mirror of
https://github.com/containers/skopeo.git
synced 2025-09-03 23:55:21 +00:00
fix(deps): update module github.com/containers/image/v5 to v5.35.0
Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com> Signed-off-by: Miloslav Trmač <mitr@redhat.com>
This commit is contained in:
committed by
Miloslav Trmač
parent
d0d0b7099e
commit
ec3516ec89
14
vendor/github.com/sigstore/protobuf-specs/COPYRIGHT.txt
generated
vendored
Normal file
14
vendor/github.com/sigstore/protobuf-specs/COPYRIGHT.txt
generated
vendored
Normal file
@@ -0,0 +1,14 @@
|
||||
|
||||
Copyright 2022 The Sigstore Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
202
vendor/github.com/sigstore/protobuf-specs/LICENSE
generated
vendored
Normal file
202
vendor/github.com/sigstore/protobuf-specs/LICENSE
generated
vendored
Normal file
@@ -0,0 +1,202 @@
|
||||
|
||||
Apache License
|
||||
Version 2.0, January 2004
|
||||
http://www.apache.org/licenses/
|
||||
|
||||
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
|
||||
|
||||
1. Definitions.
|
||||
|
||||
"License" shall mean the terms and conditions for use, reproduction,
|
||||
and distribution as defined by Sections 1 through 9 of this document.
|
||||
|
||||
"Licensor" shall mean the copyright owner or entity authorized by
|
||||
the copyright owner that is granting the License.
|
||||
|
||||
"Legal Entity" shall mean the union of the acting entity and all
|
||||
other entities that control, are controlled by, or are under common
|
||||
control with that entity. For the purposes of this definition,
|
||||
"control" means (i) the power, direct or indirect, to cause the
|
||||
direction or management of such entity, whether by contract or
|
||||
otherwise, or (ii) ownership of fifty percent (50%) or more of the
|
||||
outstanding shares, or (iii) beneficial ownership of such entity.
|
||||
|
||||
"You" (or "Your") shall mean an individual or Legal Entity
|
||||
exercising permissions granted by this License.
|
||||
|
||||
"Source" form shall mean the preferred form for making modifications,
|
||||
including but not limited to software source code, documentation
|
||||
source, and configuration files.
|
||||
|
||||
"Object" form shall mean any form resulting from mechanical
|
||||
transformation or translation of a Source form, including but
|
||||
not limited to compiled object code, generated documentation,
|
||||
and conversions to other media types.
|
||||
|
||||
"Work" shall mean the work of authorship, whether in Source or
|
||||
Object form, made available under the License, as indicated by a
|
||||
copyright notice that is included in or attached to the work
|
||||
(an example is provided in the Appendix below).
|
||||
|
||||
"Derivative Works" shall mean any work, whether in Source or Object
|
||||
form, that is based on (or derived from) the Work and for which the
|
||||
editorial revisions, annotations, elaborations, or other modifications
|
||||
represent, as a whole, an original work of authorship. For the purposes
|
||||
of this License, Derivative Works shall not include works that remain
|
||||
separable from, or merely link (or bind by name) to the interfaces of,
|
||||
the Work and Derivative Works thereof.
|
||||
|
||||
"Contribution" shall mean any work of authorship, including
|
||||
the original version of the Work and any modifications or additions
|
||||
to that Work or Derivative Works thereof, that is intentionally
|
||||
submitted to Licensor for inclusion in the Work by the copyright owner
|
||||
or by an individual or Legal Entity authorized to submit on behalf of
|
||||
the copyright owner. For the purposes of this definition, "submitted"
|
||||
means any form of electronic, verbal, or written communication sent
|
||||
to the Licensor or its representatives, including but not limited to
|
||||
communication on electronic mailing lists, source code control systems,
|
||||
and issue tracking systems that are managed by, or on behalf of, the
|
||||
Licensor for the purpose of discussing and improving the Work, but
|
||||
excluding communication that is conspicuously marked or otherwise
|
||||
designated in writing by the copyright owner as "Not a Contribution."
|
||||
|
||||
"Contributor" shall mean Licensor and any individual or Legal Entity
|
||||
on behalf of whom a Contribution has been received by Licensor and
|
||||
subsequently incorporated within the Work.
|
||||
|
||||
2. Grant of Copyright License. Subject to the terms and conditions of
|
||||
this License, each Contributor hereby grants to You a perpetual,
|
||||
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||
copyright license to reproduce, prepare Derivative Works of,
|
||||
publicly display, publicly perform, sublicense, and distribute the
|
||||
Work and such Derivative Works in Source or Object form.
|
||||
|
||||
3. Grant of Patent License. Subject to the terms and conditions of
|
||||
this License, each Contributor hereby grants to You a perpetual,
|
||||
worldwide, non-exclusive, no-charge, royalty-free, irrevocable
|
||||
(except as stated in this section) patent license to make, have made,
|
||||
use, offer to sell, sell, import, and otherwise transfer the Work,
|
||||
where such license applies only to those patent claims licensable
|
||||
by such Contributor that are necessarily infringed by their
|
||||
Contribution(s) alone or by combination of their Contribution(s)
|
||||
with the Work to which such Contribution(s) was submitted. If You
|
||||
institute patent litigation against any entity (including a
|
||||
cross-claim or counterclaim in a lawsuit) alleging that the Work
|
||||
or a Contribution incorporated within the Work constitutes direct
|
||||
or contributory patent infringement, then any patent licenses
|
||||
granted to You under this License for that Work shall terminate
|
||||
as of the date such litigation is filed.
|
||||
|
||||
4. Redistribution. You may reproduce and distribute copies of the
|
||||
Work or Derivative Works thereof in any medium, with or without
|
||||
modifications, and in Source or Object form, provided that You
|
||||
meet the following conditions:
|
||||
|
||||
(a) You must give any other recipients of the Work or
|
||||
Derivative Works a copy of this License; and
|
||||
|
||||
(b) You must cause any modified files to carry prominent notices
|
||||
stating that You changed the files; and
|
||||
|
||||
(c) You must retain, in the Source form of any Derivative Works
|
||||
that You distribute, all copyright, patent, trademark, and
|
||||
attribution notices from the Source form of the Work,
|
||||
excluding those notices that do not pertain to any part of
|
||||
the Derivative Works; and
|
||||
|
||||
(d) If the Work includes a "NOTICE" text file as part of its
|
||||
distribution, then any Derivative Works that You distribute must
|
||||
include a readable copy of the attribution notices contained
|
||||
within such NOTICE file, excluding those notices that do not
|
||||
pertain to any part of the Derivative Works, in at least one
|
||||
of the following places: within a NOTICE text file distributed
|
||||
as part of the Derivative Works; within the Source form or
|
||||
documentation, if provided along with the Derivative Works; or,
|
||||
within a display generated by the Derivative Works, if and
|
||||
wherever such third-party notices normally appear. The contents
|
||||
of the NOTICE file are for informational purposes only and
|
||||
do not modify the License. You may add Your own attribution
|
||||
notices within Derivative Works that You distribute, alongside
|
||||
or as an addendum to the NOTICE text from the Work, provided
|
||||
that such additional attribution notices cannot be construed
|
||||
as modifying the License.
|
||||
|
||||
You may add Your own copyright statement to Your modifications and
|
||||
may provide additional or different license terms and conditions
|
||||
for use, reproduction, or distribution of Your modifications, or
|
||||
for any such Derivative Works as a whole, provided Your use,
|
||||
reproduction, and distribution of the Work otherwise complies with
|
||||
the conditions stated in this License.
|
||||
|
||||
5. Submission of Contributions. Unless You explicitly state otherwise,
|
||||
any Contribution intentionally submitted for inclusion in the Work
|
||||
by You to the Licensor shall be under the terms and conditions of
|
||||
this License, without any additional terms or conditions.
|
||||
Notwithstanding the above, nothing herein shall supersede or modify
|
||||
the terms of any separate license agreement you may have executed
|
||||
with Licensor regarding such Contributions.
|
||||
|
||||
6. Trademarks. This License does not grant permission to use the trade
|
||||
names, trademarks, service marks, or product names of the Licensor,
|
||||
except as required for reasonable and customary use in describing the
|
||||
origin of the Work and reproducing the content of the NOTICE file.
|
||||
|
||||
7. Disclaimer of Warranty. Unless required by applicable law or
|
||||
agreed to in writing, Licensor provides the Work (and each
|
||||
Contributor provides its Contributions) on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
||||
implied, including, without limitation, any warranties or conditions
|
||||
of TITLE, NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A
|
||||
PARTICULAR PURPOSE. You are solely responsible for determining the
|
||||
appropriateness of using or redistributing the Work and assume any
|
||||
risks associated with Your exercise of permissions under this License.
|
||||
|
||||
8. Limitation of Liability. In no event and under no legal theory,
|
||||
whether in tort (including negligence), contract, or otherwise,
|
||||
unless required by applicable law (such as deliberate and grossly
|
||||
negligent acts) or agreed to in writing, shall any Contributor be
|
||||
liable to You for damages, including any direct, indirect, special,
|
||||
incidental, or consequential damages of any character arising as a
|
||||
result of this License or out of the use or inability to use the
|
||||
Work (including but not limited to damages for loss of goodwill,
|
||||
work stoppage, computer failure or malfunction, or any and all
|
||||
other commercial damages or losses), even if such Contributor
|
||||
has been advised of the possibility of such damages.
|
||||
|
||||
9. Accepting Warranty or Additional Liability. While redistributing
|
||||
the Work or Derivative Works thereof, You may choose to offer,
|
||||
and charge a fee for, acceptance of support, warranty, indemnity,
|
||||
or other liability obligations and/or rights consistent with this
|
||||
License. However, in accepting such obligations, You may act only
|
||||
on Your own behalf and on Your sole responsibility, not on behalf
|
||||
of any other Contributor, and only if You agree to indemnify,
|
||||
defend, and hold each Contributor harmless for any liability
|
||||
incurred by, or claims asserted against, such Contributor by reason
|
||||
of your accepting any such warranty or additional liability.
|
||||
|
||||
END OF TERMS AND CONDITIONS
|
||||
|
||||
APPENDIX: How to apply the Apache License to your work.
|
||||
|
||||
To apply the Apache License to your work, attach the following
|
||||
boilerplate notice, with the fields enclosed by brackets "[]"
|
||||
replaced with your own identifying information. (Don't include
|
||||
the brackets!) The text should be enclosed in the appropriate
|
||||
comment syntax for the file format. We also recommend that a
|
||||
file or class name and description of purpose be included on the
|
||||
same "printed page" as the copyright notice for easier
|
||||
identification within third-party archives.
|
||||
|
||||
Copyright [yyyy] [name of copyright owner]
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
1273
vendor/github.com/sigstore/protobuf-specs/gen/pb-go/common/v1/sigstore_common.pb.go
generated
vendored
Normal file
1273
vendor/github.com/sigstore/protobuf-specs/gen/pb-go/common/v1/sigstore_common.pb.go
generated
vendored
Normal file
File diff suppressed because it is too large
Load Diff
6
vendor/github.com/sigstore/rekor/pkg/util/checkpoint.go
generated
vendored
6
vendor/github.com/sigstore/rekor/pkg/util/checkpoint.go
generated
vendored
@@ -51,12 +51,12 @@ func (c Checkpoint) String() string {
|
||||
return b.String()
|
||||
}
|
||||
|
||||
// MarshalText returns the common format representation of this Checkpoint.
|
||||
// MarshalCheckpoint returns the common format representation of this Checkpoint.
|
||||
func (c Checkpoint) MarshalCheckpoint() ([]byte, error) {
|
||||
return []byte(c.String()), nil
|
||||
}
|
||||
|
||||
// UnmarshalText parses the common formatted checkpoint data and stores the result
|
||||
// UnmarshalCheckpoint parses the common formatted checkpoint data and stores the result
|
||||
// in the Checkpoint.
|
||||
//
|
||||
// The supplied data is expected to begin with the following 3 lines of text,
|
||||
@@ -157,7 +157,7 @@ func CreateAndSignCheckpoint(ctx context.Context, hostname string, treeID int64,
|
||||
if _, err := sth.Sign(hostname, signer, options.WithContext(ctx)); err != nil {
|
||||
return nil, fmt.Errorf("error signing checkpoint: %w", err)
|
||||
}
|
||||
scBytes, err := sth.SignedNote.MarshalText()
|
||||
scBytes, err := sth.MarshalText()
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("error marshalling checkpoint: %w", err)
|
||||
}
|
||||
|
21
vendor/github.com/sigstore/sigstore/pkg/oauthflow/flow.go
generated
vendored
21
vendor/github.com/sigstore/sigstore/pkg/oauthflow/flow.go
generated
vendored
@@ -22,7 +22,7 @@ import (
|
||||
"log"
|
||||
|
||||
"github.com/coreos/go-oidc/v3/oidc"
|
||||
"github.com/go-jose/go-jose/v3"
|
||||
"github.com/go-jose/go-jose/v4"
|
||||
soauth "github.com/sigstore/sigstore/pkg/oauth"
|
||||
"golang.org/x/oauth2"
|
||||
)
|
||||
@@ -172,9 +172,26 @@ type StaticTokenGetter struct {
|
||||
RawToken string
|
||||
}
|
||||
|
||||
// https://datatracker.ietf.org/doc/html/rfc7518#section-3.1
|
||||
var allowedSignatureAlgorithms = []jose.SignatureAlgorithm{
|
||||
jose.ES256,
|
||||
jose.ES384,
|
||||
jose.ES512,
|
||||
jose.RS256,
|
||||
jose.RS384,
|
||||
jose.RS512,
|
||||
jose.PS256,
|
||||
jose.PS384,
|
||||
jose.PS512,
|
||||
jose.EdDSA,
|
||||
jose.HS256,
|
||||
jose.HS384,
|
||||
jose.HS512,
|
||||
}
|
||||
|
||||
// GetIDToken extracts an OIDCIDToken from the raw token *without verification*
|
||||
func (stg *StaticTokenGetter) GetIDToken(_ *oidc.Provider, _ oauth2.Config) (*OIDCIDToken, error) {
|
||||
unsafeTok, err := jose.ParseSigned(stg.RawToken)
|
||||
unsafeTok, err := jose.ParseSigned(stg.RawToken, allowedSignatureAlgorithms)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
314
vendor/github.com/sigstore/sigstore/pkg/signature/algorithm_registry.go
generated
vendored
Normal file
314
vendor/github.com/sigstore/sigstore/pkg/signature/algorithm_registry.go
generated
vendored
Normal file
@@ -0,0 +1,314 @@
|
||||
//
|
||||
// Copyright 2024 The Sigstore Authors.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package signature
|
||||
|
||||
import (
|
||||
"crypto"
|
||||
"crypto/ecdsa"
|
||||
"crypto/ed25519"
|
||||
"crypto/elliptic"
|
||||
"crypto/rsa"
|
||||
"errors"
|
||||
"fmt"
|
||||
|
||||
v1 "github.com/sigstore/protobuf-specs/gen/pb-go/common/v1"
|
||||
)
|
||||
|
||||
// PublicKeyType represents the public key algorithm for a given signature algorithm.
