Skip to content

Conversation

@haydentherapper
Copy link
Contributor

This will be used to verify old entries using a set of trusted
keys. No changes are needed for Fulcio, since the underlying
verification library already accepts multiple trusted roots.

Ref #1273

Signed-off-by: Hayden Blauzvern [email protected]

Summary

Ticket Link

Fixes

Release Note

NONE

This will be used to verify old entries using a set of trusted
keys. No changes are needed for Fulcio, since the underlying
verification library already accepts multiple trusted roots.

Ref sigstore#1273

Signed-off-by: Hayden Blauzvern <[email protected]>
@dlorenc
Copy link
Member

dlorenc commented Feb 4, 2022

Nice!

@dlorenc
Copy link
Member

dlorenc commented Feb 4, 2022

Looks like another Windows flake. Reran it. #1389

@haydentherapper
Copy link
Contributor Author

Thanks Dan, what a strange flake.

@dlorenc dlorenc merged commit 78fb2dc into sigstore:main Feb 4, 2022
@github-actions github-actions bot added this to the v1.6.0 milestone Feb 4, 2022
haydentherapper added a commit to haydentherapper/cosign that referenced this pull request Feb 7, 2022
Introduced in sigstore#1396, this incorrectly checked err instead
of verifySctErr. This resulted in no error being printed
when SCT validation failed. Verified this is working
correctly now with local testing.

Signed-off-by: Hayden Blauzvern <[email protected]>
dlorenc pushed a commit that referenced this pull request Feb 8, 2022
Introduced in #1396, this incorrectly checked err instead
of verifySctErr. This resulted in no error being printed
when SCT validation failed. Verified this is working
correctly now with local testing.

Signed-off-by: Hayden Blauzvern <[email protected]>
hatmarch pushed a commit to hatmarch/cosign that referenced this pull request Apr 19, 2022
…tore#1396)

This will be used to verify old entries using a set of trusted
keys. No changes are needed for Fulcio, since the underlying
verification library already accepts multiple trusted roots.

Ref sigstore#1273

Signed-off-by: Hayden Blauzvern <[email protected]>
hatmarch pushed a commit to hatmarch/cosign that referenced this pull request Apr 19, 2022
Introduced in sigstore#1396, this incorrectly checked err instead
of verifySctErr. This resulted in no error being printed
when SCT validation failed. Verified this is working
correctly now with local testing.

Signed-off-by: Hayden Blauzvern <[email protected]>
mlieberman85 pushed a commit to mlieberman85/cosign that referenced this pull request May 6, 2022
…tore#1396)

This will be used to verify old entries using a set of trusted
keys. No changes are needed for Fulcio, since the underlying
verification library already accepts multiple trusted roots.

Ref sigstore#1273

Signed-off-by: Hayden Blauzvern <[email protected]>
mlieberman85 pushed a commit to mlieberman85/cosign that referenced this pull request May 6, 2022
Introduced in sigstore#1396, this incorrectly checked err instead
of verifySctErr. This resulted in no error being printed
when SCT validation failed. Verified this is working
correctly now with local testing.

Signed-off-by: Hayden Blauzvern <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants