Skip to content

Releases: sigstore/cosign

v1.9.0

03 Jun 14:08
v1.9.0
a4cb262
Compare
Choose a tag to compare

What's Changed

Read more

v1.8.0

27 Apr 14:16
v1.8.0
9ef6b20
Compare
Choose a tag to compare

⚠️ NOTE: If you use Fulcio to issue certificates you will need to use this release.

What's Changed

New Contributors

Full Changelog: v1.7.2...v1.8.0

Thanks to all contributors!

v1.7.2

12 Apr 12:15
v1.7.2
1b1bca3
Compare
Choose a tag to compare

What's Changed

Full Changelog: v1.7.1...v1.7.2

Thanks to all contributors!

v1.7.1

05 Apr 18:05
v1.7.1
53c28e4
Compare
Choose a tag to compare

What's Changed

Read more

v1.6.0

04 Mar 08:24
v1.6.0
4b2c3c0
Compare
Choose a tag to compare

This release contains fixes for GHSA-ccxc-vr6p-4858, affecting signature validations with Rekor. Only validation is affected, it is not necessary to re-sign any artifacts.
See: GHSA-ccxc-vr6p-4858

What's Changed

Read more

v1.5.2 - CVE-2022-23649

18 Feb 22:32
8ffcd12
Compare
Choose a tag to compare

This release contains fixes for CVE-2022-23649, affecting signature validations with Rekor. Only validation is affected, it is not necessary to re-sign any artifacts.
See: GHSA-ccxc-vr6p-4858

Changelog

Thanks for all contributors!

v1.5.1

31 Jan 18:41
c3e4d8b
Compare
Choose a tag to compare

Changelog

  • c3e4d8b Bump sigstore/sigstore to pick up oidc login for vault. (#1377)
  • 8b77279 Bump google.golang.org/api from 0.65.0 to 0.66.0 (#1371)
  • d2781b8 expose dafaults fulcio, rekor, oidc issuer urls (#1368)
  • 4921aa7 add check to make sure the go modules are in sync (#1369)
  • 6575648 README: fix link to race conditions (#1367)
  • e3024f4 Bump cloud.google.com/go/storage from 1.18.2 to 1.19.0 (#1365)
  • e1e0153 docs: verify-attestation cue and rego policy doc (#1362)
  • 21e6b80 Update verify-blob to support DSSEs (#1355)
  • 79012c3 organize, update select deps (#1358)
  • cd49449 Bump go-containerregistry to pick up ACR keychain fix (#1357)
  • 239d4c4 Bump github.com/go-openapi/runtime from 0.21.0 to 0.21.1 (#1352)
  • 44de8d1 sync go modules (#1353)

Thanks to all contributors!

Full Changelog: v1.5.0...v1.5.1

v1.5.0

24 Jan 19:14
7572520
Compare
Choose a tag to compare

Changelog

Thanks for all contributors!

v1.4.1

10 Dec 17:24
934567a
Compare
Choose a tag to compare

A whole buncha bugfixes!

Enhancements

  • Files created with --output-signature and --output-certificate now created with 0600 permissions (#1151)
  • Added cosign verify-attestation --local-image for verifying signed images with attestations from disk (#1174)
  • Added the ability to fetch the TUF root over HTTP with cosign initialize --mirror (#1185)

Bug Fixes

  • Fixed saving and loading a signed image index to disk (#1147)
  • Fixed sign-blob --output-certificate writing an empty file (#1149)
  • Fixed assorted issues related to the initialization and use of Sigstore's TUF root of trust (#1157)

Contributors

Changelog

Thanks for all contributors!

v1.4.0

07 Dec 00:03
50315fc
Compare
Choose a tag to compare

Highlights

  • BREAKING [COSIGN_EXPERIMENTAL]: This and future cosign releases will generate signatures that do not validate in older versions of cosign. This only applies to "keyless" experimental mode. To opt out of this behavior, use: --fulcio-url=https://fulcio.sigstore.dev when signing payloads (#1127)
  • BREAKING [cosign/pkg]: SignedEntryTimestamp is now of type []byte. To get the previous behavior, call strfmt.Base64(SignedEntryTimestamp) (#1083)
  • cosign-linux-pivkey-amd64 releases are now of the form cosign-linux-pivkey-pkcs11key-amd64 (#1052)
  • Releases are now additionally signed using the keyless workflow (#1073, #1111)

Enhancements

  • Validate the whole attestation statement, not just the predicate (#1035)
  • Added the options to replace attestations using cosign attest --replace (#1039)
  • Added URI to cosign verify-blob output (#1047)
  • Signatures and certificates created by cosign sign and cosign sign-blob can be output to file using the --output-signature and --output-certificate flags, respectively (#1016, #1093, #1066, #1095)
  • [cosign/pkg] Added the pkg/oci/layout package for storing signatures and attestations on disk (#1040, #1096)
  • [cosign/pkg] Added mutate methods to attach oci.Files to oci.Signed* objects (#1084)
  • Added the --signature-digest-algorithm flag to cosign verify, allowing verification of container image signatures which were generated with a non-SHA256 signature algorithm (#1071)
  • Builds should now be reproducible (#1053)
  • Allows base64 files as --cert in cosign verify-blob (#1088)
  • Kubernetes secrets generated for version >= 1.21 clusters have the immutible bit set (#1091)
  • Added cosign save and cosign load commands to save and upload container images and associated signatures to disk (#1094)
  • cosign sign will no longer fail to sign private images in keyless mode without --force (#1116)
  • cosign verify now supports signatures stored in files and remote URLs with --signature (#1068)
  • cosign verify now supports certs stored in files (#1095)
  • Added support for syft format in cosign attach sbom (#1137)

Bug Fixes

  • Fixed verification of Rekor bundles for InToto attestations (#1030)
  • Fixed a potential memory leak when signing and verifying with security keys (#1113)

Contributors

Changelog

Thanks for all contributors!