Skip to content

Update tool sigstore/cosign to v3#5055

Open
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/sigstore-cosign-3.x
Open

Update tool sigstore/cosign to v3#5055
renovate[bot] wants to merge 1 commit into
mainfrom
renovate/sigstore-cosign-3.x

Conversation

@renovate
Copy link
Copy Markdown
Contributor

@renovate renovate Bot commented May 7, 2026

This PR contains the following updates:

Package Update Change
sigstore/cosign major v2.5.0v3.0.6

Release Notes

sigstore/cosign (sigstore/cosign)

v3.0.6

Compare Source

Changelog

v3.0.6 resolves GHSA-w6c6-c85g-mmv6. This release also adds support for signing with OpenBao-managed keys.

Thanks to all contributors!

v3.0.5

Compare Source

Deprecations

Features

  • Automatically require signed timestamp with Rekor v2 entries (#​4666)
  • Allow --local-image with --new-bundle-format for v2 and v3 signatures (#​4626)
  • Add mTLS support for TSA client connections when signing with a signing config (#​4620)
  • Enforce TSA requirement for Rekor v2, Fuclio signing (#​4683)

Bug Fixes

  • Add empty predicate to cosign sign when payload type is application/vnd.in-toto+json (#​4635)
  • fix: avoid panic on malformed attestation payload (#​4651)
  • fix: avoid panic on malformed tlog entries (#​4649)
  • fix: avoid panic on malformed replace payload (#​4653)
  • Gracefully fail if bundle payload body is not a string (#​4648)
  • Verify validity of chain rather than just certificate (#​4663)
  • fix: avoid panic on malformed tlog entry body (#​4652)

Documentation

  • docs(cosign): clarify RFC3161 revocation semantics (#​4642)
  • Fix typo in CLI help (#​4701)

v3.0.4

Compare Source

v3.0.4 resolves GHSA-whqx-f9j3-ch6m.

Changes

  • Fix bundle verify path for old bundle/trusted root (GHSA-whqx-f9j3-ch6m) (#​4623)
  • Optimize cosign tree performance by caching digest resolution (#​4612)
  • Don't require a trusted root to verify offline with a key (#​4613)
  • Support default services for trusted-root and signing-config creation (#​4592)

v3.0.3

Compare Source

Thank you for all of your feedback on Cosign v3! v3.0.3 fixes a number of bugs reported by
the community along with adding compatibility for the new bundle format and attestation
storage in OCI to additional commands. We're continuing to work on compatibility with
the remaining commands and will have a new release shortly. If you run into any problems,
please file an issue

Changes

  • 4554: Closes 4554 - Add warning when --output* is used (#​4556)
  • Protobuf bundle support for subcommand clean (#​4539)
  • Add staging flag to initialize with staging TUF metadata
  • Updating sign-blob to also support signing with a certificate (#​4547)
  • Protobuf bundle support for subcommands save and load (#​4538)
  • Fix cert attachment for new bundle with signing config
  • Fix OCI verification with local cert - old bundle
  • Deprecate tlog-upload flag (#​4458)
  • fix: Use signal context for sign cli package.
  • update offline verification directions (#​4526)
  • Fix signing/verifying annotations for new bundle
  • Add support to download and attach for protobuf bundles (#​4477)
  • Add --signing-algorithm flag (#​3497)
  • Refactor signcommon bundle helpers
  • Add --bundle and fix --upload for new bundle
  • Pass insecure registry flags through to referrers
  • Add protobuf bundle support for tree subcommand (#​4491)
  • Remove stale embed import (#​4492)
  • Support multiple container identities
  • Fix segfault when no attestations are found (#​4472)
  • Use overridden repository for new bundle format (#​4473)
  • Remove --out flag from cosign initialize (#​4462)
  • Deprecate offline flag (#​4457)
  • Deduplicate code in sign/attest* and verify* commands (#​4449)
  • Cache signing config when calling initialize (#​4456)

v3.0.2

Compare Source

v3.0.2 is a functionally equivalent release to v3.0.0 and v3.0.1, with a fix for CI to publish signed releases in the new bundle format.

  • Note that the --bundle flag specifying an output file to write the Sigstore bundle (which contains all relevant verification material) has moved from optional to required in v3.

Changes

  • choose different signature filename for KMS-signed release signatures (#​4448)
  • Update rekor-tiles version path (#​4450)

v3.0.1

Compare Source

v3.0.1 is an equivalent release to v3.0.0, which was never published due to a failure in our CI workflows.

  • Note that the --bundle flag specifying an output file to write the Sigstore bundle (which contains all relevant verification material) has moved from optional to required in v3.

Changes

  • update goreleaser config for v3.0.0 release (#​4446)

v2.6.3

Compare Source

Changelog

v2.6.3 resolves GHSA-w6c6-c85g-mmv6.

Thanks to all contributors!

v2.6.2

Compare Source

v2.6.2 resolves GHSA-whqx-f9j3-ch6m.

