We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The npm package signing key will be distributed through Sigstore's TUF root as of next week.
The target will be found at registry.npmjs.org/keys.json and has a format like this:https://raw.githubusercontent.com/sigstore/root-signing/f3ebf7f951e021d2b1ad94735d33af7f7834793f/repository/staged/targets/registry.npmjs.org/keys.json
registry.npmjs.org/keys.json
where there is a signatures key and an attestations key.
To get this file in bytes, you can use the sigstore/sigstore TUF client like this:
tufClient, err := tuf.NewFromEnv(context.Background()) if err != nil { check(err) } keysFileBytes, err := tufClient.GetTarget(registry.npmjs.org/keys.json) if err != nil { check(err) }
The format of this file is defined loosely from the protobufs, at least the PublicKeys are from this proto
The text was updated successfully, but these errors were encountered:
Thanks @asraa
So this is for the provenance signing, correct? Or the publish attestation?
In terms of backward compatibility, does this mean we can drop support for previously-generated attestations entirely?
Sorry, something went wrong.
This is the publish attestation - the provenance signing is still always happening with GitHub OIDC.
Ah! Clarified offline - the keys in the tuf root are the same as the ones that were hard-coded
slsa-verifier/verifiers/internal/gha/npm.go
Line 29 in b01cb9d
So it will be compatible :)
This is needed by the time npm updates their cert
8c9ed07
ramonpetgrave64
No branches or pull requests
The npm package signing key will be distributed through Sigstore's TUF root as of next week.
The target will be found at
registry.npmjs.org/keys.json
and has a format like this:https://raw.githubusercontent.com/sigstore/root-signing/f3ebf7f951e021d2b1ad94735d33af7f7834793f/repository/staged/targets/registry.npmjs.org/keys.jsonwhere there is a signatures key and an attestations key.
To get this file in bytes, you can use the sigstore/sigstore TUF client like this:
The format of this file is defined loosely from the protobufs, at least the PublicKeys are from this proto
The text was updated successfully, but these errors were encountered: