-
Notifications
You must be signed in to change notification settings - Fork 53
Enable signing and verifying using keys stored in Hashicorp Vault #307
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
theupdateframework/python-tuf#1263 breaks down how to do this work with:
I believe @woodruffw plans to work on the Vault support once the first two items are complete. |
The first two items are complete. Abstract signing interface, |
Hi. D from Datadog here. Will start work on Vault support if that is still needed. |
Work on the Vault support would be great, thanks @d-niu ! Last I heard @woodruffw was planning to implement within warehouse, but AFAIK that work has not started yet. Even if the code did exist in warehouse, it would still be good to have it in securesystemslib so that more folks can make use of it. |
Description of issue or feature request:
@trishankatdatadog did a preliminary implementation of Hashicorp Vault integration with the TUF reference implementation in theupdateframework/python-tuf#1060, but such functionality seems a better fit for securesystemslib. Particularly as having such functionality in securesystemslib would also make it more widely usable, such as by TUF's sibling project in-toto.
One model for implementing Vault support would be to mimic the patterns in the proposed securesystemslib PKCS11-based HSM interface in PR #229.
Current behavior:
Unable to sign or verify with keys stored in Vault.
Expected behavior:
Able to sign and verify with keys stored in Vault.
The text was updated successfully, but these errors were encountered: