You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Like #737 provide an endpoint that returns certificate validity and SHA2 fingerprints (NotBefore and NotAfter and gpg expiration dates) for signers (this is public info for anything with a released signed artifact).
This would let:
autograph clients check the cert they'd use before signing (if the endpoint is authenticated and scoped to the current creds)
autograph operators monitor pending expirations without going to the HSM or config files
sgtm - what creds will operators use to auth? Hopefully, not some that would also enable signing! 😀
You raise a good point about making permissions explicit. Currently:
all users/auths have /sign/* for the key/signer ids they have access to. This could be broken down into distinct sign/{data,hash,file} permissions.
the monitor key has access to sign the fixed monitoring string with all signers
For the first use case, I'd grant all users access to check the certs for signers they have access to. This saves us from having to distribute additional creds for checking cert validity.
For the second use case, we can reuse the monitor creds assuming the user monitoring autograph signing also monitors certs.
Arguably, we should make the permissions more explicit and split out a separate "fetch cert info" instead of overloading the above.
Like #737 provide an endpoint that returns certificate validity and SHA2 fingerprints (NotBefore and NotAfter and gpg expiration dates) for signers (this is public info for anything with a released signed artifact).
This would let:
cc @hwine re: second item and CertCert work
The text was updated successfully, but these errors were encountered: