Supply Chain Transparency Log
Rekor's goals are to provide an immutable tamper resistant ledger of metadata generated within a software projects supply chain. Rekor will enable software maintainers and build systems to record signed metadata to an immutable record. Other parties can then query said metadata to enable them to make informed decisions on trust and non-repudiation of an object's lifecycle. For more details visit the sigstore website
The Rekor project provides a restful API based server for validation and a transparency log for storage. A CLI application is available to make and verify entries, query the transparency log for inclusion proof, integrity verification of the transparency log or retrieval of entries by either public key or artifact.
Rekor fulfils the signature transparency role of sigstore's software signing infrastructure. However, Rekor can be run on its own and is designed to be extensible to working with different manifest schemas and PKI tooling.
- Developed at security
- Sources inherited from project openSUSE:Factory
-
1
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP4:RebuildFactoryUpdates/rekor && cd $_
- Create Badge
Source Files
Filename | Size | Changed |
---|---|---|
_service | 0000000812 812 Bytes | |
_servicedata | 0000000231 231 Bytes | |
rekor-1.3.6.obscpio | 0003277324 3.13 MB | |
rekor-zypper-verify.sh | 0000000941 941 Bytes | |
rekor.changes | 0000023777 23.2 KB | |
rekor.obsinfo | 0000000094 94 Bytes | |
rekor.spec | 0000003070 3 KB | |
vendor.tar.zst | 0005958336 5.68 MB |
Latest Revision
refactor spec, change to obs_scm (no longer hardcoding the commit hash) and update to 1.3.6 (forwarded request 1189772 from ojkastl_buildservice)
Comments 0