Skip to content

Latest commit

 

History

History
409 lines (232 loc) · 8.84 KB

File metadata and controls

409 lines (232 loc) · 8.84 KB

v2.0.4

Only contains dependency updates, but fixes #1252 due to breaking API change in sigstore/sigstore

v2.0.3

Vulnerability Fixes

v2.0.2

This release bumps the Go version to 1.25.

v2.0.1

This release is identical to v2.0.0, as it only contains a fix for the release pipeline.

v2.0.0

v2.0.0 changes the default HTTP response code to 200 for timestamp responses, which matches all other well-known TSA implementations. Sigstore clients already handle both 200 and 201 response codes, so no changes are needed to clients.

If you need backwards compatibility, you can deploy the service with --use-http-201.

This release also changes the format of the binary and container signature, which is now a Sigstore bundle. To verify a release, use the latest Cosign 3.x, verifying with cosign verify-blob --bundle <artifact>-keyless.sigstore.json <artifact>.

Features

  • changes default HTTP response code to 200 for timestamp responses (#1202)
  • feat: add configurable max request body size for TSA server (#1176)

Testing

  • test: Add a K6 loadtest

Documentation

  • Minor improvements to documentation (#1169)

Misc

  • (fix): minor gosec issues under x509.go (#1201)

v1.2.9

  • logging: Don't use Error when logging 4xx responses (#1159)
  • add feature to disable intermediate cert EKU enforcement (#1146)
  • add documentation for AWS KMS example (#1094)

v1.2.8

Features

  • Allow full issuing chain in response (#1082)
  • Relax EKU chaining rules verification for intermediate certs (#1078)

v1.2.7

Features

  • fetch-tsa-certs: Add "--org-name" (#1056)

Bug Fixes

  • Fix: Disallow timestamp requests where digest length is inconsistent with hash algorithm (#1066)
  • Fix --http-ping-only flag to not affect https listener (#1051)

v1.2.6

Features

  • allow operators to customize the HTTP header used to customize request correlation IDs (#1026)

Bug Fixes

  • Do not assume leaf certificate is first in chain (#1040)

v1.2.5

Enhancements

  • Exposes validity period of signing certificate as prometheus metric for monitoring
  • fetch-tsa-certs now supports fetching a self-signed certificate chain

Changes

Bug fixes

  • Minor tweaks to CI configuration for hardening

Misc

  • Add fuzzing coverage with oss-fuzz
  • Dependabot updates

v1.2.4

Changes

Bug fixes

  • Fix timestamp response to always be returned in GMT

Misc

  • Relax go directive to permit 1.22.x
  • Dependabot updates

v1.2.3

Changes

Bug fixes

  • Don't mark hash argument as required in timestamp-cli

Misc

  • Dependabot updates

v1.2.2

Changes

Bug fixes

  • Go checksum database error on installation due to deleting a tag

Misc

  • Dependabot updates

v1.2.1

v1.2.1 includes a minor bug fix to set the SignedData version value in a timestamp response as per the RFC.

Changes

Bug Fixes

  • Bump digitorus/timestamp version to pick up RFC correctness fix (#584)

v1.2.0

v1.2.0 is based on Go 1.21.3.

Changes

Enhancements

  • Support other hash algs for pre-signed timestamp besides SHA256 (#488)
  • new http-ping-only flag for 'timestamp-server serve' (#474)

Bug Fixes

  • Fix bug where TSA signing fails if cert hash != content hash. (#465)

Misc

  • expand README on Cloud KMS deployment (#476)
  • upgrade to Go1.21 (#471)

Contributors

  • Billy Lynch
  • Carlos Tadeu Panato Junior
  • Dmitry Savintsev
  • Hayden B

1.1.2

1.1.2 fixes a signing related hash function bug and a typo.

Changes

Enhancements

Bug Fixes

  • Fix hash function hardcoding bug by updating dependency (sigstore#452)

Misc

Contributors

  • Carlos Tadeu Panato Junior
  • Dmitry Savintsev
  • Meredith Lancaster

1.1.1

1.1.1 fixes a bug in the JSON format request code.

Changes

Enhancements

Bug Fixes

Misc

Contributors

  • Meredith Lancaster

1.1.0

1.1.0 now supports making timestamp requests in JSON format in addition to DER encoded format.

Changes

Enhancements

Bug Fixes

Misc

Contributors

  • Andrea Cosentino
  • Meredith Lancaster

1.0.0

1.0 release of the timestamp authority. No changes from the previous release candidate.

Thank you to all contributors!

1.0.0-rc.1

Note: This is a prerelease for 1.0. Please try it out and file issues!

Changes

Documentation

Contributors

  • Carlos Tadeu Panato Junior
  • Hayden B
  • Meredith Lancaster

1.0.0-rc.0

Note: This is a prerelease for 1.0. Please try it out and file issues!

Changes

SLSA provenance is now uploaded with each release. Use slsa-verifier to verify the release.

Misc

Contributors

  • Carlos Tadeu Panato Junior
  • Hayden B
  • Meredith Lancaster

0.2.1

0.2.1 now rejects timestamp requests that use SHA-1. For server operators, it now defaults to using NTP monitoring.

Changes

Enhancements

Bug Fixes

Misc

Contributors

  • Hayden B
  • Hector Fernandez
  • Meredith Lancaster

0.2.0

0.2.0 improves the verification library (sigstore#121). The library now verifies the full certificate chain and additional properties of the timestamp.

Changes

Enhancements

Bug fixes

Misc

Contributors

  • Hayden Blauzvern
  • Meredith Lancaster

0.1.3

Changes

Enhancements

  • Added an optional feature to compare the local time with a set of trusted ntp servers (sigstore#143)

Bug fixes

Misc

Contributors

  • Fredrik Skogman
  • Hector Fernandez
  • Meredith Lancaster
  • neilnaveen

0.1.2

Changes

Enhancements

Bug fixes

  • Fix a bug where certChain was not set correctly (sigstore#140)

Misc

Contributors

  • Ville Aikas

0.1.1

Changes

Enhancements

Bug fixes

Misc

Contributors

  • Hayden Blauzvern
  • Hector Fernandez

0.1.0

Initial release of sigstore/timestamp-authority

See the README for instructions on how to run the timestamp authority and fetch and verify signed timestamps.

Contributors

  • Carlos Tadeu Panato Junior (@cpanato)
  • Hayden Blauzvern (@haydentherapper)
  • Hector Fernandez (@hectorj2f)
  • Meredith Lancaster (@malancas)