- Mar 29, 2022
-
-
Lily Sturmann authored
Signed-off-by:
Lily Sturmann <lsturman@redhat.com>
-
- Mar 26, 2022
-
-
Lily Sturmann authored
tlog_id specifes the active shard and is kept for backwards compatibility. To avoid replicating information, the shard config file is used only to specify inactive shards and must be used in conjunction with a tlog_id flag. Together, these build the logRanges type in the sharding module. Signed-off-by:
Lily Sturmann <lsturman@redhat.com>
-
- Mar 11, 2022
-
-
priyawadhwa authored
* Return virtual index when creating and getting a log entry Use the virtual index when signing an entry on creation, and return that to the end user. There shouldn't be any observable difference here at the moment, until we actually shard the log. Signed-off-by:
Priya Wadhwa <priya@chainguard.dev> * Remove pointer to logRanges so value can't be modified Also make all fields private and only accessible via funcition calls Signed-off-by:
Priya Wadhwa <priya@chainguard.dev> * Fix virtual log index bug when getting indicies in inactive shards Signed-off-by:
Priya Wadhwa <priya@chainguard.dev>
-
- Mar 10, 2022
-
-
priyawadhwa authored
Signed-off-by:
Priya Wadhwa <priya@chainguard.dev>
-
- Mar 05, 2022
-
-
Lily Sturmann authored
* Add helpers and refactor sharding package - Adds a function to get a TreeID from an ID string - Adds testing for the above - Consolidates validation logic for UUID, TreeID, EntryID - Removes code that attempts to use ActiveIndex() in the sharding package, as this is not accessible due to import cycles - Other small cleanup and typo fixes Signed-off-by:
Lily Sturmann <lsturman@redhat.com> * Change logRanges to work with int64 This is the type used by the trillian TreeID and saves from having to convert in multiple places. Signed-off-by:
Lily Sturmann <lsturman@redhat.com> * Add TreeID to LogInfo API endpoint WARNING: breaks loginfo cmd to current prod server Signed-off-by:
Lily Sturmann <lsturman@redhat.com> * Update API based on logRangesFlag Signed-off-by:
Lily Sturmann <lsturman@redhat.com> * Use API's logRanges to retrieve artifacts Signed-off-by:
Lily Sturmann <lsturman@redhat.com>
-
- Jan 25, 2022
-
-
Lily Sturmann authored
* Move range.go into sharding package to avoid import cycles Signed-off-by:
Lily Sturmann <lsturman@redhat.com> * Change name of FullID to EntryID Signed-off-by:
Lily Sturmann <lsturman@redhat.com> * Add unit tests for sharding package Also add a few helper functions and update names. Signed-off-by:
Lily Sturmann <lsturman@redhat.com> * Add logic to GET artifacts via old UUID or new EntryID Signed-off-by:
Lily Sturmann <lsturman@redhat.com> * Add e2e test for longer EntryID Signed-off-by:
Lily Sturmann <lsturman@redhat.com>
-
- Dec 29, 2021
-
-
dlorenc authored
Right now the type itself is defined in the cli package, which means we can't use it without an import cycle. Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Dec 16, 2021
-
-
dependabot[bot] authored
* Bump google.golang.org/grpc from 1.42.0 to 1.43.0 Bumps [google.golang.org/grpc](https://github.com/grpc/grpc-go) from 1.42.0 to 1.43.0. - [Release notes](https://github.com/grpc/grpc-go/releases) - [Commits](https://github.com/grpc/grpc-go/compare/v1.42.0...v1.43.0 ) --- updated-dependencies: - dependency-name: google.golang.org/grpc dependency-type: direct:production update-type: version-update:semver-minor ... Signed-off-by:
dependabot[bot] <support@github.com> * replace grpc.WithInsecure() with insecure.NewCredentials() Signed-off-by:
Carlos Panato <ctadeu@gmail.com> Co-authored-by:
dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com> Co-authored-by:
Carlos Panato <ctadeu@gmail.com>
-
- Nov 04, 2021
-
-
Lily Sturmann authored
Signed-off-by:
Lily Sturmann <lsturman@redhat.com>
-
- Sep 14, 2021
-
-
dlorenc authored
This is in preparation for supporting multiple logIDs (for sharding). Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Jul 30, 2021
-
-
asraa authored
* use an in memory timestamping key Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com>
-
- Jul 08, 2021
-
-
Bob Callaway authored
* Adopt new signing/verification APIs from sigstore This uses the new APIs introduced in sigstore/sigstore/pkg/signature and removes most of the calls directly to the golang crypto APIs. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jun 24, 2021
-
-
asraa authored
Signed-off-by:
Asra Ali <asraa@google.com>
-
- Jun 07, 2021
-
-
dlorenc authored
This adds an "Attestation" method to the entry interface. Entries can return an attestation that they would like to store. The attestations are currently stored in GCS, but it supports any blob store. The feature is turned off with a flag, and we can set a max size as well. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- May 27, 2021
-
-
dlorenc authored
This saves an if err != nil... check. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- May 24, 2021
-
-
asraa authored
* Add timestamps Signed-off-by:
Asra Ali <asraa@google.com> * change Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com> * fix binary writer Signed-off-by:
Asra Ali <asraa@google.com> * add tsa Signed-off-by:
Asra Ali <asraa@google.com> * distangle cert chain creation from new signer Signed-off-by:
Asra Ali <asraa@google.com> * revert some now unncessary changes Signed-off-by:
Asra Ali <asraa@google.com> * cert chain 404 Signed-off-by:
Asra Ali <asraa@google.com> * fix Signed-off-by:
Asra Ali <asraa@google.com>
-
- May 06, 2021
-
-
Bob Callaway authored
* Add Log ID to LogEntry field Since the signed entry timestamp (SET) will be able to prove insertion into the log, adding the log ID (aka public key SHA256 hash) makes it easier to know which log the entry came from. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Apr 28, 2021
-
-
priyawadhwa authored
* Add signature to LogEntry for offline verification Also add an integration test for this. Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Address code review comments: - Canonicalize payload before signing it - Change name of signature to signedEntryTimestamp - move signedEntryTimestamp and inclusionProof into separate Verification field in LogEntry Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Create helper func for extracting log entry Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Add info around verifying signedEntryTimestamp as comments in openapi.yaml Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Generalize verification instructions Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com>
-
- Apr 15, 2021
-
-
priyawadhwa authored
* Add signing package for signing within rekor Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Remove public key from trillian and add in TODO for getting public key from Signer Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Create signer flag and store signer in api struct Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Remove public key from tlog in API, replace with a new pubkey tag Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Make sure we can get the public key locally Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Fix build error Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Reuse cosign implementation of signing interface Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * fix lint Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Add in-memory signer, store unmarshaled public key in api Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Temporarily skip the log_info test, since we are now getting the public key from rekor and not trillian Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Replace cosign import with sigstore Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Add unit test for memory signer Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Remove unnecessary code Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * skip test Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Sign the signature for the signed log root ourselves Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Include memory as a signer option for signer flag, make memory default Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com>
-
Carlos Tadeu Panato Junior authored
* update boilerplate header and apply go fmt Signed-off-by:
Carlos Panato <ctadeu@gmail.com> * lints: fix golangci-lint issues Signed-off-by:
Carlos Panato <ctadeu@gmail.com> * updated based on feedback Signed-off-by:
Carlos Panato <ctadeu@gmail.com>
-
- Feb 26, 2021
-
-
Luke Hinds authored
-
- Feb 25, 2021
-
-
Luke Hinds authored
All instances of projectrekor are now renamed to SigStore This includes: * Import paths * Tests * Readme's Signed-off-by:
Luke Hinds <lhinds@redhat.com>
-
- Jan 28, 2021
-
-
Bob Callaway authored
-
- Jan 19, 2021
-
-
Bob Callaway authored
Signed-off-by:
Bob Callaway <bcallawa@redhat.com> Co-authored-by:
Dan Lorenc <dlorenc@google.com>
-
- Jan 03, 2021
-
-
Dan Lorenc authored
This allows us to skip sticking it onto each request context and retrieving it. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Dec 24, 2020
-
-
Bob Callaway authored
After #77, we have one global GRPC channel for the entire process. This change causes each GRPC call to be made on the incoming HTTP request's context such that if an HTTP client cancels prematurely, we will handle the GRPC cleanup appropriately. Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-
- Dec 23, 2020
-
-
dlorenc authored
-
- Dec 19, 2020
-
-
Bob Callaway authored
- adds trillian API object to context - improves request error logging pre and post validation - use consistent request context throughout all GRPC calls - improve validation of incoming UUID values - disable swagger UI endpoint - only print cacheable headers if response code is HTTP 2XX - use GetLeavesByRange instead of deprecated GetLeavesByIndex API Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-
- Dec 17, 2020
-
-
Bob Callaway authored
-
- Dec 07, 2020
-
-
Bob Callaway authored
-
- Dec 04, 2020
-
-
Bob Callaway authored
-
- Nov 23, 2020
-
-
Bob Callaway authored
simplify upload command to reuse common PKI package across client & server
-
Dan Lorenc authored
-
- Nov 18, 2020
-
-
Dan Lorenc authored
Some changes: - import names (app -> api, logging -> log) - Commands package (cmd -> app)
-