Commit Graph

83 Commits

Author SHA1 Message Date
David Dworken
90c0b787d9
Increase delay to account for GitHub artifacts being slow to publish 2023-11-06 22:05:59 -08:00
David Dworken
606ed6ccb0
Download the artifact from this specific run to ensure we aren't getting outdated hishtory binaries 2023-11-06 21:47:14 -08:00
David Dworken
eaccc7b638
Skip installing dedicated package for sha1sum since coreutils includes it 2023-11-06 21:25:52 -08:00
David Dworken
8567b4cbdf
Run sha256sum in macos signer too for debuging purposes 2023-11-06 21:17:09 -08:00
David Dworken
72be3ee0c7
Update slsa-releaser.yml 2023-11-05 20:08:54 -08:00
David Dworken
a10913f188
Update slsa-releaser.yml to run tmate even if tests pass 2023-11-05 18:38:40 -08:00
David Dworken
222340a97c
Add tmate for debugging darwin attestation failures 2023-11-05 18:25:27 -08:00
David Dworken
19ee1816be Revert "Add SLSA attestation validation with latest released hishtory binary too" because the released binary doesn't support the validate-binary subcommand yet
This reverts commit 259f6b7858.
2023-11-05 18:05:20 -08:00
David Dworken
259f6b7858
Add SLSA attestation validation with latest released hishtory binary too 2023-11-05 17:20:53 -08:00
David Dworken
1264388ea9
Swap post-release validation to happen in a dedicated python script 2023-11-05 12:57:58 -08:00
David Dworken
9834c6f492
Add validation of macos signatures 2023-11-05 12:42:00 -08:00
David Dworken
0eb362e123
Remove requests requirement since we no longer are using it 2023-11-05 12:39:07 -08:00
David Dworken
6cc7057d1e
Swap to running SLSA validation on macos since we need codesign_allocate to validate signatures on macos 2023-11-05 12:37:49 -08:00
David Dworken
e00bc22dfd
Add SLSA self-validation for hishtory-linux-arm64 2023-11-05 12:27:44 -08:00
David Dworken
61224a447c
Add SLSA self-validation for hishtory-darwin-arm64 2023-11-05 12:25:58 -08:00
David Dworken
be2bbb37c6
Add SLSA self-validation for hishtory-darwin-amd64 2023-11-05 12:24:47 -08:00
David Dworken
8709ec9208
Update macos signer to be stricter about ensuring the files exist, and failing if they don't 2023-11-05 12:22:47 -08:00
David Dworken
a65c3799ed
Manually download github artifact rather than using the action since the action seems to be flaky 2023-11-05 11:37:14 -08:00
David Dworken
04c915512a
Add GITHUB_TOKEN to tmate for interactive debugging 2023-11-05 10:54:37 -08:00
David Dworken
55e187d6df
Add tmate for debugging why actions/download-artifact appears to not be working 2023-11-05 10:28:05 -08:00
David Dworken
2a57ec1d73
Add ls for debugging 2023-11-05 01:33:35 -07:00
David Dworken
c918bcd3cb
Update slsa validation to not validate version when running in github actions, since the one in actions isn't associated with a released version 2023-11-05 01:15:54 -07:00
David Dworken
c3c74970b0
Swap slsa validation to use hishtory built at head 2023-11-05 00:55:01 -07:00
David Dworken
acf46893e9
Clone repo and setup go for validation 2023-11-04 09:51:58 -07:00
David Dworken
a10a796eaa
Another attempt at getting validation to work on github actions 2023-11-03 23:36:30 -07:00
David Dworken
13ba6f38f7
Add pwd for debugging 2023-11-03 23:25:57 -07:00
David Dworken
723d04e196
Remove slsa validation for macos binaries since the artifact upload currently isn't working 2023-11-03 23:24:27 -07:00
David Dworken
dcd58fe27d
Fix SLSA releaser to specify required parameter path 2023-11-03 22:42:52 -07:00
David Dworken
92537a085c
Upload artifacts from macos signer even if this isn't a release, since they're needed for validation 2023-11-03 22:31:43 -07:00
David Dworken
da99e46e42
Swap SLSA releaser to use GH steps to pass through files, rather than downloading via HTTP 2023-11-03 22:18:24 -07:00
David Dworken
4673b99579
Add integration to validate macos signers too 2023-11-03 22:16:11 -07:00
David Dworken
87dee94aab
Add initial version of slsa releaser that validates the generated SLSA signatures 2023-11-03 22:10:11 -07:00
David Dworken
7ad1e2fb03
Upgrade to go 1.21 which offers fully reproducible builds (on top of SLSA's attestations) 2023-10-01 18:00:58 -07:00
David Dworken
ac5131fe4b
Add netbsd binary for #87 2023-09-19 18:54:04 -07:00
David Dworken
d1763455c4
Rename actions for consistent naming scheme 2023-02-24 09:56:49 -08:00
David Dworken
27cd544524
Add support for arm7 for #63 to support raspberry pis 2023-02-18 22:00:39 -08:00
David Dworken
7c86b812bf
Add support for linux arm64 for #48 2022-12-11 20:39:45 -08:00
David Dworken
84c7599736
Remove the windows builds since windows is completely broken. Leave freebsd since it appears to mostly work (though it is unsupported and updates don't work) 2022-11-04 23:18:43 -07:00
David Dworken
b591a23f5e
Reorganize slsa config files + attempt to build for freebsd + windows 2022-11-04 20:57:28 -07:00
David Dworken
8ae8b7218f Add missing @ 2022-10-31 14:19:26 -07:00
David Dworken
488be1f71a Swap back to 1.2.1 2022-10-31 14:04:01 -07:00
David Dworken
7d8f6b6d6d Remove compile-generator since that doesn't apply to the go builder 2022-10-31 13:12:42 -07:00
David Dworken
6c196969f4 Try to run the latest slsa releaser to see if that fixes anything 2022-10-31 13:03:41 -07:00
David Dworken
b0df767da7 Try also compiling the generator 2022-10-30 23:42:00 -07:00
David Dworken
58680d75e0 Add permissions that 1.2.1 apparently requires 2022-10-30 23:27:56 -07:00
David Dworken
8c10148d87 Try bumping to 1.2.1 to see if it fixes the SIGSEGV 2022-10-30 23:23:59 -07:00
David Dworken
e594375e08 Add workaround for slsa breakage 2022-10-01 15:14:51 -07:00
David Dworken
b2d3bb4801 Remove slsa builder deps to see if the new builders work when running in parallel 2022-09-07 23:51:41 -07:00
David Dworken
83a0beff43 Bump go version, remove the vendored slsa library, and depend on a newer copy with a different API. Updates now work. 2022-09-02 00:15:58 -07:00
David Dworken
4f4b07165d Use a version rather than a commit hash 2022-09-01 23:34:23 -07:00