Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

add flags to specify slot, PIN, and touch policies for security keys #369

Merged
merged 1 commit into from
Jun 14, 2021
Merged

add flags to specify slot, PIN, and touch policies for security keys #369

merged 1 commit into from
Jun 14, 2021

Conversation

ddz
Copy link
Contributor

@ddz ddz commented Jun 14, 2021

This permits flexibility to use different PIN and touch policies
for container signing. Key generation will use the default PIN
and touch policies for the specified slot unless additional flags
are set to attempt to override the default. The security key is
not guaranteed to honor a particular PIN and touch policy for the
specified slot.

Signed-off-by: Dino A. Dai Zovi ddz@theta44.org

This permits flexibility to use different PIN and touch policies
for container signing. Key generation will use the default PIN
and touch policies for the specified slot unless additional flags
are set to attempt to override the default. The security key is
not guaranteed to honor a particular PIN and touch policy for the
specified slot.

Signed-off-by: Dino A. Dai Zovi <ddz@theta44.org>
@dlorenc
Copy link
Member

dlorenc commented Jun 14, 2021

Nice! Just pulled your branch and ran the yubikey tests that don't work in CI:

$ go test ./test -tags=resetyubikey,e2e,pivkey -count=1
ok      github.com/sigstore/cosign/test 19.086s

@dlorenc dlorenc merged commit 9de98f9 into sigstore:main Jun 14, 2021
@cpanato cpanato added this to the v0.6.0 milestone Jun 14, 2021
@ddz
Copy link
Contributor Author

ddz commented Jun 14, 2021

Thank you for the quick response and merge!

@ddz ddz deleted the ddz/add-piv-slot-flag branch June 27, 2021 16:08
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants