Skip to content

Commit 1110d77

Browse files
authored
Add minor doc fixes (#280)
* Fix typos in overview Signed-off-by: Colleen Murphy <[email protected]> * Add back descriptive content on cert issuing As part of doc enhancements in b57dc16, the description in step 7 was removed. Although the final step is simple and the diagram and section header are clear, it is jarring for the final step to be inconsistent with the others by having no text body. It is moreover unfriendly to screen readers since there is no context for the diagram. This change adds the brief description back for the sake of readability. Signed-off-by: Colleen Murphy <[email protected]> --------- Signed-off-by: Colleen Murphy <[email protected]>
1 parent 67b9b74 commit 1110d77

File tree

2 files changed

+4
-2
lines changed

2 files changed

+4
-2
lines changed

content/en/about/overview.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -50,11 +50,11 @@ A Sigstore client, such as Cosign, requests a certificate from our code-signing
5050

5151
You don’t have to manage signing keys, and Sigstore services never obtain your private key. The public key that a Sigstore client creates gets bound to the issued certificate, and the private key is discarded after a single signing.
5252

53-
After the client signs the artifact, the artifact's digest, signature and certificate are persisted in a transparency log: an immutable, append-only ledger known as Rekor. With this log, signing events can be publicly audited. Identity owners can monitor the log to verify that their identity is being properly used, and someone who downloads and artifact can confirm that the certificate was valid at the time of signing.
53+
After the client signs the artifact, the artifact's digest, signature and certificate are persisted in a transparency log: an immutable, append-only ledger known as Rekor. With this log, signing events can be publicly audited. Identity owners can monitor the log to verify that their identity is being properly used, and someone who downloads an artifact can confirm that the certificate was valid at the time of signing.
5454

5555
For verifying an artifact, a Sigstore client will verify the signature on the artifact using the public key from the certificate, verify the identity in the certificate matches an expected identity, verify the certificate's signature using Sigstore's root of trust, and verify proof of inclusion in Rekor. Together, verification of this information tells the user that the artifact comes from its expected source and has not been tampered with after its creation.
5656

57-
For more information on the modules that make up Sigstore, review [Toolling]({{< relref "about/tooling">}}).
57+
For more information on the modules that make up Sigstore, review [Tooling]({{< relref "about/tooling">}}).
5858

5959
## How to use Sigstore
6060

content/en/certificate_authority/certificate-issuing-overview.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -113,4 +113,6 @@ See [Certificate Transparency Log Information](https://github.com/sigstore/fulci
113113

114114
## 7 — Return certificate to client
115115

116+
Finally, the certificate and SCT are both returned to the client.
117+
116118
![Fulcio return the certificate to the client](/fulcio-7-return-to-client.png)

0 commit comments

Comments
 (0)