Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

emphasize deletion of all signatures if using invalid identity #10122

Merged

Conversation

wozniakjan
Copy link

This is to supplement openshift/origin#19976, @bmcelvee in case you already created the PR we talked about, feel free to close this one. I was trying to find yours but couldn't and I had some spare time on Friday for this anyway :)

ptal @bmcelvee, @bparees

@openshift-ci-robot openshift-ci-robot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Jun 15, 2018
Using the `--save` flag on already verified image together with invalid GPG key
or invalid expected identity causes the saved verification status to be removed,
and the image will become unverified.
or invalid expected identity causes the saved verification status with all
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"with all" -> "and all"?

or invalid expected identity causes the saved verification status to be removed,
and the image will become unverified.
or invalid expected identity causes the saved verification status with all
previous signatures to be removed, and the image will become unverified.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

s/previous// ?

Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

couldn't come up with any better adjective so I just removed the 'previous'

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

sorry if it wasn't clear, that's exactly what i was suggesting you do :)

@bparees bparees self-assigned this Jun 15, 2018
@wozniakjan wozniakjan force-pushed the image_signature/emphasize_sig_deletion branch from b37ceab to 6f2d730 Compare June 18, 2018 13:13
@bparees
Copy link
Contributor

bparees commented Jun 18, 2018

lgtm
@openshift/team-documentation ptal/merge

@bmcelvee
Copy link
Contributor

Thanks, @wozniakjan! LGTM. The bug attached to this is set for OCP 3.6, so is this applicable for 3.6+?

No QE required.

@bparees
Copy link
Contributor

bparees commented Jun 25, 2018

yes, 3.6+

@bmcelvee
Copy link
Contributor

Thanks!

@bmcelvee
Copy link
Contributor

/cherrypick enterprise-3.7

@openshift-cherrypick-robot

@bmcelvee: new pull request created: #10403

In response to this:

/cherrypick enterprise-3.7

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@bmcelvee
Copy link
Contributor

/cherrypick enterprise-3.9

@openshift-cherrypick-robot

@bmcelvee: new pull request created: #10404

In response to this:

/cherrypick enterprise-3.9

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@bmcelvee
Copy link
Contributor

/cherrypick enterprise-3.10

@openshift-cherrypick-robot

@bmcelvee: new pull request created: #10405

In response to this:

/cherrypick enterprise-3.10

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants