Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Oct 29, 2025

This PR contains the following updates:

Package Change Age Confidence
github.com/sigstore/cosign/v2 v2.5.2 -> v3.0.3 age confidence

Warning

Some dependencies could not be looked up. Check the Dependency Dashboard for more information.


Release Notes

sigstore/cosign (github.com/sigstore/cosign/v2)

v3.0.3

Compare Source

Thank you for all of your feedback on Cosign v3! v3.0.3 fixes a number of bugs reported by
the community along with adding compatibility for the new bundle format and attestation
storage in OCI to additional commands. We're continuing to work on compatibility with
the remaining commands and will have a new release shortly. If you run into any problems,
please file an issue

Changes

  • 4554: Closes 4554 - Add warning when --output* is used (#​4556)
  • Protobuf bundle support for subcommand clean (#​4539)
  • Add staging flag to initialize with staging TUF metadata
  • Updating sign-blob to also support signing with a certificate (#​4547)
  • Protobuf bundle support for subcommands save and load (#​4538)
  • Fix cert attachment for new bundle with signing config
  • Fix OCI verification with local cert - old bundle
  • Deprecate tlog-upload flag (#​4458)
  • fix: Use signal context for sign cli package.
  • update offline verification directions (#​4526)
  • Fix signing/verifying annotations for new bundle
  • Add support to download and attach for protobuf bundles (#​4477)
  • Add --signing-algorithm flag (#​3497)
  • Refactor signcommon bundle helpers
  • Add --bundle and fix --upload for new bundle
  • Pass insecure registry flags through to referrers
  • Add protobuf bundle support for tree subcommand (#​4491)
  • Remove stale embed import (#​4492)
  • Support multiple container identities
  • Fix segfault when no attestations are found (#​4472)
  • Use overridden repository for new bundle format (#​4473)
  • Remove --out flag from cosign initialize (#​4462)
  • Deprecate offline flag (#​4457)
  • Deduplicate code in sign/attest* and verify* commands (#​4449)
  • Cache signing config when calling initialize (#​4456)

v3.0.2

Compare Source

v3.0.2 is a functionally equivalent release to v3.0.0 and v3.0.1, with a fix for CI to publish signed releases in the new bundle format.

  • Note that the --bundle flag specifying an output file to write the Sigstore bundle (which contains all relevant verification material) has moved from optional to required in v3.

Changes

  • choose different signature filename for KMS-signed release signatures (#​4448)
  • Update rekor-tiles version path (#​4450)

v3.0.1

Compare Source

v3.0.1 is an equivalent release to v3.0.0, which was never published due to a failure in our CI workflows.

  • Note that the --bundle flag specifying an output file to write the Sigstore bundle (which contains all relevant verification material) has moved from optional to required in v3.

Changes

  • update goreleaser config for v3.0.0 release (#​4446)

v3.0.0

Compare Source

Announcing the next major release of Cosign!

Cosign v3 is a minor change from Cosign v2.6.x, with all of the new capabilities of recent
releases on by default, but will still allow you to disable them if you need the older functionality.
These new features include support for the standardized bundle format (--new-bundle-fomat), providing roots
of trust for verification and service URLs for signing via one file (--trusted-root, --signing-config),
and container signatures stored as an OCI Image 1.1 referring artifact.

Learn more on our v3 announcement blog post! See
the changelogs for v2.6.0, v2.5.0, and v2.4.0 for more information on recent
changes.

If you have any feedback, please reach out on Slack or file an issue on GitHub.

Changes

  • Default to using the new protobuf format (#​4318)
  • Fetch service URLs from the TUF PGI signing config by default (#​4428)
  • Bump module version to v3 for Cosign v3.0 (#​4427)

v2.6.1

Compare Source

Bug Fixes

  • Partially populate the output of cosign verify when working with new bundles (#​4416)
  • Bump sigstore-go, move conformance back to tagged release (#​4426)

v2.6.0

Compare Source

v2.6.0 introduces a number of new features, including:

  • Signing an in-toto statement rather than Cosign constructing one from a predicate, along with verifying a statement's subject using a digest and digest algorithm rather than providing a file reference (#​4306)
  • Uploading a signature and its verification material (a "bundle") as an OCI Image 1.1 referring artifact, completing #​3927 (#​4316)
  • Providing service URLs for signing and attesting using a SigningConfig. Note that this is required when using a Rekor v2 instance (#​4319)

Example generation and verification of a signed in-toto statement:

cosign attest-blob --new-bundle-format=true --bundle="digest-key-test.sigstore.json" --key="cosign.key" --statement="../sigstore-go/examples/sigstore-go-signing/intoto.txt"
cosign verify-blob-attestation --bundle="digest-key-test.sigstore.json" --key=cosign.pub --type=unused --digest="b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9" --digestAlg="sha256"

Example container signing and verification using the new bundle format and referring artifacts:

cosign sign --new-bundle-format=true ghcr.io/user/alpine@sha256:a19367999603840546b8612572e338ec076c6d1f2fec61760a9e11410f546733
cosign verify --new-bundle-format=true ghcr.io/user/alpine@sha256:a19367999603840546b8612572e338ec076c6d1f2fec61760a9e11410f546733

Example usage of a signing config provided by the public good instance's TUF repository:

cosign sign-blob --use-signing-config --bundle sigstore.json README.md
cosign verify-blob --new-bundle-format --bundle sigstore.json --certificate-identity $EMAIL --certificate-oidc-issuer $ISSUER --use-signed-timestamps README.md

v2.6.0 leverages sigstore-go's signing and verification APIs gated behind these new flags. In an upcoming major release, we will be
updating Cosign to default to producing and consuming bundles to align with all other Sigstore SDKs.

Features

  • Add to attest-blob the ability to supply a complete in-toto statement, and add to verify-blob-attestation the ability to verify with just a digest (#​4306)
  • Have cosign sign support bundle format (#​4316)
  • Add support for SigningConfig for sign-blob/attest-blob, support Rekor v2 (#​4319)
  • Add support for SigningConfig in sign/attest (#​4371)
  • Support self-managed keys when signing with sigstore-go (#​4368)
  • Don't require timestamps when verifying with a key (#​4337)
  • Don't load content from TUF if trusted root path is specified (#​4347)
  • Add a terminal spinner while signing with sigstore-go (#​4402)
  • Require exclusively a SigningConfig or service URLs when signing (#​4403)
  • Remove SHA256 assumption in sign-blob/verify-blob (#​4050)
  • Bump sigstore-go, support alternative hash algorithms with keys (#​4386)

Breaking API Changes

  • sign.SignerFromKeyOpts no longer generates a key. Instead, it returns whether or not the client needs to generate a key, and if so, clients
    should call sign.KeylessSigner. This allows clients to more easily manage key generation.

Bug Fixes

  • Verify subject with bundle only when checking claims (#​4320)
  • Fixes to cosign sign / verify for the new bundle format (#​4346)

v2.5.3

Compare Source

Features

  • Add signing-config create command (#​4280)
  • Allow multiple services to be specified for trusted-root create (#​4285)
  • feat: Add OCI 1.1+ experimental support to tree (#​4205)
  • Add validity period end for trusted-root create (#​4271)

Bug Fixes

  • Fix cert verification logic for trusted-root/SCTs (#​4294)
  • force when copying the latest image to overwrite (#​4298)
  • avoid double-loading trustedroot from file (#​4264)

Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate
Copy link
Contributor Author

renovate bot commented Oct 29, 2025

ℹ Artifact update notice

File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 136 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.24.0 -> 1.25.0
cel.dev/expr v0.24.0 -> v0.25.1
cloud.google.com/go v0.121.2 -> v0.121.6
cloud.google.com/go/auth v0.16.2 -> v0.17.0
cloud.google.com/go/compute/metadata v0.7.0 -> v0.9.0
cloud.google.com/go/iam v1.5.2 -> v1.5.3
cloud.google.com/go/kms v1.22.0 -> v1.23.2
cloud.google.com/go/storage v1.55.0 -> v1.57.1
cuelabs.dev/go/oci/ociregistry v0.0.0-20241125120445-2c00c104c6e1 -> v0.0.0-20250722084951-074d06050084
cuelang.org/go v0.12.1 -> v0.15.1
github.com/Azure/azure-sdk-for-go/sdk/azcore v1.18.0 -> v1.20.0
github.com/Azure/azure-sdk-for-go/sdk/azidentity v1.10.1 -> v1.13.1
github.com/Azure/azure-sdk-for-go/sdk/internal v1.11.1 -> v1.11.2
github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/azkeys v1.3.1 -> v1.4.0
github.com/Azure/azure-sdk-for-go/sdk/security/keyvault/internal v1.1.1 -> v1.2.0
github.com/Azure/azure-sdk-for-go/sdk/storage/azblob v1.6.1 -> v1.6.3
github.com/AzureAD/microsoft-authentication-library-for-go v1.4.2 -> v1.6.0
github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.29.0 -> v1.30.0
github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/metric v0.51.0 -> v0.54.0
github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/resourcemapping v0.51.0 -> v0.54.0
github.com/aws/aws-sdk-go v1.55.7 -> v1.55.8
github.com/aws/aws-sdk-go-v2 v1.39.6 -> v1.40.0
github.com/aws/aws-sdk-go-v2/config v1.31.19 -> v1.32.2
github.com/aws/aws-sdk-go-v2/credentials v1.18.23 -> v1.19.2
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.18.13 -> v1.18.14
github.com/aws/aws-sdk-go-v2/feature/s3/manager v1.20.6 -> v1.20.12
github.com/aws/aws-sdk-go-v2/internal/configsources v1.4.13 -> v1.4.14
github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.7.13 -> v2.7.14
github.com/aws/aws-sdk-go-v2/internal/v4a v1.4.13 -> v1.4.14
github.com/aws/aws-sdk-go-v2/service/ecr v1.43.3 -> v1.51.2
github.com/aws/aws-sdk-go-v2/service/ecrpublic v1.32.2 -> v1.38.2
github.com/aws/aws-sdk-go-v2/service/internal/checksum v1.9.4 -> v1.9.5
github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.13.13 -> v1.13.14
github.com/aws/aws-sdk-go-v2/service/internal/s3shared v1.19.13 -> v1.19.14
github.com/aws/aws-sdk-go-v2/service/kms v1.41.0 -> v1.49.1
github.com/aws/aws-sdk-go-v2/service/s3 v1.90.1 -> v1.92.1
github.com/aws/aws-sdk-go-v2/service/sso v1.30.2 -> v1.30.5
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.35.6 -> v1.35.10
github.com/aws/aws-sdk-go-v2/service/sts v1.40.1 -> v1.41.2
github.com/aws/smithy-go v1.23.2 -> v1.24.0
github.com/awslabs/amazon-ecr-credential-helper/ecr-login v0.9.1 -> v0.11.0
github.com/buildkite/agent/v3 v3.98.2 -> v3.114.1
github.com/buildkite/go-pipeline v0.13.3 -> v0.16.0
github.com/buildkite/roko v1.3.1 -> v1.4.0
github.com/cncf/xds/go v0.0.0-20250501225837-2ac532fd4443 -> v0.0.0-20251022180443-0feb69152e9f
github.com/containerd/stargz-snapshotter/estargz v0.16.3 -> v0.18.1
github.com/coreos/go-oidc/v3 v3.14.1 -> v3.17.0
github.com/docker/cli v28.2.2+incompatible -> v29.0.3+incompatible
github.com/docker/docker v28.5.1+incompatible -> v28.5.2+incompatible
github.com/docker/docker-credential-helpers v0.9.3 -> v0.9.4
github.com/docker/go-connections v0.5.0 -> v0.6.0
github.com/emicklei/go-restful/v3 v3.11.0 -> v3.12.2
github.com/emicklei/proto v1.13.4 -> v1.14.2
github.com/envoyproxy/go-control-plane/envoy v1.32.4 -> v1.35.0
github.com/fxamacker/cbor/v2 v2.7.0 -> v2.9.0
github.com/gabriel-vasile/mimetype v1.4.8 -> v1.4.10
github.com/go-jose/go-jose/v4 v4.1.2 -> v4.1.3
github.com/go-openapi/analysis v0.23.0 -> v0.24.1
github.com/go-openapi/errors v0.22.1 -> v0.22.4
github.com/go-openapi/jsonpointer v0.21.1 -> v0.22.1
github.com/go-openapi/jsonreference v0.21.0 -> v0.21.3
github.com/go-openapi/loads v0.22.0 -> v0.23.2
github.com/go-openapi/runtime v0.28.0 -> v0.29.2
github.com/go-openapi/spec v0.21.0 -> v0.22.1
github.com/go-openapi/strfmt v0.23.0 -> v0.25.0
github.com/go-openapi/swag v0.23.1 -> v0.25.4
github.com/go-playground/validator/v10 v10.27.0 -> v10.28.0
github.com/gofrs/flock v0.12.1 -> v0.13.0
github.com/golang-jwt/jwt/v5 v5.2.2 -> v5.3.0
github.com/google/gnostic-models v0.6.9 -> v0.7.0
github.com/google/go-containerregistry v0.20.6 -> v0.20.7
github.com/google/rpmpack v0.7.0 -> v0.7.1
github.com/googleapis/enterprise-certificate-proxy v0.3.6 -> v0.3.7
github.com/googleapis/gax-go/v2 v2.14.2 -> v2.15.0
github.com/in-toto/attestation v1.1.1 -> v1.1.2
github.com/jellydator/ttlcache/v3 v3.3.0 -> v3.4.0
github.com/modern-go/reflect2 v1.0.2 -> v1.0.3-0.20250322232337-35a7c28c31ee
github.com/open-policy-agent/opa v1.5.1 -> v1.10.1
github.com/prometheus/client_golang v1.22.0 -> v1.23.2
github.com/prometheus/common v0.64.0 -> v0.67.4
github.com/prometheus/procfs v0.16.1 -> v0.17.0
github.com/protocolbuffers/txtpbfmt v0.0.0-20241112170944-20d2c9ebc01d -> v0.0.0-20251016062345-16587c79cd91
github.com/sagikazarmark/locafero v0.9.0 -> v0.11.0
github.com/secure-systems-lab/go-securesystemslib v0.9.0 -> v0.9.1
github.com/sergi/go-diff v1.3.2-0.20230802210424-5b0b94c5c0d3 -> v1.4.0
github.com/sigstore/fulcio v1.7.1 -> v1.8.3
github.com/sigstore/protobuf-specs v0.4.3 -> v0.5.0
github.com/sigstore/rekor v1.3.10 -> v1.4.3
github.com/sigstore/sigstore v1.9.5 -> v1.10.0
github.com/sigstore/sigstore-go v1.0.0 -> v1.1.4-0.20251201121426-2cdedea80894
github.com/sigstore/sigstore/pkg/signature/kms/aws v1.9.5 -> v1.10.0
github.com/sigstore/sigstore/pkg/signature/kms/azure v1.9.5 -> v1.10.0
github.com/sigstore/sigstore/pkg/signature/kms/gcp v1.9.5 -> v1.10.0
github.com/sigstore/sigstore/pkg/signature/kms/hashivault v1.9.5 -> v1.10.0
github.com/sigstore/timestamp-authority v1.2.8 -> v1.2.9
github.com/sirupsen/logrus v1.9.3 -> v1.9.4-0.20230606125235-dd1b4c2e81af
