You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/design/transparency-log-port.md
+42Lines changed: 42 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -162,6 +162,48 @@ The adapter submits:
162
162
163
163
**Fallback:** If testing reveals that Rekor rejects pure Ed25519 hashedrekord entries on the production instance or they cannot be verified by standard tooling, switch to `dsse`. The adapter boundary isolates this decision — no core code changes needed.
164
164
165
+
### Sigstore Compatibility Validation
166
+
167
+
The Rekor adapter wraps raw public keys in SPKI DER before submission (see `wrap_pubkey_in_spki_der` in `auths-infra-rekor/src/client.rs`). This makes entries verifiable by standard Sigstore tooling. No Fulcio or OIDC is needed — auths bootstraps its own identity model onto Sigstore's public log.
168
+
169
+
**Manual validation steps (run once before launch):**
170
+
171
+
```bash
172
+
# 1. Install Sigstore CLI tools
173
+
go install github.com/sigstore/rekor/cmd/rekor-cli@latest
174
+
go install github.com/sigstore/cosign/cmd/cosign@latest
175
+
176
+
# 2. Create a P-256 identity and sign an artifact
177
+
cargo install --path crates/auths-cli
178
+
auths init
179
+
echo"test artifact"> /tmp/test-artifact.txt
180
+
auths artifact sign --log /tmp/test-artifact.txt
181
+
182
+
# 3. Note the log index from the output (e.g. "Logged at index 12345678")
183
+
184
+
# 4. Verify the entry exists in Rekor
185
+
rekor-cli get --log-index <INDEX> --rekor_server https://rekor.sigstore.dev
186
+
187
+
# 5. Verify the entry is well-formed (public key parses, signature structure valid)
0 commit comments