-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathchange.log
More file actions
14 lines (13 loc) · 1.73 KB
/
change.log
File metadata and controls
14 lines (13 loc) · 1.73 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
# Change Log
2026-04-07
- Released `parsedmarc` 9.5.4: bumped Dockerfiles, compose, workflows, and requirements so base image and pull commands use the new version; tagged/published release for reproducible deployments.
- Hardened CI and release automation: added `production` environment with branch/tag policies and wired `build-locked-release` & `docker-build` to require it; recorded reasoning for traceability.
- Fixed automated scans: taught Trivy/Snyk release workflows to wait for published images before pulling so SARIF uploads (and the originating GitHub Code Scanning alerts) close reliably after new artifacts go live.
- Documented that Trivy alerts CVE-2026-30922 were cleared by regenerating `requirements.lock` with `pyasn1==0.6.3` inside the lockfile-based builds.
2026-04-07 (continued)
- Updated `Dockerfile-ubi.locked` so the ubi9/python-312 builder/runtime stages now point at `sha256:7ba356eca7f476bcf9a8c51714e43353376d37e0bbd4e43ceec7b1bcc6ff9675`, which carries Python 3.12.12-4.el9_7.2 and resolves CVE-2026-4519 identified by Trivy.
- Triggered `build-locked-release` on `main` after the base bump so the signed locked images rebuild from the patched UBI Python base, and explicitly reran the Trivy/Snyk published-image scans to refresh SARIF results against the new artifacts.
- Merged the pending Dependabot PRs for code scanning/sealing:
* `sigstore/cosign-installer` to 4.1.1 and `github/codeql-action` to 4.35.1 so the signing and analysis workflows use the newest releases.
* `docker/login-action` 4.1.0 plus the matching Docker workflow tweaks that rely on that action.
* The `python` base digest bumps plus `parsedmarc==9.6.0` so the runtime is on the latest release while the locked images rebuild from the patched builder.