Open
Description
Right now the only way of signing your metadata files is by using a local key file. Many users would prefer to store sensitive keys in KMS. tools like 'tuftool' allow for specifying an AWS KMS id (eg. tuftool root sign --key aws-kms:///<my-kms-id>
) and using that to sign the various role metadata files, allowing for a more safe environment. It would be great if the go CLI equally supported this functionality and use case.
Metadata
Metadata
Assignees
Labels
No labels