Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed #67

Closed
wants to merge 1 commit into from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Sep 12, 2023

Mend Renovate

This PR contains the following updates:

Package Type Update Change
github.com/sigstore/cosign require major v1.13.1 -> v2.2.2

Release Notes

sigstore/cosign (github.com/sigstore/cosign)

v2.2.2

Compare Source

v2.2.2 adds a new container with a shell, gcr.io/projectsigstore/cosign:vx.y.z-dev, in addition to the existing
container gcr.io/projectsigstore/cosign:vx.y.z without a shell.

For private deployments, we have also added an alias for --insecure-skip-log, --private-infrastructure.

Bug Fixes

  • chore(deps): bump github.com/sigstore/sigstore from 1.7.5 to 1.7.6 (#​3411) which fixes a bug with using Azure KMS
  • Don't require CT log keys if using a key/sk (#​3415)
  • Fix copy without any flag set (#​3409)
  • Update cosign generate cmd to not include newline (#​3393)
  • Fix idempotency error with signing (#​3371)

Features

  • Add --yes flag cosign import-key-pair to skip the overwrite confirmation. (#​3383)
  • Use the timeout flag value in verify* commands. (#​3391)
  • add --private-infrastructure flag (#​3369)

Container Updates

  • Bump builder image to use go1.21.4 and add new cosign image tags with shell (#​3373)

Documentation

Contributors

  • Carlos Tadeu Panato Junior
  • Dylan Richardson
  • Hayden B
  • Lily Sturmann
  • Nikos Fotiou
  • Yonghe Zhao

v2.2.1

Compare Source

Note: This release comes with a fix for CVE-2023-46737 described in this Github Security Advisory. Please upgrade to this release ASAP

Enhancements

  • feat: Support basic auth and bearer auth login to registry (#​3310)
  • add support for ignoring certificates with pkcs11 (#​3334)
  • Support ReplaceOp in Signatures (#​3315)
  • feat: added ability to get image digest back via triangulate (#​3255)
  • feat: add --only flag in cosign copy to copy sign, att & sbom (#​3247)
  • feat: add support attaching a Rekor bundle to a container (#​3246)
  • feat: add support outputting rekor response on signing (#​3248)
  • feat: improve dockerfile verify subcommand (#​3264)
  • Add guard flag for experimental OCI 1.1 verify. (#​3272)
  • Deprecate SBOM attachments (#​3256)
  • feat: dedent line in cosign copy doc (#​3244)
  • feat: add platform flag to cosign copy command (#​3234)
  • Add SLSA 1.0 attestation support to cosign. Closes #​2860 (#​3219)
  • attest: pass OCI remote opts to att resolver. (#​3225)

Bug Fixes

  • Merge pull request from GHSA-vfp6-jrw2-99g9
  • fix: allow cosign download sbom when image is absent (#​3245)
  • ci: add a OCI registry test for referrers support (#​3253)
  • Fix ReplaceSignatures (#​3292)
  • Stop using deprecated in_toto.ProvenanceStatement (#​3243)
  • Fixes #​3236, disable SCT checking for a cosign verification when usin… (#​3237)
  • fix: update error in SignedEntity to be more descriptive (#​3233)
  • Fail timestamp verification if no root is provided (#​3224)

Documentation

  • Add some docs about verifying in an air-gapped environment (#​3321)
  • Update CONTRIBUTING.md (#​3268)
  • docs: improves the Contribution guidelines (#​3257)
  • Remove security policy (#​3230)

Others

  • Set go to min 1.21 and update dependencies (#​3327)
  • Update contact for code of conduct (#​3266)
  • Update .ko.yaml (#​3240)

Contributors

  • AdamKorcz
  • Andres Galante
  • Appu
  • Billy Lynch
  • Bob Callaway
  • Caleb Woodbine
  • Carlos Tadeu Panato Junior
  • Dylan Richardson
  • Gareth Healy
  • Hayden B
  • John Kjell
  • Jon Johnson
  • jonvnadelberg
  • Luiz Carvalho
  • Priya Wadhwa
  • Ramkumar Chinchani
  • Tosone
  • Ville Aikas
  • Vishal Choudhary
  • ziel

v2.2.0

Compare Source

Enhancements

  • switch to uploading DSSE types to rekor instead of intoto (#​3113)
  • add 'cosign sign' command-line parameters for mTLS (#​3052)
  • improve error messages around bundle != payload hash (#​3146)
  • make VerifyImageAttestation function public (#​3156)
  • Switch to cryptoutils function for SANS (#​3185)
  • Handle HTTP_1_1_REQUIRED errors in github provider (#​3172)

Bug Fixes

  • Fix nondeterminsitic timestamps (#​3121)

Documentation

  • doc: Add example of sign-blob with key in env var (#​3152)
  • add deprecation notice for cosign-releases GCS bucket (#​3148)
  • update doc links (#​3186)

Others

  • Upgrade to go1.21 (#​3188)
  • Updates ci tests (#​3142)
  • test using latest release of scaffolding (#​3187)
  • ci: free up disk space for the gh runner (#​3169)
  • update go-github to v53 (#​3116)
  • call e2e test for cosign attach (#​3112)
  • bump build cross to use go1.20.6 and cosign image to 2.1.1 (#​3108)

Contributors

  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Dmitry Savintsev
  • Hayden B
  • Hector Fernandez
  • Jason Hall
  • Jon Johnson
  • Jubril Oyetunji
  • Paulo Gomes
  • Priya Wadhwa
  • 张志强

v2.1.1

Compare Source

Bug Fixes

  • wait for the workers become available again to continue the execution (#​3084)
  • fix help text when in a container (#​3082)

Documentation

Contributors

  • Carlos Tadeu Panato Junior
  • priyawadhwa

v2.1.0

Compare Source

Breaking Change: The predicate is now a required flag in the attest commands, set via the --type flag.

Enhancements

  • Verify sigs and attestations in parallel (#​3066)
  • Deep inspect attestations when filtering download (#​3031)
  • refactor bundle validation code, add support for DSSE rekor type (#​3016)
  • Allow overriding remote options (#​3049)
  • feat: adds no cert found on sig exit code (#​3038)
  • Make predicate a required flag in attest commands (#​3033)
  • Added support for attaching Time stamp authority Response in attach command (#​3001)
  • Add sign --sign-container-identity CLI (#​2984)
  • Feature: Allow cosign to sign digests before they are uploaded. (#​2959)
  • accepts attachment-tag-prefix for cosign copy (#​3014)
  • Feature: adds '--allow-insecure-registry' for cosign load (#​3000)
  • download attestation: support --platform flag (#​2980)
  • Cleanup: Add Digest to the SignedEntity interface. (#​2960)
  • verify command: support keyless verification using only a provided certificate chain with non-fulcio roots (#​2845)
  • verify: use workers to limit the paralellism when verifying images with --max-workers flag (#​3069)

Bug Fixes

  • Fix pkg/cosign/errors (#​3050)
  • fix: update doc to refer to github-actions oidc provider (#​3040)
  • fix: prefer GitHub OIDC provider if enabled (#​3044)
  • Fix --sig-only in cosign copy (#​3074)

Documentation

  • Fix links to sigstore/docs in markdown files (#​3064)
  • Update release readme (#​2942)

Contributors

Thank you to our contributors!

  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Chok Yip Lau
  • Chris Burns
  • Dmitry Savintsev
  • Enyinna Ochulor
  • Hayden B
  • Hector Fernandez
  • Jakub Hrozek
  • Jason Hall
  • Jon Johnson
  • Luiz Carvalho
  • Matt Moore
  • Mritunjay Kumar Sharma
  • Mukuls77
  • Ramkumar Chinchani
  • Sascha Grunert
  • Yolanda Robla Mota
  • priyawadhwa

v2.0.2

Compare Source

Enhancements

  • Update sigstore/sigstore to v1.6.2 to pick up TUF CDN change (#​2891)
  • feat: Make cosign copy faster (#​2901)
  • remove sget (#​2885)
  • Require a payload to be provided with a signature (#​2785)

Bug Fixes

  • cmd: Change error message from KeyParseError to PubKeyParseError for verify-blob. (#​2876)
  • Use SOURCE_DATE_EPOCH for OCI CreatedAt times (#​2878)

