-
Notifications
You must be signed in to change notification settings - Fork 81
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[root v11] KMS keyid for timestamp/snapshot should be fixed #1347
Comments
The legacy signing uses sigstore/sigstore to sign: that just picks the highest version number available: see code -- this is IMO incorrect for TUF (since a new keyversion is a really an entriely different key that will no longer match the public key in the metadata) but explains the different keyid usage. I believe we cannot see from logs which key version is actually used in the legacy online-signing.
It seems I do not personally have the permissions to do this with gcloud:
There is a |
There is a workaround in tuf-on-ci: we will re-try the signing event merge in #1348 This issue should remain open even after that so we can properly fix the KMS keyid in the next signing event |
The workaround seems to have worked -- although next issues is still preventing seeing the results (see #1349) |
EDIT: the immediate issue was worked around: this is now open until the key in metadata is modified so the online-uri for the timestamp/snapshot key is correct.
The value is
gcpkms://projects/sigstore-root-signing/locations/global/keyRings/root/cryptoKeys/timestamp
which is what the old workflows used. IT should begcpkms:projects/sigstore-root-signing/locations/global/keyRings/root/cryptoKeys/timestamp/cryptoKeyVersions/1
original issue follows:
We tried merging the migration signing event on friday. This failed since the KMS keyid is incorrect:
projects/sigstore-root-signing/locations/global/keyRings/root/cryptoKeys/timestamp
since that is what the legacy workflows useKeyManagementServiceClient.asymmetric_sign()
in GCP KMS python bindings requires the full keyid however -- there should be a version identifier included in the stringNext steps:
The text was updated successfully, but these errors were encountered: