tuftool is a Rust command-line utility for generating and signing TUF repositories.
Make sure you have the following dependencies present on your system before installing tuftool
:
- OpenSSL: install
libssl-dev
on Ubuntu oropenssl-devel
on Fedora.
To install the latest version of tuftool
:
cargo install --force tuftool
By default, cargo installs binaries to ~/.cargo/bin
, so you will need this in your path. See the cargo book for more about installing Rust binary crates.
The following is an example of how you can create and download a TUF repository using tuftool
.
First, create a working directory:
export WRK="${HOME}/tuftool-example"
mkdir -p "${WRK}"
For production you may want to use a service like AWS KMS, but for this example we will create keys locally as files:
# we will store our root.json in $WRK/root
mkdir "${WRK}/root"
# save the path to the root.json we are about to create, we will use it a lot
export ROOT="${WRK}/root/root.json"
# we will store our signing keys in $WRK/keys
mkdir "${WRK}/keys"
# instantiate a new root.json
tuftool root init "${ROOT}"
# set the root file's expiration date
tuftool root expire "${ROOT}" 'in 6 weeks'
# set the signing threshold for each of the standard signing roles. we are saying
# that each of the following roles must have at least 1 valid signature
tuftool root set-threshold "${ROOT}" root 1
tuftool root set-threshold "${ROOT}" snapshot 1
tuftool root set-threshold "${ROOT}" targets 1
tuftool root set-threshold "${ROOT}" timestamp 1
# create an RSA key and store it as a file. this requires openssl on your system
# this command both creates the key and adds it to root.json for the root role
tuftool root gen-rsa-key "${ROOT}" "${WRK}/keys/root.pem" --role root
# for this example we will re-use the same key for the other standard roles
tuftool root add-key "${ROOT}" -k "${WRK}/keys/root.pem" --role snapshot
tuftool root add-key "${ROOT}" -k "${WRK}/keys/root.pem" --role targets
tuftool root add-key "${ROOT}" -k "${WRK}/keys/root.pem" --role timestamp
# sign root.json
tuftool root sign "${ROOT}" -k "${WRK}/keys/root.pem"
Now that we have a root.json file, we can create and sign a TUF repository.
# create a directory to hold the targets that we will sign. we call this the
# 'input' directory because these are the targets that we want to put into
# our TUF repo
mkdir -p "${WRK}/input"
# create the targets that we want in our TUF repo
echo "1" > "${WRK}/input/1.txt"
echo "2" > "${WRK}/input/2.txt"
# create a tuf repo!
tuftool create \
--root "${ROOT}" \
--key "${WRK}/keys/root.pem" \
--add-targets "${WRK}/input" \
--targets-expires 'in 3 weeks' \
--targets-version 1 \
--snapshot-expires 'in 3 weeks' \
--snapshot-version 1 \
--timestamp-expires 'in 1 week' \
--timestamp-version 1 \
--outdir "${WRK}/tuf-repo"
# you can see our signed repository's metadata here:
ls "${WRK}/tuf-repo/"
# and you can see our signed repository's targets here:
ls "${WRK}/tuf-repo/targets"
### Update TUF Repo
# Change one of the target files
echo "1.1" > "${WRK}/input/1.txt"
# update tuf repo! Version will be automatically calculated, and expiry flags are optional.
# If no expires flag is passed, existing values will be passed on to the new updated version.
# A user may forcefully change the versions by supplying the --force-version flag alongside the <metadata>-version flag.
tuftool update \
--root "${ROOT}" \
--key "${WRK}/keys/root.pem" \
--add-targets "${WRK}/input" \
--targets-expires 'in 3 weeks' \
--snapshot-expires 'in 3 weeks' \
--timestamp-expires 'in 1 week' \
--outdir "${WRK}/tuf-repo" \
--metadata-url file:///$WRK/tuf-repo
#[Optional] Set an RHTAS target (fulcio, ctlog, rekor, tsa)!
touch "${WRK}/input/ctfe.pub"
tuftool rhtas \
--root "${ROOT}" \
--key "${WRK}/keys/root.pem" \
--set-ctlog-target "${WRK}/input/ctfe.pub" \
--ctlog-uri "https://ctfe.sigstore.dev" \
--outdir "${WRK}/tuf-repo" \
--metadata-url file:///$WRK/tuf-repo/
# delete a target: --delete-<target>-target
tuftool rhtas \
--root "${ROOT}" \
--key "${WRK}/keys/root.pem" \
--delete-ctlog-target "ctfe.pub" \
--outdir "${WRK}/tuf-repo" \
--metadata-url file:///$WRK/tuf-repo/
Now that we have created TUF repo, we can inspect it using download command. Download command is usually used to download a remote repo using HTTP/S url, but for this example we will use a file based url to download from local repo.
# download tuf repo
tuftool download \
--root "${WRK}/tuf-repo/root.json" \
-t "file://${WRK}/tuf-repo/targets" \
-m "file://${WRK}/tuf-repo/" \
"${WRK}/tuf-download"
tuftool
respects the HTTPS_PROXY
and NO_PROXY
environment variables.
You can build a simple container image to avoid needing to install the Rust toolchain and dependencies or your local machine.
To build the image use Docker or Finch (same argument syntax, just replace
docker
for finch
):
docker build -t tuftool .
To use tuftool, mount the host working directory to /share
.
For example, to mount the current directory for download
you would do something like:
docker run -it -v $(pwd):/share tuftool download "/share/some_directory" ...
Unit tests are run in the usual manner: cargo test
.
Integration tests require working AWS credentials and are disabled by default behind a feature named integ
.
To run all tests, including integration tests: cargo test --features 'integ'
or AWS_PROFILE=test-profile cargo test --features 'integ'
with specific profile.