Skip to content

deps: replace sigstore-verification with sigstore-verify to kill vulns#8064

Merged
codefromthecrypt merged 1 commit intomainfrom
fix/cargo-deny-advisories
Mar 22, 2026
Merged

deps: replace sigstore-verification with sigstore-verify to kill vulns#8064
codefromthecrypt merged 1 commit intomainfrom
fix/cargo-deny-advisories

Conversation

@codefromthecrypt
Copy link
Collaborator

Summary

Cargo Deny is red on main due to four RustSec advisories.

Three are cargo update bumps, the fourth (rsa, Marvin Attack) has no patched release caused by sigstore-verification.

This replaces sigstore-verification with sigstore-verify which uses aws-lc-rs instead of rsa.

We get a clean run due to 1k fewer lines of Cargo.lock. They payment is ~30 lines of reqwest to call GitHub API directly.

Type of Change

  • Bug fix
  • Refactor / Code quality

AI Assistance

  • This PR was created or reviewed with AI assistance

Testing

$ cargo deny check advisories
advisories ok
$ cargo tree -i rsa
warning: nothing to print.
$ GH_TOKEN=$(gh auth token) cargo run -p goose-cli --bin goose -- update
Downloading goose-aarch64-apple-darwin.tar.bz2 from stable release...
Downloaded 61602128 bytes.
Archive SHA-256: bfa03a01b5e9bd97fbdf9f7d635850f46f73f62f74aedbf423fe5aa57bcf17f5
Verifying SLSA provenance via Sigstore...
Sigstore provenance verification passed.
goose updated successfully (verified with Sigstore SLSA provenance).

Related Issues

Fixes the red Cargo Deny CI build
Builds on #7818

Signed-off-by: Adrian Cole <adrian@tetrate.io>
@codefromthecrypt codefromthecrypt force-pushed the fix/cargo-deny-advisories branch from bcbf574 to 5acfef4 Compare March 22, 2026 22:49
@codefromthecrypt
Copy link
Collaborator Author

FYI, I raised this on a shared branch as this is a dev zero thing, but I am way over time budget. I hope it helps get the build green soon. whoever can take over and do what they want with this including closing.

@michaelneale michaelneale self-assigned this Mar 22, 2026
@michaelneale michaelneale marked this pull request as ready for review March 22, 2026 22:59
@michaelneale
Copy link
Collaborator

AWS dependencies - the gift that keeps on giving. really wish we could drop bedrock for good - can't they just use standard apis? why 100s of transitive deps?

@codefromthecrypt codefromthecrypt added this pull request to the merge queue Mar 22, 2026
Copy link

@chatgpt-codex-connector chatgpt-codex-connector bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 5acfef40d8

ℹ️ About Codex in GitHub

Codex has been enabled to automatically review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "@codex review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

When you sign up for Codex through ChatGPT, Codex can also answer questions or update the PR, like "@codex address that feedback".

}
};

let trusted_root = TrustedRoot::production().context("Failed to load Sigstore trusted root")?;

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

P1 Badge Refresh the Sigstore trust root instead of embedding it

Using TrustedRoot::production() hardcodes the current Sigstore public-good trust anchors into the binary. GitHub’s attestation flow rotates Fulcio/Rekor/CT/TSA keys over time, so after the next routine root update any older goose build will start rejecting legitimately signed releases and goose update becomes a dead end until the user reinstalls manually. The previous verifier path refreshed trust material via TUF; this replacement needs the same online refresh behavior to keep self-updates working long-term.

Useful? React with 👍 / 👎.

@codefromthecrypt
Copy link
Collaborator Author

@michaelneale seems bedrock wants to be openai'ish, so if we have critical mass probably dump it for their openai endpoints? https://aws.amazon.com/about-aws/whats-new/2025/12/amazon-bedrock-responses-api-from-openai/

Merged via the queue into main with commit c2a02d7 Mar 22, 2026
30 of 31 checks passed
@codefromthecrypt codefromthecrypt deleted the fix/cargo-deny-advisories branch March 22, 2026 23:21
michaelneale added a commit that referenced this pull request Mar 22, 2026
* main:
  deps: replace sigstore-verification with sigstore-verify to kill vulns (#8064)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants