-
Notifications
You must be signed in to change notification settings - Fork 38
Comparing changes
Open a pull request
base repository: containers/ocicrypt
base: v1.1.9
head repository: containers/ocicrypt
compare: v1.2.0
- 11 commits
- 11 files changed
- 4 contributors
Commits on Nov 13, 2023
-
build(deps): bump github.com/go-jose/go-jose/v3 from v3.0.0 to v3.0.1
To avoid a potential DoS vulnerability in v3.0.0 update to v3.0.1. Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Configuration menu - View commit details
-
Copy full SHA for a24b477 - Browse repository at this point
Copy the full SHA a24b477View commit details
Commits on Dec 28, 2023
-
build(deps): bump golang.org/x/crypto from 0.14.0 to 0.17.0
Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.14.0 to 0.17.0. - [Commits](golang/crypto@v0.14.0...v0.17.0) --- updated-dependencies: - dependency-name: golang.org/x/crypto dependency-type: direct:production ... Signed-off-by: dependabot[bot] <support@github.com>
Configuration menu - View commit details
-
Copy full SHA for c430e43 - Browse repository at this point
Copy the full SHA c430e43View commit details -
jwe: Support overriding the algorithm when supplying a JWK
Now, passing a JWK (via EncryptWithJwe / JSONWebKey.MarshalJSON) will allow for ECDSA keys and for customizing the algorithm used with a particular key. Previously, the code made it impossible to supply a JWK-encoded ECDSA public key in the encryption config, as all keys passed as JSONWebKey-s were treated as RSA_OAEP keys, since utils.ParsePublicKey delegates to parseJWKPublicKey which returns the JWK itself; and hence the switch in the JWE keywrap failed to detect those as an ecdsa public key. A simpler patch here would have been to change parseJWKPublicKey to return the key contained inside the JWK directly, however, as pointed out by stefanberger, this would have broken backwards compatibility of the public API. Plus, using the algorithm encoded in the JWK allows us to more easily extend the JWE encoder to new algorithms. Risks: JWK-s containing RSA keys but with .Algorithm not set to "" (the default value) or string(jose.RSA_OLAP) will end up erroring or producing different encryptions than before. However, such keys would have failed to decrypt the contents regardless, so it should be fine to consider this a correction rather than breakage of old behavior. (Hyrum's law notwithstanding) Signed-off-by: Bojidar Marinov <bojidar.marinov.bg@gmail.com>
Configuration menu - View commit details
-
Copy full SHA for 4b2101a - Browse repository at this point
Copy the full SHA 4b2101aView commit details
Commits on Mar 11, 2024
-
build(deps): bump github.com/go-jose/go-jose/v3 from v3.0.1 to v3.0.3
To avoid a potential DoS vulnerability in v3.0.0 update to v3.0.3. Resolves: Issue #104 Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Configuration menu - View commit details
-
Copy full SHA for ccaf1f8 - Browse repository at this point
Copy the full SHA ccaf1f8View commit details
Commits on Mar 14, 2024
-
build(deps): bump github.com/golang/protobuf from v1.5.3 to v1.5.4
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Configuration menu - View commit details
-
Copy full SHA for f840ae2 - Browse repository at this point
Copy the full SHA f840ae2View commit details
Commits on May 21, 2024
-
updated-dependencies: - dependency-name: golang.org/x/net dependency-type: indirect ... Signed-off-by: dependabot[bot] <support@github.com>
Configuration menu - View commit details
-
Copy full SHA for 30c2fb6 - Browse repository at this point
Copy the full SHA 30c2fb6View commit details
Commits on Jun 11, 2024
-
github: Test with go 1.22 and go 1.21
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Configuration menu - View commit details
-
Copy full SHA for c448946 - Browse repository at this point
Copy the full SHA c448946View commit details -
Refactor conditionless else branches with return statementes (govet)
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Configuration menu - View commit details
-
Copy full SHA for 5221197 - Browse repository at this point
Copy the full SHA 5221197View commit details -
github: Use golangci-lint v1.59.1 and adjust config file
Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Configuration menu - View commit details
-
Copy full SHA for 7d0db72 - Browse repository at this point
Copy the full SHA 7d0db72View commit details
Commits on Jun 30, 2024
-
The main change in go-jose/v4 is the requirement to specify accepted "alg" and "enc" parameters. This is to enhance security, like for instance "the billion hashes attach" presented at BlackHat 2023. Note that go-jose/v4 requires go 1.21 References: go-jose/go-jose#64 (comment) Signed-off-by: Reinhard Tartler <siretart@tauware.de>
Configuration menu - View commit details
-
Copy full SHA for 0703ce7 - Browse repository at this point
Copy the full SHA 0703ce7View commit details
Commits on Jul 1, 2024
-
build(deps): Update several dependencies to latest package versions
Update the following packages: - github.com/opencontainers/image-spec: v1.1.0 - github.com/sirupsen/logrus: v1.9.3 - github.com/stretchr/testify: v1.9.0 - golang.org/x/crypto: v0.24.0 - golang.org/x/term: v0.21.0 - google.golang.org/grpc: v1.64.0 Signed-off-by: Stefan Berger <stefanb@linux.ibm.com>
Configuration menu - View commit details
-
Copy full SHA for e26515d - Browse repository at this point
Copy the full SHA e26515dView commit details
This comparison is taking too long to generate.
Unfortunately it looks like we can’t render this comparison for you right now. It might be too big, or there might be something weird with your repository.
You can try running this command locally to see the comparison on your machine:
git diff v1.1.9...v1.2.0