Registry
A Simple set of Golang AWS Lambdas and supporting infrastructure definitions to act as a simple, stateless registry that sits on top of github repositories.
This repository and code is meant to be temporary and is not intended for long term usage.
Table of Contents
Registering public keys
This section describes how to register public keys for the providers and is intended for authors of providers who want the users of their providers to be able to verify the authenticity of the provider binaries.
Adding a public key
All keys are stored in the src/internal/providers/keys
directory. That directory contains subdirectories, each of which is named after the GitHub namespace (username or organization name) that hosts one or more providers.
Inside that directory are one or more ASCII-armored public key files. The names of the files are not relevant to the registry code, but it is recommended that they have a .asc
extension. It may also be a good idea to name the files using the registration date to make it easier for the reader to determine which key is the most recent. The contents of the file should be the ASCII-armored public key for the namespace.
When the user requests any provider in a given namespace, the registry will return all the registered public keys for that namespace. The user can then use these keys to verify the signature of the provider binary.
Removing a public key
It is possible to remove a public key from the registry. To do so, simply delete the corresponding file from the lambda/internal/provider/keys
directory. The next time the registry is deployed, the key will no longer be available.
This will however have an impact on the users of the provider, which will no longer be able to verify the authenticity of the provider binaries. In case of a leak it is thus recommended to re-sign all the provider binaries with a new key, and to register the new key in the registry.
Contributing to the project
** NOTE **: This project is still in development and is not yet accepting contributions. Please check back later.
Requirements
- Go: The AWS Lambda function is written in Go. Ensure you have Go installed.
- Terraform: This project uses Terraform for infrastructure management. Make sure to have Terraform installed.
- AWS CLI: Ensure that the AWS CLI is installed and configured with the necessary permissions.
Setup
-
Clone the Repository:
git clone <repository_url> cd <repository_name>
-
Set Up Go: Navigate to the
src
directory and download the required Go modules.cd src go mod download
-
Initialize Terraform: From the root of the project:
terraform init
Terraform Variables Configuration
Before deploying the infrastructure, ensure you've set the required Terraform variables:
-
github_api_token
: Personal Access Token (PAT) from GitHub, required for interactions with the GitHub API. Create a GitHub PAT if you don't have one, it should havepublic_repo, read:packages
access -
route53_zone_id
: a Route 53 hosted zone pre-configured with NS records pointing to a valid registered domain, e.g., "Z008B5091482A026MN9AUQ" -
domain_name
: The domain name you wish to manage. This should match or be a subdomain of theroute53_zone_name
.
To provide values for these variables:
-
Use the
-var
flag duringterraform apply
, e.g.,terraform apply -var="github_api_token=YOUR_TOKEN"
. -
Or, populate a
terraform.tfvars
file in the repository root:github_api_token = "YOUR_GITHUB_API_TOKEN" route53_zone_id = "Z008ABCDEF482A026MN9AUQ" domain_name = "sub.example.com"
Important: Never commit sensitive data, especially the github_api_token
, to your repository. Ensure secrets are managed securely.
Deployment
-
Setting Up AWS Credentials: Ensure your AWS credentials are properly set up, either by using the
aws configure
command or by setting the necessary environment variables. -
Terraform Commands: From the root of the project:
a. Planning:
terraform plan
b. Deploying Infrastructure and Lambda:
terraform apply
Note: When you run terraform apply
, Terraform will take care of building the Lambda function from the Go source code and deploying it to AWS.
DNS Configuration
After successfully applying the Terraform configuration, you will receive an output containing four nameservers. These nameservers are associated with the AWS Route 53 DNS settings for your service.
To complete the setup, you need to configure a subdomain to use these four nameservers. Update your domain provider's DNS settings to point the subdomain to these nameservers.
Ensure that you update the DNS settings in your domain provider's dashboard to use these nameservers for the relevant subdomain.
API Routes and Curl Usage
This project provides several routes that can be accessed and tested using the curl
command. Here's a brief guide:
-
Download Provider Version:
curl -X GET https://<your_domain>/v1/providers/{namespace}/{type}/{version}/download/{os}/{arch}
-
List Provider Versions:
curl -X GET https://<your_domain>/v1/providers/{namespace}/{type}/versions
-
List Module Versions:
curl -X GET https://<your_domain>/v1/modules/{namespace}/{name}/{system}/versions
-
Download Module Version:
curl -X GET https://<your_domain>/v1/modules/{namespace}/{name}/{system}/{version}/download
-
Terraform Well-Known Metadata:
curl -X GET https://<your_domain>/.well-known/terraform.json
Replace <your_domain>
with the actual domain where your service is hosted. For dynamic parts of the route, such as {namespace}
or {type}
, replace them with appropriate values as per your requirements.
License
This project is licensed under the terms of the LICENSE file.
For any additional queries or issues, please open a new issue in the repository.