Documentation ¶
Overview ¶
Package tuf defines the core TUF logic around manipulating a repo.
Index ¶
- Variables
- type ConsistentInfo
- type ErrInvalidBuilderInput
- type ErrLocalRootExpired
- type ErrMetaExpired
- type ErrNotLoaded
- type ErrSigVerifyFail
- type Repo
- func (tr *Repo) AddBaseKeys(role data.RoleName, keys ...data.PublicKey) error
- func (tr *Repo) AddTargets(role data.RoleName, targets data.Files) (data.Files, error)
- func (tr *Repo) DeleteDelegation(roleName data.RoleName) error
- func (tr *Repo) GetAllLoadedRoles() []*data.Role
- func (tr *Repo) GetBaseRole(name data.RoleName) (data.BaseRole, error)
- func (tr *Repo) GetDelegationRole(name data.RoleName) (data.DelegationRole, error)
- func (tr *Repo) InitRoot(root, timestamp, snapshot, targets data.BaseRole, consistent bool) error
- func (tr *Repo) InitSnapshot() error
- func (tr *Repo) InitTargets(role data.RoleName) (*data.SignedTargets, error)
- func (tr *Repo) InitTimestamp() error
- func (tr *Repo) PurgeDelegationKeys(role data.RoleName, removeKeys []string) error
- func (tr *Repo) RemoveBaseKeys(role data.RoleName, keyIDs ...string) error
- func (tr *Repo) RemoveTargets(role data.RoleName, targets ...string) error
- func (tr *Repo) ReplaceBaseKeys(role data.RoleName, keys ...data.PublicKey) error
- func (tr *Repo) SignRoot(expires time.Time, extraSigningKeys data.KeyList) (*data.Signed, error)
- func (tr *Repo) SignSnapshot(expires time.Time) (*data.Signed, error)
- func (tr *Repo) SignTargets(role data.RoleName, expires time.Time) (*data.Signed, error)
- func (tr *Repo) SignTimestamp(expires time.Time) (*data.Signed, error)
- func (tr Repo) TargetDelegations(role data.RoleName, path string) []*data.Role
- func (tr Repo) TargetMeta(role data.RoleName, path string) *data.FileMeta
- func (tr *Repo) UpdateDelegationKeys(roleName data.RoleName, addKeys data.KeyList, removeKeys []string, ...) error
- func (tr *Repo) UpdateDelegationPaths(roleName data.RoleName, addPaths, removePaths []string, clearPaths bool) error
- func (tr *Repo) UpdateSnapshot(role data.RoleName, s *data.Signed) error
- func (tr *Repo) UpdateTimestamp(s *data.Signed) error
- func (tr *Repo) VerifyCanSign(roleName data.RoleName) error
- func (tr *Repo) WalkTargets(targetPath string, rolePath data.RoleName, visitTargets walkVisitorFunc, ...) error
- type RepoBuilder
- type StopWalk
Constants ¶
This section is empty.
Variables ¶
var ErrBuildDone = fmt.Errorf(
"the builder has finished building and cannot accept any more input or produce any more output")
ErrBuildDone is returned when any functions are called on RepoBuilder, and it is already finished building
Functions ¶
This section is empty.
Types ¶
type ConsistentInfo ¶ added in v0.3.0
ConsistentInfo is the consistent name and size of a role, or just the name of the role and a -1 if no file metadata for the role is known
func (ConsistentInfo) ChecksumKnown ¶ added in v0.3.0
func (c ConsistentInfo) ChecksumKnown() bool
ChecksumKnown determines whether or not we know enough to provide a size and consistent name
func (ConsistentInfo) ConsistentName ¶ added in v0.3.0
func (c ConsistentInfo) ConsistentName() string
ConsistentName returns the consistent name (rolename.sha256) for the role given this consistent information
func (ConsistentInfo) Length ¶ added in v0.3.0
func (c ConsistentInfo) Length() int64
Length returns the expected length of the role as per this consistent information - if no checksum information is known, the size is -1.
