Skip to content

securesign/rekor

Folders and files

NameName
Last commit message
Last commit date
Jan 6, 2025
Jan 6, 2025
Jan 6, 2025
May 14, 2023
Oct 7, 2024
Jan 6, 2025
Feb 28, 2024
Oct 8, 2024
Mar 19, 2024
Aug 8, 2024
Dec 7, 2020
Jan 6, 2025
Oct 7, 2024
Jun 27, 2024
Apr 30, 2024
Nov 20, 2023
Nov 21, 2024
Apr 13, 2024
Sep 29, 2023
Oct 22, 2024
Apr 15, 2021
Apr 14, 2022
Jan 15, 2025
Feb 17, 2025
Feb 20, 2025
Feb 14, 2025
Feb 14, 2025
May 19, 2022
Jun 11, 2024
Feb 28, 2021
Apr 30, 2024
May 24, 2023
Feb 28, 2021
Oct 3, 2023
Feb 18, 2023
Apr 30, 2024
Mar 7, 2024
Apr 12, 2024
Feb 27, 2024
Nov 20, 2023
Jan 6, 2025
Jan 6, 2025
Apr 28, 2023
Aug 31, 2023
May 23, 2021
Feb 18, 2025
Nov 19, 2021

Repository files navigation

OpenSSF Scorecard

Rekor logo

Rekor

Rekór - Greek for “Record”

Rekor's goals are to provide an immutable tamper resistant ledger of metadata generated within a software projects supply chain. Rekor will enable software maintainers and build systems to record signed metadata to an immutable record. Other parties can then query said metadata to enable them to make informed decisions on trust and non-repudiation of an object's lifecycle. For more details visit the sigstore website.

The Rekor project provides a restful API based server for validation and a transparency log for storage. A CLI application is available to make and verify entries, query the transparency log for inclusion proof, integrity verification of the transparency log or retrieval of entries by either public key or artifact.

Rekor fulfils the signature transparency role of sigstore's software signing infrastructure. However, Rekor can be run on its own and is designed to be extensible to working with different manifest schemas and PKI tooling.

Official Documentation.

Public Instance

Rekor is officially Generally Available with a 1.0.0 release, and follows semver rules for API stability. This means production workloads can rely on the Rekor public instance, which has a 24/7 oncall rotation supporting it and offers a 99.5% availability SLO for the following API endpoints:

  • /api/v1/log
  • /api/v1/log/publicKey
  • /api/v1/log/proof
  • /api/v1/log/entries
  • /api/v1/log/entries/retrieve

For uptime data on the Rekor public instance, see https://status.sigstore.dev.

More details on the public instance can be found at docs.sigstore.dev.

The attestation size limit for uploads to the public instance is 100KB. If you need to upload larger files, please run your own instance of Rekor. You can find instructions for doing so in the installation documentation.

Installation

Please see the installation page for details on how to install the rekor CLI and set up / run the rekor server

Usage

For examples of uploading signatures for all the supported types to rekor, see the types documentation.

Extensibility

Custom schemas / manifests (rekor type)

Rekor allows customized manifests (which term them as types), type customization is outlined here.

API

If you're interested in integration with Rekor, we have an OpenAPI swagger editor

Security

Should you discover any security issues, please refer to sigstore's security process

Contributions

We welcome contributions from anyone and are especially interested to hear from users of Rekor.

Additional Documentation

In addition to this README file, this folder contains the additional documentation:

  • oid-info.md. Rekor OID values.
  • types.md. Information about how to sign and upload data in different pluggable types.

About

Software Supply Chain Transparency Log

Resources

License

Code of conduct

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Go 92.8%
  • Shell 5.7%
  • Makefile 1.0%
  • HCL 0.3%
  • Dockerfile 0.1%
  • Gnuplot 0.1%