File tree 7 files changed +10
-10
lines changed
7 files changed +10
-10
lines changed Original file line number Diff line number Diff line change @@ -6,7 +6,7 @@ ALL_PY_SRCS := $(shell find $(PY_MODULE) -name '*.py') \
6
6
$(shell find test -name '* .py') \
7
7
$(shell find docs/scripts -name '* .py') \
8
8
9
- # Optionally overriden by the user, if they're using a virtual environment manager.
9
+ # Optionally overridden by the user, if they're using a virtual environment manager.
10
10
VENV ?= env
11
11
12
12
# On Windows, venv scripts/shims are under `Scripts` instead of `bin`.
@@ -34,7 +34,7 @@ ifneq ($(TESTS),)
34
34
COV_ARGS :=
35
35
else
36
36
TEST_ARGS := $(TEST_ARGS)
37
- # TODO: Reenable coverage testing
37
+ # TODO: Re-enable coverage testing
38
38
# COV_ARGS := --fail-under 100
39
39
endif
40
40
Original file line number Diff line number Diff line change 9
9
10
10
Users who need to operationalize offline verification may wish to do this
11
11
by distributing their own trust configuration; see
12
- [ Customn root of trust] ( ./custom_trust.md ) .
12
+ [ Custom root of trust] ( ./custom_trust.md ) .
13
13
14
14
During verification, there are two kinds of network access that ` sigstore-python `
15
15
* can* perform:
@@ -40,4 +40,4 @@ $ sigstore --trust-config public.trustconfig.json verify identity ...
40
40
```
41
41
42
42
This will similarly result in fully offline operation, as the trust
43
- configuration contains a full trust root.
43
+ configuration contains a full trust root.
Original file line number Diff line number Diff line change @@ -44,7 +44,7 @@ the integrity and transparency of the signing process.
44
44
45
45
!!! warning
46
46
47
- This step is performed before the `Timestamping` step in the worfklow .
47
+ This step is performed before the `Timestamping` step in the workflow .
48
48
49
49
### Signing Choices
50
50
Original file line number Diff line number Diff line change @@ -41,7 +41,7 @@ namely the Fulcio's supported identity providers and the claims expected within
41
41
42
42
!!! note
43
43
44
- The examples in the section belows are using ambient credential detection.
44
+ The examples in the section below are using ambient credential detection.
45
45
When no credentials are detected, it opens a browser to perform an interactive OAuth2 authentication flow.
46
46
47
47
## Signing an artifact
@@ -130,4 +130,4 @@ Transparency log entry created at index: 155019253
130
130
Sigstore bundle written to README.md.sigstore.json
131
131
```
132
132
133
- [ SLSA ] : https://slsa.dev/
133
+ [ SLSA ] : https://slsa.dev/
Original file line number Diff line number Diff line change @@ -57,7 +57,7 @@ class LogCheckpoint(BaseModel):
57
57
- an origin, e.g. "rekor.sigstage.dev - 8050909264565447525"
58
58
- the size of the log,
59
59
- the hash of the log,
60
- - and any optional ancillary contants , e.g. "Timestamp: 1679349379012118479"
60
+ - and any optional ancillary constants , e.g. "Timestamp: 1679349379012118479"
61
61
62
62
See: <https://github.com/transparency-dev/formats/blob/main/log/README.md>
63
63
"""
Original file line number Diff line number Diff line change @@ -99,7 +99,7 @@ def _pack_digitally_signed(
99
99
blob, one that forms the signature body of the "digitally-signed" struct
100
100
for an SCT.
101
101
102
- The format of the digitaly signed data is described in IETF's RFC 6962.
102
+ The format of the digitally signed data is described in IETF's RFC 6962.
103
103
"""
104
104
105
105
# No extensions are currently specified, so we treat the presence
Original file line number Diff line number Diff line change @@ -138,7 +138,7 @@ def _signing_cert(
138
138
else :
139
139
_logger .debug ("Retrieving signed certificate..." )
140
140
141
- # Build an X.509 Certificiate Signing Request
141
+ # Build an X.509 Certificate Signing Request
142
142
builder = (
143
143
x509 .CertificateSigningRequestBuilder ()
144
144
.subject_name (
You can’t perform that action at this time.
0 commit comments