref sigstore#1273

Signed-off-by: Hayden Blauzvern <[email protected]>
hatmarch pushed a commit to hatmarch/cosign that referenced this pull request Apr 19, 2022
Introduced in sigstore#1396, this incorrectly checked err instead
of verifySctErr. This resulted in no error being printed
when SCT validation failed. Verified this is working
correctly now with local testing.

Signed-off-by: Hayden Blauzvern <[email protected]>
mlieberman85 pushed a commit to mlieberman85/cosign that referenced this pull request May 6, 2022
…tore#1396)

This will be used to verify old entries using a set of trusted
keys. No changes are needed for Fulcio, since the underlying
verification library already accepts multiple trusted roots.

Ref sigstore#1273

Signed-off-by: Hayden Blauzvern <[email protected]>
mlieberman85 pushed a commit to mlieberman85/cosign that referenced this pull request May 6, 2022
Introduced in sigstore#1396, this incorrectly checked err instead
of verifySctErr. This resulted in no error being printed
when SCT validation failed. Verified this is working
correctly now with local testing.

Signed-off-by: Hayden Blauzvern <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants