Skip to content

Commit c79035f

Browse files
Add note regarding API compatibility when using signing config (#528)
As discussed in the Go meeting today, we want developers to be aware of the consequences of using a signing config and always selecting the highest API version, which may lead to verifiers unable to verify. Signed-off-by: Hayden <[email protected]> Co-authored-by: Hayden <[email protected]>
1 parent cbc9bf5 commit c79035f

File tree

1 file changed

+6
-0
lines changed
  • examples/sigstore-go-signing

1 file changed

+6
-0
lines changed

examples/sigstore-go-signing/main.go

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -138,6 +138,12 @@ func main() {
138138
log.Fatal(err)
139139
}
140140
} else {
141+
// Note to developers: When fetching services from the public-good instance's
142+
// SigningConfig, you may retrieve a service with a higher API version than
143+
// clients that verify support, e.g. uploading to Rekor v2, but verifying with
144+
// a client that only supports Rekor v1. If you are not able to keep verifying
145+
// clients up-to-date, you may want to select specific API versions when calling
146+
// root.SelectService.
141147
signingConfig, err = root.GetSigningConfig(stagingTUFClient)
142148
if err != nil {
143149
log.Fatal(err)

0 commit comments

Comments
 (0)