Comments (4)
But for this, they need to be authorized to sign the RSL entry for the policy namespace.
This is not true anymore. The validity of a policy state is strictly verified internally except for its root keys. A policy state's root keys must be trusted by the previous policy state. So we need to think about how to handle cases where targets metadata are removed. We might have to special case this a bit, handling the top level role differently from the rest, and also double check how TUF behaves. AIUI, the snapshot role allows for removing a targets role if there's a key rotation to go with it. @JustinCappos can you confirm?
from gittuf.
In general, the snapshot doesn't allow the removal of a targets role / metadata file, but does control which versions are available and trusted. (This is similar, but not identical to what you say above.)
I think we need to consider how to appropriately merge timestamp and snapshot into gittuf. I believe it may not be necessary to have either, but would like to discuss.
from gittuf.
The RSL state can be used to infer snapshot properties (minus, possibly, the signer making the snapshot claim). It could be as simple as setting some constraints on what targets roles a state must contain based on the previous one. This is akin to #116's changes but expanded to targets roles. If I understand correctly, in the default case a new policy state must contain all the same targets roles (identified by name) as the previous one, may introduce one or more new targets roles (identified by name), and all roles must have the same version or version + 1 as the prior state.
from gittuf.
That does, however, require us to work out how targets can be removed when the delegated role is no longer necessary. This is one of a few examples we've encountered so far where gittuf's expectations deviate from TUF's. We're never verifying historic artifacts / states using the current set of metadata in gittuf, which is largely not the case with TUF.
from gittuf.
Related Issues (20)
- [Bug]: Unify signing mechanisms HOT 2
- Roadmap: Dogfood gittuf HOT 4
- Roadmap: Developer teams and multiple hats HOT 2
- Roadmap: Integrate with broader ecosystem HOT 2
- gittuf <-> gitsign attestation compatibility HOT 2
- Track verified states locally HOT 1
- Allow user to specify delegation when signing policy metadata
- Remove vendored go-securesystemslib HOT 1
- Policy state self-verification should refer to previous state for root threshold HOT 1
- RSL needs a log command HOT 6
- Support encrypted on-disk keys
- Enable expiry enforcement on latest policy
- Renew gittuf metadata HOT 4
- Make rule / delegation names unique
- Does gittuf git ref rules go into packed refs? HOT 3
- Anchoring rules to only be active after an anchored commit HOT 7
- Tag verification functionality HOT 7
- Alpha -> Beta HOT 2
- Wildcard in rule pattern doesn't apply to subdirectories HOT 5
- Policy pushing does not work HOT 3
Recommend Projects
-
React
A declarative, efficient, and flexible JavaScript library for building user interfaces.
-
Vue.js
🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.
-
Typescript
TypeScript is a superset of JavaScript that compiles to clean JavaScript output.
-
TensorFlow
An Open Source Machine Learning Framework for Everyone
-
Django
The Web framework for perfectionists with deadlines.
-
Laravel
A PHP framework for web artisans
-
D3
Bring data to life with SVG, Canvas and HTML. 📊📈🎉
-
Recommend Topics
-
javascript
JavaScript (JS) is a lightweight interpreted programming language with first-class functions.
-
web
Some thing interesting about web. New door for the world.
-
server
A server is a program made to process requests and deliver data to clients.
-
Machine learning
Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.
-
Visualization
Some thing interesting about visualization, use data art
-
Game
Some thing interesting about game, make everyone happy.
Recommend Org
-
Facebook
We are working to build community through open source technology. NB: members must have two-factor auth.
-
Microsoft
Open source projects and samples from Microsoft.
-
Google
Google ❤️ Open Source for everyone.
-
Alibaba
Alibaba Open Source for everyone
-
D3
Data-Driven Documents codes.
-
Tencent
China tencent open source team.
from gittuf.