Skip to content

Commit 091f483

Browse files
authored
Merge pull request #118 from jku/fix-online-sigstore-keys
repo: Fix broken online sigstore signing
2 parents e8e2495 + 7f927ec commit 091f483

File tree

1 file changed

+3
-6
lines changed

1 file changed

+3
-6
lines changed

repo/tuf_on_ci/_repository.py

Lines changed: 3 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -10,12 +10,12 @@
1010
from securesystemslib.exceptions import UnverifiedSignatureError
1111
from securesystemslib.signer import (
1212
KEY_FOR_TYPE_AND_SCHEME,
13+
SIGNER_FOR_URI_SCHEME,
1314
Signature,
1415
Signer,
1516
SigstoreKey,
1617
SigstoreSigner,
1718
)
18-
from sigstore.oidc import detect_credential
1919
from tuf.api.exceptions import UnsignedMetadataError
2020
from tuf.api.metadata import (
2121
Key,
@@ -32,6 +32,7 @@
3232

3333
# sigstore is not a supported key by default
3434
KEY_FOR_TYPE_AND_SCHEME[("sigstore-oidc", "Fulcio")] = SigstoreKey
35+
SIGNER_FOR_URI_SCHEME[SigstoreSigner.SCHEME] = SigstoreSigner
3536

3637
# TODO Add a metadata cache so we don't constantly open files
3738
# TODO; Signing status probably should include an error message when valid=False
@@ -205,11 +206,7 @@ def close(self, rolename: str, md: Metadata) -> None:
205206
for key in self._get_keys(rolename):
206207
if rolename in ["timestamp", "snapshot"]:
207208
uri = key.unrecognized_fields["x-tuf-on-ci-online-uri"]
208-
# WORKAROUND while sigstoresigner is not finished
209-
if uri == "sigstore:":
210-
signer = SigstoreSigner(detect_credential(), key)
211-
else:
212-
signer = Signer.from_priv_key_uri(uri, key)
209+
signer = Signer.from_priv_key_uri(uri, key)
213210
md.sign(signer, True)
214211
else:
215212
# offline signer, add empty sig

0 commit comments

Comments
 (0)