<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Transparency Log on</title><link>https://deploy-preview-426--docssigstore.netlify.app/logging/</link><description>Recent content in Transparency Log on</description><generator>Hugo -- gohugo.io</generator><lastBuildDate>Tue, 06 Oct 2020 08:49:15 +0000</lastBuildDate><atom:link href="https://deploy-preview-426--docssigstore.netlify.app/logging/index.xml" rel="self" type="application/rss+xml"/><item><title>Rekor</title><link>https://deploy-preview-426--docssigstore.netlify.app/logging/overview/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-426--docssigstore.netlify.app/logging/overview/</guid><description>Rekor aims to provide an immutable, tamper-resistant ledger of metadata generated within a software project’s supply chain.
It enables software maintainers and build systems to record signed metadata to an immutable record. Other parties can then query this metadata, enabling them to make informed decisions on trust and non-repudiation of an object’s lifecycle.
The Rekor project provides a restful API-based server for validation, and a transparency log for storage. A CLI application is available to make and verify entries, query the log for inclusion proof, integrity verification of the log or retrieval of entries (either by a public key or an artifact).</description></item><item><title>Installation</title><link>https://deploy-preview-426--docssigstore.netlify.app/logging/installation/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-426--docssigstore.netlify.app/logging/installation/</guid><description>There are several ways to install both the rekor-cli and rekor-server.
Using Go install # If you have Go installed, you can use Go to retrieve the rekor-cli binaries
go install -v github.com/sigstore/rekor/cmd/rekor-cli@latest You may also do the same for rekor-server, but please note that the Rekor server also requires Trillian and a database. (see below for setup instructions).
go install -v github.com/sigstore/rekor/cmd/rekor-server@latest From the release page # Rekor releases are available on the Release page.</description></item><item><title>Sharding</title><link>https://deploy-preview-426--docssigstore.netlify.app/logging/sharding/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-426--docssigstore.netlify.app/logging/sharding/</guid><description>This document covers what Rekor log sharding is and how to shard the log.
What is sharding? # When Rekor is started for the first time, its backend is a transparency log built on a single Merkle Tree. This log can grow indefinitely as entries are added, which can present issues over time. To resolve some of these issues the log can be &amp;ldquo;sharded&amp;rdquo; into multiple Merkle Trees.
Why do we shard the log?</description></item><item><title>CLI</title><link>https://deploy-preview-426--docssigstore.netlify.app/logging/cli/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-426--docssigstore.netlify.app/logging/cli/</guid><description>The following guide is targeted towards developers / software maintainers who would like to make a provenance entry into the Rekor transparency log.
The steps outlined below will show how to sign your software and use the Rekor CLI to make and verify an entry. It uses GPG to demonstrate, but other types are outlined in the Signing and Uploading Other Types page.
Prerequisites # You need to have Rekor CLI installed.</description></item><item><title>Pluggable Types</title><link>https://deploy-preview-426--docssigstore.netlify.app/logging/pluggable-types/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-426--docssigstore.netlify.app/logging/pluggable-types/</guid><description>Rekor supports pluggable types (aka different schemas) for entries stored in the transparency log. This will allow you to develop your own manifest type in your preferred formatting style (json|yaml|xml).
Currently supported types # The list of currently supported types and their schema is maintained in the repository.
Base schema # The base schema for all types is modeled off of the schema used by Kubernetes and can be found in openapi.</description></item><item><title>Signing and Uploading Other Types</title><link>https://deploy-preview-426--docssigstore.netlify.app/logging/sign-upload/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-426--docssigstore.netlify.app/logging/sign-upload/</guid><description>This documentation contains information on how to sign and upload data in different pluggable types.
The following are covered:
Minisign SSH PKIX/X509 RPM Alpine RPM TSR TUF Minisign # Create a keypair with something like:
$ minisign -G Please enter a password to protect the secret key. Password: Password (one more time): Deriving a key from the password in order to encrypt the secret key... done The secret key was saved as /Users/dlorenc/.</description></item><item><title>Verifying Binaries</title><link>https://deploy-preview-426--docssigstore.netlify.app/logging/verify-release/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-426--docssigstore.netlify.app/logging/verify-release/</guid><description>📓 We will refine this process over time to be more streamlined with a higher consensus threshold as well as an implementation of a TUF style policy. For now this is quite a multi step process. We will also deep dive a fair amount here, as its a good opporuntity to pull the covers aside and see how this all works.
Rekor releases are currently signed and verified using Fulcio OpenID Connect based on short lived signing certificates.</description></item><item><title>Using the Rekor Event Stream</title><link>https://deploy-preview-426--docssigstore.netlify.app/logging/event_stream/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://deploy-preview-426--docssigstore.netlify.app/logging/event_stream/</guid><description>The public Rekor instance provides an event stream of new entries added to the transparency log using GCP Pub/Sub. This can be used to monitor the log in real-time for events you are interested in.
Pub/Sub details # Important: Pub/Sub usage is not free. Please familiarize yourself with the pricing before proceeding.
Tip: You can avoid paying egress network costs by placing the workload that processes events from the subscription in the same region as the topic.</description></item></channel></rss>