-
-
Notifications
You must be signed in to change notification settings - Fork 14.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[22.05] cosign: 1.8.0 -> 1.12.0 #191885
[22.05] cosign: 1.8.0 -> 1.12.0 #191885
Conversation
Hmm build fails for me on macos 10.15 as it does in ofborg |
AFAIK it is related to the SDK version we have on 22.05 #168984 (comment) |
Not sure what to do here: maybe provide 1.8.0 with the patch proposed in #187071 for macOS with the knownVulnerabilities flag and provide 1.12.0 for everyone else? |
How critical is using go 1.18? |
Go 1.18 works on x86 darwin upstream because it uses the |
The package cannot be built without it because it has dependencies requiring Go 1.18. Since they have bumped to Go 1.18 (sigstore/cosign#2059) the number of deps requiring it has increased so trying to make it build with Go 1.17 will not be easy. |
I opened #194145 to backport the 11.0 SDK changes to x86_64-darwin. |
@ofborg build cosign |
Release notes: https://github.com/sigstore/cosign/releases/tag/v1.9.0 (cherry picked from commit 85ac5d8)
`cosigned` is no more part of the cosign repository and it has been moved into a `sigstore/policy-controller` repository. A new package should probably be created to replace it. https://github.com/sigstore/cosign/releases/tag/v1.10.0 (cherry picked from commit 595932c)
https://github.com/sigstore/cosign/releases/tag/v1.10.1 Includes a fix for CVE-2022-35929 GHSA-vjxv-45g9-9296 (cherry picked from commit 958dd9a)
(cherry picked from commit c7f4385)
https://github.com/sigstore/cosign/releases/tag/v1.11.1 (cherry picked from commit f9cd86e)
(cherry picked from commit f535732)
97e2ec1
to
fde3553
Compare
I rebased the contribution to make it easier to test since the change for darwin has been backported |
@ofborg build cosign |
Well done everyone, we got there. |
Description of changes
Those upgrades include the fixes for CVE-2022-35929 and CVE-2022-36056.
The patches are too big/complex to be backported without troubles (see discussion in #187071).
https://github.com/sigstore/cosign/blob/ff18e6639526c2442d5cba25cc7522c649c03652/CHANGELOG.md
Things done
sandbox = true
set innix.conf
? (See Nix manual)nix-shell -p nixpkgs-review --run "nixpkgs-review rev HEAD"
. Note: all changes have to be committed, also see nixpkgs-review usage./result/bin/
)nixos/doc/manual/md-to-db.sh
to update generated release notes