-
Notifications
You must be signed in to change notification settings - Fork 168
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Verifier to get public key/cert and identities for entry type #1210
Conversation
cc @asraa @priyawadhwa - Looking for some feedback before adding more tests! The motivation for this work is to make it easy for users to access the public key or certificate of the entry type - Particularly useful for monitoring. The only thing I don't love is exposing pgp in the function, not sure a way around that though. For RFC3161, we can't implement support for public keys. For TUF, I chose to not implement support for now at least, because it's not clear how best to return a set of public keys - Just from the root? From targets too? For minisign, I added a TODO. |
One thing I’ll change is setting the key in unmarshal. I’ll just read the key field in in Verifier. More usable that way |
Still needs tests, but this looks a lot better I think @asraa Main changes:
|
Codecov Report
@@ Coverage Diff @@
## main #1210 +/- ##
==========================================
+ Coverage 63.16% 63.19% +0.02%
==========================================
Files 82 82
Lines 7670 7847 +177
==========================================
+ Hits 4845 4959 +114
- Misses 2212 2258 +46
- Partials 613 630 +17
Flags with carried forward coverage won't be shown. Click here to find out more.
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nice change! Some quick first comments
Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
5abdfaf
to
29c9b10
Compare
Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
@asraa @bobcallaway It's ready for another review. I've added tests for all types. There's one potential bug I've found that I'm filing issues for:
|
Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
@asraa @bobcallaway Bumping for review |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for revamping this! It was an easy review!
@asraa ready for another review! |
* Use sigstore/sigstore method for SAN extraction * Included PEM certificate in pkcs7/x509 PKI types Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
9ae81ac
to
bd7eac5
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just one final nit!
Signed-off-by: Hayden Blauzvern <hblauzvern@google.com>
Looking for feedback before adding tests
Fixes #1173
Signed-off-by: Hayden Blauzvern hblauzvern@google.com
Summary
Release Note
Documentation