|
||||
type PublicKeyType uint
|
||||
|
||||
const (
|
||||
// RSA public key
|
||||
RSA PublicKeyType = iota
|
||||
// ECDSA public key
|
||||
ECDSA
|
||||
// ED25519 public key
|
||||
ED25519
|
||||
)
|
||||
|
||||
// RSAKeySize represents the size of an RSA public key in bits.
|
||||
type RSAKeySize int
|
||||
|
||||
// AlgorithmDetails exposes relevant information for a given signature algorithm.
|
||||
type AlgorithmDetails struct {
|
||||
// knownAlgorithm is the signature algorithm that the following details refer to.
|
||||
knownAlgorithm v1.PublicKeyDetails
|
||||
|
||||
// keyType is the public key algorithm being used.
|
||||
keyType PublicKeyType
|
||||
|
||||
// hashType is the hash algorithm being used.
|
||||
hashType crypto.Hash
|
||||
|
||||
// protoHashType is the hash algorithm being used as a proto message, it must be the protobuf-specs
|
||||
// v1.HashAlgorithm equivalent of the hashType.
|
||||
protoHashType v1.HashAlgorithm
|
||||
|
||||
// extraKeyParams contains any extra parameters required to check a given public key against this entry.
|
||||
//
|
||||
// The underlying type of these parameters is dependent on the keyType.
|
||||
// For example, ECDSA algorithms will store an elliptic curve here whereas, RSA keys will store the key size.
|
||||
// Algorithms that don't require any extra parameters leave this set to nil.
|
||||
extraKeyParams interface{}
|
||||
|
||||
// flagValue is a string representation of the signature algorithm that follows the naming conventions of CLI
|
||||
// arguments that are used for Sigstore services.
|
||||
flagValue string
|
||||
}
|
||||
|
||||
// GetSignatureAlgorithm returns the PublicKeyDetails associated with the algorithm details.
|
||||
func (a AlgorithmDetails) GetSignatureAlgorithm() v1.PublicKeyDetails {
|
||||
return a.knownAlgorithm
|
||||
}
|
||||
|
||||
// GetKeyType returns the PublicKeyType for the algorithm details.
|
||||
func (a AlgorithmDetails) GetKeyType() PublicKeyType {
|
||||
return a.keyType
|
||||
}
|
||||
|
||||
// GetHashType returns the hash algorithm that should be used with this algorithm.
|
||||
func (a AlgorithmDetails) GetHashType() crypto.Hash {
|
||||
return a.hashType
|
||||
}
|
||||
|
||||
// GetProtoHashType is a convenience method to get the protobuf-specs type of the hash algorithm.
|
||||
func (a AlgorithmDetails) GetProtoHashType() v1.HashAlgorithm {
|
||||
return a.protoHashType
|
||||
}
|
||||
|
||||
// GetRSAKeySize returns the RSA key size for the algorithm details, if the key type is RSA.
|
||||
func (a AlgorithmDetails) GetRSAKeySize() (RSAKeySize, error) {
|
||||
if a.keyType != RSA {
|
||||
return 0, fmt.Errorf("unable to retrieve RSA key size for key type: %T", a.keyType)
|
||||
}
|
||||
rsaKeySize, ok := a.extraKeyParams.(RSAKeySize)
|
||||
if !ok {
|
||||
// This should be unreachable.
|
||||
return 0, fmt.Errorf("unable to retrieve key size for RSA, malformed algorithm details?: %T", a.keyType)
|
||||
}
|
||||
return rsaKeySize, nil
|
||||
}
|
||||
|
||||
// GetECDSACurve returns the elliptic curve for the algorithm details, if the key type is ECDSA.
|
||||
func (a AlgorithmDetails) GetECDSACurve() (*elliptic.Curve, error) {
|
||||
if a.keyType != ECDSA {
|
||||
return nil, fmt.Errorf("unable to retrieve ECDSA curve for key type: %T", a.keyType)
|
||||
}
|
||||
ecdsaCurve, ok := a.extraKeyParams.(elliptic.Curve)
|
||||
if !ok {
|
||||
// This should be unreachable.
|
||||
return nil, fmt.Errorf("unable to retrieve curve for ECDSA, malformed algorithm details?: %T", a.keyType)
|
||||
}
|
||||
return &ecdsaCurve, nil
|
||||
}
|
||||
|
||||
func (a AlgorithmDetails) checkKey(pubKey crypto.PublicKey) (bool, error) {
|
||||
switch a.keyType {
|
||||
case RSA:
|
||||
rsaKey, ok := pubKey.(*rsa.PublicKey)
|
||||
if !ok {
|
||||
return false, nil
|
||||
}
|
||||
keySize, err := a.GetRSAKeySize()
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
return rsaKey.Size()*8 == int(keySize), nil
|
||||
case ECDSA:
|
||||
ecdsaKey, ok := pubKey.(*ecdsa.PublicKey)
|
||||
if !ok {
|
||||
return false, nil
|
||||
}
|
||||
curve, err := a.GetECDSACurve()
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
return ecdsaKey.Curve == *curve, nil
|
||||
case ED25519:
|
||||
_, ok := pubKey.(ed25519.PublicKey)
|
||||
return ok, nil
|
||||
}
|
||||
return false, fmt.Errorf("unrecognized key type: %T", a.keyType)
|
||||
}
|
||||
|
||||
func (a AlgorithmDetails) checkHash(hashType crypto.Hash) bool {
|
||||
return a.hashType == hashType
|
||||
}
|
||||
|
||||
// Note that deprecated options in PublicKeyDetails are not included in this
|
||||
// list, including PKCS1v1.5 encoded RSA. Refer to the v1.PublicKeyDetails enum
|
||||
// for more details.
|
||||
var supportedAlgorithms = []AlgorithmDetails{
|
||||
{v1.PublicKeyDetails_PKIX_RSA_PKCS1V15_2048_SHA256, RSA, crypto.SHA256, v1.HashAlgorithm_SHA2_256, RSAKeySize(2048), "rsa-sign-pkcs1-2048-sha256"},
|
||||
{v1.PublicKeyDetails_PKIX_RSA_PKCS1V15_3072_SHA256, RSA, crypto.SHA256, v1.HashAlgorithm_SHA2_256, RSAKeySize(3072), "rsa-sign-pkcs1-3072-sha256"},
|
||||
{v1.PublicKeyDetails_PKIX_RSA_PKCS1V15_4096_SHA256, RSA, crypto.SHA256, v1.HashAlgorithm_SHA2_256, RSAKeySize(4096), "rsa-sign-pkcs1-4096-sha256"},
|
||||
{v1.PublicKeyDetails_PKIX_RSA_PSS_2048_SHA256, RSA, crypto.SHA256, v1.HashAlgorithm_SHA2_256, RSAKeySize(2048), "rsa-sign-pss-2048-sha256"},
|
||||
{v1.PublicKeyDetails_PKIX_RSA_PSS_3072_SHA256, RSA, crypto.SHA256, v1.HashAlgorithm_SHA2_256, RSAKeySize(3072), "rsa-sign-pss-3072-sha256"},
|
||||
{v1.PublicKeyDetails_PKIX_RSA_PSS_4096_SHA256, RSA, crypto.SHA256, v1.HashAlgorithm_SHA2_256, RSAKeySize(4096), "rsa-sign-pss-4092-sha256"},
|
||||
{v1.PublicKeyDetails_PKIX_ECDSA_P256_SHA_256, ECDSA, crypto.SHA256, v1.HashAlgorithm_SHA2_256, elliptic.P256(), "ecdsa-sha2-256-nistp256"},
|
||||
{v1.PublicKeyDetails_PKIX_ECDSA_P384_SHA_384, ECDSA, crypto.SHA384, v1.HashAlgorithm_SHA2_384, elliptic.P384(), "ecdsa-sha2-384-nistp384"},
|
||||
{v1.PublicKeyDetails_PKIX_ECDSA_P384_SHA_256, ECDSA, crypto.SHA256, v1.HashAlgorithm_SHA2_256, elliptic.P384(), "ecdsa-sha2-256-nistp384"}, //nolint:staticcheck
|
||||
{v1.PublicKeyDetails_PKIX_ECDSA_P521_SHA_512, ECDSA, crypto.SHA512, v1.HashAlgorithm_SHA2_512, elliptic.P521(), "ecdsa-sha2-512-nistp521"},
|
||||
{v1.PublicKeyDetails_PKIX_ECDSA_P521_SHA_256, ECDSA, crypto.SHA256, v1.HashAlgorithm_SHA2_256, elliptic.P521(), "ecdsa-sha2-256-nistp521"}, //nolint:staticcheck
|
||||
{v1.PublicKeyDetails_PKIX_ED25519, ED25519, crypto.Hash(0), v1.HashAlgorithm_HASH_ALGORITHM_UNSPECIFIED, nil, "ed25519"},
|
||||
{v1.PublicKeyDetails_PKIX_ED25519_PH, ED25519, crypto.SHA512, v1.HashAlgorithm_SHA2_512, nil, "ed25519-ph"},
|
||||
}
|
||||
|
||||
// AlgorithmRegistryConfig represents a set of permitted algorithms for a given Sigstore service or component.
|
||||
//
|
||||
// Individual services may wish to restrict what algorithms are allowed to a subset of what is covered in the algorithm
|
||||
// registry (represented by v1.PublicKeyDetails).
|
||||
type AlgorithmRegistryConfig struct {
|
||||
permittedAlgorithms []AlgorithmDetails
|
||||
}
|
||||
|
||||
// GetAlgorithmDetails retrieves a set of details for a given v1.PublicKeyDetails flag that allows users to
|
||||
// introspect the public key algorithm, hash algorithm and more.
|
||||
func GetAlgorithmDetails(knownSignatureAlgorithm v1.PublicKeyDetails) (AlgorithmDetails, error) {
|
||||
for _, detail := range supportedAlgorithms {
|
||||
if detail.knownAlgorithm == knownSignatureAlgorithm {
|
||||
return detail, nil
|
||||
}
|
||||
}
|
||||
return AlgorithmDetails{}, fmt.Errorf("could not find algorithm details for known signature algorithm: %s", knownSignatureAlgorithm)
|
||||
}
|
||||
|
||||
// NewAlgorithmRegistryConfig creates a new AlgorithmRegistryConfig for a set of permitted signature algorithms.