Documentation

  • Remove experimental warning from Fulcio flags (#​2923)
  • add missing oidc provider (#​2922)
  • Add zot as a supported registry (#​2920)
  • deprecates kms_support docs (#​2900)
  • chore(docs) deprecate note for usage docs (#​2906)
  • adds note of deprecation for examples.md docs (#​2899)

Contributors

  • Carlos Tadeu Panato Junior
  • Chris Burns
  • Dmitry Savintsev
  • eiffel-fl
  • Hayden B
  • Hector Fernandez
  • Jon Johnson
  • Miloslav Trmač
  • priyawadhwa
  • Ramkumar Chinchani

v2.0.1

Compare Source

Enhancements

  • Add environment variable token provider (#​2864)
  • Remove cosign policy command (#​2846)
  • Allow customising 'go' executable with GOEXE var (#​2841)
  • Consistent tlog warnings during verification (#​2840)
  • Add riscv64 arch (#​2821)
  • Default generated PEM labels to SIGSTORE (#​2735)
  • Update privacy statement and confirmation (#​2797)
  • Add exit codes for verify errors (#​2766)
  • Add Buildkite provider (#​2779)
  • verify-blob-attestation: Loosen arg requirements if --check-claims=false (#​2746)

Bug Fixes

  • PKCS11 sessions are now opened read only (#​2853)
  • Makefile: date format of log should not show signatures (#​2835)
  • Add missing flags to cosign verify dockerfile/manifest (#​2830)
  • Add a warning to remember how to configure a custom Gitlab host (#​2816)
  • Remove tag warning message from save/copy commands (#​2799)
  • Mark keyless pem files with b64 (#​2671)

Contributors

  • Aleksandr Razumov
  • Batuhan Apaydın
  • Billy Lynch
  • Carlos Tadeu Panato Junior
  • Chris Burns
  • Derek Burdick
  • Dmitry Savintsev
  • favonia
  • Hayden B
  • Hector Fernandez
  • Ivana Atanasova
  • joe miller
  • Luiz Carvalho
  • Paolo Mainardi
  • priyawadhwa
  • Radoslav Dimitrov
  • Steve Winslow
  • Vincent Batts
  • Zack Newman

v2.0.0

Compare Source

This is the official 2.0.0 release of cosign!
There are many new features and breaking changes from version 1.x, for a full explanation please read the Cosign 2.0 blog post.

Breaking Changes

  • COSIGN_EXPERIMENTAL=1 is no longer required to have identity-based ("keyless") signing and transparency.
  • By default, artifact signatures will be uploaded to Rekor, for both key-based and identity-based signing. To not upload to Rekor, include --tlog-upload=false.
    • You must also include --insecure-ignore-tlog=true when verifying an artifact that was not uploaded to Rekor.
    • Examples of when you may want to skip uploading to the transparency log are if you have a private Sigstore deployment that does not use transparency or a private artifact.
    • We strongly encourage all other use-cases to upload artifact signatures to Rekor. Transparency is a critical component of supply chain security, to allow artifact maintainers and consumers to monitor a public log for their artifacts and signing identities.
  • Verification now requires identity flags, --certificate-identity and --certificate-oidc-issuer. Like verifying a signature with a public key, it's critical to specify who you trust to generate a signature for identity-based signing. See #​2056 for more discussion on this change.
  • --certificate-email has been removed. Use --certificate-identity, which supports not only email verification but also any identity specified in a certificate, including SPIFFE, GitHub Actions, or service account identities.
  • Cosign no longer supports providing a certificate that does not conform to the Fulcio certificate profile, which includes setting the SubjectAlternativeName and OIDC Issuer OID. To verify with a non-conformant certificate, extract the public key from the certificate and verify with cosign verify --key <key.pem>. We are actively working on more support for custom certificates for those who want to bring their existing PKI.
  • Signing OCI images by tag prints a warning and is strongly discouraged, e.g. cosign sign container.registry.io/foo:tag. This is considered insecure since tags are mutable. If you want to specify a particular image, you are recommended to do so by digest.
  • SCT verification, a proof of inclusion in a certificate transparency log, is now on by default for verifying Fulcio certificates. For private deployments without certificate transparency, use --insecure-ignore-sct=true to skip this check.
  • DSSE support in verify-blob has been removed. You can now verify attestations using verify-blob-attestation.
  • Environment variable SIGSTORE_TRUST_REKOR_API_PUBLIC_KEY has been removed. For private deployments, if you would like to set the Rekor public key to verify transparency log entries, use either a TUF setup or set SIGSTORE_REKOR_PUBLIC_KEY with the PEM of the custom Rekor public key..
  • verify-blob no longer searches for a certificate. You must provide one with either --certificate or --bundle.
  • cosign attest --type {custom|vuln} (and cosign verify-attestation) will now use the RFC 3986 compliant URIs, adding https://, so that these predicate types are compliant with the in-toto specification.
  • The CosignPredicate envelope that wraps the predicates of SPDX and CycloneDX attestations has been removed, which was a violation of the schema specified via the predicateType field (more information).
  • --force has been removed. To skip any prompts, use --yes.

