- Dec 20, 2021
-
-
dlorenc authored
Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Dec 11, 2021
-
-
dlorenc authored
This included some manual changes because of the interface changes. Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Nov 19, 2021
-
-
asraa authored
* WIP: new hashed type Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com> * wip add signature verification Signed-off-by:
Asra Ali <asraa@google.com> * address bobs comments Signed-off-by:
Asra Ali <asraa@google.com> Co-authored-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Nov 15, 2021
-
-
Naveen authored
Fuzzing the RequestFromRekor API call using go-fuzz. Signed-off-by:
naveen <172697+naveensrinivasan@users.noreply.github.com>
-
- Oct 07, 2021
-
-
asraa authored
* update go tuf for rsa key impl Signed-off-by:
Asra Ali <asraa@google.com> * fix Signed-off-by:
Asra Ali <asraa@google.com>
-
- Oct 03, 2021
-
-
Aditya Sirish authored
1. Switch DSSE provider to go-securesystemslib 2. Update in-toto and use newly renamed SLSA provenance predicate Signed-off-by:
Aditya Sirish <aditya@saky.in>
-
- Aug 18, 2021
-
-
asraa authored
* Adds rekor TUF type Co-authored-by:
Santiago Torres <santiagotorres@purdue.edu> Co-authored-by:
Trishank Karthik Kuppusamy <trishank.kuppusamy@datadoghq.com> Co-authored-by:
Marina Moore <mnm678@gmail.com> Signed-off-by:
Asra Ali <asraa@google.com> * add type documentation Signed-off-by:
Asra Ali <asraa@google.com> * Address bob comments Signed-off-by:
Asra Ali <asraa@google.com> * run make Signed-off-by:
Asra Ali <asraa@google.com> * wip Signed-off-by:
Asra Ali <asraa@google.com> * Address comments Signed-off-by:
Asra Ali <asraa@google.com> Co-authored-by:
Santiago Torres <santiagotorres@purdue.edu> Co-authored-by:
Trishank Karthik Kuppusamy <trishank.kuppusamy@datadoghq.com> Co-authored-by:
Marina Moore <mnm678@gmail.com>
-
- Jul 28, 2021
-
-
Bob Callaway authored
Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 27, 2021
-
-
Bob Callaway authored
Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
Bob Callaway authored
Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 17, 2021
-
-
Bob Callaway authored
Previously we returned an HTTP 500 "error canonicalizing entry" error if Rekor was unable to parse or verify the proposed content of a new log entry. This adds a new error type ValidationError that allows implementers of the Canonicalize method to delineate between internal, transient errors and errors that clients can rectify. With this patch, errors parsing or validating (provided or referenced) artifacts will return an HTTP 400 message to the client with a message about the issue. Fixes: #362 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
Bob Callaway authored
This causes a JAR to be fetched over a local HTTP server in the e2e test harness instead of the external Jenkins mirror. Also causes the JAR input to be randomized so we can re-use the createSignedJar method in multiple tests. Fixes: #375 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 12, 2021
-
-
dlorenc authored
Signed-off-by:
Dan Lorenc <lorenc.d@gmail.com>
-
- Jul 09, 2021
-
-
Andrew Block authored
* Added Helm type Signed-off-by:
Andrew Block <andy.block@gmail.com> * Cleaned up helm type Signed-off-by:
Andrew Block <andy.block@gmail.com> * Correct Helm schema required fields Signed-off-by:
Andrew Block <andy.block@gmail.com> * Regenerated Helm schema Signed-off-by:
Andrew Block <andy.block@gmail.com>
-
- Jul 08, 2021
-
-
Bob Callaway authored
* Adopt new signing/verification APIs from sigstore This uses the new APIs introduced in sigstore/sigstore/pkg/signature and removes most of the calls directly to the golang crypto APIs. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jul 01, 2021
-
-
Bob Callaway authored
* Move GetRekorClient into util directory Since other sigstore projects are using GetRekorClient, this moves it into the pkg/util directory so that the number of dependencies this brings with it can be minimized. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com> * move to pkg/client Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Jun 28, 2021
-
-
dlorenc authored
Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Jun 23, 2021
-
-
Bob Callaway authored
This adds support for the alpine package format used by Alpine Linux, which is the concatenation of three tgz files (signature, control data, and then the actual package files). Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
asraa authored
* upload all generated timestamps Signed-off-by:
Asra Ali <asraa@google.com> * address bazooka comments Signed-off-by:
Asra Ali <asraa@google.com> * simplify params Signed-off-by:
Asra Ali <asraa@google.com> * address changes Signed-off-by:
Asra Ali <asraa@google.com> * forgot to run swagger Signed-off-by:
Asra Ali <asraa@google.com>
-
- Jun 16, 2021
-
-
Appu authored
Signed-off-by:
Appu Goundan <appu@google.com>
-
- Jun 07, 2021
-
-
dlorenc authored
This adds an "Attestation" method to the entry interface. Entries can return an attestation that they would like to store. The attestations are currently stored in GCS, but it supports any blob store. The feature is turned off with a flag, and we can set a max size as well. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- May 29, 2021
-
-
dlorenc authored
This uses a custom fork of in-toto-golang because not all the changes are merged in one place. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- May 27, 2021
-
-
dlorenc authored
This saves an if err != nil... check. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- May 24, 2021
-
-