github.com/sourcegraph/conc v0.3.0 -> v0.3.1-0.20240121214520-5f936abd7ae8
github.com/spf13/afero v1.14.0 -> v1.15.0
github.com/spf13/cast v1.9.2 -> v1.10.0
github.com/spf13/cobra v1.9.1 -> v1.10.2
github.com/spf13/pflag v1.0.7 -> v1.0.10
github.com/spf13/viper v1.20.1 -> v1.21.0
github.com/spiffe/go-spiffe/v2 v2.5.0 -> v2.6.0
github.com/tchap/go-patricia/v2 v2.3.2 -> v2.3.3
github.com/theupdateframework/go-tuf/v2 v2.1.1 -> v2.3.0
github.com/vbatts/tar-split v0.12.1 -> v0.12.2
github.com/vektah/gqlparser/v2 v2.5.27 -> v2.5.30
gitlab.com/gitlab-org/api/client-go v0.130.1 -> v0.160.0
go.mongodb.org/mongo-driver v1.17.3 -> v1.17.6
go.opentelemetry.io/auto/sdk v1.1.0 -> v1.2.1
go.opentelemetry.io/contrib/detectors/gcp v1.36.0 -> v1.38.0
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.61.0 -> v0.63.0
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.61.0 -> v0.63.0
go.uber.org/mock v0.5.2 -> v0.6.0
go.uber.org/zap v1.27.0 -> v1.27.1
golang.org/x/crypto v0.44.0 -> v0.45.0
golang.org/x/exp v0.0.0-20250408133849-7e4ce0ab07d0 -> v0.0.0-20250620022241-b7579e27df2b
golang.org/x/mod v0.29.0 -> v0.30.0
golang.org/x/oauth2 v0.30.0 -> v0.33.0
golang.org/x/time v0.12.0 -> v0.14.0
golang.org/x/tools v0.38.0 -> v0.39.0
google.golang.org/api v0.242.0 -> v0.256.0
google.golang.org/genproto v0.0.0-20250505200425-f936aa4a68b2 -> v0.0.0-20250922171735-9219d122eba9
gotest.tools/gotestsum v1.12.3 -> v1.13.0
k8s.io/api v0.33.1 -> v0.34.2
k8s.io/apimachinery v0.33.1 -> v0.34.2
k8s.io/client-go v0.33.1 -> v0.34.2
k8s.io/kube-openapi v0.0.0-20250318190949-c8a335a9a2ff -> v0.0.0-20250710124328-f3f2b991d03b
k8s.io/utils v0.0.0-20250321185631-1f6e0b77f77e -> v0.0.0-20250820121507-0af2bda4dd1d
mvdan.cc/gofumpt v0.8.0 -> v0.9.2
sigs.k8s.io/json v0.0.0-20241010143419-9aa6b5e7a4b3 -> v0.0.0-20241014173422-cfa47c3a1cc8
sigs.k8s.io/release-utils v0.11.1 -> v0.12.2
sigs.k8s.io/yaml v1.4.0 -> v1.6.0
github.com/grpc-ecosystem/grpc-gateway/v2 v2.27.2 -> v2.27.3
google.golang.org/genproto/googleapis/api v0.0.0-20250825161204-c5933d9347a5 -> v0.0.0-20251022142026-3a174f9686a8
google.golang.org/genproto/googleapis/rpc v0.0.0-20250825161204-c5933d9347a5 -> v0.0.0-20251103181224-f26f9409b101
google.golang.org/grpc v1.76.0 -> v1.77.0

@renovate renovate bot requested a review from a team as a code owner October 29, 2025 13:37
@renovate renovate bot force-pushed the renovate/github.com-sigstore-cosign-v2-3.x branch from dab1139 to 0bcccdc Compare October 29, 2025 13:41
@renovate renovate bot force-pushed the renovate/github.com-sigstore-cosign-v2-3.x branch from 0bcccdc to dad6e2b Compare November 12, 2025 14:20
@renovate renovate bot force-pushed the renovate/github.com-sigstore-cosign-v2-3.x branch from dad6e2b to a01ed02 Compare December 8, 2025 16:55
@renovate renovate bot force-pushed the renovate/github.com-sigstore-cosign-v2-3.x branch from a01ed02 to 8b2ddcd Compare December 10, 2025 04:38
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants