Bump go.opentelemetry.io/otel/sdk from 1.42.0 to 1.43.0 (#1784)
Bumps go.opentelemetry.io/otel/sdk from 1.42.0 to 1.43.0.
updated-dependencies:
- dependency-name: go.opentelemetry.io/otel/sdk dependency-version: 1.43.0 dependency-type: indirect …
Signed-off-by: dependabot[bot] support@github.com Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
版权所有:中国计算机学会技术支持:开源发展技术委员会
京ICP备13000930号-9
京公网安备 11010802032778号
Certificate Transparency: Go Code
This repository holds Go code related to Certificate Transparency (CT). The repository requires Go version 1.24.
Support
Repository Structure
The main parts of the repository are:
asn1/andx509/are forks of the upstream Goencoding/asn1andcrypto/x509libraries. We maintain separate forks of these packages because CT is intended to act as an observatory of certificates across the ecosystem; as such, we need to be able to process somewhat-malformed certificates that the stricter upstream code would (correctly) reject. Ourx509fork also includes code for working with the pre-certificates defined in RFC 6962.tlsholds a library for processing TLS-encoded data as described in RFC 5246.x509util/provides additional utilities for dealing withx509.Certificates.ctpackage (in.) holds types and utilities for working with CT data structures defined in RFC 6962.client/andjsonclient/hold libraries that allow access to CT Logs via HTTP entrypoints described in section 4 of RFC 6962.dnsclient/has a library that allows access to CT Logs over DNS.scanner/holds a library for scanning the entire contents of an existing CT Log.trillian/holds code that allows a Certificate Transparency Log to be run using a Trillian Log as its back-end – see below../client/ctclientallows interaction with a CT Log../ctutil/sctcheckallows SCTs (signed certificate timestamps) from a CT Log to be verified../scanner/scanlogallows an existing CT Log to be scanned for certificates of interest; please be polite when running this tool against a Log../x509util/certcheckallows display and verification of certificates./x509util/crlcheckallows display and verification of certificate revocation lists (CRLs).ctutil/holds utility functions for validating and verifying CT data structures.loglist3/has a library for reading v3 JSON lists of CT Logs.Trillian CT Personality
The
trillian/subdirectory holds code and scripts for running a CT Log based on the Trillian general transparency Log, and is documented separately.Working on the Code
Developers who want to make changes to the codebase need some additional dependencies and tools, described in the following sections.
Running Codebase Checks
The
scripts/presubmit.shscript runs various tools and tests over the codebase; please ensure this script passes before sending pull requests for review.Rebuilding Generated Code
Some of the CT Go code is autogenerated from other files:
.pb.goimplementations.trillian/mockclient) is created with GoMock.fmt.Stringerinterface) created using the stringer tool (go get golang.org/x/tools/cmd/stringer).Re-generating mock or protobuffer files is only needed if you’re changing the original files. The recommended way to do this is by using the Docker image used by the Cloud Build:
These commands first create a docker image from the Dockerfile in this repo, and then launch a container based on this image with the local directory mounted. The correct versions of the tools are determined using the
go.modfile in this repo, and these tools are installed. Finally, all of the generated files are regenerated and Docker exits.Alternatively, you can install the prerequisites locally:
a series of tools, using
go installto ensure that the versions are compatible and tested:protoctool: you’ll need version 3.20.1 installed, andPATHupdated to include itsbin/directory.and run the following: