Skip to content
Snippets Groups Projects
Unverified Commit 236a8722 authored by dlorenc's avatar dlorenc Committed by GitHub
Browse files

Merge pull request #263 from dlorenc/stopver

Drop signature verification in rekor server.
parents cce6cabf 05af75f0
No related branches found
No related tags found
No related merge requests found
...@@ -31,7 +31,6 @@ import ( ...@@ -31,7 +31,6 @@ import (
"github.com/google/trillian" "github.com/google/trillian"
tclient "github.com/google/trillian/client" tclient "github.com/google/trillian/client"
tcrypto "github.com/google/trillian/crypto"
"github.com/google/trillian/merkle/rfc6962/hasher" "github.com/google/trillian/merkle/rfc6962/hasher"
"github.com/google/trillian/types" "github.com/google/trillian/types"
...@@ -158,8 +157,9 @@ func doCheck(c *client.Rekor, v *tclient.LogVerifier) (*SignedAndUnsignedLogRoot ...@@ -158,8 +157,9 @@ func doCheck(c *client.Rekor, v *tclient.LogVerifier) (*SignedAndUnsignedLogRoot
LogRoot: logRoot, LogRoot: logRoot,
LogRootSignature: signature, LogRootSignature: signature,
} }
lr, err := tcrypto.VerifySignedLogRoot(v.PubKey, v.SigHash, &sth)
if err != nil { lr := &types.LogRootV1{}
if err := lr.UnmarshalBinary(sth.LogRoot); err != nil {
return nil, err return nil, err
} }
return &SignedAndUnsignedLogRoot{ return &SignedAndUnsignedLogRoot{
......
...@@ -23,6 +23,8 @@ import ( ...@@ -23,6 +23,8 @@ import (
"net/http" "net/http"
"net/url" "net/url"
ttypes "github.com/google/trillian/types"
"github.com/google/trillian" "github.com/google/trillian"
"github.com/spf13/viper" "github.com/spf13/viper"
"golang.org/x/sync/errgroup" "golang.org/x/sync/errgroup"
...@@ -39,18 +41,17 @@ import ( ...@@ -39,18 +41,17 @@ import (
"github.com/go-openapi/runtime/middleware" "github.com/go-openapi/runtime/middleware"
"github.com/go-openapi/strfmt" "github.com/go-openapi/strfmt"
tcrypto "github.com/google/trillian/crypto"
rfc6962 "github.com/google/trillian/merkle/rfc6962/hasher" rfc6962 "github.com/google/trillian/merkle/rfc6962/hasher"
"github.com/sigstore/rekor/pkg/generated/restapi/operations/entries" "github.com/sigstore/rekor/pkg/generated/restapi/operations/entries"
) )
//logEntryFromLeaf creates LogEntry struct from trillian structs //logEntryFromLeaf creates LogEntry struct from trillian structs
func logEntryFromLeaf(tc TrillianClient, leaf *trillian.LogLeaf, signedLogRoot *trillian.SignedLogRoot, proof *trillian.Proof) (models.LogEntry, error) { func logEntryFromLeaf(tc TrillianClient, leaf *trillian.LogLeaf, signedLogRoot *trillian.SignedLogRoot, proof *trillian.Proof) (models.LogEntry, error) {
root, err := tcrypto.VerifySignedLogRoot(tc.verifier.PubKey, tc.verifier.SigHash, signedLogRoot)
if err != nil { root := &ttypes.LogRootV1{}
if err := root.UnmarshalBinary(signedLogRoot.LogRoot); err != nil {
return nil, err return nil, err
} }
hashes := []string{} hashes := []string{}
for _, hash := range proof.Hashes { for _, hash := range proof.Hashes {
hashes = append(hashes, hex.EncodeToString(hash)) hashes = append(hashes, hex.EncodeToString(hash))
......
...@@ -27,7 +27,7 @@ import ( ...@@ -27,7 +27,7 @@ import (
"github.com/go-openapi/runtime/middleware" "github.com/go-openapi/runtime/middleware"
"github.com/go-openapi/strfmt" "github.com/go-openapi/strfmt"
tcrypto "github.com/google/trillian/crypto" "github.com/google/trillian/types"
"github.com/sigstore/rekor/pkg/generated/restapi/operations/tlog" "github.com/sigstore/rekor/pkg/generated/restapi/operations/tlog"
) )
...@@ -41,9 +41,8 @@ func GetLogInfoHandler(params tlog.GetLogInfoParams) middleware.Responder { ...@@ -41,9 +41,8 @@ func GetLogInfoHandler(params tlog.GetLogInfoParams) middleware.Responder {
} }
result := resp.getLatestResult result := resp.getLatestResult
// validate result is signed with the key we're aware of root := &types.LogRootV1{}
root, err := tcrypto.VerifySignedLogRoot(tc.verifier.PubKey, tc.verifier.SigHash, result.SignedLogRoot) if err := root.UnmarshalBinary(result.SignedLogRoot.LogRoot); err != nil {
if err != nil {
return handleRekorAPIError(params, http.StatusInternalServerError, err, trillianUnexpectedResult) return handleRekorAPIError(params, http.StatusInternalServerError, err, trillianUnexpectedResult)
} }
...@@ -80,9 +79,8 @@ func GetLogProofHandler(params tlog.GetLogProofParams) middleware.Responder { ...@@ -80,9 +79,8 @@ func GetLogProofHandler(params tlog.GetLogProofParams) middleware.Responder {
} }
result := resp.getConsistencyProofResult result := resp.getConsistencyProofResult
// validate result is signed with the key we're aware of var root types.LogRootV1
root, err := tcrypto.VerifySignedLogRoot(tc.verifier.PubKey, tc.verifier.SigHash, result.SignedLogRoot) if err := root.UnmarshalBinary(result.SignedLogRoot.LogRoot); err != nil {
if err != nil {
return handleRekorAPIError(params, http.StatusInternalServerError, err, trillianUnexpectedResult) return handleRekorAPIError(params, http.StatusInternalServerError, err, trillianUnexpectedResult)
} }
......
0% Loading or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment