- Oct 19, 2021
-
-
dlorenc authored
The CryptoPubKey function only returned the key value, but we should retrieve it from the cert if set. This fixes the rest of #918. Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Oct 07, 2021
-
-
asraa authored
Signed-off-by:
Asra Ali <asraa@google.com>
-
asraa authored
* update go tuf for rsa key impl Signed-off-by:
Asra Ali <asraa@google.com> * fix Signed-off-by:
Asra Ali <asraa@google.com>
-
- Oct 06, 2021
-
-
Bob Callaway authored
Each of the supported types has a Canonicalize() method that generates a JSON representation of the entry. If the golang library were to make a change to the order of keys when marshalling an object, it would cause a duplicate entry in the log for a semantically equivalent object. This change simply transforms the JSON into RFC8785-compliant canonicalized JSON protecting against any changes in JSON libraries going forward. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Oct 03, 2021
-
-
Aditya Sirish authored
1. Switch DSSE provider to go-securesystemslib 2. Update in-toto and use newly renamed SLSA provenance predicate Signed-off-by:
Aditya Sirish <aditya@saky.in>
-
- Sep 14, 2021
-
-
dlorenc authored
This is in preparation for supporting multiple logIDs (for sharding). Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Aug 30, 2021
-
-
dlorenc authored
We get flooded with scapers so it makes it hard to find real errors in our logs. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Aug 20, 2021
-
-
Bob Callaway authored
Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Aug 18, 2021
-
-
asraa authored
* Adds rekor TUF type Co-authored-by:
Santiago Torres <santiagotorres@purdue.edu> Co-authored-by:
Trishank Karthik Kuppusamy <trishank.kuppusamy@datadoghq.com> Co-authored-by:
Marina Moore <mnm678@gmail.com> Signed-off-by:
Asra Ali <asraa@google.com> * add type documentation Signed-off-by:
Asra Ali <asraa@google.com> * Address bob comments Signed-off-by:
Asra Ali <asraa@google.com> * run make Signed-off-by:
Asra Ali <asraa@google.com> * wip Signed-off-by:
Asra Ali <asraa@google.com> * Address comments Signed-off-by:
Asra Ali <asraa@google.com> Co-authored-by:
Santiago Torres <santiagotorres@purdue.edu> Co-authored-by:
Trishank Karthik Kuppusamy <trishank.kuppusamy@datadoghq.com> Co-authored-by:
Marina Moore <mnm678@gmail.com>
-
- Aug 10, 2021
-
-
asraa authored
Signed-off-by:
Asra Ali <asraa@google.com>
-
- Jul 30, 2021
-
-
asraa authored
* use an in memory timestamping key Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com>
-
- Jul 29, 2021
-
-
asraa authored
* just commit timestampnote Signed-off-by:
Asra Ali <asraa@google.com> * add signed timestamp note Signed-off-by:
Asra Ali <asraa@google.com> * address validating sha comment Signed-off-by:
Asra Ali <asraa@google.com>
-
- Jul 28, 2021
-
-
Carlos Tadeu Panato Junior authored
Signed-off-by:
Carlos Panato <ctadeu@gmail.com>
-
- Jul 26, 2021
-
-
Bob Callaway authored
Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 20, 2021
-
-
asraa authored
* generalize signed checkpoint Signed-off-by:
Asra Ali <asraa@google.com> * store note as text representation Signed-off-by:
Asra Ali <asraa@google.com> * cleanup diff Signed-off-by:
Asra Ali <asraa@google.com> * simplify Signed-off-by:
Asra Ali <asraa@google.com> * use signer/verifier Signed-off-by:
Asra Ali <asraa@google.com> * address dan comments Signed-off-by:
Asra Ali <asraa@google.com>
-
- Jul 19, 2021
-
-
Christian Rebischke authored
This commit adds a PATH lookup to the openSSH tests. This prevents failing tests on systems with no ssh-keygen in PATH. Signed-off-by:
Christian Rebischke <chris@shibumi.dev>
-
- Jul 17, 2021
-
-
Bob Callaway authored
Previously we returned an HTTP 500 "error canonicalizing entry" error if Rekor was unable to parse or verify the proposed content of a new log entry. This adds a new error type ValidationError that allows implementers of the Canonicalize method to delineate between internal, transient errors and errors that clients can rectify. With this patch, errors parsing or validating (provided or referenced) artifacts will return an HTTP 400 message to the client with a message about the issue. Fixes: #362 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 14, 2021
-
-
Bob Callaway authored
* Refactor PKI factory and add type checking This allows for more DRY addition of new PKI types, and stricter type checking. This also allows for simpler enumeration of supported PKI formats which will be used in further updates to simplify the CLI codebase. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * revamp CLI flags; support different versions for upload Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * Add Alpine Package type This adds support for the alpine package format used by Alpine Linux, which is the concatenation of three tgz files (signature, control data, and then the actual package files). Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * use shaFlag for --artifact-hash Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * change arg type to PKIFormat Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * defer type-specific validation logic to type code (instead of in CLI); also use CliLogger throughout CLI Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * refactor factory code Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * review comments Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * Clean up EntryImpl interface Make the interface clearer by removing ambiguity around who and when an entry should have external objects fetched or validated. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * update pluggable type README Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
