-
Notifications
You must be signed in to change notification settings - Fork 31
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Clarified how clients should work with the trust root during rotations #210
Clarified how clients should work with the trust root during rotations #210
Conversation
Signed-off-by: Fredrik Skogman <[email protected]>
Signed-off-by: Fredrik Skogman <[email protected]>
d20b224
to
a3c1cb9
Compare
protos/sigstore_trustroot.proto
Outdated
// order, that is, the oldest instance first. Only the last instance is | ||
// allowed to have their 'end' timestamp unset. All previous instances MUST | ||
// have a closed interval of validity. The last instance MAY have a closed | ||
// interval. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The last instance MAY have a closed interval.
What is the use case for this?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I can't think of a good reason I wanted to do so, but as an example, the current Fulcio root expires Not After : Oct 5 13:56:58 2031 GMT
and I think it should be ok to have that value as end
.
And also this makes the language clear that clients must not treat the last instance with an open interval in any specific way.
// | ||
// To be able to manage planned rotations of either transparency logs or | ||
// certificate authorities, clienst MUST accept lists of instances where | ||
// the last instance have a 'valid_for' that belongs to the future. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
+1, thanks for mentioning this.
Signed-off-by: Fredrik Skogman <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
Summary
Clarified how clients should interpret the trust root with respect to rotations of trusted material
Release Note
Documentation
N/A
ping: @loosebazooka @codysoyland @bdehamer @haydentherapper @woodruffw