From c8b4137f96add41752ee00f55351d3e504c34032 Mon Sep 17 00:00:00 2001 From: chaosinthecrd Date: Tue, 23 Jan 2024 11:23:56 +0000 Subject: [PATCH] fixed ellipsis Signed-off-by: chaosinthecrd --- docs/tutorials/sigstore-keyless.md | 4 +--- 1 file changed, 1 insertion(+), 3 deletions(-) diff --git a/docs/tutorials/sigstore-keyless.md b/docs/tutorials/sigstore-keyless.md index f70e3d72..8d2a12bf 100644 --- a/docs/tutorials/sigstore-keyless.md +++ b/docs/tutorials/sigstore-keyless.md @@ -165,7 +165,6 @@ In the template we have defined a single functionary for the `test` step. This f "functionaries": [ { "type": "root", - ... ``` There is also a `certConstraint` field within the `type: root` functionary, which is used to define constraints on the certificate that is used to sign the attestation. In this case, we are requiring that the certificate be signed by the Fulcio Root CA (by referencing the KEYID) and that the certificate contains the email address @@ -181,7 +180,6 @@ of the user that signed the attestation: "{{FULCIO_KEYID}}" ] } - ... ``` Next, there is a `roots` field, which is where the details of the X.509 Root CA defined above will be stored. The Key ID will be the same as above (the sha256sum of the root certificate), and we are supplying the root and intermediate certificate of the CA that we expect has signed the certificate that was used to sign the artifact: @@ -191,7 +189,7 @@ Next, there is a `roots` field, which is where the details of the X.509 Root CA "{{FULCIO_KEYID}}": { "certificate": "{{FULCIO_ROOT}}", "intermediates": [ - "{{FULCIO_INT} + "{{FULCIO_INT}}" ] } },