Skip to content
Snippets Groups Projects
  1. Dec 27, 2021
    • dlorenc's avatar
      Remove the attestation media type field. (#565) · 12d1a47c
      dlorenc authored
      
      This was never actually correct - these are technically "payloadTypes", which are
      not actually mediaTypes. Some implementations mistakenly sent incorrect media types, so
      it appeared to work. The GCS storage layer rejected correct implementations that sent the
      payloadType, because these are not valid mediaTypes.
      
      We never used this field anyway, so let's drop it. I verified that the API correctly ignores
      unknown fields, so removing this will not break clients that send it.
      
      Signed-off-by: default avatarDan Lorenc <lorenc.d@gmail.com>
      12d1a47c
  2. Nov 19, 2021
  3. Nov 17, 2021
  4. Aug 20, 2021
  5. Aug 18, 2021
  6. Jul 26, 2021
  7. Jul 12, 2021
  8. Jul 09, 2021
  9. Jun 23, 2021
  10. Jun 16, 2021
  11. Jun 07, 2021
  12. May 29, 2021
  13. May 24, 2021
  14. May 14, 2021
  15. May 06, 2021
  16. Apr 29, 2021
  17. Apr 28, 2021
  18. Apr 20, 2021
  19. Apr 18, 2021
  20. Apr 15, 2021
  21. Apr 13, 2021
  22. Apr 10, 2021
    • Bob Callaway's avatar
      Update rekor REST API to match Trillian semantics (#250) · cce6cabf
      Bob Callaway authored
      
      This patch removes the /api/v1/log/entries/{uuid}/proof endpoint. If you
      have the UUID (aka the leaf Merkle hash), you likely want proof that the
      content represented by that hash is included in the log. There's no need
      for a separate /proof endpoint to deliver the same content.
      
      This commit also ensures that the getLogEntryByIndex and
      getLogEntryByUUID endpoints return an inclusion proof as part of their
      response content. The search endpoint also now returns the inclusion
      proof of all entries returned from the query.
      
      With this patch, Rekor no longer uses the deprecated `GetLeavesByHash`
      Trillian API.
      
      Fixes #229
      
      Signed-off-by: default avatarBob Callaway <bob.callaway@gmail.com>
      cce6cabf
  23. Apr 04, 2021
  24. Mar 24, 2021
  25. Mar 03, 2021
    • Bob Callaway's avatar
      no longer require SHA to upload artifacts to log · 4e6156b5
      Bob Callaway authored
      
      Since the verification of a signature will, by definition, include
      verifying the content has not been altered, it is unnecessary to require
      users of the CLI or REST API to specify the SHA256 hash of the content
      when creating a new entry into the log.
      
      Note that the server will still compute the hash and store it in the log
      for ease of comparison.
      
      Fixes #180
      
      Signed-off-by: default avatarBob Callaway <bcallawa@redhat.com>
      4e6156b5
  26. Jan 30, 2021
  27. Jan 28, 2021
  28. Jan 21, 2021
  29. Jan 19, 2021
  30. Jan 18, 2021
  31. Jan 15, 2021
  32. Jan 14, 2021
  33. Jan 13, 2021
    • Dan Lorenc's avatar
      Update generated files. · 366786ab
      Dan Lorenc authored
      My swagger build introduced these, they're whitespace only but could
      make larger PRs harder to review.
      366786ab
  34. Jan 12, 2021
Loading