- Apr 03, 2022
-
-
Hayden B authored
This allows you to create an entry for the entire certificate chain, not just the leaf certificate. The certificate chain will be verified before adding the entry. Signed-off-by:
Hayden Blauzvern <hblauzvern@google.com>
-
- Nov 23, 2021
-
-
Harry Fallows authored
* Upgraded go-playground/validator module to v10 Signed-off-by:
Harry Fallows <harryfallows@protonmail.com> * Manually re-added missing go.sum entry for module providing package github.com/dvyukov/go-fuzz/go-fuzz-dep Signed-off-by:
Harry Fallows <harryfallows@protonmail.com>
-
- Nov 19, 2021
-
-
asraa authored
* WIP: new hashed type Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com> * wip add signature verification Signed-off-by:
Asra Ali <asraa@google.com> * address bobs comments Signed-off-by:
Asra Ali <asraa@google.com> Co-authored-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Oct 19, 2021
-
-
dlorenc authored
The CryptoPubKey function only returned the key value, but we should retrieve it from the cert if set. This fixes the rest of #918. Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Jul 30, 2021
-
-
asraa authored
* use an in memory timestamping key Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com>
-
- Jul 17, 2021
-
-
Bob Callaway authored
Previously we returned an HTTP 500 "error canonicalizing entry" error if Rekor was unable to parse or verify the proposed content of a new log entry. This adds a new error type ValidationError that allows implementers of the Canonicalize method to delineate between internal, transient errors and errors that clients can rectify. With this patch, errors parsing or validating (provided or referenced) artifacts will return an HTTP 400 message to the client with a message about the issue. Fixes: #362 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 14, 2021
-
-
Bob Callaway authored
* Refactor PKI factory and add type checking This allows for more DRY addition of new PKI types, and stricter type checking. This also allows for simpler enumeration of supported PKI formats which will be used in further updates to simplify the CLI codebase. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * revamp CLI flags; support different versions for upload Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * Add Alpine Package type This adds support for the alpine package format used by Alpine Linux, which is the concatenation of three tgz files (signature, control data, and then the actual package files). Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * use shaFlag for --artifact-hash Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * change arg type to PKIFormat Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * defer type-specific validation logic to type code (instead of in CLI); also use CliLogger throughout CLI Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * refactor factory code Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * review comments Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 08, 2021
-
-
Bob Callaway authored
* Adopt new signing/verification APIs from sigstore This uses the new APIs introduced in sigstore/sigstore/pkg/signature and removes most of the calls directly to the golang crypto APIs. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jun 23, 2021
-
-
Bob Callaway authored
This adds support for the alpine package format used by Alpine Linux, which is the concatenation of three tgz files (signature, control data, and then the actual package files). Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- May 24, 2021
-
-
asraa authored
* Add timestamps Signed-off-by:
Asra Ali <asraa@google.com> * change Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com> * fix binary writer Signed-off-by:
Asra Ali <asraa@google.com> * add tsa Signed-off-by:
Asra Ali <asraa@google.com> * distangle cert chain creation from new signer Signed-off-by:
Asra Ali <asraa@google.com> * revert some now unncessary changes Signed-off-by:
Asra Ali <asraa@google.com> * cert chain 404 Signed-off-by:
Asra Ali <asraa@google.com> * fix Signed-off-by:
Asra Ali <asraa@google.com>
-
- Apr 21, 2021
-
-
asraa authored
Signed-off-by:
Asra Ali <asraa@google.com>
-
- Apr 20, 2021
-
-
asraa authored
Signed-off-by:
Asra Ali <asraa@google.com>
-
- Apr 15, 2021
-
-
Carlos Tadeu Panato Junior authored
* update boilerplate header and apply go fmt Signed-off-by:
Carlos Panato <ctadeu@gmail.com> * lints: fix golangci-lint issues Signed-off-by:
Carlos Panato <ctadeu@gmail.com> * updated based on feedback Signed-off-by:
Carlos Panato <ctadeu@gmail.com>
-
- Mar 27, 2021
-
-
dlorenc authored
The error was turning signature bytes into a string directly. We could base64 encode it, but that's not terribly useful either. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Mar 16, 2021
-
-
Dan Lorenc authored
Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Feb 20, 2021
-
-
Dan Lorenc authored
-
- Jan 14, 2021
-
-
Bob Callaway authored
saves second pass over data
-
Dan Lorenc authored
Still need to add some more e2e-style tests that go through the ArtifactFactory flow.
-