Open tim-gp opened 5 years ago
I am seeing a related issue (https://github.com/theupdateframework/notary/issues/1499)
We created delegations in order to allow a large number of machines to push to the same images without worrying about having the signing key on each one. It looks like the default expiration date for delegations is 3 years (or it was when we started created them around 3 years ago). This is now hitting us ...
I can't find a way to either revoke a compromised delegate, or replace and remove an expired delegate. I'm hoping this is user error on my part.
I originally posted as a comment here: https://github.com/theupdateframework/notary/issues/1444#issuecomment-503549414 but am creating a standalone issue in the hope of a response.
Here are the steps to reproduce using the
notary
compose file (frommaster
) and a locally-running registry:Here is the debug output from
delegation list
after purging the first key:The interesting line is
DEBU[0000] verifying signature for key ID: cb1f6014718e5c2346f887c60523f38bc4967ce9fe8f1689c70cd08b73a5613b
- in my example the first delegate key was idcb1...
and the second was id363...
. It appears that thetargets/releases
role may still be associated with the first delegate key.When I re-add the first public key with
delegation add
the threshold messages stop and I can continue to push and sign content.I would really like to understand how delegation keys can be updated in the case of either certificate expiry or key compromise as I cannot see how it works in practice.