Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fixed typo in overview.md #299

Merged
merged 1 commit into from
Mar 25, 2024
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion content/en/signing/overview.md
Original file line number Diff line number Diff line change
Expand Up @@ -42,9 +42,9 @@

#### Verifying identity and signing the artifact

1) An in-memory public/private keypair is created.

Check failure on line 45 in content/en/signing/overview.md

View workflow job for this annotation

GitHub Actions / markdownlint

Trailing spaces

content/en/signing/overview.md:45:51 MD009/no-trailing-spaces Trailing spaces [Expected: 0 or 2; Actual: 1] https://github.com/DavidAnson/markdownlint/blob/v0.29.0/doc/md009.md
2) The identity token is retrieved.
3) Sigstore's certificate authority verifies the identity token of the user signing the artifact and issues a certificate attesting to their identity. The identity is bound to the public key. Decrypting with the public key will prove the identity of the private keyholder.

Check failure on line 47 in content/en/signing/overview.md

View workflow job for this annotation

GitHub Actions / markdownlint

Trailing spaces

content/en/signing/overview.md:47:273 MD009/no-trailing-spaces Trailing spaces [Expected: 0 or 2; Actual: 1] https://github.com/DavidAnson/markdownlint/blob/v0.29.0/doc/md009.md
4) For security, the private key is destroyed shortly after and the short-lived identity certificate expires. Users who wish to verify the software will use the transparency log entry, rather than relying on the signer to safely store and manage the private key.

#### Recording signing event
Expand All @@ -53,7 +53,7 @@

#### Verifying the signed artifact

When a software consumer wants to verify the software’s signature, Sigstore compares a tuple of signature, key/certificate, and artifact from the timestamped object against the timestamped Rekor entry. If they match, it confirms that the signature is valid because the user knows that the expected software creator, whose identity was certified at the moment of signing, published the software artifact in their possession. The entry in Rekor’s immutable transparency log means that the signer will be monitoring the log for occurrences of their identity and will know if there is an unexpected signing event.

Check failure on line 56 in content/en/signing/overview.md

View workflow job for this annotation

GitHub Actions / markdownlint

Trailing spaces

content/en/signing/overview.md:56:610 MD009/no-trailing-spaces Trailing spaces [Expected: 0 or 2; Actual: 1] https://github.com/DavidAnson/markdownlint/blob/v0.29.0/doc/md009.md

### On Google Cloud Platform

Expand Down Expand Up @@ -88,9 +88,9 @@

## Custom infrastructure

If you're running your own sigtore services flags are available to set your own endpoint's, e.g
If you're running your own sigstore services flags are available to set your own endpoint's, e.g

```

Check failure on line 93 in content/en/signing/overview.md

View workflow job for this annotation

GitHub Actions / markdownlint

Fenced code blocks should have a language specified

content/en/signing/overview.md:93 MD040/fenced-code-language Fenced code blocks should have a language specified [Context: "```"] https://github.com/DavidAnson/markdownlint/blob/v0.29.0/doc/md040.md
cosign sign --oidc-issuer "https://oauth2.example.com/auth" \
--fulcio-url "https://fulcio.example.com" \
--rekor-url "https://rekor.example.com" \
Expand Down
Loading