-
Notifications
You must be signed in to change notification settings - Fork 546
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
respect tlog-upload flag with TSA #2474
Conversation
Codecov Report
@@ Coverage Diff @@
## main #2474 +/- ##
==========================================
- Coverage 30.35% 30.34% -0.02%
==========================================
Files 139 139
Lines 8466 8469 +3
==========================================
Hits 2570 2570
- Misses 5543 5546 +3
Partials 353 353
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. |
Signed-off-by: Hector Fernandez <[email protected]>
8a0375e
to
705d8a1
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
thanks!
Hey @hectorj2f @priyawadhwa, I think we should revert this (or I'll remove it in my new PR). Getting a timestamp should not affect whether or not you upload a rekor entry. It's not an alternative to signature transparency, it's only an alternative to where the timestamp comes from. |
I disagree, for private artifacts users may not want to store anything in a transparency log and because the artifacts are private they aren't looking for signature transparency. Using a TSA instead of Rekor is a good option in that case. I think it's important to support both cases, and we've made it clear via flags that using a TSA is an insecure option. |
They should be setting |
Or maybe we have a global I don't think the default should be not uploading to the transparency log however. The defaults must be secure by default, and removing the tlog upload isn't. |
That sounds good to me, that way it's explicit on sign and then we have |
Agreed! I see the issue in the previous code, that if keyless=true and tlog-upload=false, we don't respect tlog-upload. I'll submit a fix to always respect tlog-upload, regardless of if a TSA is used. Does that sound good? |
SGTM |
Signed-off-by: Hector Fernandez [email protected]
Summary
--tlog-upload
flag was ignored when relying on time-stamping verification. We should allow disabling the tlog entry creation when relying on time-stamping.Release Note
Documentation