@@ -16,10 +16,10 @@ All versions prior to 0.9.0 are untracked.
16
16
17
17
* Added support for ed25519 keys.
18
18
[ #1377 ] ( https://github.com/sigstore/sigstore-python/pull/1377 )
19
+
19
20
* API: ` IdentityToken ` now supports ` client_id ` for audience claim validation.
20
21
[ #1402 ] ( https://github.com/sigstore/sigstore-python/pull/1402 )
21
22
22
-
23
23
* Added a ` RekorV2Client ` for posting new entries to a Rekor V2 instance.
24
24
[ #1400 ] ( https://github.com/sigstore/sigstore-python/pull/1422 )
25
25
@@ -60,15 +60,21 @@ All versions prior to 0.9.0 are untracked.
60
60
61
61
### Changed
62
62
63
+ * Rekor V2 is now supported for both verification and signing: The used instances are selected
64
+ with configuration from TUF or ` --trust-config ` as before
65
+ [ #1432 ] ( https://github.com/sigstore/sigstore-python/pull/1432 )
66
+
63
67
* API:
64
68
* ClientTrustConfig now provides methods ` production() ` , ` staging() ` and ` from_tuf() `
65
69
to get access to current client configuration (trusted keys & certificates,
66
70
URLs and their validity periods). [ #1363 ] ( https://github.com/sigstore/sigstore-python/pull/1363 )
67
71
* SigningConfig now has methods that return actual clients (like ` RekorClient ` ) instead of
68
72
just URLs. The returned clients are also filtered according to SigningConfig contents.
69
73
[ #1407 ] ( https://github.com/sigstore/sigstore-python/pull/1407 )
74
+
70
75
* ` --trust-config ` now requires a file with SigningConfig v0.2, and is able to fully
71
76
configure the used Sigstore instance [ #1358 ] /(https://github.com/sigstore/sigstore-python/pull/1358 )
77
+
72
78
* By default (when ` --trust-config ` is not used) the whole trust configuration now
73
79
comes from the TUF repository [ #1363 ] ( https://github.com/sigstore/sigstore-python/pull/1363 )
74
80
0 commit comments