@@ -304,8 +304,8 @@ configured repository.
304
304
The root role's private keys MUST be kept very secure and thus should be
305
305
kept offline. If less than a threshold of Root keys are compromised, the
306
306
repository should revoke trust on the compromised keys. This can be
307
- accomplished with a normal rotation of root keys, covered in section 6.1
308
- (Key management and migration) . If a threshold of root keys is compromised,
307
+ accomplished with a normal rotation of root keys, covered in section
308
+ [[ #key- management- and- migration]] . If a threshold of root keys is compromised,
309
309
the Root keys should be updated out-of-band, however, the threshold should
310
310
be chosen so that this is extremely unlikely. In the unfortunate event that
311
311
a threshold of keys are compromised, it is safest to assume that attackers
@@ -689,8 +689,8 @@ The "signed" portion of <a>root.json</a> is as follows:
689
689
: <dfn >CONSISTENT_SNAPSHOT</dfn >
690
690
::
691
691
A boolean indicating whether the repository supports
692
- consistent snapshots. Section 7 goes into more detail on the consequences
693
- of enabling this setting on a repository.
692
+ consistent snapshots. Section [[ #consistent-snapshots ]] goes into more
693
+ detail on the consequences of enabling this setting on a repository.
694
694
695
695
: <dfn for =" role " >VERSION</dfn >
696
696
::
@@ -1505,10 +1505,10 @@ it in the next step.
1505
1505
metadata file found earlier in step [[ #update-targets]] . In either
1506
1506
case, the client MUST write the file to non-volatile storage as FILENAME.EXT.
1507
1507
1508
- # 6. Usage # {#usage }
1508
+ # Repository operations # {#repository-operations }
1509
1509
1510
- See [ https://theupdateframework.io/ ] ( https://theupdateframework.io/ ) for discussion of
1511
- recommended usage in various situations.
1510
+ See [ https://theupdateframework.io/ ] ( https://theupdateframework.io/ ) for
1511
+ discussion of recommended usage in various situations.
1512
1512
1513
1513
## Key management and migration ## {#key-management-and-migration}
1514
1514
@@ -1550,7 +1550,7 @@ To replace a delegated developer key, the role that delegated to that key
1550
1550
just replaces that key with another in the signed metadata where the
1551
1551
delegation is done.
1552
1552
1553
- # Consistent Snapshots # {#consistent-snapshots}
1553
+ ## Consistent snapshots # # {#consistent-snapshots}
1554
1554
1555
1555
So far, we have considered a TUF repository that is relatively static (in
1556
1556
terms of how often metadata and target files are updated). The problem is
@@ -1565,7 +1565,7 @@ so-called consistent snapshot. If a client is reading from one consistent
1565
1565
snapshot, then the repository is free to write another consistent snapshot
1566
1566
without interrupting that client.
1567
1567
1568
- ## Writing consistent snapshots ## {#writing-consistent-snapshots}
1568
+ ### Writing consistent snapshots # ## {#writing-consistent-snapshots}
1569
1569
1570
1570
We now explain how a repository should write metadata and targets to
1571
1571
produce self-contained consistent snapshots.
@@ -1616,7 +1616,7 @@ released versions of root metadata files should always be provided
1616
1616
so that outdated clients can update to the latest available root.
1617
1617
1618
1618
1619
- ## Reading consistent snapshots ## {#reading-consistent-snapshots}
1619
+ ### Reading consistent snapshots # ## {#reading-consistent-snapshots}
1620
1620
1621
1621
See [[ #detailed-client-workflow]] for more details.
1622
1622
0 commit comments