Skip to content

Conversation

@jku
Copy link
Member

@jku jku commented Apr 11, 2025

Rekor keyring can (and in future will) have multiple keys: logs not only get sharded but once rekor-tiles is integrated in the public good instance, there will be two writable logs for a while.

As far as I can tell all calling code is already capable of handling the keyring.

Fixes #1349

Rekor keyring can (and in future will) have multiple keys:
logs not only get sharded but once rekor-tiles is integrated in the
public good instance, there will be two writable logs for a while.

As far as I can tell all calling code is already capable of handling
the keyring.

Signed-off-by: Jussi Kukkonen <[email protected]>
woodruffw
woodruffw previously approved these changes Apr 11, 2025
Copy link
Member

@woodruffw woodruffw left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM!

@woodruffw
Copy link
Member

@jku actually, could you add a small CHANGELOG entry too? I imagine users of older versions might hit this once Sigstore shards and a CL entry will point them in the right direction.

@jku jku merged commit 3418024 into sigstore:main Apr 11, 2025
23 checks passed
jku added a commit to jku/sigstore-python that referenced this pull request Oct 14, 2025
Rekor keyring can (and in future will) have multiple keys:
logs not only get sharded but once rekor-tiles is integrated in the
public good instance, there will be two writable logs for a while.

Backport of sigstore#1350

Signed-off-by: Jussi Kukkonen <[email protected]>
jku added a commit that referenced this pull request Oct 24, 2025
* Backport: internal/trust: Fix bug in rekor key lookup

Rekor keyring can (and in future will) have multiple keys:
logs not only get sharded but once rekor-tiles is integrated in the
public good instance, there will be two writable logs for a while.

Backport of #1350

Signed-off-by: Jussi Kukkonen <[email protected]>

* Backport #1424

Fail less hard when unsupported keys are seen

Current trusted root contains keys this client version does not
understand: the keys are not necessary to verify or sign
bundles with rekor v1

Signed-off-by: Jussi Kukkonen <[email protected]>

* Backport: ci: fix offline tests on ubuntu-latest

Backport of #1283

Signed-off-by: Jussi Kukkonen <[email protected]>

* Bump 3.5.x series to 3.5.4

Signed-off-by: Jussi Kukkonen <[email protected]>

---------

Signed-off-by: Jussi Kukkonen <[email protected]>
Co-authored-by: William Woodruff <[email protected]>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

multiple rekor keys should be allowed

2 participants