- Dec 20, 2021
-
-
dlorenc authored
Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Dec 11, 2021
-
-
dlorenc authored
This included some manual changes because of the interface changes. Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Nov 19, 2021
-
-
asraa authored
* WIP: new hashed type Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com> * wip add signature verification Signed-off-by:
Asra Ali <asraa@google.com> * address bobs comments Signed-off-by:
Asra Ali <asraa@google.com> Co-authored-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Oct 03, 2021
-
-
Aditya Sirish authored
1. Switch DSSE provider to go-securesystemslib 2. Update in-toto and use newly renamed SLSA provenance predicate Signed-off-by:
Aditya Sirish <aditya@saky.in>
-
- Aug 18, 2021
-
-
asraa authored
* Adds rekor TUF type Co-authored-by:
Santiago Torres <santiagotorres@purdue.edu> Co-authored-by:
Trishank Karthik Kuppusamy <trishank.kuppusamy@datadoghq.com> Co-authored-by:
Marina Moore <mnm678@gmail.com> Signed-off-by:
Asra Ali <asraa@google.com> * add type documentation Signed-off-by:
Asra Ali <asraa@google.com> * Address bob comments Signed-off-by:
Asra Ali <asraa@google.com> * run make Signed-off-by:
Asra Ali <asraa@google.com> * wip Signed-off-by:
Asra Ali <asraa@google.com> * Address comments Signed-off-by:
Asra Ali <asraa@google.com> Co-authored-by:
Santiago Torres <santiagotorres@purdue.edu> Co-authored-by:
Trishank Karthik Kuppusamy <trishank.kuppusamy@datadoghq.com> Co-authored-by:
Marina Moore <mnm678@gmail.com>
-
- Jul 28, 2021
-
-
Bob Callaway authored
Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 27, 2021
-
-
Bob Callaway authored
Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
Bob Callaway authored
Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 17, 2021
-
-
Bob Callaway authored
Previously we returned an HTTP 500 "error canonicalizing entry" error if Rekor was unable to parse or verify the proposed content of a new log entry. This adds a new error type ValidationError that allows implementers of the Canonicalize method to delineate between internal, transient errors and errors that clients can rectify. With this patch, errors parsing or validating (provided or referenced) artifacts will return an HTTP 400 message to the client with a message about the issue. Fixes: #362 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
Bob Callaway authored
This causes a JAR to be fetched over a local HTTP server in the e2e test harness instead of the external Jenkins mirror. Also causes the JAR input to be randomized so we can re-use the createSignedJar method in multiple tests. Fixes: #375 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 12, 2021
-
-
dlorenc authored
Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Jul 08, 2021
-
-
Bob Callaway authored
* Adopt new signing/verification APIs from sigstore This uses the new APIs introduced in sigstore/sigstore/pkg/signature and removes most of the calls directly to the golang crypto APIs. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 01, 2021
-
-
Bob Callaway authored
* Move GetRekorClient into util directory Since other sigstore projects are using GetRekorClient, this moves it into the pkg/util directory so that the number of dependencies this brings with it can be minimized. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * move to pkg/client Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jun 23, 2021
-
-
Bob Callaway authored
This adds support for the alpine package format used by Alpine Linux, which is the concatenation of three tgz files (signature, control data, and then the actual package files). Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
asraa authored
* upload all generated timestamps Signed-off-by:
Asra Ali <asraa@google.com> * address bazooka comments Signed-off-by:
Asra Ali <asraa@google.com> * simplify params Signed-off-by:
Asra Ali <asraa@google.com> * address changes Signed-off-by:
Asra Ali <asraa@google.com> * forgot to run swagger Signed-off-by:
Asra Ali <asraa@google.com>
-
- Jun 16, 2021
-
-
Appu authored
Signed-off-by:
Appu Goundan <appu@google.com>
-
- Jun 07, 2021
-
-
dlorenc authored
This adds an "Attestation" method to the entry interface. Entries can return an attestation that they would like to store. The attestations are currently stored in GCS, but it supports any blob store. The feature is turned off with a flag, and we can set a max size as well. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- May 29, 2021
-
-
dlorenc authored
This uses a custom fork of in-toto-golang because not all the changes are merged in one place. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- May 27, 2021
-
-
dlorenc authored
This saves an if err != nil... check. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- May 24, 2021
-
-
asraa authored
* Add timestamps Signed-off-by:
Asra Ali <asraa@google.com> * change Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com> * fix binary writer Signed-off-by:
Asra Ali <asraa@google.com> * add tsa Signed-off-by:
Asra Ali <asraa@google.com> * distangle cert chain creation from new signer Signed-off-by:
Asra Ali <asraa@google.com> * revert some now unncessary changes Signed-off-by:
Asra Ali <asraa@google.com> * cert chain 404 Signed-off-by:
Asra Ali <asraa@google.com> * fix Signed-off-by:
Asra Ali <asraa@google.com>
-
- May 05, 2021
-
-
Bob Callaway authored
* GetLogByIndexHandler returns 404 for missing index GRPC return codes have changed after switching the Trillian GRPC calls due to recent changes; therefore we need to adapt for InvalidArgument which should be returned as a 404 Not Found error to callers. Fixes #296 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- May 01, 2021
-
-
priyawadhwa authored
Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com>
-
- Apr 29, 2021
-
-
Bob Callaway authored
* Add sha256 prefix to index keys for artifact hashes This change adds the `sha256:` prefix to index values that are created to simplify searching the transparency log for artifacts. In case we shift to using a different hashing algorithm in the future, this will provide a way to specify it. Fixes #289 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Apr 28, 2021
-
-
priyawadhwa authored
* Add signature to LogEntry for offline verification Also add an integration test for this. Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Address code review comments: - Canonicalize payload before signing it - Change name of signature to signedEntryTimestamp - move signedEntryTimestamp and inclusionProof into separate Verification field in LogEntry Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Create helper func for extracting log entry Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Add info around verifying signedEntryTimestamp as comments in openapi.yaml Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Generalize verification instructions Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com>
-
- Apr 22, 2021
-
-
dlorenc authored
This is required when uploading jars by URL. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Apr 20, 2021
-
-
asraa authored
Signed-off-by:
Asra Ali <asraa@google.com>
-
- Apr 15, 2021
-
-
Bob Callaway authored
* Add new type for JAR archives This adds support for a new pluggable type that can extract signatures from signed JAR files. Per the JAR spec, a special manifest file is created with the digest hashes of all included content in the JAR file. It is this special manifest file that is then signed, and included in a file within the archive in PKCS7 format. The PKCS7 file also includes the X509 certificate that can be used to verify the signed manifest file inside of the JAR. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
Carlos Tadeu Panato Junior authored
* update boilerplate header and apply go fmt Signed-off-by:
Carlos Panato <ctadeu@gmail.com> * lints: fix golangci-lint issues Signed-off-by:
Carlos Panato <ctadeu@gmail.com> * updated based on feedback Signed-off-by:
Carlos Panato <ctadeu@gmail.com>
-
- Mar 19, 2021
-
-
Bob Callaway authored
* Remove gzip processing flow completely from rekor Issue #208 reported different handling of gzipped content via fetch vs direct upload to rekor server. The code should be consistent, regardless of whether content was compressed or not - by always attempting to verify the signature against the (unmodified) byte stream. This patch removes the gzip decoding completely from rekor and verifies the bytes supplied or referenced. Also fixes issue in E2E tests where sending SIGKILL to watch process caused message to be printed to stderr, which fails the test when running on MacOS. Fixes #208 Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-
- Mar 16, 2021
-
-
Dan Lorenc authored
them to GCS. We don't always have a new one, and under load there might be "batches" of entries all integrated into the same STH. This means there is no guaranteed frequency of updates or even a guarantee that every index will exist. The values (and timestamps) should be monotonically increasing though. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
Dan Lorenc authored
Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Mar 14, 2021
-
-
dlorenc authored
This will allow us to use types.NewEntry() to unmarshal returned values in clients. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Mar 03, 2021
-
-
Bob Callaway authored
Since the API key can be specified as an environment variable and could be thought of as an authentication credential, it should not be included in the path to the created entry in the log. Previously we simply appended the new entry's UUID to the full URL, which was incorrect if an API key was specified as a query parameter. Fixes #182 Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-
- Feb 20, 2021
-
-
Dan Lorenc authored
-
- Feb 17, 2021
-
-
Bob Callaway authored
By using viper.GetString(flag), viper will return the values of that argument from a precedence order (including CLI arguments). However, if a value was passed in through an environment variable or as a value in the config file, it would skip the validation step since that logic was defined against the FlagSet for command line arguments. This change causes validation to be done across all input methods. Fixes #157 Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-
- Feb 01, 2021
-
-
Dan Lorenc authored
-
- Jan 30, 2021
-
-
Dan Lorenc authored
-
- Jan 28, 2021
-
-
Bob Callaway authored
-
Dan Lorenc authored
I noticed this when running some tests locally.
-
Bob Callaway authored
-