⬆️ (deps): Update dependency cosign to v3#333
Open
renovate[bot] wants to merge 1 commit intomainfrom
Open
Conversation
993e8d7 to
8b0ee40
Compare
8b0ee40 to
94c1320
Compare
94c1320 to
67f3049
Compare
67f3049 to
b17a298
Compare
Signed-off-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
b17a298 to
4b50f63
Compare
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
2.2.0→3.0.6Release Notes
sigstore/cosign (cosign)
v3.0.6Compare Source
Changelog
v3.0.6 resolves GHSA-w6c6-c85g-mmv6. This release also adds support for signing with OpenBao-managed keys.
f1ad3eeFix DSSE predicate check (GHSA-w6c6-c85g-mmv6) (#4801)a09afa9Handle whitespace-only certificate annotation (#4760)5a38a6dfix(sign): closing SignerVerifier too early when signing with a security key (#4761)2290a59Disallow --new-bundle-format and --rfc3161-timestamp (#4762)36f4008support managed keys in conformance testing (#4728)3274cf9Add support for GCE metadata server env var (#4732)2e9754afix: preserve per-layer annotations in WriteAttestationsReferrer (#4709)dece275Fix parsing of in-toto for string predicatesbd4f0fdMark batch of flags for deprecation (#4698)9b259ffdisallow key and cert identity being used together during verification (#4636)95eb1c3support key creation in GitLab group (#4704)Thanks to all contributors!
v3.0.5Compare Source
Deprecations
Features
Bug Fixes
Documentation
v3.0.4Compare Source
v3.0.4 resolves GHSA-whqx-f9j3-ch6m.
Changes
v3.0.3Compare Source
Thank you for all of your feedback on Cosign v3! v3.0.3 fixes a number of bugs reported by
the community along with adding compatibility for the new bundle format and attestation
storage in OCI to additional commands. We're continuing to work on compatibility with
the remaining commands and will have a new release shortly. If you run into any problems,
please file an issue
Changes
clean(#4539)saveandload(#4538)signcli package.cosign initialize(#4462)v3.0.2Compare Source
v3.0.2 is a functionally equivalent release to v3.0.0 and v3.0.1, with a fix for CI to publish signed releases in the new bundle format.
--bundleflag specifying an output file to write the Sigstore bundle (which contains all relevant verification material) has moved from optional to required in v3.Changes
v3.0.1Compare Source
v3.0.1 is an equivalent release to v3.0.0, which was never published due to a failure in our CI workflows.
--bundleflag specifying an output file to write the Sigstore bundle (which contains all relevant verification material) has moved from optional to required in v3.Changes
v2.6.3Compare Source
Changelog
v2.6.3 resolves GHSA-w6c6-c85g-mmv6.
fecddd3Fix DSSE predicate check (#4802)564c5b1Backport bundle detection to sign and attest (#4727)Thanks to all contributors!
v2.6.2Compare Source
v2.6.2 resolves GHSA-whqx-f9j3-ch6m.
Changes
v2.6.1Compare Source
Bug Fixes
v2.6.0Compare Source
v2.6.0 introduces a number of new features, including:
Example generation and verification of a signed in-toto statement:
Example container signing and verification using the new bundle format and referring artifacts:
Example usage of a signing config provided by the public good instance's TUF repository:
v2.6.0 leverages sigstore-go's signing and verification APIs gated behind these new flags. In an upcoming major release, we will be
updating Cosign to default to producing and consuming bundles to align with all other Sigstore SDKs.
Features
attest-blobthe ability to supply a complete in-toto statement, and add toverify-blob-attestationthe ability to verify with just a digest (#4306)Breaking API Changes
sign.SignerFromKeyOptsno longer generates a key. Instead, it returns whether or not the client needs to generate a key, and if so, clientsshould call
sign.KeylessSigner. This allows clients to more easily manage key generation.Bug Fixes
v2.5.3Compare Source
Features
Bug Fixes
v2.5.2Compare Source
Bug Fixes
Documentation
v2.5.1Compare Source
Features
Bug Fixes
Docs
verify-blobcmd examples (#4160)Releases
Contributors
v2.5.0Compare Source
v2.5.0 includes an implementation of the new bundle specification,
attesting and verifying OCI image attestations uploaded as OCI artifacts.
This feature is currently gated behind the
--new-bundle-formatflagwhen running
cosign attest.Features
Fixes
Contributors
v2.4.3Compare Source
Features
Bug Fixes
Cleanup
Contributors
v2.4.2Compare Source
Features
--trusted-root(#3933)Bug Fixes
Documentation
Contributors
v2.4.1Compare Source
v2.4.1 largely contains bug fixes and updates dependencies.
Features
Bug Fixes
Contributors
v2.4.0Compare Source
v2.4.0 begins the modernization of the Cosign client, which includes:
through a trust root file, instead of many different flags
In future updates, we'll include:
format during verification
Cosign-specific bundle format
We have also moved nightly Cosign container builds to GHCR instead of GCR.
Features
verify-blobandverify-blob-attestation(#3796)email_verifiedas string or boolean (#3819)Contributors
v2.3.0Compare Source
Features
Bug Fixes
bundleVerifiedto true after Rekor verification (Resolves #3740) (#3745)Documentation
Testing
Contributors
v2.2.4Compare Source
Bug Fixes
Features
Documentation
Testing
v2.2.3Compare Source
Bug Fixes
Features
Documentation
versionsub-command expected behaviour documentation and testing (#3447)Misc
Contributors
v2.2.2Compare Source
v2.2.2 adds a new container with a shell,
gcr.io/projectsigstore/cosign:vx.y.z-dev, in addition to the existingcontainer
gcr.io/projectsigstore/cosign:vx.y.zwithout a shell.For private deployments, we have also added an alias for
--insecure-skip-log,--private-infrastructure.Bug Fixes
Features
--yesflagcosign import-key-pairto skip the overwrite confirmation. (#3383)Container Updates
Documentation
Contributors
v2.2.1Compare Source
Note: This release comes with a fix for CVE-2023-46737 described in this Github Security Advisory. Please upgrade to this release ASAP
Enhancements
--onlyflag incosign copyto copy sign, att & sbom (#3247)Bug Fixes
SignedEntityto be more descriptive (#3233)Documentation
Others
Contributors
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.
♻ Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.