Improvements

  • Blob attestation and verification is now supported with cosign attest-blob and cosign verify-blob-attestation.
  • You can now set flags via environment variables, for example instead of --certificate-identity=email, you can set an environment variable for COSIGN_CERTIFICATE_IDENTITY=email.
  • --offline=true removes the fallback to the Rekor log when verifying an artifact. Previously, if you did not provide a bundle (a persisted response from Rekor), Cosign would fallback to querying Rekor. You can now skip this fallback for offline environments. Note that if the bundle fails to verify, Cosign will not fallback and will fail early.
  • A Fulcio certificate can now be issued for self-managed keys by providing --issue-certificate=true with a key, --key, or security key, --sk. This is useful when adopting Sigstore incrementally.
  • Experimental support for trusted timestamping has been added. Timestamping leverages a third party to provide the timestamp that will be used to verify short-lived Fulcio certificates, which distributes trust. We will be writing more about this in an upcoming blog post!
    • To use a timestamp when signing a container, use cosign sign --timestamp-server-url=<url> <container>, such as https://freetsa.org/tsr, and to verify, cosign verify --timestamp-certificate-chain=<path-to-PEM-encodeded-chain> <other flags> <artifact>.
    • To use a timestamp when signing a blob, use cosign sign-blob --timestamp-server-url=<url> --rfc3161-timestamp=<output-path> --bundle=<output-path> <blob>, and to verify, cosign verify-blob --rfc3161-timestamp=<output-path> --timestamp-certificate-chain=<path-to-PEM-encoded-chain> --bundle=<output-path> <other flags> <blob>.

For specific PRs representing enhancements, bug fixes, documentation, and breaking changes, please see the sections below for prereleases v2.0.0-rc.0, v2.0.0-rc.1, v2.0.0-rc.2, and v2.0.0-rc.3.

Thanks to all contributors!
  • Anish Shah
  • Arnaud J Le Hors
  • Arthur Lutz
  • Batuhan Apaydın
  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Chris Burns
  • Christian Loos
  • Emmanuel T Odeke
  • Hayden B
  • Hector Fernandez
  • Huang Huang
  • Jan Wozniak
  • Josh Dolitsky
  • Josh Wolf
  • Kenny Leung
  • Marko Mudrinić
  • Matt Moore
  • Matthias Glastra
  • Miloslav Trmač
  • Mukuls77
  • Priya Wadhwa
  • Puerco
  • Stefan Zhelyazkov
  • Tim Seagren
  • Tom Meadows
  • Ville Aikas
  • Zack Newman
  • asraa
  • kpk47
  • priyawadhwa

v1.13.2

Compare Source

What's Changed

Full Changelog: sigstore/cosign@v1.13.1...v1.13.2


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot requested a review from a team as a code owner September 12, 2023 07:59
@renovate renovate bot force-pushed the renovate/github.com-sigstore-cosign-2.x branch 2 times, most recently from 796aebf to 93c6a83 Compare September 12, 2023 08:20
@github-actions
Copy link

Pull Request Test Coverage Report for Build 6156791357

  • 0 of 0 changed or added relevant lines in 0 files are covered.
  • No unchanged relevant lines lost coverage.
  • Overall coverage remained the same at 68.948%

Totals Coverage Status
Change from base Build 6156651662: 0.0%
Covered Lines: 1743
Relevant Lines: 2528

