sigstore_protobuf_specs 0.4.2 → 0.5.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 415c797b21e6c9404e3e0181d44c9b8ff0143f6783a77252da414ff4fa397613
4
- data.tar.gz: 53f4896dbda3c701db47677643a9b705c09dc8dba8bfe5727e272f10d33f27fb
3
+ metadata.gz: 93cd068d1f50a1c5e37f223e271a2d3404d421dfeba08ea7bca219a488b3c2ec
4
+ data.tar.gz: 47c06d270c81d7fbc4d59413226c437af264d8936f9fccb9da407daa82a42d57
5
5
  SHA512:
6
- metadata.gz: f34e1c7234c7ebcd2c58c348dd206a6acbd4d04ddf98b924eb9c0b82161d8c69ece2844a6515c51445dd929dffff41ba69531923bce1a18c714143f6063b0fc9
7
- data.tar.gz: 7f884d9a2a6abf508c4d7504c3c83c4ee5a8c460a6cee46292ec4f59c7c575b162bddef5d433edba0fc13ae7aa4e456f8facd70fb57c24942f118df07590cd88
6
+ metadata.gz: 82f2f7efeeb972bf763453e043eded3dbcb6db9a9c7fbf4d310ec2bc061d30cf2c75c4ca9010d61fa8f81f8bd12145a9fd2f15d9aac2c3ae148ebbbf77e5dcca
7
+ data.tar.gz: 74db689981043cedc31a9ca9c3d2d581b258929c09efbe83f24e9a89e0cf42899aeba47f9989f1379ec6589889204c736efd29dfec0fa0dc9108cbb4027172da
@@ -0,0 +1,25 @@
1
+ # frozen_string_literal: true
2
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
3
+ # source: rekor/v2/dsse.proto
4
+
5
+ require 'google/protobuf'
6
+
7
+ require 'google/api/field_behavior_pb'
8
+ require 'sigstore_common_pb'
9
+ require 'envelope_pb'
10
+ require 'rekor/v2/verifier_pb'
11
+
12
+
13
+ descriptor_data = "\n\x13rekor/v2/dsse.proto\x12\x15\x64\x65v.sigstore.rekor.v2\x1a\x1fgoogle/api/field_behavior.proto\x1a\x15sigstore_common.proto\x1a\x0e\x65nvelope.proto\x1a\x17rekor/v2/verifier.proto\"v\n\x0f\x44SSERequestV002\x12*\n\x08\x65nvelope\x18\x01 \x01(\x0b\x32\x13.io.intoto.EnvelopeB\x03\xe0\x41\x02\x12\x37\n\tverifiers\x18\x02 \x03(\x0b\x32\x1f.dev.sigstore.rekor.v2.VerifierB\x03\xe0\x41\x02\"\x8b\x01\n\x10\x44SSELogEntryV002\x12<\n\x0bpayloadHash\x18\x01 \x01(\x0b\x32\".dev.sigstore.common.v1.HashOutputB\x03\xe0\x41\x02\x12\x39\n\nsignatures\x18\x02 \x03(\x0b\x32 .dev.sigstore.rekor.v2.SignatureB\x03\xe0\x41\x02\x42y\n\x1b\x64\x65v.sigstore.proto.rekor.v2B\x0bRekorV2DsseP\x01Z5github.com/sigstore/protobuf-specs/gen/pb-go/rekor/v2\xea\x02\x13Sigstore::Rekor::V2b\x06proto3"
14
+
15
+ pool = Google::Protobuf::DescriptorPool.generated_pool
16
+ pool.add_serialized_file(descriptor_data)
17
+
18
+ module Sigstore
19
+ module Rekor
20
+ module V2
21
+ DSSERequestV002 = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("dev.sigstore.rekor.v2.DSSERequestV002").msgclass
22
+ DSSELogEntryV002 = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("dev.sigstore.rekor.v2.DSSELogEntryV002").msgclass
23
+ end
24
+ end
25
+ end
@@ -0,0 +1,25 @@
1
+ # frozen_string_literal: true
2
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
3
+ # source: rekor/v2/entry.proto
4
+
5
+ require 'google/protobuf'
6
+
7
+ require 'google/api/field_behavior_pb'
8
+ require 'rekor/v2/dsse_pb'
9
+ require 'rekor/v2/hashedrekord_pb'
10
+
11
+
12
+ descriptor_data = "\n\x14rekor/v2/entry.proto\x12\x15\x64\x65v.sigstore.rekor.v2\x1a\x1fgoogle/api/field_behavior.proto\x1a\x13rekor/v2/dsse.proto\x1a\x1brekor/v2/hashedrekord.proto\"d\n\x05\x45ntry\x12\x11\n\x04kind\x18\x01 \x01(\tB\x03\xe0\x41\x02\x12\x18\n\x0b\x61pi_version\x18\x02 \x01(\tB\x03\xe0\x41\x02\x12.\n\x04spec\x18\x03 \x01(\x0b\x32\x1b.dev.sigstore.rekor.v2.SpecB\x03\xe0\x41\x02\"\xa5\x01\n\x04Spec\x12R\n\x12hashed_rekord_v002\x18\x01 \x01(\x0b\x32/.dev.sigstore.rekor.v2.HashedRekordLogEntryV002B\x03\xe0\x41\x02H\x00\x12\x41\n\tdsse_v002\x18\x02 \x01(\x0b\x32\'.dev.sigstore.rekor.v2.DSSELogEntryV002B\x03\xe0\x41\x02H\x00\x42\x06\n\x04spec\"\xc1\x01\n\x12\x43reateEntryRequest\x12Y\n\x1ahashed_rekord_request_v002\x18\x01 \x01(\x0b\x32..dev.sigstore.rekor.v2.HashedRekordRequestV002B\x03\xe0\x41\x02H\x00\x12H\n\x11\x64sse_request_v002\x18\x02 \x01(\x0b\x32&.dev.sigstore.rekor.v2.DSSERequestV002B\x03\xe0\x41\x02H\x00\x42\x06\n\x04specBz\n\x1b\x64\x65v.sigstore.proto.rekor.v2B\x0cRekorV2EntryP\x01Z5github.com/sigstore/protobuf-specs/gen/pb-go/rekor/v2\xea\x02\x13Sigstore::Rekor::V2b\x06proto3"
13
+
14
+ pool = Google::Protobuf::DescriptorPool.generated_pool
15
+ pool.add_serialized_file(descriptor_data)
16
+
17
+ module Sigstore
18
+ module Rekor
19
+ module V2
20
+ Entry = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("dev.sigstore.rekor.v2.Entry").msgclass
21
+ Spec = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("dev.sigstore.rekor.v2.Spec").msgclass
22
+ CreateEntryRequest = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("dev.sigstore.rekor.v2.CreateEntryRequest").msgclass
23
+ end
24
+ end
25
+ end
@@ -0,0 +1,24 @@
1
+ # frozen_string_literal: true
2
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
3
+ # source: rekor/v2/hashedrekord.proto
4
+
5
+ require 'google/protobuf'
6
+
7
+ require 'google/api/field_behavior_pb'
8
+ require 'sigstore_common_pb'
9
+ require 'rekor/v2/verifier_pb'
10
+
11
+
12
+ descriptor_data = "\n\x1brekor/v2/hashedrekord.proto\x12\x15\x64\x65v.sigstore.rekor.v2\x1a\x1fgoogle/api/field_behavior.proto\x1a\x15sigstore_common.proto\x1a\x17rekor/v2/verifier.proto\"h\n\x17HashedRekordRequestV002\x12\x13\n\x06\x64igest\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x02\x12\x38\n\tsignature\x18\x02 \x01(\x0b\x32 .dev.sigstore.rekor.v2.SignatureB\x03\xe0\x41\x02\"\x8b\x01\n\x18HashedRekordLogEntryV002\x12\x35\n\x04\x64\x61ta\x18\x01 \x01(\x0b\x32\".dev.sigstore.common.v1.HashOutputB\x03\xe0\x41\x02\x12\x38\n\tsignature\x18\x02 \x01(\x0b\x32 .dev.sigstore.rekor.v2.SignatureB\x03\xe0\x41\x02\x42\x81\x01\n\x1b\x64\x65v.sigstore.proto.rekor.v2B\x13RekorV2HashedRekordP\x01Z5github.com/sigstore/protobuf-specs/gen/pb-go/rekor/v2\xea\x02\x13Sigstore::Rekor::V2b\x06proto3"
13
+
14
+ pool = Google::Protobuf::DescriptorPool.generated_pool
15
+ pool.add_serialized_file(descriptor_data)
16
+
17
+ module Sigstore
18
+ module Rekor
19
+ module V2
20
+ HashedRekordRequestV002 = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("dev.sigstore.rekor.v2.HashedRekordRequestV002").msgclass
21
+ HashedRekordLogEntryV002 = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("dev.sigstore.rekor.v2.HashedRekordLogEntryV002").msgclass
22
+ end
23
+ end
24
+ end
@@ -0,0 +1,24 @@
1
+ # frozen_string_literal: true
2
+ # Generated by the protocol buffer compiler. DO NOT EDIT!
3
+ # source: rekor/v2/verifier.proto
4
+
5
+ require 'google/protobuf'
6
+
7
+ require 'sigstore_common_pb'
8
+ require 'google/api/field_behavior_pb'
9
+
10
+
11
+ descriptor_data = "\n\x17rekor/v2/verifier.proto\x12\x15\x64\x65v.sigstore.rekor.v2\x1a\x15sigstore_common.proto\x1a\x1fgoogle/api/field_behavior.proto\"#\n\tPublicKey\x12\x16\n\traw_bytes\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x02\"\xe1\x01\n\x08Verifier\x12;\n\npublic_key\x18\x01 \x01(\x0b\x32 .dev.sigstore.rekor.v2.PublicKeyB\x03\xe0\x41\x02H\x00\x12H\n\x10x509_certificate\x18\x02 \x01(\x0b\x32\'.dev.sigstore.common.v1.X509CertificateB\x03\xe0\x41\x02H\x00\x12\x42\n\x0bkey_details\x18\x03 \x01(\x0e\x32(.dev.sigstore.common.v1.PublicKeyDetailsB\x03\xe0\x41\x02\x42\n\n\x08verifier\"Y\n\tSignature\x12\x14\n\x07\x63ontent\x18\x01 \x01(\x0c\x42\x03\xe0\x41\x02\x12\x36\n\x08verifier\x18\x02 \x01(\x0b\x32\x1f.dev.sigstore.rekor.v2.VerifierB\x03\xe0\x41\x02\x42}\n\x1b\x64\x65v.sigstore.proto.rekor.v2B\x0fRekorV2VerifierP\x01Z5github.com/sigstore/protobuf-specs/gen/pb-go/rekor/v2\xea\x02\x13Sigstore::Rekor::V2b\x06proto3"
12
+
13
+ pool = Google::Protobuf::DescriptorPool.generated_pool
14
+ pool.add_serialized_file(descriptor_data)
15
+
16
+ module Sigstore
17
+ module Rekor
18
+ module V2
19
