Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

LFX: Add TUF project for Term 01 #1340

Merged
merged 1 commit into from
Feb 4, 2025
Merged

Conversation

lukpueh
Copy link
Contributor

@lukpueh lukpueh commented Feb 3, 2025

Copy link
Member

@nate-double-u nate-double-u left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Hi @lukpueh, thanks for this!

Usually we ask that there be more than one mentor per project, but as that's labelled TBD I'll approve this PR as a work in progress (we can make updates later if needed -- even into the application phase).

@nate-double-u nate-double-u merged commit e8e2116 into cncf:main Feb 4, 2025
2 checks passed

A suitable visual representation of this trust hierarchy makes TUF's security properties more accessible to end-users, and, more importantly, allows metadata signers to carefully review metadata changes before signing them.

In this project you will, together with your mentor and the TUF community, identify requirements for the visualization of a TUF metadata repository and build a corresponding web app.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Something I forgot when we we discussed this: I think the focus on "web app" is probably correct (considering the need to make the proposal tangible)...

That said, one of the difficulties in tuf-on-ci has been that there are two use cases with different technical limitations:

  • We want the repository state (who the signers are, when will signatures expire, what are the current artifact hashes) to be highly visible to the community: A website makes sense here even if it sidesteps some TUF security protections
  • But we also want the signers to only trust the information given by their signing tool (code running on their machine): they should not make decisions based on content of a website. Currently signing tools are all command line apps

If there's a way to improve both use cases, that would be great.

@nate-double-u
Copy link
Member

@lukpueh, I think the upstream issue may be incorrect as it's closed.
theupdateframework/tuf-on-ci#39

Sorry i didn't catch this earlier, could you open a follow up PR to this with the correct Upstream issue?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
Development

Successfully merging this pull request may close these issues.

3 participants