type ErrInvalidBuilderInput ¶ added in v0.3.0
type ErrInvalidBuilderInput struct {
// contains filtered or unexported fields
}
ErrInvalidBuilderInput is returned when RepoBuilder.Load is called with the wrong type of metadata for the state that it's in
func (ErrInvalidBuilderInput) Error ¶ added in v0.3.0
func (e ErrInvalidBuilderInput) Error() string
type ErrLocalRootExpired ¶
type ErrLocalRootExpired struct{}
ErrLocalRootExpired - the local root file is out of date
func (ErrLocalRootExpired) Error ¶
func (e ErrLocalRootExpired) Error() string
type ErrMetaExpired ¶
type ErrMetaExpired struct{}
ErrMetaExpired - metadata file has expired
func (ErrMetaExpired) Error ¶
func (e ErrMetaExpired) Error() string
type ErrNotLoaded ¶
ErrNotLoaded - attempted to access data that has not been loaded into the repo. This means specifically that the relevant JSON file has not been loaded.
func (ErrNotLoaded) Error ¶
func (err ErrNotLoaded) Error() string
type ErrSigVerifyFail ¶
type ErrSigVerifyFail struct{}
ErrSigVerifyFail - signature verification failed
func (ErrSigVerifyFail) Error ¶
func (e ErrSigVerifyFail) Error() string
type Repo ¶
type Repo struct { Root *data.SignedRoot Targets map[data.RoleName]*data.SignedTargets Snapshot *data.SignedSnapshot Timestamp *data.SignedTimestamp // contains filtered or unexported fields }
Repo is an in memory representation of the TUF Repo. It operates at the data.Signed level, accepting and producing data.Signed objects. Users of a Repo are responsible for fetching raw JSON and using the Set* functions to populate the Repo instance.
func NewRepo ¶
func NewRepo(cryptoService signed.CryptoService) *Repo
NewRepo initializes a Repo instance with a CryptoService. If the Repo will only be used for reading, the CryptoService can be nil.
func (*Repo) AddBaseKeys ¶
AddBaseKeys is used to add keys to the role in root.json
func (*Repo) AddTargets ¶
AddTargets will attempt to add the given targets specifically to the directed role. If the metadata for the role doesn't exist yet, AddTargets will create one.
func (*Repo) DeleteDelegation ¶
DeleteDelegation removes a delegated targets role from its parent targets object. It also deletes the delegation from the snapshot. DeleteDelegation will only make use of the role Name field.
func (*Repo) GetAllLoadedRoles ¶
GetAllLoadedRoles returns a list of all role entries loaded in this TUF repo, could be empty
func (*Repo) GetBaseRole ¶
GetBaseRole gets a base role from this repo's metadata
func (*Repo) GetDelegationRole ¶
GetDelegationRole gets a delegation role from this repo's metadata, walking from the targets role down to the delegation itself
func (*Repo) InitRoot ¶
InitRoot initializes an empty root file with the 4 core roles passed to the method, and the consistent flag.
func (*Repo) InitSnapshot ¶
InitSnapshot initializes a snapshot based on the current root and targets
func (*Repo) InitTargets ¶
InitTargets initializes an empty targets, and returns the new empty target
func (*Repo) InitTimestamp ¶
InitTimestamp initializes a timestamp based on the current snapshot
func (*Repo) PurgeDelegationKeys ¶ added in v0.4.0
PurgeDelegationKeys removes the provided canonical key IDs from all delegations present in the subtree rooted at role. The role argument must be provided in a wildcard format, i.e. targets/* would remove the key from all delegations in the repo
func (*Repo) RemoveBaseKeys ¶
RemoveBaseKeys is used to remove keys from the roles in root.json
func (*Repo) RemoveTargets ¶
RemoveTargets removes the given target (paths) from the given target role (delegation)
func (*Repo) ReplaceBaseKeys ¶
ReplaceBaseKeys is used to replace all keys for the given role with the new keys
func (*Repo) SignRoot ¶
SignRoot signs the root, using all keys from the "root" role (i.e. currently trusted) as well as available keys used to sign the previous version, if the public part is carried in tr.Root.Keys and the private key is available (i.e. probably previously trusted keys, to allow rollover). If there are any errors, attempt to put root back to the way it was (so version won't be incremented, for instance). Extra signing keys can be added to support older clients
func (*Repo) SignSnapshot ¶
SignSnapshot updates the snapshot based on the current targets and root then signs it
func (*Repo) SignTargets ¶
SignTargets signs the targets file for the given top level or delegated targets role
func (*Repo) SignTimestamp ¶
SignTimestamp updates the timestamp based on the current snapshot then signs it
func (Repo) TargetDelegations ¶
TargetDelegations returns a slice of Roles that are valid publishers for the target path provided.
