- Jan 06, 2022
-
-
Lily Sturmann authored
* Add sharding package Signed-off-by:
Lily Sturmann <lsturman@redhat.com> * Update validators to support future FullID A FullID is a UUID prepended by a TreeID. This will be used for log sharding Signed-off-by:
Lily Sturmann <lsturman@redhat.com>
-
- Dec 27, 2021
-
-
Morten Linderud authored
* rekor-server: Implement /api/v1/version This implements a version endpoint for rekor. This helps figure out the version the server is currently running. It could later be used to implement version compatibility with CLI utilities. Example: λ rekor main» curl -s localhost:3000/api/v1/version | jq { "builddate": "'2021-12-27T13:20:32Z'", "commit": "12d1a47c", "treestate": "dirty", "version": "v0.4.0-15-g12d1a47-dirty" } This removes some duplication of the build flags and inserts them into /pkg/api which is then reused across the utilities. Signed-off-by:
Morten Linderud <morten@linderud.pw> Signed-off-by:
Morten Linderud <morten@linderud.pw> * Generated files Signed-off-by:
Morten Linderud <morten@linderud.pw>
-
dlorenc authored
This was never actually correct - these are technically "payloadTypes", which are not actually mediaTypes. Some implementations mistakenly sent incorrect media types, so it appeared to work. The GCS storage layer rejected correct implementations that sent the payloadType, because these are not valid mediaTypes. We never used this field anyway, so let's drop it. I verified that the API correctly ignores unknown fields, so removing this will not break clients that send it. Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Nov 19, 2021
-
-
asraa authored
* WIP: new hashed type Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com> * wip add signature verification Signed-off-by:
Asra Ali <asraa@google.com> * address bobs comments Signed-off-by:
Asra Ali <asraa@google.com> Co-authored-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Nov 17, 2021
-
-
Mikhail Swift authored
Adds the ability to search for indicies with sha1 hashes. Currently rekor custom types can store indices with formats other than sha256:<hash>. Particularly the in-toto type can do this. One particular use case of interest is indexing log entries by git commit hash, which largely still use sha1. Signed-off-by:
Mikhail Swift <mswift@mswift.dev>
-
- Aug 18, 2021
-
-
asraa authored
* Adds rekor TUF type Co-authored-by:
Santiago Torres <santiagotorres@purdue.edu> Co-authored-by:
Trishank Karthik Kuppusamy <trishank.kuppusamy@datadoghq.com> Co-authored-by:
Marina Moore <mnm678@gmail.com> Signed-off-by:
Asra Ali <asraa@google.com> * add type documentation Signed-off-by:
Asra Ali <asraa@google.com> * Address bob comments Signed-off-by:
Asra Ali <asraa@google.com> * run make Signed-off-by:
Asra Ali <asraa@google.com> * wip Signed-off-by:
Asra Ali <asraa@google.com> * Address comments Signed-off-by:
Asra Ali <asraa@google.com> Co-authored-by:
Santiago Torres <santiagotorres@purdue.edu> Co-authored-by:
Trishank Karthik Kuppusamy <trishank.kuppusamy@datadoghq.com> Co-authored-by:
Marina Moore <mnm678@gmail.com>
-
- Jul 12, 2021
-
-
dlorenc authored
Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Jul 09, 2021
-
-
Andrew Block authored
* Added Helm type Signed-off-by:
Andrew Block <andy.block@gmail.com> * Cleaned up helm type Signed-off-by:
Andrew Block <andy.block@gmail.com> * Correct Helm schema required fields Signed-off-by:
Andrew Block <andy.block@gmail.com> * Regenerated Helm schema Signed-off-by:
Andrew Block <andy.block@gmail.com>
-
- Jun 23, 2021
-
-
Bob Callaway authored
This adds support for the alpine package format used by Alpine Linux, which is the concatenation of three tgz files (signature, control data, and then the actual package files). Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
asraa authored
* upload all generated timestamps Signed-off-by:
Asra Ali <asraa@google.com> * address bazooka comments Signed-off-by:
Asra Ali <asraa@google.com> * simplify params Signed-off-by:
Asra Ali <asraa@google.com> * address changes Signed-off-by:
Asra Ali <asraa@google.com> * forgot to run swagger Signed-off-by:
Asra Ali <asraa@google.com>
-
- Jun 16, 2021
-
-
Appu authored
Signed-off-by:
Appu Goundan <appu@google.com>
-
- Jun 07, 2021
-
-
Bob Callaway authored
* Convert STH to checkpoint format This switches away from sending the (now deprecated) Trillian LogRootV1 format over to the checkpoint format documented at https://github.com/google/trillian-examples/tree/master/formats/log Fixes: #313 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- May 29, 2021
-
-
dlorenc authored
This uses a custom fork of in-toto-golang because not all the changes are merged in one place. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- May 24, 2021
-
-
asraa authored
* Add timestamps Signed-off-by:
Asra Ali <asraa@google.com> * change Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com> * fix binary writer Signed-off-by:
Asra Ali <asraa@google.com> * add tsa Signed-off-by:
Asra Ali <asraa@google.com> * distangle cert chain creation from new signer Signed-off-by:
Asra Ali <asraa@google.com> * revert some now unncessary changes Signed-off-by:
Asra Ali <asraa@google.com> * cert chain 404 Signed-off-by:
Asra Ali <asraa@google.com> * fix Signed-off-by:
Asra Ali <asraa@google.com>
-
- May 14, 2021
-
-
Bob Callaway authored
As we have moved away from the rekor.dev domain, switching over to rekor.sigstore.dev for the public instance. api.sigstore.dev still works as an alias. Fixes #305 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- May 06, 2021
-
-
Bob Callaway authored
* Add Log ID to LogEntry field Since the signed entry timestamp (SET) will be able to prove insertion into the log, adding the log ID (aka public key SHA256 hash) makes it easier to know which log the entry came from. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Apr 29, 2021
-
-
Bob Callaway authored
* Add sha256 prefix to index keys for artifact hashes This change adds the `sha256:` prefix to index values that are created to simplify searching the transparency log for artifacts. In case we shift to using a different hashing algorithm in the future, this will provide a way to specify it. Fixes #289 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Apr 28, 2021