+ PublicKey = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("dev.sigstore.rekor.v2.PublicKey").msgclass
20
+ Verifier = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("dev.sigstore.rekor.v2.Verifier").msgclass
21
+ Signature = ::Google::Protobuf::DescriptorPool.generated_pool.lookup("dev.sigstore.rekor.v2.Signature").msgclass
22
+ end
23
+ end
24
+ end
@@ -16,6 +16,6 @@
16
16
 
17
17
  module Dev
18
18
  module Sigstore
19
- VERSION = '0.4.2'
19
+ VERSION = '0.5.0'
20
20
  end
21
21
  end
@@ -8,7 +8,7 @@ require 'google/api/field_behavior_pb'
8
8
  require 'sigstore_common_pb'
9
9
 
10
10
 
11
- descriptor_data = "\n\x18sigstore_trustroot.proto\x12\x19\x64\x65v.sigstore.trustroot.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x15sigstore_common.proto\"\xa0\x02\n\x17TransparencyLogInstance\x12\x10\n\x08\x62\x61se_url\x18\x01 \x01(\t\x12=\n\x0ehash_algorithm\x18\x02 \x01(\x0e\x32%.dev.sigstore.common.v1.HashAlgorithm\x12\x35\n\npublic_key\x18\x03 \x01(\x0b\x32!.dev.sigstore.common.v1.PublicKey\x12\x31\n\x06log_id\x18\x04 \x01(\x0b\x32\x1d.dev.sigstore.common.v1.LogIdB\x02\x18\x01\x12\x38\n\x11\x63heckpoint_key_id\x18\x05 \x01(\x0b\x32\x1d.dev.sigstore.common.v1.LogId\x12\x10\n\x08operator\x18\x06 \x01(\t\"\xe9\x01\n\x14\x43\x65rtificateAuthority\x12:\n\x07subject\x18\x01 \x01(\x0b\x32).dev.sigstore.common.v1.DistinguishedName\x12\x0b\n\x03uri\x18\x02 \x01(\t\x12@\n\ncert_chain\x18\x03 \x01(\x0b\x32,.dev.sigstore.common.v1.X509CertificateChain\x12\x34\n\tvalid_for\x18\x04 \x01(\x0b\x32!.dev.sigstore.common.v1.TimeRange\x12\x10\n\x08operator\x18\x05 \x01(\t\"\xca\x02\n\x0bTrustedRoot\x12\x12\n\nmedia_type\x18\x01 \x01(\t\x12\x41\n\x05tlogs\x18\x02 \x03(\x0b\x32\x32.dev.sigstore.trustroot.v1.TransparencyLogInstance\x12P\n\x17\x63\x65rtificate_authorities\x18\x03 \x03(\x0b\x32/.dev.sigstore.trustroot.v1.CertificateAuthority\x12\x42\n\x06\x63tlogs\x18\x04 \x03(\x0b\x32\x32.dev.sigstore.trustroot.v1.TransparencyLogInstance\x12N\n\x15timestamp_authorities\x18\x05 \x03(\x0b\x32/.dev.sigstore.trustroot.v1.CertificateAuthority\"\x99\x03\n\rSigningConfig\x12\x12\n\nmedia_type\x18\x05 \x01(\t\x12\x33\n\x07\x63\x61_urls\x18\x06 \x03(\x0b\x32\".dev.sigstore.trustroot.v1.Service\x12\x35\n\toidc_urls\x18\x07 \x03(\x0b\x32\".dev.sigstore.trustroot.v1.Service\x12;\n\x0frekor_tlog_urls\x18\x08 \x03(\x0b\x32\".dev.sigstore.trustroot.v1.Service\x12J\n\x11rekor_tlog_config\x18\t \x01(\x0b\x32/.dev.sigstore.trustroot.v1.ServiceConfiguration\x12\x34\n\x08tsa_urls\x18\n \x03(\x0b\x32\".dev.sigstore.trustroot.v1.Service\x12\x43\n\ntsa_config\x18\x0b \x01(\x0b\x32/.dev.sigstore.trustroot.v1.ServiceConfigurationJ\x04\x08\x01\x10\x05\"y\n\x07Service\x12\x0b\n\x03url\x18\x01 \x01(\t\x12\x19\n\x11major_api_version\x18\x02 \x01(\r\x12\x34\n\tvalid_for\x18\x03 \x01(\x0b\x32!.dev.sigstore.common.v1.TimeRange\x12\x10\n\x08operator\x18\x04 \x01(\t\"c\n\x14ServiceConfiguration\x12<\n\x08selector\x18\x01 \x01(\x0e\x32*.dev.sigstore.trustroot.v1.ServiceSelector\x12\r\n\x05\x63ount\x18\x02 \x01(\r\"\xb1\x01\n\x11\x43lientTrustConfig\x12\x12\n\nmedia_type\x18\x01 \x01(\t\x12\x41\n\x0ctrusted_root\x18\x02 \x01(\x0b\x32&.dev.sigstore.trustroot.v1.TrustedRootB\x03\xe0\x41\x02\x12\x45\n\x0esigning_config\x18\x03 \x01(\x0b\x32(.dev.sigstore.trustroot.v1.SigningConfigB\x03\xe0\x41\x02*N\n\x0fServiceSelector\x12\x1e\n\x1aSERVICE_SELECTOR_UNDEFINED\x10\x00\x12\x07\n\x03\x41LL\x10\x01\x12\x07\n\x03\x41NY\x10\x02\x12\t\n\x05\x45XACT\x10\x03\x42\x88\x01\n\x1f\x64\x65v.sigstore.proto.trustroot.v1B\x0eTrustRootProtoP\x01Z9github.com/sigstore/protobuf-specs/gen/pb-go/trustroot/v1\xea\x02\x17Sigstore::TrustRoot::V1b\x06proto3"
11
+ descriptor_data = "\n\x18sigstore_trustroot.proto\x12\x19\x64\x65v.sigstore.trustroot.v1\x1a\x1fgoogle/api/field_behavior.proto\x1a\x15sigstore_common.proto\"\x9c\x02\n\x17TransparencyLogInstance\x12\x10\n\x08\x62\x61se_url\x18\x01 \x01(\t\x12=\n\x0ehash_algorithm\x18\x02 \x01(\x0e\x32%.dev.sigstore.common.v1.HashAlgorithm\x12\x35\n\npublic_key\x18\x03 \x01(\x0b\x32!.dev.sigstore.common.v1.PublicKey\x12-\n\x06log_id\x18\x04 \x01(\x0b\x32\x1d.dev.sigstore.common.v1.LogId\x12\x38\n\x11\x63heckpoint_key_id\x18\x05 \x01(\x0b\x32\x1d.dev.sigstore.common.v1.LogId\x12\x10\n\x08operator\x18\x06 \x01(\t\"\xe9\x01\n\x14\x43\x65rtificateAuthority\x12:\n\x07subject\x18\x01 \x01(\x0b\x32).dev.sigstore.common.v1.DistinguishedName\x12\x0b\n\x03uri\x18\x02 \x01(\t\x12@\n\ncert_chain\x18\x03 \x01(\x0b\x32,.dev.sigstore.common.v1.X509CertificateChain\x12\x34\n\tvalid_for\x18\x04 \x01(\x0b\x32!.dev.sigstore.common.v1.TimeRange\x12\x10\n\x08operator\x18\x05 \x01(\t\"\xca\x02\n\x0bTrustedRoot\x12\x12\n\nmedia_type\x18\x01 \x01(\t\x12\x41\n\x05tlogs\x18\x02 \x03(\x0b\x32\x32.dev.sigstore.trustroot.v1.TransparencyLogInstance\x12P\n\x17\x63\x65rtificate_authorities\x18\x03 \x03(\x0b\x32/.dev.sigstore.trustroot.v1.CertificateAuthority\x12\x42\n\x06\x63tlogs\x18\x04 \x03(\x0b\x32\x32.dev.sigstore.trustroot.v1.TransparencyLogInstance\x12N\n\x15timestamp_authorities\x18\x05 \x03(\x0b\x32/.dev.sigstore.trustroot.v1.CertificateAuthority\"\x99\x03\n\rSigningConfig\x12\x12\n\nmedia_type\x18\x05 \x01(\t\x12\x33\n\x07\x63\x61_urls\x18\x06 \x03(\x0b\x32\".dev.sigstore.trustroot.v1.Service\x12\x35\n\toidc_urls\x18\x07 \x03(\x0b\x32\".dev.sigstore.trustroot.v1.Service\x12;\n\x0frekor_tlog_urls\x18\x08 \x03(\x0b\x32\".dev.sigstore.trustroot.v1.Service\x12J\n\x11rekor_tlog_config\x18\t \x01(\x0b\x32/.dev.sigstore.trustroot.v1.ServiceConfiguration\x12\x34\n\x08tsa_urls\x18\n \x03(\x0b\x32\".dev.sigstore.trustroot.v1.Service\x12\x43\n\ntsa_config\x18\x0b \x01(\x0b\x32/.dev.sigstore.trustroot.v1.ServiceConfigurationJ\x04\x08\x01\x10\x05\"y\n\x07Service\x12\x0b\n\x03url\x18\x01 \x01(\t\x12\x19\n\x11major_api_version\x18\x02 \x01(\r\x12\x34\n\tvalid_for\x18\x03 \x01(\x0b\x32!.dev.sigstore.common.v1.TimeRange\x12\x10\n\x08operator\x18\x04 \x01(\t\"c\n\x14ServiceConfiguration\x12<\n\x08selector\x18\x01 \x01(\x0e\x32*.dev.sigstore.trustroot.v1.ServiceSelector\x12\r\n\x05\x63ount\x18\x02 \x01(\r\"\xb1\x01\n\x11\x43lientTrustConfig\x12\x12\n\nmedia_type\x18\x01 \x01(\t\x12\x41\n\x0ctrusted_root\x18\x02 \x01(\x0b\x32&.dev.sigstore.trustroot.v1.TrustedRootB\x03\xe0\x41\x02\x12\x45\n\x0esigning_config\x18\x03 \x01(\x0b\x32(.dev.sigstore.trustroot.v1.SigningConfigB\x03\xe0\x41\x02*N\n\x0fServiceSelector\x12\x1e\n\x1aSERVICE_SELECTOR_UNDEFINED\x10\x00\x12\x07\n\x03\x41LL\x10\x01\x12\x07\n\x03\x41NY\x10\x02\x12\t\n\x05\x45XACT\x10\x03\x42\x88\x01\n\x1f\x64\x65v.sigstore.proto.trustroot.v1B\x0eTrustRootProtoP\x01Z9github.com/sigstore/protobuf-specs/gen/pb-go/trustroot/v1\xea\x02\x17Sigstore::TrustRoot::V1b\x06proto3"
12
12
 
13
13
  pool = Google::Protobuf::DescriptorPool.generated_pool
14
14
  pool.add_serialized_file(descriptor_data)
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: sigstore_protobuf_specs
3
3
  version: !ruby/object:Gem::Version
4
- version: 0.4.2
4
+ version: 0.5.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Sigstore Authors
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2025-05-16 00:00:00.000000000 Z
11
+ date: 2025-07-10 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: google-protobuf
@@ -55,6 +55,10 @@ files:
55
55
  - README.md
56
56
  - lib/envelope_pb.rb
57
57
  - lib/events_pb.rb
58
+ - lib/rekor/v2/dsse_pb.rb
59
+ - lib/rekor/v2/entry_pb.rb
60
+ - lib/rekor/v2/hashedrekord_pb.rb
61
+ - lib/rekor/v2/verifier_pb.rb
58
62
  - lib/sigstore_bundle_pb.rb
59
63
  - lib/sigstore_common_pb.rb
60
64
  - lib/sigstore_protobuf_specs.rb