You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Support GCP Secret Manager for signer key pair (#40)
* Support GCP Secret Manager for signer
* Add terraform dependency lock file
* Add security warning to tls_private_key.sctfe-ecdsa-p256 resource
* Rename `Signer` to `ECDSAWithSHA256Signer`
* Wrap err with key secret name
* Refactor `pem.Decode`
* Fix readme after rebase
* Fix TF resources naming convention
* Fix `panic` when `opts` is `nil`
* Verify the correctness of the signer key pair
* Refactor `ECDSAWithSHA256Signer` to use `ecdsa.{Public,Private}Key`
rootsPemFile=flag.String("roots_pem_file", "", "Path to the file containing root certificates that are acceptable to the log. The certs are served through get-roots endpoint.")
66
-
rejectExpired=flag.Bool("reject_expired", false, "If true then the certificate validity period will be checked against the current time during the validation of submissions. This will cause expired certificates to be rejected.")
67
-
rejectUnexpired=flag.Bool("reject_unexpired", false, "If true then CTFE rejects certificates that are either currently valid or not yet valid.")
68
-
extKeyUsages=flag.String("ext_key_usages", "", "If set, will restrict the set of such usages that the server will accept. By default all are accepted. The values specified must be ones known to the x509 package.")
69
-
rejectExtensions=flag.String("reject_extension", "", "A list of X.509 extension OIDs, in dotted string form (e.g. '2.3.4.5') which, if present, should cause submissions to be rejected.")
70
-
privKey=flag.String("private_key", "", "Path to a private key .der file. Used to sign checkpoints and SCTs.")
rootsPemFile=flag.String("roots_pem_file", "", "Path to the file containing root certificates that are acceptable to the log. The certs are served through get-roots endpoint.")
65
+
rejectExpired=flag.Bool("reject_expired", false, "If true then the certificate validity period will be checked against the current time during the validation of submissions. This will cause expired certificates to be rejected.")
66
+
rejectUnexpired=flag.Bool("reject_unexpired", false, "If true then CTFE rejects certificates that are either currently valid or not yet valid.")
67
+
extKeyUsages=flag.String("ext_key_usages", "", "If set, will restrict the set of such usages that the server will accept. By default all are accepted. The values specified must be ones known to the x509 package.")
68
+
rejectExtensions=flag.String("reject_extension", "", "A list of X.509 extension OIDs, in dotted string form (e.g. '2.3.4.5') which, if present, should cause submissions to be rejected.")
69
+
signerPublicKeySecretName=flag.String("signer_public_key_secret_name", "", "Public key secret name for checkpoints and SCTs signer. Format: projects/{projectId}/secrets/{secretName}/versions/{secretVersion}.")
70
+
signerPrivateKeySecretName=flag.String("signer_private_key_secret_name", "", "Private key secret name for checkpoints and SCTs signer. Format: projects/{projectId}/secrets/{secretName}/versions/{secretVersion}.")
72
71
)
73
72
74
73
// nolint:staticcheck
@@ -77,10 +76,9 @@ func main() {
77
76
flag.Parse()
78
77
ctx:=context.Background()
79
78
80
-
// TODO(phboneff): move to something else, like KMS
0 commit comments