-
Notifications
You must be signed in to change notification settings - Fork 81
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[root v11] signing period length #1355
Comments
I would vote for extending both the root validity and the signing period, with eg. 15 days to give us enough time to perform the signing. By extending both the signing period and the validity we would still get the same starting date as with the current configuration, without risking any prober alerts. |
I agree to extending both. I think we should try to leave 2 weeks to handle any issues, so I would say 21 days for the root signing period and 14 days for the issue, giving signers a week. |
There are three deadlines we need to juggle and I can't quite parse that fully, so I'll write this out to make sure we all agree.
Fredrik suggested extending signing period (and expiry) by 15 days and that feels reasonable, then we would have
With these deadlines some scenarios would look like:
|
Current situation:
This is not completely sustainable as it means signing events must finish within in a day, otherwise tests start complaining.
There seem to be two main options:
CC @sigstore/tuf-root-signing-codeowners and @sigstore/sigstore-keyholders for opinions, I'm not sure what I'd like to do here.
The text was updated successfully, but these errors were encountered: