A Rust implementation of a Tessera-compatible transparency log server for package distribution systems.
This implementation follows the C2SP tlog-tiles specification and provides an append-only Merkle tree with cryptographic guarantees that all users see the same data.
- Transparency Log Server: Accepts entries, builds a Merkle tree, and publishes signed checkpoints
- Witness Server: Independent co-signing of checkpoints following the tlog-witness specification
- Verifiable Index: Optional key-value index with cryptographic proofs for efficient lookups
- Multiple Storage Backends: S3-compatible storage (Tigris, MinIO) or local filesystem
- Multiple Database Backends: SQLite (with LiteFS for distribution) or PostgreSQL
┌─────────────┐
│ Client │
└──────┬──────┘
│
┌────┼────┐
│ │ │
▼ ▼ ▼
┌──────────┐ ┌─────────┐
│Log Server│ │ Witness │
│ 8080 │ │ 8081 │
└────┬─────┘ └────┬────┘
│ │
└────────────┘
│
▼
┌──────────────────┐
│ SQLite (LiteFS) │
│ or PostgreSQL │
└────────┬─────────┘
│
▼
┌──────────────────┐
│ S3 / Filesystem │
│ (Tile Storage) │
└──────────────────┘
- Rust 1.75+ (install via rustup)
- SQLite 3.x or PostgreSQL 14+
- (Optional) S3-compatible storage for production
# Build all binaries in release mode
cargo build --release
# Binaries will be in ./target/release/
# - siglog (log server)
# - witness (witness server)| Variable | Description | Default |
|---|---|---|
LISTEN_ADDR |
Server listen address | 0.0.0.0:8080 |
DATABASE_URL |
Database connection string | sqlite:./siglog.db |
LOG_ORIGIN |
Log origin identifier | transparency-log |
LOG_PRIVATE_KEY |
Ed25519 signing key (note format) | Required |
STORAGE_BACKEND |
Storage type: s3 or fs |
fs |
STORAGE_PATH |
Filesystem storage path | ./tiles |
S3_BUCKET |
S3 bucket name | - |
S3_ACCESS_KEY |
S3 access key | - |
S3_SECRET_KEY |
S3 secret key | - |
S3_ENDPOINT |
S3 endpoint URL | - |
S3_REGION |
S3 region | auto |
CHECKPOINT_INTERVAL |
Checkpoint frequency (seconds) | 5 |
BATCH_MAX_SIZE |
Max entries per batch | 256 |
BATCH_MAX_AGE_MS |
Max batch age (ms) | 2000 |
VINDEX_ENABLED |
Enable verifiable index | false |
VINDEX_KEY_FIELD |
JSON field for key extraction | name |
| Variable | Description | Default |
|---|---|---|
LISTEN_ADDR |
Server listen address | 0.0.0.0:8081 |
DATABASE_URL |
Database connection string | sqlite:./witness.db |
WITNESS_PRIVATE_KEY |
Ed25519 signing key (note format) | Required |
WITNESS_LOGS |
Logs to witness (format: origin=vkey) |
Required |
Keys use the note signature format:
# Private key format:
PRIVATE+KEY+<name>+<key_id>+<base64_seed>
# Public key (verification key) format:
<name>+<key_id>+<base64_pubkey>
# Example:
PRIVATE+KEY+example.com/log+a1b2c3d4+SGVsbG8gV29ybGQh...
example.com/log+a1b2c3d4+SGVsbG8gV29ybGQh...
Generate a new keypair:
#!/usr/bin/env python3
import base64
import hashlib
from cryptography.hazmat.primitives.asymmetric.ed25519 import Ed25519PrivateKey
name = "example.com/log"
private_key = Ed25519PrivateKey.generate()
public_key = private_key.public_key()
seed = private_key.private_bytes_raw()
pub_bytes = public_key.public_bytes_raw()
# Key ID is first 4 bytes of SHA256(name || 0x0a || 0x01 || pubkey)
h = hashlib.sha256(name.encode() + b"\n\x01" + pub_bytes).digest()
key_id = base64.b64encode(h[:4]).decode().rstrip("=")
private_note = f"PRIVATE+KEY+{name}+{key_id}+{base64.b64encode(b'\\x01' + seed).decode()}"
public_note = f"{name}+{key_id}+{base64.b64encode(b'\\x01' + pub_bytes).decode()}"
print(f"Private: {private_note}")
print(f"Public: {public_note}")The easiest way to run locally is with Docker Compose:
# Generate keys and create .env file
python scripts/setup_local.py
# Build and start services
docker compose build
docker compose upThis starts:
- Log server on
http://localhost:8080 - Witness server on
http://localhost:8081
# Start the log server
export LOG_ORIGIN="my-transparency-log"
export LOG_PRIVATE_KEY="PRIVATE+KEY+my-transparency-log+xxxx+..."
export DATABASE_URL="sqlite:./siglog.db"
export STORAGE_BACKEND="fs"
export STORAGE_PATH="./tiles"
./target/release/siglog
# In another terminal, start the witness
export WITNESS_PRIVATE_KEY="PRIVATE+KEY+witness.example.com+xxxx+..."
export WITNESS_LOGS="my-transparency-log=my-transparency-log+xxxx+..."
export DATABASE_URL="sqlite:./witness.db"
./target/release/witnessA witness independently verifies and co-signs transparency log checkpoints. Running a witness helps ensure the log operator cannot present different views to different users.