💛 - Coveralls

@renovate renovate bot force-pushed the renovate/github.com-sigstore-cosign-2.x branch from 93c6a83 to b77c111 Compare October 31, 2023 14:35
@github-actions github-actions bot added size/XS and removed size/XXL labels Oct 31, 2023
@renovate renovate bot force-pushed the renovate/github.com-sigstore-cosign-2.x branch from b77c111 to 1831716 Compare November 1, 2023 08:42
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed Nov 8, 2023
@renovate renovate bot closed this Nov 8, 2023
@renovate renovate bot deleted the renovate/github.com-sigstore-cosign-2.x branch November 8, 2023 17:10
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed chore(deps): update module github.com/sigstore/cosign to v2 Nov 10, 2023
@renovate renovate bot reopened this Nov 10, 2023
@renovate renovate bot restored the renovate/github.com-sigstore-cosign-2.x branch November 10, 2023 01:30
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed Nov 10, 2023
@renovate renovate bot closed this Nov 10, 2023
@renovate renovate bot deleted the renovate/github.com-sigstore-cosign-2.x branch November 10, 2023 04:25
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed chore(deps): update module github.com/sigstore/cosign to v2 Nov 10, 2023
@renovate renovate bot reopened this Nov 10, 2023
@renovate renovate bot restored the renovate/github.com-sigstore-cosign-2.x branch November 10, 2023 13:36
@renovate renovate bot force-pushed the renovate/github.com-sigstore-cosign-2.x branch from 1831716 to 6519c15 Compare November 10, 2023 15:41
@github-actions github-actions bot added size/XXL and removed size/XS labels Nov 10, 2023
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed Nov 11, 2023
@renovate renovate bot closed this Nov 11, 2023
@renovate renovate bot deleted the renovate/github.com-sigstore-cosign-2.x branch November 11, 2023 10:48
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed chore(deps): update module github.com/sigstore/cosign to v2 Nov 11, 2023
@renovate renovate bot reopened this Dec 8, 2023
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed Dec 8, 2023
@renovate renovate bot closed this Dec 8, 2023
@renovate renovate bot deleted the renovate/github.com-sigstore-cosign-2.x branch December 8, 2023 06:04
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed chore(deps): update module github.com/sigstore/cosign to v2 Dec 8, 2023
@renovate renovate bot restored the renovate/github.com-sigstore-cosign-2.x branch December 8, 2023 09:28
@renovate renovate bot reopened this Dec 8, 2023
@renovate renovate bot force-pushed the renovate/github.com-sigstore-cosign-2.x branch from 91dfd39 to e600722 Compare December 8, 2023 22:18
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed Dec 9, 2023
@renovate renovate bot closed this Dec 9, 2023
@renovate renovate bot deleted the renovate/github.com-sigstore-cosign-2.x branch December 9, 2023 04:58
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed chore(deps): update module github.com/sigstore/cosign to v2 Dec 9, 2023
@renovate renovate bot restored the renovate/github.com-sigstore-cosign-2.x branch December 9, 2023 06:42
@renovate renovate bot reopened this Dec 9, 2023
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed Dec 9, 2023
@renovate renovate bot closed this Dec 9, 2023
@renovate renovate bot deleted the renovate/github.com-sigstore-cosign-2.x branch December 9, 2023 10:00
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed chore(deps): update module github.com/sigstore/cosign to v2 Dec 9, 2023
@renovate renovate bot reopened this Dec 9, 2023
@renovate renovate bot restored the renovate/github.com-sigstore-cosign-2.x branch December 9, 2023 13:18
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed Dec 10, 2023
@renovate renovate bot closed this Dec 10, 2023
@renovate renovate bot deleted the renovate/github.com-sigstore-cosign-2.x branch December 10, 2023 15:10
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed chore(deps): update module github.com/sigstore/cosign to v2 Dec 10, 2023
@renovate renovate bot reopened this Dec 10, 2023
@renovate renovate bot restored the renovate/github.com-sigstore-cosign-2.x branch December 10, 2023 19:45
@renovate renovate bot changed the title chore(deps): update module github.com/sigstore/cosign to v2 chore(deps): update module github.com/sigstore/cosign to v2 - autoclosed Dec 11, 2023
@renovate renovate bot closed this Dec 11, 2023
@renovate renovate bot deleted the renovate/github.com-sigstore-cosign-2.x branch December 11, 2023 18:07
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

0 participants