-
Notifications
You must be signed in to change notification settings - Fork 558
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Integrate sigstore's root of trust into cosign
#389
Comments
cc @asraa any thoughts here? |
Hm! Interesting good point. Here's what you could do: With the client portion of the demo code #366:
In order to facilitate all of that people would need to provide / trust some initial root keys they trust (to bootstrap all of this anyway). That needs a source of truth/provision as well. Edit: But besides facilitating the client to fetching the targets with the initial root, I don't think anything else in the UX needs to change |
If it makes sense to pin the initial root in cosign and add verification for Fulcio/Rekor keys and certs, let me know! I can at least use an HTTP fetch. |
Don't know how I closed this one by accident! @dekkagaijin could you link your doc here when it's ready? |
Allows for us to validate cert chains and signatures for arbitrary images and binaries.
TODO: decide on what the UX should look like for keyless attestation of signatures
The text was updated successfully, but these errors were encountered: