feat: add --instance support for TUF-based trust bootstrapping#617
feat: add --instance support for TUF-based trust bootstrapping#617SequeI wants to merge 1 commit intosigstore:mainfrom
Conversation
Allow users to bootstrap and use a Sigstore instance by its TUF repository URL instead of requiring a full ClientTrustConfig JSON file. Adds a trust-instance CLI command to seed the local TUF cache from a root.json, and an --instance option on sign/verify to resolve trust configuration via TUF at runtime. Bumps sigstore dependency to >=4.2. Signed-off-by: SequeI <asiek@redhat.com>
|
Tests fail rn because of the OIDC pulling action, I noticed it seems to fail around this time period I opened the PR at. Will rerun tests in a different time period. |
|
Should we use instead the tooling that already exists in the Sigstore ecosystem for this? I'm wary of creating divergences in the future. CC @Hayden-IO as this also relates to the way we interoperate within the wider Sigstore ecosystem |
|
This is a necessary feature to be able to support private deployments, so I'm supportive of it. I don't love add |
Summary
Allow users to bootstrap and use a Sigstore instance by its TUF repository URL instead of requiring a full ClientTrustConfig JSON file. Adds a trust-instance CLI command to seed the local TUF cache from a root.json, and an --instance option on sign/verify to resolve trust configuration via TUF at runtime. Bumps sigstore dependency to >=4.2.
Also tested with personal private RH sigstore instance, worked perfect.
Closes #618
Checklist