./target/release/witness \
--database-url sqlite:./witness.db \
--private-key "PRIVATE+KEY+witness.example.com+xxxx+base64..." \
--log "log.example.com=log.example.com+yyyy+base64pubkey..." \
--listen 0.0.0.0:8081| Endpoint | Method | Description |
|---|---|---|
/add-checkpoint |
POST | Submit a checkpoint for co-signing |
/health |
GET | Health check |
Request body:
{
"checkpoint": "log.example.com\n123\nROOTHASH...\n\n- log.example.com SIGNATURE...",
"proof": ["HASH1...", "HASH2..."],
"old_size": 100
}Response (on success): The witness's cosignature line.
| Endpoint | Method | Description |
|---|---|---|
/add |
POST | Add a new entry to the log |
/checkpoint |
GET | Get the latest signed checkpoint |
/tile/{level}/{index} |
GET | Get a Merkle tree tile |
/tile/entries/{index} |
GET | Get an entry bundle |
/health |
GET | Health check |
curl -X POST http://localhost:8080/add \
-H "Content-Type: application/json" \
-d '{"name": "my-package", "version": "1.0.0", "sha256": "abc123..."}'curl http://localhost:8080/checkpointResponse:
my-transparency-log
42
Ynl0ZXMgb2YgdGhlIHJvb3QgaGFzaA==
— my-transparency-log Ab1CdEf...
# Get tile at level 0, index 0
curl http://localhost:8080/tile/0/000# Get entry bundle at index 0 (entries 0-255)
curl http://localhost:8080/tile/entries/000See DEPLOY.md for detailed Fly.io deployment instructions using LiteFS and Tigris.
Quick start:
# Create app and storage
fly apps create my-siglog
fly storage create
fly consul attach
fly volumes create litefs --size 1
# Set secrets
fly secrets set LOG_PRIVATE_KEY="PRIVATE+KEY+..."
fly secrets set S3_ACCESS_KEY="..." S3_SECRET_KEY="..." S3_BUCKET="..."
# Deploy
fly deployPre-built images are available from GitHub Container Registry:
# Log server (replace OWNER/REPO with your GitHub repository)
docker pull ghcr.io/OWNER/REPO-server:latest
# Witness
docker pull ghcr.io/OWNER/REPO-witness:latestRun the log server:
docker run -d \
-p 8080:8080 \
-v siglog-data:/data \
-e LOG_ORIGIN="my-transparency-log" \
-e LOG_PRIVATE_KEY="PRIVATE+KEY+..." \
ghcr.io/OWNER/REPO-server:latestRun the witness:
docker run -d \
-p 8081:8081 \
-v witness-data:/data \
-e WITNESS_PRIVATE_KEY="PRIVATE+KEY+..." \
-e WITNESS_LOGS="my-transparency-log=my-transparency-log+xxxx+..." \
ghcr.io/OWNER/REPO-witness:latestTo build images locally:
docker build -f docker/Dockerfile.server -t siglog-server .
docker build -f docker/Dockerfile.witness -t siglog-witness .Example deployment manifest:
apiVersion: apps/v1
kind: Deployment
metadata:
name: transparency-log
spec:
replicas: 1
selector:
matchLabels:
app: transparency-log
template:
metadata:
labels:
app: transparency-log
spec:
containers:
- name: log
image: your-registry/siglog:latest
ports:
- containerPort: 8080
env:
- name: LOG_ORIGIN
value: "your-log.example.com"
- name: LOG_PRIVATE_KEY
valueFrom:
secretKeyRef:
name: siglog-secrets
key: log-private-key
- name: DATABASE_URL
value: "postgres://user:pass@postgres:5432/siglog"
- name: STORAGE_BACKEND
value: "s3"
envFrom:
- secretRef:
name: s3-credentialsClients can verify entries against the transparency log:
- Fetch the latest checkpoint
- Verify the checkpoint signature
- Verify any witness cosignatures
- For a specific entry, fetch the inclusion proof
- Verify the proof against the checkpoint root hash
BSD-3-Clause. See LICENSE for details.