|
||||
func NewAlgorithmRegistryConfig(algorithmConfig []v1.PublicKeyDetails) (*AlgorithmRegistryConfig, error) {
|
||||
permittedAlgorithms := make([]AlgorithmDetails, 0, len(supportedAlgorithms))
|
||||
for _, algorithm := range algorithmConfig {
|
||||
a, err := GetAlgorithmDetails(algorithm)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
permittedAlgorithms = append(permittedAlgorithms, a)
|
||||
}
|
||||
return &AlgorithmRegistryConfig{permittedAlgorithms: permittedAlgorithms}, nil
|
||||
}
|
||||
|
||||
// IsAlgorithmPermitted checks whether a given public key/hash algorithm combination is permitted by a registry config.
|
||||
func (registryConfig AlgorithmRegistryConfig) IsAlgorithmPermitted(key crypto.PublicKey, hash crypto.Hash) (bool, error) {
|
||||
for _, algorithm := range registryConfig.permittedAlgorithms {
|
||||
keyMatch, err := algorithm.checkKey(key)
|
||||
if err != nil {
|
||||
return false, err
|
||||
}
|
||||
if keyMatch && algorithm.checkHash(hash) {
|
||||
return true, nil
|
||||
}
|
||||
}
|
||||
return false, nil
|
||||
}
|
||||
|
||||
// FormatSignatureAlgorithmFlag formats a v1.PublicKeyDetails to a string that conforms to the naming conventions
|
||||
// of CLI arguments that are used for Sigstore services.
|
||||
func FormatSignatureAlgorithmFlag(algorithm v1.PublicKeyDetails) (string, error) {
|
||||
for _, a := range supportedAlgorithms {
|
||||
if a.knownAlgorithm == algorithm {
|
||||
return a.flagValue, nil
|
||||
}
|
||||
}
|
||||
return "", fmt.Errorf("could not find matching flag for signature algorithm: %s", algorithm)
|
||||
}
|
||||
|
||||
// ParseSignatureAlgorithmFlag parses a string produced by FormatSignatureAlgorithmFlag and returns the corresponding
|
||||
// v1.PublicKeyDetails value.
|
||||
func ParseSignatureAlgorithmFlag(flag string) (v1.PublicKeyDetails, error) {
|
||||
for _, a := range supportedAlgorithms {
|
||||
if a.flagValue == flag {
|
||||
return a.knownAlgorithm, nil
|
||||
}
|
||||
}
|
||||
return v1.PublicKeyDetails_PUBLIC_KEY_DETAILS_UNSPECIFIED, fmt.Errorf("could not find matching signature algorithm for flag: %s", flag)
|
||||
}
|
||||
|
||||
// GetDefaultPublicKeyDetails returns the default public key details for a given key.
|
||||
//
|
||||
// RSA 2048 => v1.PublicKeyDetails_PKIX_RSA_PKCS1V15_2048_SHA256
|
||||
// RSA 3072 => v1.PublicKeyDetails_PKIX_RSA_PKCS1V15_3072_SHA256
|
||||
// RSA 4096 => v1.PublicKeyDetails_PKIX_RSA_PKCS1V15_4096_SHA256
|
||||
// ECDSA P256 => v1.PublicKeyDetails_PKIX_ECDSA_P256_SHA_256
|
||||
// ECDSA P384 => v1.PublicKeyDetails_PKIX_ECDSA_P384_SHA_384
|
||||
// ECDSA P521 => v1.PublicKeyDetails_PKIX_ECDSA_P521_SHA_512
|
||||
// ED25519 => v1.PublicKeyDetails_PKIX_ED25519_PH
|
||||
//
|
||||
// This function accepts LoadOptions, which are used to determine the default
|
||||
// public key details when there may be ambiguities. For example, RSA keys may
|
||||
// be PSS or PKCS1v1.5 encoded, and ED25519 keys may be used with PureEd25519 or
|
||||
// with Ed25519ph. The Hash option is ignored if passed, because each of the
|
||||
// supported algorithms already has a default hash.
|
||||
func GetDefaultPublicKeyDetails(publicKey crypto.PublicKey, opts ...LoadOption) (v1.PublicKeyDetails, error) {
|
||||
var rsaPSSOptions *rsa.PSSOptions
|
||||
var useED25519ph bool
|
||||
for _, o := range opts {
|
||||
o.ApplyED25519ph(&useED25519ph)
|
||||
o.ApplyRSAPSS(&rsaPSSOptions)
|
||||
}
|
||||
|
||||
switch pk := publicKey.(type) {
|
||||
case *rsa.PublicKey:
|
||||
if rsaPSSOptions != nil {
|
||||
switch pk.Size() * 8 {
|
||||
case 2048:
|
||||
return v1.PublicKeyDetails_PKIX_RSA_PSS_2048_SHA256, nil
|
||||
case 3072:
|
||||
return v1.PublicKeyDetails_PKIX_RSA_PSS_3072_SHA256, nil
|
||||
case 4096:
|
||||
return v1.PublicKeyDetails_PKIX_RSA_PSS_4096_SHA256, nil
|
||||
}
|
||||
} else {
|
||||
switch pk.Size() * 8 {
|
||||
case 2048:
|
||||
return v1.PublicKeyDetails_PKIX_RSA_PKCS1V15_2048_SHA256, nil
|
||||
case 3072:
|
||||
return v1.PublicKeyDetails_PKIX_RSA_PKCS1V15_3072_SHA256, nil
|
||||
case 4096:
|
||||
return v1.PublicKeyDetails_PKIX_RSA_PKCS1V15_4096_SHA256, nil
|
||||
}
|
||||
}
|
||||
case *ecdsa.PublicKey:
|
||||
switch pk.Curve {
|
||||
case elliptic.P256():
|
||||
return v1.PublicKeyDetails_PKIX_ECDSA_P256_SHA_256, nil
|
||||
case elliptic.P384():
|
||||
return v1.PublicKeyDetails_PKIX_ECDSA_P384_SHA_384, nil
|
||||
case elliptic.P521():
|
||||
return v1.PublicKeyDetails_PKIX_ECDSA_P521_SHA_512, nil
|
||||
}
|
||||
case ed25519.PublicKey:
|
||||
if useED25519ph {
|
||||
return v1.PublicKeyDetails_PKIX_ED25519_PH, nil
|
||||
}
|
||||
return v1.PublicKeyDetails_PKIX_ED25519, nil
|
||||
}
|
||||
return v1.PublicKeyDetails_PUBLIC_KEY_DETAILS_UNSPECIFIED, errors.New("unsupported public key type")
|
||||
}
|
||||
|
||||
// GetDefaultAlgorithmDetails returns the default algorithm details for a given
|
||||
// key, according to GetDefaultPublicKeyDetails.
|
||||
//
|
||||
// This function accepts LoadOptions, which are used to determine the default
|
||||
// algorithm details when there may be ambiguities. For example, RSA keys may be
|
||||
// PSS or PKCS1v1.5 encoded, and ED25519 keys may be used with PureEd25519 or
|
||||
// with Ed25519ph. The Hash option is ignored if passed, because each of the
|
||||
// supported algorithms already has a default hash.
|
||||
func GetDefaultAlgorithmDetails(publicKey crypto.PublicKey, opts ...LoadOption) (AlgorithmDetails, error) {
|
||||
knownAlgorithm, err := GetDefaultPublicKeyDetails(publicKey, opts...)
|
||||
if err != nil {
|
||||
return AlgorithmDetails{}, err
|
||||
}
|
||||
return GetAlgorithmDetails(knownAlgorithm)
|
||||
}
|
2
vendor/github.com/sigstore/sigstore/pkg/signature/ecdsa.go
generated
vendored
2
vendor/github.com/sigstore/sigstore/pkg/signature/ecdsa.go
generated
vendored
@@ -188,7 +188,7 @@ func (e ECDSAVerifier) VerifySignature(signature, message io.Reader, opts ...Ver
|
||||
}
|
||||
|
||||
// Without this check, VerifyASN1 panics on an invalid key.
|
||||
if !e.publicKey.Curve.IsOnCurve(e.publicKey.X, e.publicKey.Y) {
|
||||
if !e.publicKey.IsOnCurve(e.publicKey.X, e.publicKey.Y) {
|
||||
return fmt.Errorf("invalid ECDSA public key for %s", e.publicKey.Params().Name)
|
||||
}
|
||||
|
||||
|
22
vendor/github.com/sigstore/sigstore/pkg/signature/signer.go
generated
vendored
22
vendor/github.com/sigstore/sigstore/pkg/signature/signer.go
generated
vendored
@@ -123,3 +123,25 @@ func LoadSignerFromPEMFileWithOpts(path string, pf cryptoutils.PassFunc, opts ..
|
||||
}
|
||||
return LoadSignerWithOpts(priv, opts...)
|
||||
}
|
||||
|
||||
// LoadDefaultSigner returns a signature.Signer based on the private key.
|
||||
// Each private key has a corresponding PublicKeyDetails associated in the
|
||||
// Sigstore ecosystem, see Algorithm Registry for more details.
|
||||
func LoadDefaultSigner(privateKey crypto.PrivateKey, opts ...LoadOption) (Signer, error) {
|
||||
signer, ok := privateKey.(crypto.Signer)
|
||||
if !ok {
|
||||
return nil, errors.New("private key does not implement signature.Signer")
|
||||
}
|
||||
algorithmDetails, err := GetDefaultAlgorithmDetails(signer.Public(), opts...)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return LoadSignerFromAlgorithmDetails(privateKey, algorithmDetails, opts...)
|
||||
}
|
||||
|
||||
// LoadSignerFromAlgorithmDetails returns a signature.Signer based on
|
||||
// the algorithm details and the user's choice of options.
|
||||
func LoadSignerFromAlgorithmDetails(privateKey crypto.PrivateKey, algorithmDetails AlgorithmDetails, opts ...LoadOption) (Signer, error) {
|
||||
filteredOpts := GetOptsFromAlgorithmDetails(algorithmDetails, opts...)
|
||||
return LoadSignerWithOpts(privateKey, filteredOpts...)