-
-
priyawadhwa authored
* Add signature to LogEntry for offline verification Also add an integration test for this. Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Address code review comments: - Canonicalize payload before signing it - Change name of signature to signedEntryTimestamp - move signedEntryTimestamp and inclusionProof into separate Verification field in LogEntry Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Create helper func for extracting log entry Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Add info around verifying signedEntryTimestamp as comments in openapi.yaml Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Generalize verification instructions Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com>
-
- Apr 20, 2021
-
-
asraa authored
Signed-off-by:
Asra Ali <asraa@google.com>
-
- Apr 15, 2021
-
-
Bob Callaway authored
* Add new type for JAR archives This adds support for a new pluggable type that can extract signatures from signed JAR files. Per the JAR spec, a special manifest file is created with the digest hashes of all included content in the JAR file. It is this special manifest file that is then signed, and included in a file within the archive in PKCS7 format. The PKCS7 file also includes the X509 certificate that can be used to verify the signed manifest file inside of the JAR. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
priyawadhwa authored
* Add signing package for signing within rekor Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Remove public key from trillian and add in TODO for getting public key from Signer Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Create signer flag and store signer in api struct Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Remove public key from tlog in API, replace with a new pubkey tag Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Make sure we can get the public key locally Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Fix build error Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Reuse cosign implementation of signing interface Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * fix lint Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Add in-memory signer, store unmarshaled public key in api Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Temporarily skip the log_info test, since we are now getting the public key from rekor and not trillian Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Replace cosign import with sigstore Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Add unit test for memory signer Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Remove unnecessary code Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * skip test Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Sign the signature for the signed log root ourselves Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Include memory as a signer option for signer flag, make memory default Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com>
-
Carlos Tadeu Panato Junior authored
* update boilerplate header and apply go fmt Signed-off-by:
Carlos Panato <ctadeu@gmail.com> * lints: fix golangci-lint issues Signed-off-by:
Carlos Panato <ctadeu@gmail.com> * updated based on feedback Signed-off-by:
Carlos Panato <ctadeu@gmail.com>
-
- Apr 10, 2021
-
-
Bob Callaway authored
This patch removes the /api/v1/log/entries/{uuid}/proof endpoint. If you have the UUID (aka the leaf Merkle hash), you likely want proof that the content represented by that hash is included in the log. There's no need for a separate /proof endpoint to deliver the same content. This commit also ensures that the getLogEntryByIndex and getLogEntryByUUID endpoints return an inclusion proof as part of their response content. The search endpoint also now returns the inclusion proof of all entries returned from the query. With this patch, Rekor no longer uses the deprecated `GetLeavesByHash` Trillian API. Fixes #229 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Mar 24, 2021
-
-
Bob Callaway authored
Adds a Location response header when a 409 Conflict error is returned from the server when a duplicate entry is sent for insertion into the log. Also changes message printed by CLI to improve usability. Fixes #222 Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-
- Jan 30, 2021
-
-
Dan Lorenc authored
-
- Jan 28, 2021
-
-
Bob Callaway authored
-
- Jan 21, 2021
-
-
Dan Lorenc authored
-
- Jan 19, 2021
-
-
Bob Callaway authored
Signed-off-by:
Bob Callaway <bcallawa@redhat.com> Co-authored-by:
Dan Lorenc <dlorenc@google.com>
-
- Jan 15, 2021
-
-
Luke Hinds authored
-
- Jan 14, 2021
-
-
Bob Callaway authored
Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-
- Jan 12, 2021
-
-
Bob Callaway authored
* add endpoint for public key and return signed tree head with loginfo Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-
Luke Hinds authored
Introduce swagger UI server Signed-off-by:
Bob Callaway <bcallawa@redhat.com> Co-authored-by:
Bob Callaway <bcallawa@redhat.com>
-
- Jan 08, 2021
-
-
Bob Callaway authored
also adds --log-index parameter to CLI verify command Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-
- Jan 04, 2021
-
-
Bob Callaway authored
We can't insert a blank entry, so mark request body as required. Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-
- Dec 19, 2020
-
-
Bob Callaway authored
- adds trillian API object to context - improves request error logging pre and post validation - use consistent request context throughout all GRPC calls - improve validation of incoming UUID values - disable swagger UI endpoint - only print cacheable headers if response code is HTTP 2XX - use GetLeavesByRange instead of deprecated GetLeavesByIndex API Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-
- Dec 17, 2020
-
-
Bob Callaway authored
-
- Dec 07, 2020
-
-
Bob Callaway authored
* add xml & yaml format support * add attributes to denote files that are generated so GH skips them on diffs
-
- Dec 05, 2020
-
-
Bob Callaway authored
-
- Dec 04, 2020
-
-
Bob Callaway authored
-
- Dec 01, 2020
-
-
Dan Lorenc authored
-