{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":687735500,"defaultBranch":"main","name":"sigstore-tsa","ownerLogin":"wlynch","currentUserCanPush":false,"isFork":true,"isEmpty":false,"createdAt":"2023-09-05T22:43:07.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/1844673?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1693954372.0","currentOid":""},"activityList":{"items":[{"before":"af4b772a0e5fd2807a77377f4f0be35e5d58b7fb","after":"20368f3fc2bea4f860f01bb5530427b12bffd99e","ref":"refs/heads/ts-bump","pushedAt":"2023-09-06T16:00:40.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"wlynch","name":"Billy Lynch","path":"/wlynch","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1844673?s=80&v=4"},"commit":{"message":"Fix bug where TSA signing fails if cert hash != content hash.\n\nThis was fixed upstream in\nhttps://github.com/digitorus/timestamp/pull/19.\n\nWe should cut a patch release - the buggy behavior was introduced in\nv1.1.2.\n\nNOTE: This potentially breaks some users if they are relying on the new\ncert hash behavior introduced in v1.1.2 to support other hash types, but\nthis fixes those who were broken by the v1.1.2 update.\nSupport for other hash types can be added in another PR by moving to using\n[timestamp.CreateResponseWithOpts](https://pkg.go.dev/github.com/digitorus/timestamp#Timestamp.CreateResponseWithOpts)\nand passing in the appropriate hash (but I'm considering that out of\nscope for this PR).\n\nSigned-off-by: Billy Lynch ","shortMessageHtmlLink":"Fix bug where TSA signing fails if cert hash != content hash."}},{"before":null,"after":"af4b772a0e5fd2807a77377f4f0be35e5d58b7fb","ref":"refs/heads/ts-bump","pushedAt":"2023-09-05T22:52:52.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"wlynch","name":"Billy Lynch","path":"/wlynch","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/1844673?s=80&v=4"},"commit":{"message":"Fix bug where TSA signing fails if cert hash != content hash.\n\nThis was fixed upstream in\nhttps://github.com/digitorus/timestamp/pull/19.\n\nWe should cut a patch release - the buggy behavior was introduced in\nv1.1.2.\n\nNOTE: This potentially breaks some users if they are relying on the new\ncert hash behavior introduced in v1.1.2 to support other hash types, but\nthis fixes those who were broken by the v1.1.2 update.\nSupport for other hash types can be added in another PR by moving to using\n[timestamp.CreateResponseWithOpts](https://pkg.go.dev/github.com/digitorus/timestamp#Timestamp.CreateResponseWithOpts)\nand passing in the appropriate hash (but I'm considering that out of\nscope for this PR).\n\nSigned-off-by: Billy Lynch ","shortMessageHtmlLink":"Fix bug where TSA signing fails if cert hash != content hash."}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"startCursor":"Y3Vyc29yOnYyOpK7MjAyMy0wOS0wNlQxNjowMDo0MC4wMDAwMDBazwAAAAN6wNvG","endCursor":"Y3Vyc29yOnYyOpK7MjAyMy0wOS0wNVQyMjo1Mjo1Mi4wMDAwMDBazwAAAAN6HLTf"}},"title":"Activity ยท wlynch/sigstore-tsa"}