Skip to content

Commit 93024b3

Browse files
authored
Add trusted root docs (#327)
To go with sigstore/cosign#3876 Signed-off-by: Zach Steindler <[email protected]>
1 parent d93d652 commit 93024b3

File tree

1 file changed

+4
-2
lines changed

1 file changed

+4
-2
lines changed

content/en/cosign/system_config/custom_components.md

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -9,13 +9,15 @@ This page contains instructions on how to configure Cosign to work with alternat
99

1010
Verifying keyless signatures require verifying signatures from Rekor, material (SCTs) from the CT log, and certificates that chain up to Fulcio. The public keys and root certificates for these components are distributed through [TUF](https://theupdateframework.io/) repositories. By default, Cosign uses a TUF client that has an initial trust in an embedded root and then fetches updated verification material from our public-good-instance TUF repository created on the [root-signing](https://github.com/sigstore/root-signing) GitHub repository.
1111

12-
There are three options to configure Cosign to verify against custom components:
12+
There are several options to configure Cosign to verify against custom components:
1313

1414
1. Use [scaffolding](https://github.com/sigstore/scaffolding) to create a custom Sigstore stack. This provides a TUF root distributing verification material for the custom components, and pre-configured Cosign with the trust root.
1515

1616
2. Create a TUF repository yourself, using [go-tuf](https://github.com/theupdateframework/go-tuf) or [python-tuf](https://github.com/theupdateframework/python-tuf)'s repository writers. Instructions for how to configure this root is in this [blog post](https://blog.sigstore.dev/sigstore-bring-your-own-stuf-with-tuf-40febfd2badd). This [script](https://gist.github.com/asraa/947f1a38afd03af57c7b71d893c36af0) can be used to create a TUF repository from the custom Fulcio, Rekor, and CT log verification material.
1717

18-
3. As a last resort, you may also use the following environment variables to configure custom keys out of band.
18+
3. TUF is recommended because it makes it easy to distribute up-to-date key material to clients. However, if you aren't using TUF, you can manually assemble trusted key material into a trusted root file with `cosign trusted-root create ...`. You can then supply that trusted root file to `cosign verify` commands with `--trusted-root`.
19+
20+
4. As a last resort, you may also use the following environment variables to configure custom keys out of band.
1921

2022
| Env Variable | Description |
2123
| ---------- | ------------------- |

0 commit comments

Comments
 (0)