Граф коммитов

22 Коммитов

Автор SHA1 Сообщение Дата
Hidde Beydals 6ebee6bcd9
Release v3.8.1
Signed-off-by: Hidde Beydals <hidde@hhh.computer>
2023-10-11 09:38:04 +02:00
Hidde Beydals 59286ae375
Prepare v3.8.0
Signed-off-by: Hidde Beydals <hidde@hhh.computer>
2023-09-15 11:25:06 +02:00
Hidde Beydals e26844deff
version: rewrite command to use GitHub endpoints
This changes the logic of parsing the `version.go` file from a certain
branch to instead make use of the GitHub latest release redirect or
API[1] endpoints for checking if `sops` is on the latest version.

Detaching any future release of SOPS from specific file structures
and/or branches, and (theoretically) freeing it from the requirement of
having to bump the version in-code during release (as this is also done
using `-ldflags` during build). Were it not for the fact that we have
to maintain it for backwards compatibility.

[1]: https://docs.github.com/en/free-pro-team@latest/rest/releases/releases?apiVersion=2022-11-28#get-the-latest-release

Signed-off-by: Hidde Beydals <hidde@hhh.computer>
2023-08-23 07:37:42 +02:00
Brian Kemper fd3e5ad5f4
Clean up more Mozilla references
Signed-off-by: Brian Kemper <bkemper@gmail.com>
2023-08-16 14:29:40 -06:00
Stoned Elipot cb1a43dfab Only report version check when it can be
Signed-off-by: Stoned Elipot <stoned.elipot@gmail.com>
2023-08-15 00:49:50 +02:00
Hidde Beydals 02de4a8745
release: outline release logic using GoReleaser
This adds the base for releasing using GoReleaser going forward in a
backwards compatible manner, which means:

- Publishing of artifacts in the same formats as previous releases
- Publishing of RPM and deb artifacts in the same formats as previous
  releases (although the metadata may need a bit of tweaking)

In addition, it includes:

- SBOM inclusion per binary artifact

It still needs work around:

- Artifact signing
- SLSA compliance
- Docker images
- GitHub release
- Changelog generation
- GitHub Action workflow

Signed-off-by: Hidde Beydals <hidde@hhh.computer>
2023-08-14 22:37:38 +02:00
Hidde Beydals f2a1d4c782
Rename Go module to `github.com/getsops/sops/v3`
This commit renames the Go module from `go.mozilla.org/sops/v3` to
`github.com/getsops/sops/v3` without a major version bump, to align
with new stewardship.

For more information around this change, refer to
https://github.com/getsops/sops/issues/1246.

For a one-liner to change the `go.mod` and any import paths in your
Go project making use of this module, run:

```
find /path/to/repo -type f \( -name "*.go" -o -name "go.mod" \) -exec sed -i 's|go.mozilla.org/sops/v3|github.com/getsops/sops/v3|g' {} \;
find /path/to/repo -type f \( -name "*.go" -o -name "go.mod" \) -exec sed -i '' 's|go.mozilla.org/sops/v3|github.com/getsops/sops/v3|g' {} \;
```

Signed-off-by: Hidde Beydals <hidde@hhh.computer>
2023-07-31 22:51:36 +02:00
Felix Fontein 148d46108b Do not check whether current version is latest when --disable-version-check is passed. 2022-08-27 15:33:41 +02:00
daurnimator 290ec3dca6
Update to urfave/cli to 1.22.7 2022-05-24 15:47:10 +10:00
AJ Bahnken 15583bdae9
prep for v3.7.3 2022-05-06 09:57:47 -07:00
AJ Bahnken 035672f3b4
prep v3.7.2 2022-03-08 12:01:39 -08:00
AJ Bahnken 8838db65fa
v3.7.1 prep 2021-04-08 14:28:12 -07:00
AJ Bahnken cb4229fe37
Prep for v3.7.0 2021-03-24 14:30:21 -07:00
Mikhail Katychev 0f2ebcf7ff
added wrap verb to outputs (#817) 2021-02-17 22:21:20 +01:00
AJ Bahnken 225ac82d3f
Bump version and add changelog for 3.6.1 2020-09-09 10:18:53 -07:00
AJ Bahnken 260ca36ef1
Update CHANGLOG and version for 3.6.0 2020-07-14 10:33:36 -07:00
AJ Bahnken bc4b7478ad
prepare 3.5.0 release (#578) 2019-11-21 13:53:50 -08:00
AJ Bahnken 8e21de8dbc
Upgrade sops to go 1.13 (#566) 2019-11-18 10:06:58 -08:00
AJ Bahnken 045a876841
Bump version and CHANGELOG for 3.4.0 2019-09-11 13:40:01 -07:00
Adriano 4b99fa18b3
go lint 2019-07-11 10:30:32 -07:00
AJ Bahnken 008ce8f4de
3.3.1 bump and release notes (#477) 2019-06-11 18:06:58 +00:00
AJ Bahnken 23fb078e05
Autofix AWS KMS encryption context bug (#445)
* kms encryption ctx auto fix

Code to do the migration is still rough and needs clean up and further
testing.

* Added some further polish to enc ctx fix code path

* Attempt to decrypt using other keys before trying enc ctx variations

* just re-encrypt datakey instead of all of the values

* Move KMS enc ctx fix code to new function

* Fix RetrieveLatestVersionFromUpstream with pkg move

* Fixes from code review

* Include err in message displayed to user

* Remove duplicate file.Close() calls in Fix kms func

* move file.Close() to defer
2019-03-21 10:55:51 -07:00