You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
rootsPemFile=flag.String("roots_pem_file", "", "Path to the file containing root certificates that are acceptable to the log. The certs are served through get-roots endpoint.")
65
-
rejectExpired=flag.Bool("reject_expired", false, "If true then the certificate validity period will be checked against the current time during the validation of submissions. This will cause expired certificates to be rejected.")
66
-
rejectUnexpired=flag.Bool("reject_unexpired", false, "If true then CTFE rejects certificates that are either currently valid or not yet valid.")
67
-
extKeyUsages=flag.String("ext_key_usages", "", "If set, will restrict the set of such usages that the server will accept. By default all are accepted. The values specified must be ones known to the x509 package.")
68
-
rejectExtensions=flag.String("reject_extension", "", "A list of X.509 extension OIDs, in dotted string form (e.g. '2.3.4.5') which, if present, should cause submissions to be rejected.")
69
-
signerPublicKeySecretName=flag.String("signer_public_key_secret_name", "", "Public key secret name for checkpoints and SCTs signer. Format: projects/{projectId}/secrets/{secretName}/versions/{secretVersion}.")
70
-
signerPrivateKeySecretName=flag.String("signer_private_key_secret_name", "", "Private key secret name for checkpoints and SCTs signer. Format: projects/{projectId}/secrets/{secretName}/versions/{secretVersion}.")
53
+
httpEndpoint=flag.String("http_endpoint", "localhost:6962", "Endpoint for HTTP (host:port).")
54
+
metricsEndpoint=flag.String("metrics_endpoint", "", "Endpoint for serving metrics; if left empty, metrics will be visible on --http_endpoint.")
55
+
tesseraDeadline=flag.Duration("tessera_deadline", time.Second*10, "Deadline for Tessera requests.")
56
+
maskInternalErrors=flag.Bool("mask_internal_errors", false, "Don't return error strings with Internal Server Error HTTP responses.")
57
+
tracing=flag.Bool("tracing", false, "If true opencensus Stackdriver tracing will be enabled. See https://opencensus.io/.")
58
+
tracingProjectID=flag.String("tracing_project_id", "", "project ID to pass to stackdriver. Can be empty for GCP, consult docs for other platforms.")
59
+
tracingPercent=flag.Int("tracing_percent", 0, "Percent of requests to be traced. Zero is a special case to use the DefaultSampler.")
60
+
origin=flag.String("origin", "", "Origin of the log, for checkpoints and the monitoring prefix.")
rootsPemFile=flag.String("roots_pem_file", "", "Path to the file containing root certificates that are acceptable to the log. The certs are served through get-roots endpoint.")
66
+
rejectExpired=flag.Bool("reject_expired", false, "If true then the certificate validity period will be checked against the current time during the validation of submissions. This will cause expired certificates to be rejected.")
67
+
rejectUnexpired=flag.Bool("reject_unexpired", false, "If true then CTFE rejects certificates that are either currently valid or not yet valid.")
68
+
extKeyUsages=flag.String("ext_key_usages", "", "If set, will restrict the set of such usages that the server will accept. By default all are accepted. The values specified must be ones known to the x509 package.")
69
+
rejectExtensions=flag.String("reject_extension", "", "A list of X.509 extension OIDs, in dotted string form (e.g. '2.3.4.5') which, if present, should cause submissions to be rejected.")
70
+
privKey=flag.String("private_key", "", "Path to a private key .der file. Used to sign checkpoints and SCTs.")
0 commit comments