Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

verification: Run sig verification even without a policy #2026

Merged
merged 2 commits into from
Sep 10, 2021

Conversation

yondonfu
Copy link
Member

@yondonfu yondonfu commented Sep 9, 2021

What does this pull request do? Explain your changes. (required)

At the moment, signature verification for results returned by an orchestrators will only run if a verification policy is specified which is only the case if -localVerify=true. As a result, if -localVerify=false when running a broadcaster, signature verification is skipped.

This PR ensures that signature verification is always run regardless of the value of -localVerify because the broadcaster should always verify signatures returned by an orchestrator.

Specific updates (required)

See commit history.

How did you test each of these updates (required)

Added unit tests.

Does this pull request close any open issues?

N/A

Checklist:

@yondonfu yondonfu merged commit 0a17374 into master Sep 10, 2021
@yondonfu yondonfu deleted the yf/sig-verify-order branch September 10, 2021 01:22
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant