You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Assign all deployed logs ("dev1", "dev2", and "shard1") a distinct OID
from the space on Cloudflare's PEN allocated for MTC experiments. Also,
use a distinct OID for the cosigner for each log. (Each has its own
secret key.)
This is a breaking change that will require a migration to first delete
all durable object data. The reason is that signatures for existing
artifacts no longer verify:
```
dev2: Initializing log from fetch handler
dev2: Log exists, not creating
▲ [WARNING] dev2 failed to submit timed-out batch: Error: Error: invalid signature for key localhost:8787/logs/dev2+f0b8bc08 - Cause: Error: invalid signature for key localhost:8787/logs/dev2+f0b8bc08
[wrangler:info] POST /logs/dev2/add-entry 503 Service Unavailable (1069ms)
✘ [ERROR] Uncaught invalid signature for key localhost:8787/logs/dev2+f0b8bc08
✘ [ERROR] Uncaught Error: invalid signature for key localhost:8787/logs/dev2+f0b8bc08
```
Alternatively, we could spin down these logs and spin up new ones.
let relative_oid = RelativeOid::from_str(&CONFIG.logs[name].cosigner_id).unwrap();
76
+
TrustAnchorID(relative_oid.as_bytes().to_vec())
77
+
};
67
78
68
-
// Get the BER/DER serialization of the content bytes, as described in <https://datatracker.ietf.org/doc/html/draft-ietf-tls-trust-anchor-ids-01#name-trust-anchor-identifiers>.
69
-
let log_id = TrustAnchorID(log_id_relative_oid.as_bytes().to_vec());
70
-
71
-
// TODO should the CA cosigner have a different ID than the log itself?
72
-
let cosigner_id = log_id.clone();
73
79
let signing_key = load_signing_key(env, name).unwrap().clone();
74
80
75
-
// Make the checkpoint signers from the secret keys and put them in a vec
76
-
let signer = MTCSubtreeCosigner::new(cosigner_id, log_id, origin.clone(), signing_key);
0 commit comments