-The Notary project comprises a [server](cmd/notary-server) and a [client](cmd/notary) for running and interacting
-with trusted collections. Please see the [service architecture](docs/service_architecture.md) documentation
-for more information.
-
-
-Notary aims to make the internet more secure by making it easy for people to
-publish and verify content. We often rely on TLS to secure our communications
-with a web server which is inherently flawed, as any compromise of the server
-enables malicious content to be substituted for the legitimate content.
-
-With Notary, publishers can sign their content offline using keys kept highly
-secure. Once the publisher is ready to make the content available, they can
-push their signed trusted collection to a Notary Server.
-
-Consumers, having acquired the publisher's public key through a secure channel,
-can then communicate with any notary server or (insecure) mirror, relying
-only on the publisher's key to determine the validity and integrity of the
-received content.
-
-## Goals
-
-Notary is based on [The Update Framework](https://www.theupdateframework.com/), a secure general design for the problem of software distribution and updates. By using TUF, notary achieves a number of key advantages:
-
-* **Survivable Key Compromise**: Content publishers must manage keys in order to sign their content. Signing keys may be compromised or lost so systems must be designed in order to be flexible and recoverable in the case of key compromise. TUF's notion of key roles is utilized to separate responsibilities across a hierarchy of keys such that loss of any particular key (except the root role) by itself is not fatal to the security of the system.
-* **Freshness Guarantees**: Replay attacks are a common problem in designing secure systems, where previously valid payloads are replayed to trick another system. The same problem exists in the software update systems, where old signed can be presented as the most recent. notary makes use of timestamping on publishing so that consumers can know that they are receiving the most up to date content. This is particularly important when dealing with software update where old vulnerable versions could be used to attack users.
-* **Configurable Trust Thresholds**: Oftentimes there are a large number of publishers that are allowed to publish a particular piece of content. For example, open source projects where there are a number of core maintainers. Trust thresholds can be used so that content consumers require a configurable number of signatures on a piece of content in order to trust it. Using thresholds increases security so that loss of individual signing keys doesn't allow publishing of malicious content.
-* **Signing Delegation**: To allow for flexible publishing of trusted collections, a content publisher can delegate part of their collection to another signer. This delegation is represented as signed metadata so that a consumer of the content can verify both the content and the delegation.
-* **Use of Existing Distribution**: Notary's trust guarantees are not tied at all to particular distribution channels from which content is delivered. Therefore, trust can be added to any existing content delivery mechanism.
-* **Untrusted Mirrors and Transport**: All of the notary metadata can be mirrored and distributed via arbitrary channels.
-
-## Security
-
-Please see our [service architecture docs](docs/service_architecture.md#threat-model) for more information about our threat model, which details the varying survivability and severities for key compromise as well as mitigations.
-
-Our last security audit was on July 31, 2015 by NCC ([results](docs/resources/ncc_docker_notary_audit_2015_07_31.pdf)).
-
-Any security vulnerabilities can be reported to security@docker.com.
-
-# Getting started with the Notary CLI
-
-Please get the Notary Client CLI binary from [the official releases page](https://github.com/docker/notary/releases) or you can [build one yourself](#building-notary).
-The version of Notary server and signer should be greater than or equal to Notary CLI's version to ensure feature compatibility (ex: CLI version 0.2, server/signer version >= 0.2), and all official releases are associated with GitHub tags.
-
-To use the Notary CLI with Docker hub images, please have a look at our
-[getting started docs](docs/getting_started.md).
-
-For more advanced usage, please see the
-[advanced usage docs](docs/advanced_usage.md).
-
-To use the CLI against a local Notary server rather than against Docker Hub:
-
-1. Please ensure that you have [docker and docker-compose](http://docs.docker.com/compose/install/) installed.
-1. `git clone https://github.com/docker/notary.git` and from the cloned repository path,
- start up a local Notary server and signer and copy the config file and testing certs to your
- "loaded library %s, but failed to list HSM slots %s", libraryPath, err)
- }
- // Check to see if we got any slots from the HSM.
- if len(slots) < 1 {
- defer finalizeAndDestroy(p)
- return nil, 0, fmt.Errorf(
- "loaded library %s, but no HSM slots found", libraryPath)
- }
-
- // CKF_SERIAL_SESSION: TRUE if cryptographic functions are performed in serial with the application; FALSE if the functions may be performed in parallel with the application.
- // CKF_RW_SESSION: TRUE if the session is read/write; FALSE if the session is read-only
- for id, key := range tgt.Signed.Delegations.Keys {
- var (
- canonID string
- ok bool
- )
- if canonID, ok = tufIDToCanon[id]; !ok {
- canonID, err = utils.CanonicalKeyID(key)
- if err != nil {
- return err
- }
- tufIDToCanon[id] = canonID
- }
- if _, ok := removeIDs[canonID]; ok {
- deleteCandidates = append(deleteCandidates, id)
- }
- }
- if len(deleteCandidates) == 0 {
- // none of the interesting keys were present. We're done with this role
- return nil
- }
- // now we know there are changes, check if we'll be able to sign them in
- if err := tr.VerifyCanSign(validRole.Name); err != nil {
- logrus.Warnf(
- "role %s contains keys being purged but you do not have the necessary keys present to sign it; keys will not be purged from %s or its immediate children",
- validRole.Name,
- validRole.Name,
- )
- return nil
- }
- // we know we can sign in the changes, delete the keys
- for _, id := range deleteCandidates {
- delete(tgt.Signed.Delegations.Keys, id)
- }
- // delete candidate keys from all roles.
- for _, role := range tgt.Signed.Delegations.Roles {
- role.RemoveKeys(deleteCandidates)
- if len(role.KeyIDs) < role.Threshold {
- logrus.Warnf("role %s has fewer keys than its threshold of %d; it will not be usable until keys are added to it", role.Name, role.Threshold)
- }
- }
- tgt.Dirty = true
- return nil
- }
- return tr.WalkTargets("", start, purgeKeys)
-}
-
-// UpdateDelegationPaths updates the appropriate delegation's paths.
-The 4.Evaluation part of the previous reference, starting with 'If the currently referenced value is a JSON array, the reference token MUST contain either...' is not implemented.
-**err.Value()**: *interface{}* Returns the value given
-
-**err.Context()**: *gojsonschema.jsonContext* Returns the context. This has a String() method that will print something like this: (root).firstName
-
-**err.Field()**: *string* Returns the fieldname in the format firstName, or for embedded properties, person.firstName. This returns the same as the String() method on *err.Context()* but removes the (root). prefix.
-
-**err.Description()**: *string* The error description. This is based on the locale you are using. See the beginning of this section for overwriting the locale with a custom implementation.
-
-**err.Details()**: *gojsonschema.ErrorDetails* Returns a map[string]interface{} of additional error details specific to the error. For example, GTE errors will have a "min" value, LTE will have a "max" value. See errors.go for a full description of all the error details. Every error always contains a "field" key that holds the value of *err.Field()*
-
-Note in most cases, the err.Details() will be used to generate replacement strings in your locales. and not used directly i.e.
-```
-%field% must be greater than or equal to %min%
-```
-
-## Formats
-JSON Schema allows for optional "format" property to validate strings against well-known formats. gojsonschema ships with all of the formats defined in the spec that you can use like this: