Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

build(deps): bump github.com/sigstore/sigstore-go from 0.4.0 to 0.5.1 #3983

Merged

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jul 25, 2024

Bumps github.com/sigstore/sigstore-go from 0.4.0 to 0.5.1.

Release notes

Sourced from github.com/sigstore/sigstore-go's releases.

v0.5.1

See release v0.5.0 for a list of breaking changes in v0.5.0.

This minor release is to correct the spelling of the new helper function in pkg/verify/certificate_identity.go, now called NewIssuerMatcher().

v0.5.0

We are continuing to work down items as we move towards a v1.0.0 release. As noted in the v0.4.0 release this includes some minor interface changes as we clean things up and get feedback from people using sigstore-go in different contexts.

Because we are pre-1.0.0 these were made as breaking changes. After 1.0.0 we will provide deprecation notices and smoother migration paths. There may be more minor interface changes between now and v1.0.0.

Breaking Changes

  • In pkg/bundle/verification_content.go:

    • For bundle.Certificate and bundle.PublicKey, HasCertificate() is now called GetCertificate(); only returns *x509.Certificate instead of (x509.Certificate, bool)
  • In pkg/verify/certificate.go:

    • Change NewShortCertificateIdentity() arguments
      • Was: func NewShortCertificateIdentity(issuer, sanValue, sanType, sanRegex string)
      • Now: func NewShortCertificateIdentity(issuer, issuerRegex, sanValue, sanRegex string)
    • Change in NewSANMatcher() arguments
      • Was: func NewSANMatcher(sanValue string, sanType string, regexpStr string)
      • Now: func NewSANMatcher(sanValue string, regexpStr string)
    • Change in NewCertificateIdentity() arguments
      • Was: NewCertificateIdentity(sanMatcher SubjectAlternativeNameMatcher, extensions certificate.Extensions)
      • Now: NewCertificateIdentity(sanMatcher SubjectAlternativeNameMatcher, issuerMatcher IssuerMatcher, extensions certificate.Extensions)
        • func NewIssuserMatcher(issuerValue, regexpStr string) (IssuerMatcher, error) can help you create IssuerMatcher
  • In pkg/verify/signed_entity.go:

    • WithoutAnyObserverTimestampsInsecure() is now WithoutAnyObserverTimestampsUnsafe()

What's Changed

Full Changelog: sigstore/sigstore-go@v0.4.0...v0.5.0

Commits
  • 2b6fc6d NewIssuserMatcher should be NewIssuerMatcher (#244)
  • 17ad99b Update to Go 1.22, bump sigstore and TUF deps (#242)
  • a808341 Add the ability to specify certificate identity via a regular expression (#236)
  • 6034b75 Bump github/codeql-action from 3.25.12 to 3.25.13 (#240)
  • d6eb35a Bump github.com/google/go-containerregistry (#238)
  • 8554eb6 Updates for SAN parsing (#229)
  • fef0ebe Add Policy WithKey() for verifing content you know is signed with a key (#235)
  • e26954b Bump golang.org/x/mod from 0.18.0 to 0.19.0 (#222)
  • dc8ea35 Bump github.com/google/go-containerregistry (#231)
  • b4c38c6 Bump github.com/hashicorp/go-retryablehttp from 0.7.5 to 0.7.7 (#215)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot requested a review from a team as a code owner July 25, 2024 06:21
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Jul 25, 2024
Copy link

Minder Vulnerability Report ✅

Minder analyzed this PR and found no vulnerable dependencies.

Vulnerability scan of 823cf6b1:

  • 🐞 vulnerable packages: 0
  • 🛠 fixes available for: 0

@eleftherias eleftherias self-assigned this Jul 25, 2024
@eleftherias
Copy link
Contributor

@dependabot rebase

Bumps [github.com/sigstore/sigstore-go](https://github.com/sigstore/sigstore-go) from 0.4.0 to 0.5.1.
- [Release notes](https://github.com/sigstore/sigstore-go/releases)
- [Commits](sigstore/sigstore-go@v0.4.0...v0.5.1)

---
updated-dependencies:
- dependency-name: github.com/sigstore/sigstore-go
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/github.com/sigstore/sigstore-go-0.5.1 branch from 823cf6b to 95f5376 Compare July 25, 2024 07:28
Remove check for Type in SubjectAlternativeName. The CA is expected to handle validating that SAN values match their designated types.
@dmjb
Copy link
Contributor

dmjb commented Jul 25, 2024

@dependabot rebase

Copy link
Contributor Author

dependabot bot commented on behalf of github Jul 25, 2024

Looks like this PR has been edited by someone other than Dependabot. That means Dependabot can't rebase it - sorry!

If you're happy for Dependabot to recreate it from scratch, overwriting any edits, you can request @dependabot recreate.

@dmjb dmjb merged commit 4cf4cee into main Jul 25, 2024
19 checks passed
@dmjb dmjb deleted the dependabot/go_modules/github.com/sigstore/sigstore-go-0.5.1 branch July 25, 2024 08:18
@coveralls
Copy link

Coverage Status

coverage: 54.315% (-0.03%) from 54.342%
when pulling a0877ef on dependabot/go_modules/github.com/sigstore/sigstore-go-0.5.1
into 1ceab64 on main.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants