Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

docs: rewrite README #624

Closed
wants to merge 1 commit into from

Conversation

lukpueh
Copy link
Member

@lukpueh lukpueh commented Aug 24, 2023

  • Switch from rst to markdown (syntax is just so much easier)

  • Add honest project description (securesystemslib is for TUF and in-toto).

  • Remove wordy Overview section. Relevant information about crypto backends, and key types and formats should be documented as part of the API on RTD.

  • Replace legacy interface snippets in Usage section with link to securesystemslib RTD page.

    Legacy interfaces have functional replacements in the new Signer API, i.e. CryptoSigner for file-based RSA, ed25519, ecdsa keys, and GPGSigner for GPG keys.

    Signer API docs are still WIP (see Automate Signer API docs for RTD #622), but already seem more useful than the legacy docs. And we definitely don't want to encourage anyone to use legacy interfaces.

  • Shorten installation/testing sections.

Fixes README part of #511

- Switch from rst to markdown (syntax is just so much easier)

- Add honest project description (securesystemslib is for TUF and
  in-toto).

- Remove wordy Overview section. Relevant information about
  crypto backends, and key types and formats should be documented
  as part of the API on RTD.

- Replace legacy interface snippets in Usage section
  with link to securesystemslib RTD page.

  Legacy interfaces have functional replacements in the new
  Signer API, i.e. CryptoSigner for file-based RSA, ed25519, ecdsa
  keys, and GPGSigner for GPG keys.

  Signer API docs are still WIP (see secure-systems-lab#622), but already seem more useful
  than the legacy docs. And we definitely don't want to encourage anyone
  to use legacy interfaces.

- Shorten installation/testing sections.

Signed-off-by: Lukas Puehringer <[email protected]>
@jku jku mentioned this pull request Aug 31, 2023
Copy link
Collaborator

@jku jku left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

left a few suggestion, but looks good -- obviously would be even nicer to have a link to usage examples or a manual but I agree removing the old code examples is better than leaving them up.

Comment on lines +28 to +29
- Security issues: [*Draft a new security
advisory*](https://github.com/secure-systems-lab/securesystemslib/security/advisories/new)
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Suggested change
- Security issues: [*Draft a new security
advisory*](https://github.com/secure-systems-lab/securesystemslib/security/advisories/new)
- Security issues: [*Report a vulnerability*](https://github.com/secure-systems-lab/securesystemslib/security/advisories/new)

Comment on lines +5 to +7
A cryptography interface to sign and verify
[TUF](https://theupdateframework.io) and [in-toto](https://in-toto.io)
metadata.
Copy link
Collaborator

@jku jku Aug 31, 2023

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This is more honest but maybe goes a bit too far? It's not that you can't sign anything you want...

I've added a bit of hopfully still honest marketing -- also mentioned some tech we use so that the "default installation supports ed25519 only" doesn't scare people away.

Suggested change
A cryptography interface to sign and verify
[TUF](https://theupdateframework.io) and [in-toto](https://in-toto.io)
metadata.
Securesystemslib is a cryptography interface for signing and verifying digital signatures. It is developed for the [TUF](https://theupdateframework.io) and [in-toto](https://in-toto.io) projects: the key and signature containers are compatible with metadata formats from those projects.
Under the hood Securesystemslib is able to use various digital signing systems (e.g. [cryptography](https://pypi.org/project/cryptography/), PIV hardware keys and multiple cloud based key management systems).

Comment on lines +17 to +18
# Install with ed25519, RSA, ECDSA sign and verify support
pip install securesystemslib[crypto]
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"crypto" is such a confusing term here that maybe worth adding another example

Suggested change
# Install with ed25519, RSA, ECDSA sign and verify support
pip install securesystemslib[crypto]
# Install with ed25519, RSA, ECDSA sign and verify support
pip install securesystemslib[crypto]
# ...or with HSM (e.g. Yubikey) support
pip install securesystemslib[hsm]

@jku
Copy link
Collaborator

jku commented Sep 4, 2023

I've asked martin to take this over (with the assumption that lukas is busy), and he's kindly doing this in #634

@jku jku closed this Sep 4, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants