update
This commit is contained in:
61
package/node_modules/@sigstore/verify/dist/timestamp/set.js
generated
vendored
Normal file
61
package/node_modules/@sigstore/verify/dist/timestamp/set.js
generated
vendored
Normal file
@@ -0,0 +1,61 @@
|
||||
"use strict";
|
||||
Object.defineProperty(exports, "__esModule", { value: true });
|
||||
exports.verifyTLogSET = void 0;
|
||||
/*
|
||||
Copyright 2023 The Sigstore Authors.
|
||||
|
||||
Licensed under the Apache License, Version 2.0 (the "License");
|
||||
you may not use this file except in compliance with the License.
|
||||
You may obtain a copy of the License at
|
||||
|
||||
http://www.apache.org/licenses/LICENSE-2.0
|
||||
|
||||
Unless required by applicable law or agreed to in writing, software
|
||||
distributed under the License is distributed on an "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
See the License for the specific language governing permissions and
|
||||
limitations under the License.
|
||||
*/
|
||||
const core_1 = require("@sigstore/core");
|
||||
const error_1 = require("../error");
|
||||
const trust_1 = require("../trust");
|
||||
// Verifies the SET for the given entry against the list of trusted
|
||||
// transparency logs. Returns true if the SET can be verified against at least
|
||||
// one of the trusted logs; otherwise, returns false.
|
||||
function verifyTLogSET(entry, tlogs) {
|
||||
// Filter the list of tlog instances to only those which might be able to
|
||||
// verify the SET
|
||||
const validTLogs = (0, trust_1.filterTLogAuthorities)(tlogs, {
|
||||
logID: entry.logId.keyId,
|
||||
targetDate: new Date(Number(entry.integratedTime) * 1000),
|
||||
});
|
||||
// Check to see if we can verify the SET against any of the valid tlogs
|
||||
const verified = validTLogs.some((tlog) => {
|
||||
// Re-create the original Rekor verification payload
|
||||
const payload = toVerificationPayload(entry);
|
||||
// Canonicalize the payload and turn into a buffer for verification
|
||||
const data = Buffer.from(core_1.json.canonicalize(payload), 'utf8');
|
||||
// Extract the SET from the tlog entry
|
||||
const signature = entry.inclusionPromise.signedEntryTimestamp;
|
||||
return core_1.crypto.verify(data, tlog.publicKey, signature);
|
||||
});
|
||||
if (!verified) {
|
||||
throw new error_1.VerificationError({
|
||||
code: 'TLOG_INCLUSION_PROMISE_ERROR',
|
||||
message: 'inclusion promise could not be verified',
|
||||
});
|
||||
}
|
||||
}
|
||||
exports.verifyTLogSET = verifyTLogSET;
|
||||
// Returns a properly formatted "VerificationPayload" for one of the
|
||||
// transaction log entires in the given bundle which can be used for SET
|
||||
// verification.
|
||||
function toVerificationPayload(entry) {
|
||||
const { integratedTime, logIndex, logId, canonicalizedBody } = entry;
|
||||
return {
|
||||
body: canonicalizedBody.toString('base64'),
|
||||
integratedTime: Number(integratedTime),
|
||||
logIndex: Number(logIndex),
|
||||
logID: logId.keyId.toString('hex'),
|
||||
};
|
||||
}
|
Reference in New Issue
Block a user