-
Notifications
You must be signed in to change notification settings - Fork 50
Closed
Description
When rotating keys for rekor (while doing v2 sharding), currently we would require two signing events for root signing
- add new key to TrustedRoot for new current rekor
- rotate signers to the new rekor in SingingConfig
Root signing is a somewhat expensive process but we don't want the ecosystem to end up in a situation where verifiers slightly behind on time can't verify new signatures.
I think this can be solved by making SigningConfig more flexible to key rotations. Potentially by adding startTimes or some sort of time for when signers should start using it. Signers could go down the list of providers and pick the first one that is valid.
fyi: @jku
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels