@@ -991,7 +991,7 @@ as is described for the <a>root.json</a> file.
991991 "keyids" : [ <a for =" role " >KEYID</a >, ... ] ,
992992 "threshold" : <a >THRESHOLD</a >,
993993 (<a >"path_hash_prefixes"</a > : [ HEX_DIGEST, ... ] |
994- "< a > paths</a >" : [ <a >PATHPATTERN</a >, ... ]),
994+ < a for = " delegation-role " >" paths" </a > : [ <a >PATHPATTERN</a >, ... ]),
995995 "terminating": <a >TERMINATING</a >,
996996 },
997997 ...
@@ -1024,7 +1024,7 @@ as is described for the <a>root.json</a> file.
10241024 ignored.
10251025
10261026In order to discuss target paths, a role MUST specify only one of the
1027- <a >"path_hash_prefixes"</a > or <a >"paths"</a > attributes, each of which we
1027+ <a >"path_hash_prefixes"</a > or <a for = " delegation-role " >"paths"</a > attributes, each of which we
10281028discuss next.
10291029
10301030 : <dfn >"path_hash_prefixes"</dfn >
@@ -1039,7 +1039,7 @@ discuss next.
10391039 in <a >"path_hash_prefixes"</a >. This is useful to split a large number of
10401040 targets into separate bins identified by consistent hashing.
10411041
1042- : <dfn >"paths"</dfn >
1042+ : <dfn for = " delegation-role " >"paths"</dfn >
10431043 ::
10441044 A list of strings, where each string describes a path that the role is
10451045 trusted to provide. Clients MUST check that a target is in one of the
@@ -1321,7 +1321,7 @@ it in the next step.
13211321 trusted root metadata file MUST be higher than the fixed update start time.
13221322 If the trusted root metadata file has expired, abort the update cycle,
13231323 report the potential freeze attack. On the next update cycle, begin at step
1324- [[ #update-root]] and version N of the root metadata file.
1324+ [[ #update-root]] and version N of the root metadata file.
13251325
1326132611 . ** If the timestamp and / or snapshot keys have been rotated, then delete the
13271327 trusted timestamp and snapshot metadata files.** This is done
0 commit comments