Commit Graph

69 Commits

Author SHA1 Message Date
David Dworken
61224a447c
Add SLSA self-validation for hishtory-darwin-arm64 2023-11-05 12:25:58 -08:00
David Dworken
be2bbb37c6
Add SLSA self-validation for hishtory-darwin-amd64 2023-11-05 12:24:47 -08:00
David Dworken
8709ec9208
Update macos signer to be stricter about ensuring the files exist, and failing if they don't 2023-11-05 12:22:47 -08:00
David Dworken
a65c3799ed
Manually download github artifact rather than using the action since the action seems to be flaky 2023-11-05 11:37:14 -08:00
David Dworken
04c915512a
Add GITHUB_TOKEN to tmate for interactive debugging 2023-11-05 10:54:37 -08:00
David Dworken
55e187d6df
Add tmate for debugging why actions/download-artifact appears to not be working 2023-11-05 10:28:05 -08:00
David Dworken
2a57ec1d73
Add ls for debugging 2023-11-05 01:33:35 -07:00
David Dworken
c918bcd3cb
Update slsa validation to not validate version when running in github actions, since the one in actions isn't associated with a released version 2023-11-05 01:15:54 -07:00
David Dworken
c3c74970b0
Swap slsa validation to use hishtory built at head 2023-11-05 00:55:01 -07:00
David Dworken
acf46893e9
Clone repo and setup go for validation 2023-11-04 09:51:58 -07:00
David Dworken
a10a796eaa
Another attempt at getting validation to work on github actions 2023-11-03 23:36:30 -07:00
David Dworken
13ba6f38f7
Add pwd for debugging 2023-11-03 23:25:57 -07:00
David Dworken
723d04e196
Remove slsa validation for macos binaries since the artifact upload currently isn't working 2023-11-03 23:24:27 -07:00
David Dworken
dcd58fe27d
Fix SLSA releaser to specify required parameter path 2023-11-03 22:42:52 -07:00
David Dworken
92537a085c
Upload artifacts from macos signer even if this isn't a release, since they're needed for validation 2023-11-03 22:31:43 -07:00
David Dworken
da99e46e42
Swap SLSA releaser to use GH steps to pass through files, rather than downloading via HTTP 2023-11-03 22:18:24 -07:00
David Dworken
4673b99579
Add integration to validate macos signers too 2023-11-03 22:16:11 -07:00
David Dworken
87dee94aab
Add initial version of slsa releaser that validates the generated SLSA signatures 2023-11-03 22:10:11 -07:00
David Dworken
7ad1e2fb03
Upgrade to go 1.21 which offers fully reproducible builds (on top of SLSA's attestations) 2023-10-01 18:00:58 -07:00
David Dworken
ac5131fe4b
Add netbsd binary for #87 2023-09-19 18:54:04 -07:00
David Dworken
d1763455c4
Rename actions for consistent naming scheme 2023-02-24 09:56:49 -08:00
David Dworken
27cd544524
Add support for arm7 for #63 to support raspberry pis 2023-02-18 22:00:39 -08:00
David Dworken
7c86b812bf
Add support for linux arm64 for #48 2022-12-11 20:39:45 -08:00
David Dworken
84c7599736
Remove the windows builds since windows is completely broken. Leave freebsd since it appears to mostly work (though it is unsupported and updates don't work) 2022-11-04 23:18:43 -07:00
David Dworken
b591a23f5e
Reorganize slsa config files + attempt to build for freebsd + windows 2022-11-04 20:57:28 -07:00
David Dworken
8ae8b7218f Add missing @ 2022-10-31 14:19:26 -07:00
David Dworken
488be1f71a Swap back to 1.2.1 2022-10-31 14:04:01 -07:00
David Dworken
7d8f6b6d6d Remove compile-generator since that doesn't apply to the go builder 2022-10-31 13:12:42 -07:00
David Dworken
6c196969f4 Try to run the latest slsa releaser to see if that fixes anything 2022-10-31 13:03:41 -07:00
David Dworken
b0df767da7 Try also compiling the generator 2022-10-30 23:42:00 -07:00
David Dworken
58680d75e0 Add permissions that 1.2.1 apparently requires 2022-10-30 23:27:56 -07:00
David Dworken
8c10148d87 Try bumping to 1.2.1 to see if it fixes the SIGSEGV 2022-10-30 23:23:59 -07:00
David Dworken
e594375e08 Add workaround for slsa breakage 2022-10-01 15:14:51 -07:00
David Dworken
b2d3bb4801 Remove slsa builder deps to see if the new builders work when running in parallel 2022-09-07 23:51:41 -07:00
David Dworken
83a0beff43 Bump go version, remove the vendored slsa library, and depend on a newer copy with a different API. Updates now work. 2022-09-02 00:15:58 -07:00
David Dworken
4f4b07165d Use a version rather than a commit hash 2022-09-01 23:34:23 -07:00
David Dworken
b37b598e65 Bump to 1.0 of slsa generator 2022-09-01 23:30:28 -07:00
David Dworken
bdd35c1776 Bump slsa to v0.0.2 2022-06-04 20:18:13 -07:00
David Dworken
5539ce8510 Fix file path 2022-06-03 21:12:15 -07:00
David Dworken
17b569756a Maybe this works since this is the commit associated with the tag?: 2022-06-03 21:09:59 -07:00
David Dworken
b1bdf8b7da Specify a version tag since f9e31da2a5 now requires that we use a tagged version 2022-06-03 21:01:53 -07:00
David Dworken
4cb4e5176a Try executing in sequence 2022-05-28 09:34:53 -07:00
David Dworken
3bb8d74358 CHeck if it is the config-file directive that is messing up the hash 2022-05-28 09:29:56 -07:00
David Dworken
fa32a1af07 Check if the task name is part of the hash 2022-05-28 09:24:31 -07:00
David Dworken
2f8727f29b A new way of releasing, taking advantage of config-file to avoid having to create a new commit per platform 2022-05-28 00:01:38 -07:00
David Dworken
a6476c1bf4 Update permissions 2022-05-27 23:30:49 -07:00
David Dworken
798fe48585 envs --> evaluated-envs to match updated slsa builder 2022-05-27 23:28:01 -07:00
David Dworken
adb20f1bb2 Upgrade slsa releaser action 2022-05-27 23:21:45 -07:00
David Dworken
64d4c211b4 Trigger cron from github actions 2022-05-27 22:48:13 -07:00
David Dworken
ea6be650ba Export the unsigned files for a new theory on how SLSA verification can be done 2022-05-26 23:09:00 -07:00