Documentation ¶
Overview ¶
Package tuf defines the core TUF logic around manipulating a repo.
Index ¶
- type ErrLocalRootExpired
- type ErrMetaExpired
- type ErrNotLoaded
- type ErrSigVerifyFail
- type Repo
- func (tr *Repo) AddBaseKeys(role string, keys ...data.PublicKey) error
- func (tr *Repo) AddTargets(role string, targets data.Files) (data.Files, error)
- func (tr *Repo) DeleteDelegation(role data.Role) error
- func (tr Repo) FindTarget(path string) *data.FileMeta
- func (tr *Repo) GetDelegation(role string) (*data.Role, error)
- func (tr *Repo) InitRepo(consistent bool) error
- func (tr *Repo) InitRoot(consistent bool) error
- func (tr *Repo) InitSnapshot() error
- func (tr *Repo) InitTargets(role string) (*data.SignedTargets, error)
- func (tr *Repo) InitTimestamp() error
- func (tr *Repo) RemoveBaseKeys(role string, keyIDs ...string) error
- func (tr *Repo) RemoveTargets(role string, targets ...string) error
- func (tr *Repo) ReplaceBaseKeys(role string, keys ...data.PublicKey) error
- func (tr *Repo) SetRoot(s *data.SignedRoot) error
- func (tr *Repo) SetSnapshot(s *data.SignedSnapshot) error
- func (tr *Repo) SetTargets(role string, s *data.SignedTargets) error
- func (tr *Repo) SetTimestamp(s *data.SignedTimestamp) error
- func (tr *Repo) SignRoot(expires time.Time) (*data.Signed, error)
- func (tr *Repo) SignSnapshot(expires time.Time) (*data.Signed, error)
- func (tr *Repo) SignTargets(role string, expires time.Time) (*data.Signed, error)
- func (tr *Repo) SignTimestamp(expires time.Time) (*data.Signed, error)
- func (tr Repo) TargetDelegations(role, path, pathHex string) []*data.Role
- func (tr Repo) TargetMeta(role, path string) *data.FileMeta
- func (tr *Repo) UpdateDelegations(role *data.Role, keys []data.PublicKey) error
- func (tr *Repo) UpdateSnapshot(role string, s *data.Signed) error
- func (tr *Repo) UpdateTimestamp(s *data.Signed) error
- func (tr *Repo) VerifyCanSign(roleName string) error
Constants ¶
This section is empty.
Variables ¶
This section is empty.
Functions ¶
This section is empty.
Types ¶
type ErrLocalRootExpired ¶
type ErrLocalRootExpired struct{}
ErrLocalRootExpired - the local root file is out of date
func (ErrLocalRootExpired) Error ¶
func (e ErrLocalRootExpired) Error() string
type ErrMetaExpired ¶
type ErrMetaExpired struct{}
ErrMetaExpired - metadata file has expired
func (ErrMetaExpired) Error ¶
func (e ErrMetaExpired) Error() string
type ErrNotLoaded ¶
type ErrNotLoaded struct {
// contains filtered or unexported fields
}
ErrNotLoaded - attempted to access data that has not been loaded into the repo
func (ErrNotLoaded) Error ¶
func (err ErrNotLoaded) Error() string
type ErrSigVerifyFail ¶
type ErrSigVerifyFail struct{}
ErrSigVerifyFail - signature verification failed
func (ErrSigVerifyFail) Error ¶
func (e ErrSigVerifyFail) Error() string
type Repo ¶
type Repo struct { Root *data.SignedRoot Targets map[string]*data.SignedTargets Snapshot *data.SignedSnapshot Timestamp *data.SignedTimestamp // contains filtered or unexported fields }
Repo is an in memory representation of the TUF Repo. It operates at the data.Signed level, accepting and producing data.Signed objects. Users of a Repo are responsible for fetching raw JSON and using the Set* functions to populate the Repo instance.
func NewRepo ¶
func NewRepo(keysDB *keys.KeyDB, cryptoService signed.CryptoService) *Repo
NewRepo initializes a Repo instance with a keysDB and a signer. If the Repo will only be used for reading, the signer should be nil.
func (*Repo) AddBaseKeys ¶
AddBaseKeys is used to add keys to the role in root.json
func (*Repo) AddTargets ¶
AddTargets will attempt to add the given targets specifically to the directed role. If the metadata for the role doesn't exist yet, AddTargets will create one.
func (*Repo) DeleteDelegation ¶
DeleteDelegation removes a delegated targets role from its parent targets object. It also deletes the delegation from the snapshot. DeleteDelegation will only make use of the role Name field.
func (Repo) FindTarget ¶
FindTarget attempts to find the target represented by the given path by starting at the top targets file and traversing appropriate delegations until the first entry is found or it runs out of locations to search. N.B. Multiple entries may exist in different delegated roles
for the same target. Only the first one encountered is returned.
func (*Repo) GetDelegation ¶
GetDelegation finds the role entry representing the provided role name or ErrInvalidRole
func (*Repo) InitRepo ¶
InitRepo creates the base files for a repo. It inspects data.BaseRoles and data.ValidTypes to determine what the role names and filename should be. It also relies on the keysDB having already been populated with the keys and roles.
func (*Repo) InitRoot ¶
InitRoot initializes an empty root file with the 4 core roles based on the current content of th ekey db
func (*Repo) InitSnapshot ¶
InitSnapshot initializes a snapshot based on the current root and targets
func (*Repo) InitTargets ¶
func (tr *Repo) InitTargets(role string) (*data.SignedTargets, error)
InitTargets initializes an empty targets, and returns the new empty target
func (*Repo) InitTimestamp ¶
InitTimestamp initializes a timestamp based on the current snapshot
func (*Repo) RemoveBaseKeys ¶
RemoveBaseKeys is used to remove keys from the roles in root.json
func (*Repo) RemoveTargets ¶
RemoveTargets removes the given target (paths) from the given target role (delegation)
func (*Repo) ReplaceBaseKeys ¶
ReplaceBaseKeys is used to replace all keys for the given role with the new keys
func (*Repo) SetRoot ¶
func (tr *Repo) SetRoot(s *data.SignedRoot) error
SetRoot parses the Signed object into a SignedRoot object, sets the keys and roles in the KeyDB, and sets the Repo.Root field to the SignedRoot object.
func (*Repo) SetSnapshot ¶
func (tr *Repo) SetSnapshot(s *data.SignedSnapshot) error
SetSnapshot parses the Signed object into a SignedSnapshots object and sets the Repo.Snapshot field.
func (*Repo) SetTargets ¶
func (tr *Repo) SetTargets(role string, s *data.SignedTargets) error
SetTargets parses the Signed object into a SignedTargets object, reads the delegated roles and keys into the KeyDB, and sets the SignedTargets object agaist the role in the Repo.Targets map.
func (*Repo) SetTimestamp ¶
func (tr *Repo) SetTimestamp(s *data.SignedTimestamp) error
SetTimestamp parses the Signed object into a SignedTimestamp object and sets the Repo.Timestamp field.
func (*Repo) SignSnapshot ¶
SignSnapshot updates the snapshot based on the current targets and root then signs it
func (*Repo) SignTargets ¶
SignTargets signs the targets file for the given top level or delegated targets role
func (*Repo) SignTimestamp ¶
SignTimestamp updates the timestamp based on the current snapshot then signs it
func (Repo) TargetDelegations ¶
TargetDelegations returns a slice of Roles that are valid publishers for the target path provided.
func (Repo) TargetMeta ¶
TargetMeta returns the FileMeta entry for the given path in the targets file associated with the given role. This may be nil if the target isn't found in the targets file.
func (*Repo) UpdateDelegations ¶
UpdateDelegations updates the appropriate delegations, either adding a new delegation or updating an existing one. If keys are provided, the IDs will be added to the role (if they do not exist there already), and the keys will be added to the targets file.
func (*Repo) UpdateSnapshot ¶
UpdateSnapshot updates the FileMeta for the given role based on the Signed object
func (*Repo) UpdateTimestamp ¶
UpdateTimestamp updates the snapshot meta in the timestamp based on the Signed object
func (*Repo) VerifyCanSign ¶
VerifyCanSign returns nil if the role exists and we have at least one signing key for the role, false otherwise. This does not check that we have enough signing keys to meet the threshold, since we want to support the use case of multiple signers for a role. It returns an error if the role doesn't exist or if there are no signing keys.
Directories ¶
Path | Synopsis |
---|---|
Package encrypted provides a simple, secure system for encrypting data symmetrically with a passphrase.
|
Package encrypted provides a simple, secure system for encrypting data symmetrically with a passphrase. |