-
Notifications
You must be signed in to change notification settings - Fork 57
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Convert SigstoreKeys to protobuf-specs type #1303
Convert SigstoreKeys to protobuf-specs type #1303
Conversation
@codysoyland Let me know when it is ready for a review. Good work :)! |
c867dd5
to
f50ce6c
Compare
Thanks @hectorj2f! A few questions if you don't mind:
|
@codysoyland Would you mind creating a separate PR for this? So we can add these changes to main. |
When you restart the webhook, it tries to reconcile all the TrustRoot resources. If I understood you correctly. We have a watch on the configMap so every time it gets updated, we get the latest changes. |
This sounds great. |
327aa13
to
d28ef98
Compare
Codecov ReportAttention: Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## main #1303 +/- ##
==========================================
- Coverage 54.33% 52.92% -1.41%
==========================================
Files 44 44
Lines 3839 3979 +140
==========================================
+ Hits 2086 2106 +20
- Misses 1539 1651 +112
- Partials 214 222 +8 ☔ View full report in Codecov by Sentry. |
d28ef98
to
e381716
Compare
@hectorj2f I rebased this PR onto #1325, added coverage for the fetching of |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice! Not too bad after all, love it when a plan comes together 👍 Just need to do some rebasing as Hector says, but looks good overall! Thanks for handling my TODOs :)
0ee701a
to
266c96f
Compare
Signed-off-by: Cody Soyland <[email protected]>
Signed-off-by: Cody Soyland <[email protected]>
Signed-off-by: Cody Soyland <[email protected]>
Signed-off-by: Cody Soyland <[email protected]>
Signed-off-by: Cody Soyland <[email protected]>
Signed-off-by: Cody Soyland <[email protected]>
Signed-off-by: Cody Soyland <[email protected]>
Signed-off-by: Brian DeHamer <[email protected]>
Signed-off-by: Brian DeHamer <[email protected]>
Signed-off-by: Brian DeHamer <[email protected]>
51aaec7
to
3846a34
Compare
Signed-off-by: Cody Soyland <[email protected]>
Signed-off-by: Cody Soyland <[email protected]>
Signed-off-by: Cody Soyland <[email protected]>
f877ded
to
18eea2b
Compare
I rebased again and also removed unnecessary go.mod updates, which in turn removed the commits related to re-running codegen, so I think this PR is in a good state to merge now. Would love to have this reviewed again @hectorj2f @vaikas 🙏🏻 Thanks! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM overall
Signed-off-by: Cody Soyland <[email protected]>
Signed-off-by: Cody Soyland <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks!
Summary
This PR converts
SigstoreKeys
into theTrustedRoot
type fromprotobuf-specs
.Additionally, this updates the TUF fetching logic to use
trusted_root.json
to fetch the trusted key material if it exists, and falls back to using the custom metadata and individual target files if that file is not included in given TUF repo.This is the first step in modifying policy-controller to support bundle verification with
sigstore-go
using the OCI storage scheme detailed in Sigstore Bundle as OCI Artifact.Fixes #1297
Release Note
Documentation