-
Notifications
You must be signed in to change notification settings - Fork 70
Description
Description
I am currently running a Private Sigstore stack using the Scaffold Helm chart. I cureently have gitsign installed using the following:
git config --global gitsign.fulcio https://<my-fulcio-url>
git config --global gitsign.rekor https://<my-rekor-url>
git config --global gitsign.issuer https://<my-dex-url>
using this I am able to get gitsign to properly sign the commits, however I am unable to get gitsign to verify any commits I make.
failed to verify detached signature: x509: certificate signed by unknown authority
I understand this is something to do with TUF, and the documentation here is almost non-existant so I did some digging. I have tuf enabled and hosted via the scaffold helm chart, though I don't quite understand how this works or how to interact with it to properly manage my roots.
I have read that if you are using a private sigstore instance you must run cosign initialize
first however this breaks my setup as I don't have cosign installed and I want to be able to configure everything using environment variables so I can easily point my machine at any private sigstore instance I wish.
Is there a way to use only environment variables to configure gitsign to securely connect to, trust, and verify a private sigstore instance? I am happy to encode json into such a variable, or have a root.json file downloaded if it will help.
Is the scaffold helm chart complete and does its tuf config require any more additional manual steps? the helm chart has been deployed successfully and is running smoothly, but I am certain I've missed something.