Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: containers/ocicrypt Loading
base: v1.1.9
Choose a base ref
...
head repository: containers/ocicrypt Loading
compare: v1.1.10
Choose a head ref
  • 4 commits
  • 5 files changed
  • 3 contributors

Commits on Nov 13, 2023

  1. build(deps): bump github.com/go-jose/go-jose/v3 from v3.0.0 to v3.0.1

    To avoid a potential DoS vulnerability in v3.0.0 update to v3.0.1.
    
    Signed-off-by: Stefan Berger <[email protected]>
    stefanberger committed Nov 13, 2023
    Configuration menu
    Copy the full SHA
    a24b477 View commit details
    Browse the repository at this point in the history

Commits on Dec 28, 2023

  1. build(deps): bump golang.org/x/crypto from 0.14.0 to 0.17.0

    Bumps [golang.org/x/crypto](https://github.com/golang/crypto) from 0.14.0 to 0.17.0.
    - [Commits](golang/crypto@v0.14.0...v0.17.0)
    
    ---
    updated-dependencies:
    - dependency-name: golang.org/x/crypto
      dependency-type: direct:production
    ...
    
    Signed-off-by: dependabot[bot] <[email protected]>
    dependabot[bot] authored and stefanberger committed Dec 28, 2023
    Configuration menu
    Copy the full SHA
    c430e43 View commit details
    Browse the repository at this point in the history
  2. jwe: Support overriding the algorithm when supplying a JWK

    Now, passing a JWK (via EncryptWithJwe / JSONWebKey.MarshalJSON) will
    allow for ECDSA keys and for customizing the algorithm used with a
    particular key.
    
    Previously, the code made it impossible to supply a JWK-encoded ECDSA
    public key in the encryption config, as all keys passed as JSONWebKey-s
    were treated as RSA_OAEP keys, since utils.ParsePublicKey delegates to
    parseJWKPublicKey which returns the JWK itself; and hence the switch in
    the JWE keywrap failed to detect those as an ecdsa public key.
    A simpler patch here would have been to change parseJWKPublicKey to return
    the key contained inside the JWK directly, however, as pointed out by
    stefanberger, this would have broken backwards compatibility of the public
    API. Plus, using the algorithm encoded in the JWK allows us to more easily
    extend the JWE encoder to new algorithms.
    
    Risks: JWK-s containing RSA keys but with .Algorithm not set to "" (the
    default value) or string(jose.RSA_OLAP) will end up erroring or producing
    different encryptions than before. However, such keys would have failed to
    decrypt the contents regardless, so it should be fine to consider this a
    correction rather than breakage of old behavior. (Hyrum's law
    notwithstanding)
    
    Signed-off-by: Bojidar Marinov <[email protected]>
    bojidar-bg authored and stefanberger committed Dec 28, 2023
    Configuration menu
    Copy the full SHA
    4b2101a View commit details
    Browse the repository at this point in the history

Commits on Mar 11, 2024

  1. build(deps): bump github.com/go-jose/go-jose/v3 from v3.0.1 to v3.0.3

    To avoid a potential DoS vulnerability in v3.0.0 update to v3.0.3.
    
    Resolves: Issue #104
    Signed-off-by: Stefan Berger <[email protected]>
    stefanberger committed Mar 11, 2024
    Configuration menu
    Copy the full SHA
    ccaf1f8 View commit details
    Browse the repository at this point in the history
Loading