@@ -76,8 +76,8 @@ def __init__(self, *, rekor: RekorClient, trusted_root: TrustedRoot):
76
76
`rekor` is a `RekorClient` capable of connecting to a Rekor instance
77
77
containing logs for the file(s) being verified.
78
78
79
- `fulcio_certificate_chain ` is a list of PEM-encoded X.509 certificates,
80
- establishing the trust chain for the signing certificate and signature .
79
+ `trusted_root ` is the `TrustedRoot` object containing the root of trust
80
+ for the verification process .
81
81
"""
82
82
self ._rekor = rekor
83
83
self ._fulcio_certificate_chain : List [X509 ] = [
@@ -90,6 +90,10 @@ def __init__(self, *, rekor: RekorClient, trusted_root: TrustedRoot):
90
90
def production (cls , * , offline : bool = False ) -> Verifier :
91
91
"""
92
92
Return a `Verifier` instance configured against Sigstore's production-level services.
93
+
94
+ `offline` controls the Trusted Root refresh behavior: if `True`,
95
+ the verifier uses the Trusted Root in the local TUF cache. If `False`,
96
+ a TUF repository refresh is attempted.
93
97
"""
94
98
return cls (
95
99
rekor = RekorClient .production (),
@@ -100,6 +104,10 @@ def production(cls, *, offline: bool = False) -> Verifier:
100
104
def staging (cls , * , offline : bool = False ) -> Verifier :
101
105
"""
102
106
Return a `Verifier` instance configured against Sigstore's staging-level services.
107
+
108
+ `offline` controls the Trusted Root refresh behavior: if `True`,
109
+ the verifier uses the Trusted Root in the local TUF cache. If `False`,
110
+ a TUF repository refresh is attempted.
103
111
"""
104
112
return cls (
105
113
rekor = RekorClient .staging (),
0 commit comments