|
||||
}
|
||||
|
22
vendor/github.com/sigstore/sigstore/pkg/signature/signerverifier.go
generated
vendored
22
vendor/github.com/sigstore/sigstore/pkg/signature/signerverifier.go
generated
vendored
@@ -103,3 +103,25 @@ func LoadSignerVerifierFromPEMFileWithOpts(path string, pf cryptoutils.PassFunc,
|
||||
}
|
||||
return LoadSignerVerifierWithOpts(priv, opts...)
|
||||
}
|
||||
|
||||
// LoadDefaultSignerVerifier returns a signature.SignerVerifier based on
|
||||
// the private key. Each private key has a corresponding PublicKeyDetails
|
||||
// associated in the Sigstore ecosystem, see Algorithm Registry for more details.
|
||||
func LoadDefaultSignerVerifier(privateKey crypto.PrivateKey, opts ...LoadOption) (SignerVerifier, error) {
|
||||
signer, ok := privateKey.(crypto.Signer)
|
||||
if !ok {
|
||||
return nil, errors.New("private key does not implement signature.Signer")
|
||||
}
|
||||
algorithmDetails, err := GetDefaultAlgorithmDetails(signer.Public(), opts...)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return LoadSignerVerifierFromAlgorithmDetails(privateKey, algorithmDetails, opts...)
|
||||
}
|
||||
|
||||
// LoadSignerVerifierFromAlgorithmDetails returns a signature.SignerVerifier based on
|
||||
// the algorithm details and the user's choice of options.
|
||||
func LoadSignerVerifierFromAlgorithmDetails(privateKey crypto.PrivateKey, algorithmDetails AlgorithmDetails, opts ...LoadOption) (SignerVerifier, error) {
|
||||
filteredOpts := GetOptsFromAlgorithmDetails(algorithmDetails, opts...)
|
||||
return LoadSignerVerifierWithOpts(privateKey, filteredOpts...)
|
||||
}
|
||||
|
19
vendor/github.com/sigstore/sigstore/pkg/signature/util.go
generated
vendored
19
vendor/github.com/sigstore/sigstore/pkg/signature/util.go
generated
vendored
@@ -17,11 +17,13 @@ package signature
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"crypto/rsa"
|
||||
"encoding/json"
|
||||
"fmt"
|
||||
|
||||
"github.com/google/go-containerregistry/pkg/name"
|
||||
|
||||
"github.com/sigstore/sigstore/pkg/signature/options"
|
||||
sigpayload "github.com/sigstore/sigstore/pkg/signature/payload"
|
||||
)
|
||||
|
||||
@@ -53,3 +55,20 @@ func VerifyImageSignature(signer SignerVerifier, payload, signature []byte) (ima
|
||||
}
|
||||
return imgPayload.Image, imgPayload.Annotations, nil
|
||||
}
|
||||
|
||||
// GetOptsFromAlgorithmDetails returns a list of LoadOptions that are
|
||||
// appropriate for the given algorithm details. It ignores the hash type because
|
||||
// that can be retrieved from the algorithm details.
|
||||
func GetOptsFromAlgorithmDetails(algorithmDetails AlgorithmDetails, opts ...LoadOption) []LoadOption {
|
||||
res := []LoadOption{options.WithHash(algorithmDetails.hashType)}
|
||||
for _, opt := range opts {
|
||||
var useED25519ph bool
|
||||
var rsaPSSOptions *rsa.PSSOptions
|
||||
opt.ApplyED25519ph(&useED25519ph)
|
||||
opt.ApplyRSAPSS(&rsaPSSOptions)
|
||||
if useED25519ph || rsaPSSOptions != nil {
|
||||
res = append(res, opt)
|
||||
}
|
||||
}
|
||||
return res
|
||||
}
|
||||
|
18
vendor/github.com/sigstore/sigstore/pkg/signature/verifier.go
generated
vendored
18
vendor/github.com/sigstore/sigstore/pkg/signature/verifier.go
generated
vendored
@@ -136,3 +136,21 @@ func LoadVerifierFromPEMFileWithOpts(path string, opts ...LoadOption) (Verifier,
|
||||
|
||||
return LoadVerifierWithOpts(pubKey, opts...)
|
||||
}
|
||||
|
||||
// LoadDefaultVerifier returns a signature.Verifier based on the public key.
|
||||
// Each public key has a corresponding PublicKeyDetails associated in the
|
||||
// Sigstore ecosystem, see Algorithm Registry for more details.
|
||||
func LoadDefaultVerifier(publicKey crypto.PublicKey, opts ...LoadOption) (Verifier, error) {
|
||||
algorithmDetails, err := GetDefaultAlgorithmDetails(publicKey, opts...)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
return LoadVerifierFromAlgorithmDetails(publicKey, algorithmDetails, opts...)
|
||||
}
|
||||
|
||||
// LoadVerifierFromAlgorithmDetails returns a signature.Verifier based on
|
||||
// the algorithm details and the user's choice of options.
|
||||
func LoadVerifierFromAlgorithmDetails(publicKey crypto.PublicKey, algorithmDetails AlgorithmDetails, opts ...LoadOption) (Verifier, error) {
|
||||
filteredOpts := GetOptsFromAlgorithmDetails(algorithmDetails, opts...)
|
||||
return LoadVerifierWithOpts(publicKey, filteredOpts...)
|
||||
}
|
||||
|
Reference in New Issue
Block a user