func (Repo) TargetMeta ¶
TargetMeta returns the FileMeta entry for the given path in the targets file associated with the given role. This may be nil if the target isn't found in the targets file.
func (*Repo) UpdateDelegationKeys ¶
func (tr *Repo) UpdateDelegationKeys(roleName data.RoleName, addKeys data.KeyList, removeKeys []string, newThreshold int) error
UpdateDelegationKeys updates the appropriate delegations, either adding a new delegation or updating an existing one. If keys are provided, the IDs will be added to the role (if they do not exist there already), and the keys will be added to the targets file.
func (*Repo) UpdateDelegationPaths ¶
func (tr *Repo) UpdateDelegationPaths(roleName data.RoleName, addPaths, removePaths []string, clearPaths bool) error
UpdateDelegationPaths updates the appropriate delegation's paths. It is not allowed to create a new delegation.
func (*Repo) UpdateSnapshot ¶
UpdateSnapshot updates the FileMeta for the given role based on the Signed object
func (*Repo) UpdateTimestamp ¶
UpdateTimestamp updates the snapshot meta in the timestamp based on the Signed object
func (*Repo) VerifyCanSign ¶
VerifyCanSign returns nil if the role exists and we have at least one signing key for the role, false otherwise. This does not check that we have enough signing keys to meet the threshold, since we want to support the use case of multiple signers for a role. It returns an error if the role doesn't exist or if there are no signing keys.
func (*Repo) WalkTargets ¶
func (tr *Repo) WalkTargets(targetPath string, rolePath data.RoleName, visitTargets walkVisitorFunc, skipRoles ...data.RoleName) error
WalkTargets will apply the specified visitor function to iteratively walk the targets/delegation metadata tree, until receiving a StopWalk. The walk starts from the base "targets" role, and searches for the correct targetPath and/or rolePath to call the visitor function on. Any roles passed into skipRoles will be excluded from the walk, as well as roles in those subtrees
type RepoBuilder ¶ added in v0.3.0
type RepoBuilder interface { Load(roleName data.RoleName, content []byte, minVersion int, allowExpired bool) error LoadRootForUpdate(content []byte, minVersion int, isFinal bool) error GenerateSnapshot(prev *data.SignedSnapshot) ([]byte, int, error) GenerateTimestamp(prev *data.SignedTimestamp) ([]byte, int, error) Finish() (*Repo, *Repo, error) BootstrapNewBuilder() RepoBuilder BootstrapNewBuilderWithNewTrustpin(trustpin trustpinning.TrustPinConfig) RepoBuilder // informative functions IsLoaded(roleName data.RoleName) bool GetLoadedVersion(roleName data.RoleName) int GetConsistentInfo(roleName data.RoleName) ConsistentInfo }
RepoBuilder is an interface for an object which builds a tuf.Repo
func NewBuilderFromRepo ¶ added in v0.4.0
func NewBuilderFromRepo(gun data.GUN, repo *Repo, trustpin trustpinning.TrustPinConfig) RepoBuilder
NewBuilderFromRepo allows us to bootstrap a builder given existing repo data. YOU PROBABLY SHOULDN'T BE USING THIS OUTSIDE OF TESTING CODE!!!
func NewRepoBuilder ¶ added in v0.3.0
func NewRepoBuilder(gun data.GUN, cs signed.CryptoService, trustpin trustpinning.TrustPinConfig) RepoBuilder
NewRepoBuilder is the only way to get a pre-built RepoBuilder
Directories ¶
Path | Synopsis |
---|---|
Package utils contains tuf related utility functions however this file is hard forked from https://github.com/youmark/pkcs8 package.
|
Package utils contains tuf related utility functions however this file is hard forked from https://github.com/youmark/pkcs8 package. |