Bob Callaway authored
* Refactor PKI factory and add type checking This allows for more DRY addition of new PKI types, and stricter type checking. This also allows for simpler enumeration of supported PKI formats which will be used in further updates to simplify the CLI codebase. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * revamp CLI flags; support different versions for upload Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * Add Alpine Package type This adds support for the alpine package format used by Alpine Linux, which is the concatenation of three tgz files (signature, control data, and then the actual package files). Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * use shaFlag for --artifact-hash Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * change arg type to PKIFormat Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * defer type-specific validation logic to type code (instead of in CLI); also use CliLogger throughout CLI Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * refactor factory code Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * review comments Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 13, 2021
-
-
dlorenc authored
Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Jul 12, 2021
-
-
dlorenc authored
Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com>
-
dlorenc authored
Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Jul 09, 2021
-
-
Andrew Block authored
* Added Helm type Signed-off-by:
Andrew Block <andy.block@gmail.com> * Cleaned up helm type Signed-off-by:
Andrew Block <andy.block@gmail.com> * Correct Helm schema required fields Signed-off-by:
Andrew Block <andy.block@gmail.com> * Regenerated Helm schema Signed-off-by:
Andrew Block <andy.block@gmail.com>
-
- Jul 08, 2021
-
-
Bob Callaway authored
* Adopt new signing/verification APIs from sigstore This uses the new APIs introduced in sigstore/sigstore/pkg/signature and removes most of the calls directly to the golang crypto APIs. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 01, 2021
-
-
Bob Callaway authored
* Move GetRekorClient into util directory Since other sigstore projects are using GetRekorClient, this moves it into the pkg/util directory so that the number of dependencies this brings with it can be minimized. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * move to pkg/client Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jun 28, 2021
-
-
dlorenc authored
Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Jun 24, 2021
-
-
asraa authored
Signed-off-by:
Asra Ali <asraa@google.com>
-
- Jun 23, 2021
-
-
Bob Callaway authored
This adds support for the alpine package format used by Alpine Linux, which is the concatenation of three tgz files (signature, control data, and then the actual package files). Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
asraa authored
* upload all generated timestamps Signed-off-by:
Asra Ali <asraa@google.com> * address bazooka comments Signed-off-by:
Asra Ali <asraa@google.com> * simplify params Signed-off-by:
Asra Ali <asraa@google.com> * address changes Signed-off-by:
Asra Ali <asraa@google.com> * forgot to run swagger Signed-off-by:
Asra Ali <asraa@google.com>
-
- Jun 16, 2021
-
-
asraa authored
Signed-off-by:
Asra Ali <asraa@google.com>
-
Appu authored
Signed-off-by:
Appu Goundan <appu@google.com>
-
- Jun 15, 2021
-
-
Appu authored
Signed-off-by:
Appu Goundan <appu@google.com>
-
- Jun 07, 2021
-
-
Bob Callaway authored
* Convert STH to checkpoint format This switches away from sending the (now deprecated) Trillian LogRootV1 format over to the checkpoint format documented at https://github.com/google/trillian-examples/tree/master/formats/log Fixes: #313 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
dlorenc authored
This adds an "Attestation" method to the entry interface. Entries can return an attestation that they would like to store. The attestations are currently stored in GCS, but it supports any blob store. The feature is turned off with a flag, and we can set a max size as well. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Jun 02, 2021
-
-
dlorenc authored
Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- May 29, 2021
-
-
dlorenc authored
This uses a custom fork of in-toto-golang because not all the changes are merged in one place. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- May 27, 2021
-
-
dlorenc authored
This saves an if err != nil... check. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- May 24, 2021
-
-
asraa authored
* Add timestamps Signed-off-by:
Asra Ali <asraa@google.com> * change Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com> * fix binary writer Signed-off-by:
Asra Ali <asraa@google.com> * add tsa Signed-off-by:
Asra Ali <asraa@google.com> * distangle cert chain creation from new signer Signed-off-by:
Asra Ali <asraa@google.com> * revert some now unncessary changes Signed-off-by:
Asra Ali <asraa@google.com> * cert chain 404 Signed-off-by:
Asra Ali <asraa@google.com> * fix Signed-off-by:
Asra Ali <asraa@google.com>
-
- May 14, 2021
-
-
Bob Callaway authored
As we have moved away from the rekor.dev domain, switching over to rekor.sigstore.dev for the public instance. api.sigstore.dev still works as an alias. Fixes #305 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- May 06, 2021
-
-
Bob Callaway authored
* Add Log ID to LogEntry field Since the signed entry timestamp (SET) will be able to prove insertion into the log, adding the log ID (aka public key SHA256 hash) makes it easier to know which log the entry came from. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-