Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): bump github.com/sigstore/cosign/v2 from 2.0.3-0.20230523133326-0544abd8fc8a to 2.2.1 in /tools #705

Merged

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Nov 9, 2023

Bumps github.com/sigstore/cosign/v2 from 2.0.3-0.20230523133326-0544abd8fc8a to 2.2.1.

Release notes

Sourced from github.com/sigstore/cosign/v2's releases.

v2.2.1

Note: This release comes with a fix for CVE-2023-46737 described in this Github Security Advisory. Please upgrade to this release ASAP

Enhancements

  • feat: Support basic auth and bearer auth login to registry (#3310)
  • add support for ignoring certificates with pkcs11 (#3334)
  • Support ReplaceOp in Signatures (#3315)
  • feat: added ability to get image digest back via triangulate (#3255)
  • feat: add --only flag in cosign copy to copy sign, att & sbom (#3247)
  • feat: add support attaching a Rekor bundle to a container (#3246)
  • feat: add support outputting rekor response on signing (#3248)
  • feat: improve dockerfile verify subcommand (#3264)
  • Add guard flag for experimental OCI 1.1 verify. (#3272)
  • Deprecate SBOM attachments (#3256)
  • feat: dedent line in cosign copy doc (#3244)
  • feat: add platform flag to cosign copy command (#3234)
  • Add SLSA 1.0 attestation support to cosign. Closes #2860 (#3219)
  • attest: pass OCI remote opts to att resolver. (#3225)

Bug Fixes

  • Merge pull request from GHSA-vfp6-jrw2-99g9
  • fix: allow cosign download sbom when image is absent (#3245)
  • ci: add a OCI registry test for referrers support (#3253)
  • Fix ReplaceSignatures (#3292)
  • Stop using deprecated in_toto.ProvenanceStatement (#3243)
  • Fixes #3236, disable SCT checking for a cosign verification when usin… (#3237)
  • fix: update error in SignedEntity to be more descriptive (#3233)
  • Fail timestamp verification if no root is provided (#3224)

Documentation

  • Add some docs about verifying in an air-gapped environment (#3321)
  • Update CONTRIBUTING.md (#3268)
  • docs: improves the Contribution guidelines (#3257)
  • Remove security policy (#3230)

Others

  • Set go to min 1.21 and update dependencies (#3327)
  • Update contact for code of conduct (#3266)
  • Update .ko.yaml (#3240)

Contributors

  • AdamKorcz
  • Andres Galante
  • Appu
  • Billy Lynch
  • Bob Callaway
  • Caleb Woodbine

... (truncated)

Changelog

Sourced from github.com/sigstore/cosign/v2's changelog.

v2.2.1

Note: This release comes with a fix for CVE-2023-46737 described in this Github Security Advisory. Please upgrade to this release ASAP

Enhancements

  • feat: Support basic auth and bearer auth login to registry (#3310)
  • add support for ignoring certificates with pkcs11 (#3334)
  • Support ReplaceOp in Signatures (#3315)
  • feat: added ability to get image digest back via triangulate (#3255)
  • feat: add --only flag in cosign copy to copy sign, att & sbom (#3247)
  • feat: add support attaching a Rekor bundle to a container (#3246)
  • feat: add support outputting rekor response on signing (#3248)
  • feat: improve dockerfile verify subcommand (#3264)
  • Add guard flag for experimental OCI 1.1 verify. (#3272)
  • Deprecate SBOM attachments (#3256)
  • feat: dedent line in cosign copy doc (#3244)
  • feat: add platform flag to cosign copy command (#3234)
  • Add SLSA 1.0 attestation support to cosign. Closes #2860 (#3219)
  • attest: pass OCI remote opts to att resolver. (#3225)

Bug Fixes

  • Merge pull request from GHSA-vfp6-jrw2-99g9
  • fix: allow cosign download sbom when image is absent (#3245)
  • ci: add a OCI registry test for referrers support (#3253)
  • Fix ReplaceSignatures (#3292)
  • Stop using deprecated in_toto.ProvenanceStatement (#3243)
  • Fixes #3236, disable SCT checking for a cosign verification when usin… (#3237)
  • fix: update error in SignedEntity to be more descriptive (#3233)
  • Fail timestamp verification if no root is provided (#3224)

Documentation

  • Add some docs about verifying in an air-gapped environment (#3321)
  • Update CONTRIBUTING.md (#3268)
  • docs: improves the Contribution guidelines (#3257)
  • Remove security policy (#3230)

Others

  • Set go to min 1.21 and update dependencies (#3327)
  • Update contact for code of conduct (#3266)
  • Update .ko.yaml (#3240)

Contributors

  • AdamKorcz
  • Andres Galante
  • Appu
  • Billy Lynch
  • Bob Callaway
  • Caleb Woodbine

... (truncated)

Commits

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    You can disable automated security fix PRs for this repo from the Security Alerts page.

@dependabot dependabot bot added dependencies Pull requests that update a dependency file go labels Nov 9, 2023
@bpg
Copy link
Owner

bpg commented Nov 9, 2023

@dependabot rebase

@dependabot dependabot bot force-pushed the dependabot/go_modules/tools/github.com/sigstore/cosign/v2-2.2.1 branch from 3e5b07c to 6c5a8b9 Compare November 9, 2023 23:47
@bpg
Copy link
Owner

bpg commented Nov 10, 2023

@dependabot rebase

Bumps [github.com/sigstore/cosign/v2](https://github.com/sigstore/cosign) from 2.0.3-0.20230523133326-0544abd8fc8a to 2.2.1.
- [Release notes](https://github.com/sigstore/cosign/releases)
- [Changelog](https://github.com/sigstore/cosign/blob/main/CHANGELOG.md)
- [Commits](https://github.com/sigstore/cosign/commits/v2.2.1)

---
updated-dependencies:
- dependency-name: github.com/sigstore/cosign/v2
  dependency-type: indirect
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/tools/github.com/sigstore/cosign/v2-2.2.1 branch from 6c5a8b9 to 80a7c8a Compare November 10, 2023 01:51
…on/net/http/otelhttp => go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.44.0

Signed-off-by: Pavel Boldyrev <627562+bpg@users.noreply.github.com>
@bpg bpg enabled auto-merge (squash) November 10, 2023 01:58
@bpg bpg merged commit 3e6fe4d into main Nov 10, 2023
8 checks passed
@bpg bpg deleted the dependabot/go_modules/tools/github.com/sigstore/cosign/v2-2.2.1 branch November 10, 2023 01:58
@ghost ghost mentioned this pull request Nov 10, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file size/L
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant