You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: CHANGELOG.md
+1Lines changed: 1 addition & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -28,6 +28,7 @@ All versions prior to 1.0.0 are untracked.
28
28
- cli: Added support for `--ignore_unsigned_files` option
29
29
- Implemented a new, minimal container image. This variant excludes optional dependencies (like OTel and PKCS#11) to reduce footprint, focusing solely on core signing and verification mechanisms.
30
30
- The library now requires at least v4.0.0 of `sigstore` due to breaking changes in that library
31
+
- Added support for signing and verifying using private Sigstore instances (`--trust_config`)
The `client_trust_config.json` file should include:
139
+
140
+
- A signed target trust root
141
+
- A `signingConfig` section with your private Rekor, Fulcio, and CT log endpoints
142
+
- Public keys for verification (if applicable)
143
+
144
+
You can find an example `client_trust_config.json` that references the public Sigstore production services in the Sigstore Python repository [here](https://github.com/sigstore/sigstore-python/blob/main/test/assets/trust_config/config.v1.json).
145
+
120
146
As another example, here is how we can sign with private keys. First, we
0 commit comments