Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: fail to load deprecated ecdsa verifier #541

Merged

Conversation

rdimitrov
Copy link
Contributor

@rdimitrov rdimitrov commented Aug 8, 2023

Description of the changes being introduced by the pull request:

The following PR updates the set_ecdsa package to use the correct verifier for the deprecated ECDSA key type - deprecated is hex encoded, and the compliant one is PEM-formatted.

The deprecated verifier is added for both key type formats - "ecdsa" and "ecdsa-sha2-nistp256".

Once this is merged, there will be a patch release of v0.6.1 which should include it.

Fixes #527

Release Notes:

Types of changes:

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected). Please ensure that your PR title is a Conventional Commit breaking change (with a !, as in feat!: change foo).

Please verify and check that the pull request fulfills the following requirements:

  • Tests have been added for the bug fix or new feature
  • Docs have been added for the bug fix or new feature

Signed-off-by: Radoslav Dimitrov <dimitrovr@vmware.com>
@rdimitrov rdimitrov self-assigned this Aug 8, 2023
@rdimitrov rdimitrov added bug go Pull requests that update Go code labels Aug 8, 2023
Signed-off-by: Radoslav Dimitrov <dimitrovr@vmware.com>
@rdimitrov
Copy link
Contributor Author

rdimitrov commented Aug 8, 2023

I wonder if we should disable govulncheck for the time being. It's nice, but it cannot be configured to silence vulnerabilities. In this case, it's referring to getting the fix from an unstable version which is not ideal.

Update: I've decided to add a -json flag so it still runs but it doesn't fail the CI.

Signed-off-by: Radoslav Dimitrov <dimitrovr@vmware.com>
@rdimitrov
Copy link
Contributor Author

cc: @asraa @haydentherapper

Copy link
Contributor

@znewman01 znewman01 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Nice, thanks for digging into this!

Copy link
Contributor

@haydentherapper haydentherapper left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks!

@haydentherapper
Copy link
Contributor

Can we get this merged and a new release cut?

@rdimitrov
Copy link
Contributor Author

Can we get this merged and a new release cut?

Yes, unfortunately, I cannot merge it unless there're 2 maintainer approvals :/

ping @mnm678 @trishankatdatadog @kommendorkapten

Copy link
Member

@joshuagl joshuagl left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM, thanks.

@rdimitrov rdimitrov merged commit ca0c316 into theupdateframework:master Aug 11, 2023
4 checks passed
@rdimitrov rdimitrov deleted the dimitrovr/fix-ecdsa-verifier branch August 11, 2023 11:09
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Initializing client regression between v0.5.2 and v0.6.0
5 participants