forked from google/keytransparency
-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Sync with base #5
Open
therealdrake
wants to merge
419
commits into
therealdrake:master
Choose a base branch
from
google:master
base: master
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
* go get github.com/google/trillian@HEAD * Use new TrillianMapWrite API
* Fix proto copying in server_test. * Make HighWatermarks handle nil, fix proto comparison.
* Fix proto copying in revisions and paginator tests. Towards github.com/google/trillian#1738. * Fix that nil / empty protos don't compare the same.
* Return MapRoov from VerifiedGetUser This allows callsers to track the revision number of the returned data * Return MapRoot from BatchVerifiedGetUser * SetPrevious takes revision * fixup GetUser returns smr * Use mutation's revision for waiting * Document ambiguities * MinApplyRevision
* Transcript protobuf * proto: TrustNewLog * Integration tests produce transcripts * SaveTestVectors with transcript proto * New testdata * rm testdata/types.go * Use testdata local read and write functions * RunTranscriptTest * Key fields * packagePath comment * Use transcripts in p256 test * mv api/transcript to testdata * transcript message documentation * KT no longer depends on tink/proto * s/Unary/Action/ * WriteTranscript * Unknown actions should fail * Regenerate testvectors with action * Capture err from WriteTranscript
* Pass along err message * lower case error message
* LogRootRequest proto * last_verified_log_root documentation * Save LastVerifiedLogRoot * Use LastVerified in tests * Regenerate test vectors
All verifications should be rooted in the last verified log root
This enables a 1:1 mapping between log root requests and log root verifications
* Pair verifier functions
* Remove duplicate DomainID * Stream MapRevisions * StreamRevsions uses VerifiedGetRevision * ProcessLoop of MapRevisions * Format comments
* New tracker package * Use new tracker in client * tracker.NewFromSaved gets test vectors working * Use LogTracker interface embedding * LastVerifiedLogRoot returns LogRootRequest * VerifyLogRoot requires LogRootRequest * Tracker.SetUpdatePredicate * Dependency inject logtracker * Update pair verifiers * Update integration tests * Remove mutex * FakeLogVerifier * LogTrackerTest * Document race behavior
* Cache go mod download * Copy go.mod and go.sum as one
* Limit the number of map revisions to return at once * Documentation * Flagify
* Reduce keyserver log verbosity * An integration test to make sure we don't regress * Run integration test in travis * Use prod config for integration test * Fix README for prod config * Fix docker compose indentation * Update trillian paths * Increase timeouts * Use docker enabled travis env * Use Trillian db_server * Nits and simplify * Install GNU wget * respect wget errors
* Tracker Factory for dependency injection Allow callers of NewFromConfig to supply a tracker factory. * Factory documentation * tracker.New -> NewSynchronous
* Use $(go env GOPATH) Use go env GOPATH for situations where the GOPATH environment variable may be unset https://golang.org/cmd/go/#hdr-GOPATH_environment_variable * Remove secrets from the docker images * Bump docker version * Add secrets to sequencer * Set permission bits before writing file
* prototool format -w * Use LogRootRequest in request protos * go generate ./core/... * Use GetLastVerified * Remove LastVerifiedLogRoot from transcript * Remove LastVerifiedLogRoot from transcript generation * go generate ./core/testdata/ * Update pair verifiers
* Update uber/prototool * Turn on GOPROXY
* Build stages * Skip installing go dependencies for docker testa
* BenchmarkEvaluate * Test paralleism pkg: github.com/google/keytransparency/core/crypto/vrf/p256 BenchmarkEvaluate/1_goroutines-12 300 5538849 ns/op BenchmarkEvaluate/2_goroutines-12 500 2931862 ns/op BenchmarkEvaluate/4_goroutines-12 1000 1625216 ns/op BenchmarkEvaluate/8_goroutines-12 1000 1333662 ns/op BenchmarkEvaluate/16_goroutines-12 1000 1447403 ns/op BenchmarkEvaluate/32_goroutines-12 1000 1526478 ns/op BenchmarkEvaluate/64_goroutines-12 2000 1569843 ns/op BenchmarkEvaluate/128_goroutines-12 10000 1817793 ns/op * Use constant-time p256 implementation
Add UNAVAILABLE to the list of HTTP codes the integration test retries on
) Bumps [github.com/grpc-ecosystem/grpc-gateway](https://github.com/grpc-ecosystem/grpc-gateway) from 1.12.1 to 1.14.6. - [Release notes](https://github.com/grpc-ecosystem/grpc-gateway/releases) - [Changelog](https://github.com/grpc-ecosystem/grpc-gateway/blob/master/CHANGELOG.md) - [Commits](grpc-ecosystem/grpc-gateway@v1.12.1...v1.14.6) Signed-off-by: dependabot-preview[bot] <[email protected]> Co-authored-by: dependabot-preview[bot] <27856297+dependabot-preview[bot]@users.noreply.github.com>
* Sort Directory List * Timestamp bound: min_read_timestamp for read can be only be used for a single use transaction. * Working emulator test * panner: code = "Unimplemented", desc = "Cloud Spanner does not support returning read timestamps from range reads that are empty by definition." * Parallel tests * Support Spanner Emulator and Google Cloud * lints
* go mod tidy * Storage factory * Use new storage factory
Bumps [google.golang.org/api](https://github.com/googleapis/google-api-go-client) from 0.25.0 to 0.26.0. - [Release notes](https://github.com/googleapis/google-api-go-client/releases) - [Changelog](https://github.com/googleapis/google-api-go-client/blob/master/CHANGES.md) - [Commits](googleapis/google-api-go-client@v0.25.0...v0.26.0) Signed-off-by: dependabot-preview[bot] <[email protected]>
* Use gocloud.dev/server/health * Set liveness and readiness probe paths * GracefulShutdown
Bumps [gocloud.dev](https://github.com/google/go-cloud) from 0.19.0 to 0.20.0. - [Release notes](https://github.com/google/go-cloud/releases) - [Commits](google/go-cloud@v0.19.0...v0.20.0) Signed-off-by: dependabot-preview[bot] <[email protected]>
Bumps [google.golang.org/api](https://github.com/googleapis/google-api-go-client) from 0.26.0 to 0.28.0. - [Release notes](https://github.com/googleapis/google-api-go-client/releases) - [Changelog](https://github.com/googleapis/google-api-go-client/blob/master/CHANGES.md) - [Commits](googleapis/google-api-go-client@v0.26.0...v0.28.0) Signed-off-by: dependabot-preview[bot] <[email protected]> Co-authored-by: dependabot-preview[bot] <27856297+dependabot-preview[bot]@users.noreply.github.com>
Bumps [github.com/prometheus/client_golang](https://github.com/prometheus/client_golang) from 1.5.1 to 1.7.0. - [Release notes](https://github.com/prometheus/client_golang/releases) - [Changelog](https://github.com/prometheus/client_golang/blob/master/CHANGELOG.md) - [Commits](prometheus/client_golang@v1.5.1...v1.7.0) Signed-off-by: dependabot-preview[bot] <[email protected]>
Bumps [github.com/google/go-cmp](https://github.com/google/go-cmp) from 0.4.1 to 0.5.0. - [Release notes](https://github.com/google/go-cmp/releases) - [Commits](google/go-cmp@v0.4.1...v0.5.0) Signed-off-by: dependabot-preview[bot] <[email protected]>
Even though this is an older design doc, I still thought others might appreciate having the right proto link.
* Fix off by one error For all Map Revisions, we want each Map Revision written in the log of map roots such that Map Revision == Leaf Index. When Max Map Revision > Max Leaf Index, we want to AddSequencedLeaf all the revisions inbetween.
* Add timeouts
* gcloud is managed by snap * snap
* Meet in the middle algorithm * doc * stress test
* DB_NAME and DB_ENGINE flags * Use noop quota Spanner doesn't have a quota impl * DB_ENGINE=cloud_spanner Inject GOOGLE_APPLICATION_CREDENTIALS * Cloudspanner flags * Set master hold interval * server -v=3 * Set sequencer batch size * pin trillian docker * go get github.com/google/[email protected] * remove mysql sidecar * proper proto copy
Bumps [google.golang.org/api](https://github.com/googleapis/google-api-go-client) from 0.28.0 to 0.29.0. - [Release notes](https://github.com/googleapis/google-api-go-client/releases) - [Changelog](https://github.com/googleapis/google-api-go-client/blob/master/CHANGES.md) - [Commits](googleapis/google-api-go-client@v0.28.0...v0.29.0) Signed-off-by: dependabot-preview[bot] <[email protected]>
Bumps [github.com/golang/mock](https://github.com/golang/mock) from 1.4.3 to 1.4.4. - [Release notes](https://github.com/golang/mock/releases) - [Changelog](https://github.com/golang/mock/blob/master/.goreleaser.yml) - [Commits](golang/mock@v1.4.3...v1.4.4) Signed-off-by: dependabot-preview[bot] <[email protected]>
List of changes: 1) Created a new script from "docker-compose_test.sh" that allows users to deploy, and later cleanup, the KeyTransparency service locally; 2) Updated the README's related section with the new script's usage; 3) Substituted the instruction `go get github.com/google/keytransparency/...` which fails due to missing (autogenerated ?) files, with the equivalent `git clone` version; 4) Fixed the key file existance check in script "docker-compose_test.sh";
Bumps [github.com/google/go-cmp](https://github.com/google/go-cmp) from 0.5.0 to 0.5.2. - [Release notes](https://github.com/google/go-cmp/releases) - [Commits](google/go-cmp@v0.5.0...v0.5.2) Signed-off-by: dependabot-preview[bot] <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
No description provided.