asraa authored
* Add timestamps Signed-off-by:
Asra Ali <asraa@google.com> * change Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com> * address comments Signed-off-by:
Asra Ali <asraa@google.com> * fix binary writer Signed-off-by:
Asra Ali <asraa@google.com> * add tsa Signed-off-by:
Asra Ali <asraa@google.com> * distangle cert chain creation from new signer Signed-off-by:
Asra Ali <asraa@google.com> * revert some now unncessary changes Signed-off-by:
Asra Ali <asraa@google.com> * cert chain 404 Signed-off-by:
Asra Ali <asraa@google.com> * fix Signed-off-by:
Asra Ali <asraa@google.com>
-
- May 05, 2021
-
-
Bob Callaway authored
* GetLogByIndexHandler returns 404 for missing index GRPC return codes have changed after switching the Trillian GRPC calls due to recent changes; therefore we need to adapt for InvalidArgument which should be returned as a 404 Not Found error to callers. Fixes #296 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- May 01, 2021
-
-
priyawadhwa authored
Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com>
-
- Apr 29, 2021
-
-
Bob Callaway authored
* Add sha256 prefix to index keys for artifact hashes This change adds the `sha256:` prefix to index values that are created to simplify searching the transparency log for artifacts. In case we shift to using a different hashing algorithm in the future, this will provide a way to specify it. Fixes #289 Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Apr 28, 2021
-
-
priyawadhwa authored
* Add signature to LogEntry for offline verification Also add an integration test for this. Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Address code review comments: - Canonicalize payload before signing it - Change name of signature to signedEntryTimestamp - move signedEntryTimestamp and inclusionProof into separate Verification field in LogEntry Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Create helper func for extracting log entry Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Add info around verifying signedEntryTimestamp as comments in openapi.yaml Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com> * Generalize verification instructions Signed-off-by:
Priya Wadhwa <priyawadhwa@google.com>
-
- Apr 22, 2021
-
-
dlorenc authored
This is required when uploading jars by URL. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Apr 21, 2021
-
-
asraa authored
Signed-off-by:
Asra Ali <asraa@google.com>
-
- Apr 20, 2021
-
-
asraa authored
Signed-off-by:
Asra Ali <asraa@google.com>
-
- Apr 18, 2021
-
-
Bob Callaway authored
* Improve code sharing in pluggable type support This patch removes some of the duplicate logic from specific type implementations and moves it into the base design which hopefully makes writing pluggable types a bit easier. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
- Apr 15, 2021
-
-
Bob Callaway authored
* Add new type for JAR archives This adds support for a new pluggable type that can extract signatures from signed JAR files. Per the JAR spec, a special manifest file is created with the digest hashes of all included content in the JAR file. It is this special manifest file that is then signed, and included in a file within the archive in PKCS7 format. The PKCS7 file also includes the X509 certificate that can be used to verify the signed manifest file inside of the JAR. Signed-off-by:
Bob Callaway <bob.callaway@gmail.com>
-
Carlos Tadeu Panato Junior authored
* update boilerplate header and apply go fmt Signed-off-by:
Carlos Panato <ctadeu@gmail.com> * lints: fix golangci-lint issues Signed-off-by:
Carlos Panato <ctadeu@gmail.com> * updated based on feedback Signed-off-by:
Carlos Panato <ctadeu@gmail.com>
-
- Mar 26, 2021
-
-
Dan Lorenc authored
This makes the binaries "go installable" by their canonical names. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Mar 19, 2021
-
-
Bob Callaway authored
* Remove gzip processing flow completely from rekor Issue #208 reported different handling of gzipped content via fetch vs direct upload to rekor server. The code should be consistent, regardless of whether content was compressed or not - by always attempting to verify the signature against the (unmodified) byte stream. This patch removes the gzip decoding completely from rekor and verifies the bytes supplied or referenced. Also fixes issue in E2E tests where sending SIGKILL to watch process caused message to be printed to stderr, which fails the test when running on MacOS. Fixes #208 Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-
- Mar 16, 2021
-
-
Dan Lorenc authored
them to GCS. We don't always have a new one, and under load there might be "batches" of entries all integrated into the same STH. This means there is no guaranteed frequency of updates or even a guarantee that every index will exist. The values (and timestamps) should be monotonically increasing though. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
Dan Lorenc authored
Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Mar 14, 2021
-
-
dlorenc authored
This will allow us to use types.NewEntry() to unmarshal returned values in clients. Signed-off-by:
Dan Lorenc <dlorenc@google.com>
-
- Mar 03, 2021
-
-
Bob Callaway authored
Since the API key can be specified as an environment variable and could be thought of as an authentication credential, it should not be included in the path to the created entry in the log. Previously we simply appended the new entry's UUID to the full URL, which was incorrect if an API key was specified as a query parameter. Fixes #182 Signed-off-by:
Bob Callaway <bcallawa@redhat.com>
-