Changes

v2.6.1

Compare Source

Bug Fixes

  • Partially populate the output of cosign verify when working with new bundles (#​4416)
  • Bump sigstore-go, move conformance back to tagged release (#​4426)

v2.6.0

Compare Source

v2.6.0 introduces a number of new features, including:

  • Signing an in-toto statement rather than Cosign constructing one from a predicate, along with verifying a statement's subject using a digest and digest algorithm rather than providing a file reference (#​4306)
  • Uploading a signature and its verification material (a "bundle") as an OCI Image 1.1 referring artifact, completing #​3927 (#​4316)
  • Providing service URLs for signing and attesting using a SigningConfig. Note that this is required when using a Rekor v2 instance (#​4319)

Example generation and verification of a signed in-toto statement:

cosign attest-blob --new-bundle-format=true --bundle="digest-key-test.sigstore.json" --key="cosign.key" --statement="../sigstore-go/examples/sigstore-go-signing/intoto.txt"
cosign verify-blob-attestation --bundle="digest-key-test.sigstore.json" --key=cosign.pub --type=unused --digest="b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9" --digestAlg="sha256"

Example container signing and verification using the new bundle format and referring artifacts:

cosign sign --new-bundle-format=true ghcr.io/user/alpine@sha256:a19367999603840546b8612572e338ec076c6d1f2fec61760a9e11410f546733
cosign verify --new-bundle-format=true ghcr.io/user/alpine@sha256:a19367999603840546b8612572e338ec076c6d1f2fec61760a9e11410f546733

Example usage of a signing config provided by the public good instance's TUF repository:

cosign sign-blob --use-signing-config --bundle sigstore.json README.md
cosign verify-blob --new-bundle-format --bundle sigstore.json --certificate-identity $EMAIL --certificate-oidc-issuer $ISSUER --use-signed-timestamps README.md

v2.6.0 leverages sigstore-go's signing and verification APIs gated behind these new flags. In an upcoming major release, we will be
updating Cosign to default to producing and consuming bundles to align with all other Sigstore SDKs.

Features

  • Add to attest-blob the ability to supply a complete in-toto statement, and add to verify-blob-attestation the ability to verify with just a digest (#​4306)
  • Have cosign sign support bundle format (#​4316)
  • Add support for SigningConfig for sign-blob/attest-blob, support Rekor v2 (#​4319)
  • Add support for SigningConfig in sign/attest (#​4371)
  • Support self-managed keys when signing with sigstore-go (#​4368)
  • Don't require timestamps when verifying with a key (#​4337)
  • Don't load content from TUF if trusted root path is specified (#​4347)
  • Add a terminal spinner while signing with sigstore-go (#​4402)
  • Require exclusively a SigningConfig or service URLs when signing (#​4403)
  • Remove SHA256 assumption in sign-blob/verify-blob (#​4050)
  • Bump sigstore-go, support alternative hash algorithms with keys (#​4386)

Breaking API Changes

  • sign.SignerFromKeyOpts no longer generates a key. Instead, it returns whether or not the client needs to generate a key, and if so, clients
    should call sign.KeylessSigner. This allows clients to more easily manage key generation.

Bug Fixes

  • Verify subject with bundle only when checking claims (#​4320)
  • Fixes to cosign sign / verify for the new bundle format (#​4346)

v2.5.3

Compare Source

Features

  • Add signing-config create command (#​4280)
  • Allow multiple services to be specified for trusted-root create (#​4285)
  • feat: Add OCI 1.1+ experimental support to tree (#​4205)
  • Add validity period end for trusted-root create (#​4271)

Bug Fixes

  • Fix cert verification logic for trusted-root/SCTs (#​4294)
  • force when copying the latest image to overwrite (#​4298)
  • avoid double-loading trustedroot from file (#​4264)

v2.5.2

Compare Source

Bug Fixes

  • Do not load trusted root when CT env key is set

Documentation

  • docs: improve doc for --no-upload option (#​4206)

v2.5.1

Compare Source

Features

  • Add Rekor v2 support for trusted-root create (#​4242)
  • Add baseUrl and Uri to trusted-root create command
  • Upgrade to TUF v2 client with trusted root
  • Don't verify SCT for a private PKI cert (#​4225)
  • Bump TSA library to relax EKU chain validation rules (#​4219)

Bug Fixes

  • Bump sigstore-go to pick up log index=0 fix (#​4162)
  • remove unused recursive flag on attest command (#​4187)

Docs

  • Fix indentation in verify-blob cmd examples (#​4160)

Releases

  • ensure we copy the latest tags on each release (#​4157)

Contributors

  • arthurus-rex
  • Babak K. Shandiz
  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Colleen Murphy
  • Dmitry Savintsev
  • Emmanuel Ferdman
  • Hayden B
  • Ville Skyttä

Configuration

📅 Schedule: (UTC)

  • Branch creation
    • At any time (no schedule defined)
  • Automerge
    • At any time (no schedule defined)

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate renovate Bot requested a review from a team as a code owner May 7, 2026 09:02
@renovate renovate Bot added the dependencies Pull requests that update a dependency file label May 7, 2026
@renovate renovate Bot changed the title chore(deps): update tool sigstore/cosign to v3 chore(deps): update tool sigstore/cosign to v3 - autoclosed May 7, 2026
@renovate renovate Bot closed this May 7, 2026
@renovate renovate Bot deleted the renovate/sigstore-cosign-3.x branch May 7, 2026 16:26
@renovate renovate Bot changed the title chore(deps): update tool sigstore/cosign to v3 - autoclosed Update tool sigstore/cosign to v3 May 13, 2026
@renovate renovate Bot reopened this May 13, 2026
@renovate renovate Bot force-pushed the renovate/sigstore-cosign-3.x branch 2 times, most recently from 94ff4cc to 01de81a Compare May 13, 2026 13:56
@renovate renovate Bot force-pushed the renovate/sigstore-cosign-3.x branch from 01de81a to 7fddafb Compare May 14, 2026 16:31
@github-actions
Copy link
Copy Markdown
Contributor

E2E Test Results

 38 files  261 suites   2h 25m 59s ⏱️
110 tests 108 ✅ 1 💤 1 ❌
283 runs  278 ✅ 4 💤 1 ❌

Results for commit 7fddafb.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants