Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(deps): sigstore revert from v1.9 to v1.8 #2913

Merged
merged 7 commits into from
Oct 24, 2023

Conversation

enteraga6
Copy link
Collaborator

@enteraga6 enteraga6 commented Oct 24, 2023

fixes issues #2873 through #2912 (e2e test failures)

Sigstore v1.9 introduces errors on retrieving the token as if the workflow is not seen as GHA but as a browser.

Example workflow using 1.9: https://github.com/enteraga6/bazel_docker_test/actions/runs/6631189448
It fails on slsa-setup with "error retrieving identity token"

Example workflow using 1.8: https://github.com/enteraga6/bazel_docker_test/actions/runs/6631199842
Token generation and retrieval completes successfully.

What causes the issue is currently unknown, but I think that it is a change heading towards the major version bump which will require refactoring of which packages are used to get the token. See here: https://github.com/sigstore/sigstore-js/releases/tag/sigstore%402.0.0, especially bullet pt 3 which conflicts with current signing attestation action.

This PR reverts Sigstore dependencies to 1.8 to allow the workflows to properly run and not fail on setup.

Signed-off-by: Noah Elzner <nge1@rice.edu>
Signed-off-by: Noah Elzner <nge1@rice.edu>
…ritical vuln

Signed-off-by: Noah Elzner <nge1@rice.edu>
Signed-off-by: Noah Elzner <nge1@rice.edu>
Signed-off-by: Noah Elzner <nge1@rice.edu>
Signed-off-by: Noah Elzner <nge1@rice.edu>
Point actions back to slsa-framework/...@main
This reverts commit 1c61d2a.

Signed-off-by: Noah Elzner <nge1@rice.edu>
@laurentsimon laurentsimon merged commit 10ddc67 into slsa-framework:main Oct 24, 2023
75 checks passed
@ianlewis
Copy link
Member

@enteraga6 Can you maybe create an issue on the sigstore-js repo with this info? I think that this backwards compatibility breakage might be unintentional?

At least we'll be able to get more clarification.

@enteraga6
Copy link
Collaborator Author

@ianlewis Certainly! Tracking the issue here: sigstore/sigstore-js#833

laurentsimon pushed a commit that referenced this pull request Mar 28, 2024
# Summary
Updates sigstore version from 1.8 -> 2.2.2 for the root dependency
version and for the Github Action `sign-attestation`, `verify-token`,
and `setup-generic`.

Per 1.9, signing options needed to be removed. More information on it
here on this [Sigstore
Issue](sigstore/sigstore-js#833). This fixes
revert from #2913

The actions were refactored to make use of to explicitly use Sigstore's
individual functions/types on imports from this [v2.0.0
change](sigstore/sigstore-js@829e123)

## Testing Process
**Testing Removal of Signing Options**
After updating `sign-attestation` on a personal workflow pointing to the
branch. Check it out
[here](https://github.com/enteraga6/bazel_docker_test/actions/runs/8458206728)
After updating `verify-token` and `setup-generic` to 1.9, I tested using
this
[workflow](https://github.com/enteraga6/bazel_docker_test/actions/runs/8459083200).

**Testing 2.2.2**
After updating the actions to Sigstore 2.2.2, I tested using this
[workflow](https://github.com/enteraga6/bazel_docker_test/actions/runs/8464040937).
Note: it says Sigstore 1.9 on workflow title, but it was used to test
2.2.2. I used the same workflow.

**Final Test**
This [workflow
test](https://github.com/enteraga6/bazel_docker_test/actions/runs/8474173065)
shows successful functionality after all the changes.

## Checklist

- [x] Review the contributing [guidelines](./../CONTRIBUTING.md)
- [x] Add a reference to related issues in the PR description.
- [x] Update documentation if applicable.
- [x] Add unit tests if applicable.
- [x] Add changes to the [CHANGELOG](./../CHANGELOG.md) if applicable.

---------

Signed-off-by: Noah Elzner <nge1@rice.edu>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

3 participants