-
Notifications
You must be signed in to change notification settings - Fork 20
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
v1 tuf client #415
v1 tuf client #415
Conversation
|
||
public Builder usePublicGoodInstance() { | ||
if (remoteMirror != null || trustedRoot != null) { | ||
throw new IllegalStateException(); |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
maybe just a message here explaining why you're throwing.
} | ||
|
||
public SigstoreTufClient build() throws IOException { | ||
Preconditions.checkState( |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
why not just accept 0 as no caching?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
yeah, that works.
Signed-off-by: Patrick Flynn <patrick@chainguard.dev>
Signed-off-by: Appu Goundan <appu@google.com>
c52f1ab
to
8499567
Compare
Continuation of patricks work on this.
This is the sigstore wrapper around the Updater. It's very barebones right now, but it should allow us to easily access key/cert material defined in the trusted_root.json easier. This should also implement an interface that is passed to all verifiers (not yet defined).