Skip to content
This repository has been archived by the owner on Oct 11, 2024. It is now read-only.

Releases: google/keytransparency

Google Cloud Spanner in GKE

03 Jul 12:49
74d4671
Compare
Choose a tag to compare

Key Transparency now works with Google Cloud Spanner on GKE

Observed performance on a small scale load test of 3M fake users:

  • 50 QPS of Key Updates

Google Cloud SQL in GKE

29 Apr 14:17
634ac72
Compare
Choose a tag to compare

Bux Fixes:

  • Removes a dependency on Trillian

Google Cloud SQL in GKE

29 Apr 11:10
88a5359
Compare
Choose a tag to compare

This release supports Google Cloud MySQL on Google Kubernetes Engine (GKE).

Changelog

  • Support Kubernetes Egress with Managed TLS Certificates
    • Liveness and Readiness probes
    • Serve health checks over HTTP2
  • Support for Google Cloud MySQL
  • Support for IPv6
  • Integration tests for Kubernetes and Docker Compose
  • Update dependencies
  • Update documentation

Google Cloud SQL in GKE

10 Mar 10:56
5e555fd
Compare
Choose a tag to compare

This release supports Google Cloud MySQL on Google Kubernetes Engine (GKE).

Changelog

  • Support Kubernetes Egress with Managed TLS Certificates
    • Liveness and Readiness probes
    • Serve health checks over HTTP2
  • Support for Google Cloud MySQL
  • Support for IPv6
  • Integration tests for Kubernetes and Docker Compose
  • Update dependencies
  • Update documentation

Commits

5e555fd New Design Doc (#1469)
3bb1289 Acknowledgements (#1490)
c6ef70f Use cases (#1489)
2747f89 Bump github.com/prometheus/client_golang from 1.4.1 to 1.5.0 (#1486)
98eada6 README.md # Related (#1485)
5c77bf8 Explain authorized keys (#1484)
227f113 Use new prometheus sidecar deployment (#1483)
260f9dc don't overwrite the ReplicaSet service label (#1482)
b14c3eb Update encrypted creds (#1481)
9ea84e6 Pickup DB_HOST env variable (#1480)
c870922 Fix credential encryption (#1479)
28fc8fd Use Cloud MySQL in GKE (#1473)
fdba48b Update client_secrets.json.enc (#1478)
8011388 Bump github.com/golang/mock from 1.4.0 to 1.4.1 (#1477)
ba1c7e0 Refactor: Move kustomize set image to it's own script (#1475)
843f369 Remove old key generation scripts (#1447)
299594e Bump github.com/spf13/cobra from 0.0.5 to 0.0.6 (#1470)
1ca14a6 Bump github.com/google/tink from 1.3.0-rc3 to 1.3.0-rc4 (#1471)
3a7cbeb Bump github.com/go-sql-driver/mysql from 1.4.1 to 1.5.0 (#1458)
8d37aca Remove dependency on kr/pretty (#1467)
7f8264c Avoid race condition in election test (#1460)
668a377 (origin/fix) Set tags for init and prometheus docker images (#1468)
cd0b76c go mod tidy (#1466)
557aa84 (origin/master, origin/HEAD) Bump github.com/grpc-ecosystem/go-grpc-middleware from 1.1.0 to 1.2.0 (#1463)
e8b6eba Bump github.com/golang/protobuf from 1.3.2 to 1.3.3 (#1456)
a6b9061 Bump github.com/prometheus/client_golang from 1.2.1 to 1.4.1 (#1457)
b821681 Bump github.com/golang/mock from 1.3.1 to 1.4.0 (#1455)
170bf26 Use a real public key in the example (#1454)
2de5509 Explain directories (#1451)
3b442e2 Use fake authentication in example (#1452)
abd6967 ForceMaster election library (#1453)
128f290 GO111MODULE install directions (#1450)
a9b296f Use sandbox.keytransparency.dev as example server (#1449)
57ba06e Use K8 ingress for TLS termination (#1443)
ab27b74 Portable docker images cleanup script (#1445)
50329f2 Split kt-secrets into kt-tls and kt-monitor (#1444)
69dad1c Serve HTTP2 health check (#1442)
d8831a2 Remove objecthash dependency (#1441)
ad57ca8 Add ipv6 localhost address to self-signed-cert (#1436)
b53823d set fresh TRAVIS_COMMIT (#1438)
ac3b6cf Don't double encrypt (#1439)
c0be697 Use linux date format (#1437)
ef79a0a Use cmux (#1435)
9b523b6 Explicitly block until server exit
3e17ef5 return error in listern
6c71826 go runSequencer
bc37ddd Serve HTTP2
2c8e035 Move TLS setup to listener
447bea1 rename addr
2bcb5e8 Finish comment
f3c2337 Keep glog.Exit in main.go
a428f0c Move listen to serverutil
d7ee542 Use errgroup to lauch listeners
66e1675 Update heathz paths
da38eb4 ServeHTTPMetrics on a separate port
c99a25e TODO for picking a trillian release image
d07737a travis docker swarm init
be3f4f6 Fix wait scripts
eac808e Removed unused restart param
f022cd0 attachable network
9f25373 Move init to deploy script
387e169 move build defs to dev compose file
2dd8e99 Update wait-for invocation
55bc23f Remove prometheus-to-sd
ec244a9 Use docker-stack-wait
d6471a8 docker-stack-wait.sh
7a0177d docker stack deploy
e48c257 Remove deprecated container_name option
f7c27c5 Less flakey codecov (#1421)
93eafc9 Cleanup old docker images (#1430)
68e4b31 Fix Docker HEALTHCHECK (#1427)
ceecf10 Fix scripts to not depend on KT being in $GOPATH (#1428)
610bdd3 Fix permissions on Prometheus config files (#1429)
926eef1 Setup liveness and readiness k8 probes (#1418)
214c0cf Remove kompose k8 cruft (#1425)
5c733f7 Turn on monitor integration tests (#1423)
2559372 Copy backoff module from Trillian (#1424)
850d311 Set TRAVIS_COMMIT if unset (#1422)
e5421fb Test against fresh builds (#1420)

Performance Improvement

08 Jan 02:00
8d1ee7a
Compare
Choose a tag to compare
Pre-release

This revision contains a variety of performance tweaks:
PublishRevisions: 4s -> 1s

Technical changes:

  • PublishRevisions usesAddSequencedLeaves to publish map revisions in a batch.

Retriable Revisions

14 Dec 11:23
36160ee
Compare
Choose a tag to compare
Retriable Revisions Pre-release
Pre-release

This release allows the Key Transparency sequencer to safely crash at any point.

The process of creating a new revision has been broken into discrete steps, each of which are check pointed to storage and will be retried if a failure occurs.

https://github.com/google/keytransparency/milestone/17
https://github.com/google/keytransparency/projects/3