Skip to content

Conversation

@dependabot
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Jun 23, 2025

Bumps sigstore/cosign-installer from 3.7.0 to 3.9.0.

Release notes

Sourced from sigstore/cosign-installer's releases.

v3.9.0

What's Changed

Full Changelog: sigstore/cosign-installer@v3...v3.9.0

v3.8.2

What's Changed

Full Changelog: sigstore/cosign-installer@v3...v3.8.2

v3.8.1

What's Changed

Full Changelog: sigstore/cosign-installer@v3...v3.8.1

v3.8.0

What's Changed

Full Changelog: sigstore/cosign-installer@v3...v3.8.0

Commits
  • fb28c2b bump cosign install to use release v2.5.0 as default (#191)
  • e9a05e6 Bump actions/setup-go from 5.4.0 to 5.5.0 (#189)
  • 3454372 install cosign v2 from main (#186)
  • b6ee8f8 Bump actions/setup-go from 5.3.0 to 5.4.0 (#185)
  • d7d6bc7 use cosign 2.4.3 and other updates (#182)
  • c56c2d3 Bump actions/setup-go from 5.2.0 to 5.3.0 (#180)
  • 02e36b8 bump for cosign v2.4.2 release (#181)
  • 789d288 test action against all non-rc releases, verify entry in rekor log (#179)
  • e11c089 Bump actions/setup-go from 5.1.0 to 5.2.0 (#178)
  • 718228a Bump actions/setup-go from 5.0.2 to 5.1.0 (#176)
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

Bumps [sigstore/cosign-installer](https://github.com/sigstore/cosign-installer) from 3.7.0 to 3.9.0.
- [Release notes](https://github.com/sigstore/cosign-installer/releases)
- [Commits](sigstore/cosign-installer@dc72c7d...fb28c2b)

---
updated-dependencies:
- dependency-name: sigstore/cosign-installer
  dependency-version: 3.9.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot added dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code labels Jun 23, 2025
@dryrunsecurity
Copy link

DryRun Security

This pull request includes a recommendation to pin GitHub Actions to a specific commit hash in the release workflow, which is considered a positive security practice to prevent potential supply chain attacks by ensuring deliberate review of action updates.

Action Version Pinning in .github/workflows/release.yaml
Vulnerability Action Version Pinning
Description Pinning GitHub Actions to a specific commit hash is actually a recommended security practice to prevent potential supply chain attacks. While the suggestion frames this as a potential vulnerability, it is more accurately a security control. By using a specific commit hash, the workflow prevents unexpected changes from action maintainers that could introduce malicious or breaking modifications. The manual process of updating the hash ensures deliberate review of action updates, which is a positive security practice rather than a vulnerability.

- name: Run tests
run: go test ./... -coverprofile=coverage.out -coverpkg=./... -covermode=atomic
- uses: sigstore/cosign-installer@fb28c2b6339dcd94da6e4cbcbc5e888961f6f8c3 # v3.5 # installs cosign
- uses: anchore/sbom-action/download-syft@f325610c9f50a54015d37c8d16cb3b0e2c8f4de0 # v0.17 installs syft
- uses: goreleaser/goreleaser-action@9ed2f89a662bf1735a48bc8557fd212fa902bebf # v6 # run goreleaser
id: goreleaser


All finding details can be found in the DryRun Security Dashboard.

@dependabot @github
Copy link
Contributor Author

dependabot bot commented on behalf of github Jun 30, 2025

Superseded by #333.

@dependabot dependabot bot closed this Jun 30, 2025
@dependabot dependabot bot deleted the dependabot/github_actions/pre-main/sigstore/cosign-installer-3.9.0 branch June 30, 2025 04:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

dependencies Pull requests that update a dependency file github_actions Pull requests that update GitHub Actions code

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant