-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update tuf version #115
Update tuf version #115
Conversation
This comment was marked as outdated.
This comment was marked as outdated.
This simplifies the handling quite a lot: * status() result is now a lot easier to understand * root version is now checked by get_root_verification_result(): tuf-on-ci does not need to * No need to build a list of signed and unsigned signers anymore (just translate keys to signer names)
@@ -144,7 +149,7 @@ def _role_status(repo: CIRepository, role: str, event_name) -> bool: | |||
if status.message: | |||
click.echo(f"**Error**: {status.message}") | |||
|
|||
return role_is_valid and not status.invites |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
SigningStatus makes sure it is not valid if there are invites so this is safe
* Use verify_delegate() from Root, Targets * Use helpers like Repository.root(), Repository.targets()
FYI @lukpueh in case you are interested. |
# Specification: root version must be x+1, not just larger | ||
if prev_md and prev_md.signed != md.signed: | ||
if md.signed.version != prev_md.signed.version + 1: | ||
return False, f"Version {md.signed.version} is not valid for root" | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This check is handled by Root.get_root_verification_result()
This update is now possible as tuf 4.0 has been released. There is no rush though: the securesystemslib pinning in #243 handles the main reason to upgrade quickly |
This is still in limbo as tuf, sigstore and securesystemslib all have had changes that need releases before the three are compatible again :( Basically:
|
Closing this for now, we have enough open PRs without drafts |
This is an update to current (unreleased) tuf API, draft until tuf makes a release:
The verification result changes mean some modifications in the code here, mostly in a good direction.