immudb-release-0-8

Release v0.8.0 – atomic multi-key operations, cryptographic root signing and new SDKs

The release sets the basis to support complex use cases with an enhanced security model:

  • Atomic multi-key insertion: all entries are applied or none. Built-in atomicity provides the support needed to deal with multiple entities or complex entities mapped into several keys.
  • Cryptographic root signing: this feature is now incorporated into the state update protocol to guarantee any single client or auditor is able to irrefutable demonstrate any tampering.
  • Updated Java SDK immudb4j with step-by-step guides and running samples
  • All new SDKs for Python immudb-py, Node.js immudb-node, .net immudb4dotnet

Thanks again to the community for great feedback, real-life testing and confirming our performance tests.

Changelog

[v0.8.0] – 2020-09-15

Bug Fixes

  • fix immudb and immugw version and mangen commands errors Without this change, while immuclient and immuadmin still worked as expected, immudb and immugw version and mangen commands were throwing the following error: ./immugw version Error: flag accessed but not defined: config Usage: immugw version [flags]
  • fix immuclient audit-mode
  • cmd/immuadmin/command: fix immuadmin dbswitch
  • pkg/client: setBatch creates structured values
  • pkg/client: token service manages old token format

Changes

  • update README file (#487)
  • switching README.md end lines to LF
  • fix immugw dependency to support new root structure
  • update readme, add immudb4j news (#488)
  • cmd: add signingKey flag
  • cmd: remove error suppression in config loader
  • cmd/immutest/command: remove immugw dependency from immutest
  • pkg: add kvlist validator (#498)
  • pkg/server: log uuid set and get error
  • pkg/server: log signer initialization in immudb start

Code Refactoring

  • wrap root hash and index in a new structure to support signature
  • move immugw in a separate repository
  • configs file are loaded in viper preRun method
  • pkg/server: inject root signer service inside immudb server

Features

  • auditor verifies root signature
  • cmd: process launcher check if are present another istances. fixes #168
  • pkg: add root signer service
  • pkg/signer: add ecdsa signer

Downloads

Docker image
https://hub.docker.com/r/codenotary/immudb

Immudb Binaries

File SHA256
immudb-v0.8.0-darwin-amd64 4a1e251237f8b51f22015d4e657d7ee5065da6cf8c0c44b6de2c6daf63cce9d2
immudb-v0.8.0-linux-amd64 4d7639117fcd68949c0a12b0430112d066c1299ef22a409b2fb6e4065bb289b7
immudb-v0.8.0-linux-amd64-static c72a6449d670be24d6233fe80e5e262925d1ebacc887269309f0fe4f34a616d4
immudb-v0.8.0-linux-s390x 9b1b795f7127a20ce94c1aeaf444ef8b6e5438fd623854cb18b6447c77b40c57
immudb-v0.8.0-windows-amd64.exe 74d2000fe3ceea9b78dda45304e4b18070c51218f1d0e593335d67ac3a28d249

Immuclient Binaries

File SHA256
immuclient-v0.8.0-darwin-amd64 ba54d3c2fcca4ac12ca4f26e9e6b84e40f5ecd727e2c9a09018495b724faa28a
immuclient-v0.8.0-linux-amd64 0cdd0ec9fe85c411745f37c668c3ccbbeb56dcaa0064cb972f46f2159861950f
immuclient-v0.8.0-linux-amd64-static b5fe457535b988077d20ff9bf8ae0df00bcd2b6ec74f3ebffbb79c0165493b16
immuclient-v0.8.0-linux-s390x bd6f0e724154c208f5e84e44381b77c17baec6892baa7729ddb889b26715e878
immuclient-v0.8.0-windows-amd64.exe 1a0346d19bfc17f4c117d0e763a5a38a886c420a89149c8749e077e3319c9aeb

Immuadmin Binaries

File SHA256
immuadmin-v0.8.0-darwin-amd64 e85c9a5c7b2394383bcefd73a392a9ae6b4c96868adcb57715a0e76775b0cc37
immuadmin-v0.8.0-linux-amd64 dac4af24f9c3fce9cd9da755c9abf45a37a2ebde5d732a5599f84eb8d0f1c183
immuadmin-v0.8.0-linux-amd64-static 443803e46aedba428c21108e567a9481ff7e6b269d6d1b0037f59c507326a53e
immuadmin-v0.8.0-linux-s390x 1f713d269986a67abcb9aa74b4f310f467de026faac17976af5450f1dec2b7de
immuadmin-v0.8.0-windows-amd64.exe dd2f32c2b490156814a826e8f3c90ff0290a793427af0f2cbee5b8745f71f162

CNIL Metrics & Logs

Self-Hosted performance monitoring and compliant log analysis for VMware vSphere, container and much more.

immudb

Built on the fastest immutable ledger technology. Open Source and easy to use and integrate into existing application.

Codenotary Cloud

Trusted CI/CD, SBOM and artifact
protection with cryptographic proof.
One CLI to manage all.

MOST POPULAR

Sorry. No data so far.

Subscribe to Our Newsletter

Get the latest product updates, company news, and special offers delivered right to your inbox.

Subscribe to our newsletter

Use Case - Tamper-resistant Clinical Trials

Goal:

Blockchain PoCs were unsuccessful due to complexity and lack of developers.

Still the goal of data immutability as well as client verification is a crucial. Furthermore, the system needs to be easy to use and operate (allowing backup, maintenance windows aso.).

Implementation:

immudb is running in different datacenters across the globe. All clinical trial information is stored in immudb either as transactions or the pdf documents as a whole.

Having that single source of truth with versioned, timestamped, and cryptographically verifiable records, enables a whole new way of transparency and trust.

Use Case - Finance

Goal:

Store the source data, the decision and the rule base for financial support from governments timestamped, verifiable.

A very important functionality is the ability to compare the historic decision (based on the past rulebase) with the rulebase at a different date. Fully cryptographic verifiable Time Travel queries are required to be able to achieve that comparison.

Implementation:

While the source data, rulebase and the documented decision are stored in verifiable Blobs in immudb, the transaction is stored using the relational layer of immudb.

That allows the use of immudb’s time travel capabilities to retrieve verified historic data and recalculate with the most recent rulebase.

Use Case - eCommerce and NFT marketplace

Goal:

No matter if it’s an eCommerce platform or NFT marketplace, the goals are similar:

  • High amount of transactions (potentially millions a second)
  • Ability to read and write multiple records within one transaction
  • prevent overwrite or updates on transactions
  • comply with regulations (PCI, GDPR, …)


Implementation:

immudb is typically scaled out using Hyperscaler (i. e. AWS, Google Cloud, Microsoft Azure) distributed across the Globe. Auditors are also distributed to track the verification proof over time. Additionally, the shop or marketplace applications store immudb cryptographic state information. That high level of integrity and tamper-evidence while maintaining a very high transaction speed is key for companies to chose immudb.

Use Case - IoT Sensor Data

Goal:

IoT sensor data received by devices collecting environment data needs to be stored locally in a cryptographically verifiable manner until the data is transferred to a central datacenter. The data integrity needs to be verifiable at any given point in time and while in transit.

Implementation:

immudb runs embedded on the IoT device itself and is consistently audited by external probes. The data transfer to audit is minimal and works even with minimum bandwidth and unreliable connections.

Whenever the IoT devices are connected to a high bandwidth, the data transfer happens to a data center (large immudb deployment) and the source and destination date integrity is fully verified.

Use Case - DevOps Evidence

Goal:

CI/CD and application build logs need to be stored auditable and tamper-evident.
A very high Performance is required as the system should not slow down any build process.
Scalability is key as billions of artifacts are expected within the next years.
Next to a possibility of integrity validation, data needs to be retrievable by pipeline job id or digital asset checksum.

Implementation:

As part of the CI/CD audit functionality, data is stored within immudb using the Key/Value functionality. Key is either the CI/CD job id (i. e. Jenkins or GitLab) or the checksum of the resulting build or container image.

White Paper — Registration

We will also send you the research paper
via email.

CodeNotary — Webinar

White Paper — Registration

Please let us know where we can send the whitepaper on CodeNotary Trusted Software Supply Chain. 

Become a partner

Start Your Trial

Please enter contact information to receive an email with the virtual appliance download instructions.

Start Free Trial

Please enter contact information to receive an email with the free trial details.