Skip to content

Conversation

@renovate
Copy link
Contributor

@renovate renovate bot commented Jan 13, 2026

This PR contains the following updates:

Package Change Age Adoption Passing Confidence
github.com/sigstore/cosign/v2 v2.4.1v2.6.2 age adoption passing confidence

GitHub Vulnerability Alerts

CVE-2026-22703

Impact

A Cosign bundle can be crafted to successfully verify an artifact even if the embedded Rekor entry does not reference the artifact's digest, signature or public key. When verifying a Rekor entry, Cosign verifies the Rekor entry signature, and also compares the artifact's digest, the user's public key from either a Fulcio certificate or provided by the user, and the artifact signature to the Rekor entry contents. Without these comparisons, Cosign would accept any response from Rekor as valid. A malicious actor that has compromised a user's identity or signing key could construct a valid Cosign bundle by including any arbitrary Rekor entry, thus preventing the user from being able to audit the signing event.

This vulnerability only affects users that provide a trusted root via --trusted-root or when fetched automatically from a TUF repository, when no trusted key material is provided via SIGSTORE_REKOR_PUBLIC_KEY. When using the default flag values in Cosign v3 to sign and verify (--use-signing-config=true and --new-bundle-format=true for signing, --new-bundle-format=true for verification), users are unaffected. Cosign v2 users are affected using the default flag values.

This issue had previously been fixed in GHSA-8gw7-4j42-w388 but recent refactoring caused a regression. We have added testing to prevent a future regression.

Steps to Reproduce

echo blob > /tmp/blob
cosign sign-blob -y --new-bundle-format=false --bundle /tmp/bundle.1 --use-signing-config=false /tmp/blob
cosign sign-blob -y --new-bundle-format=false --bundle /tmp/bundle.2 --use-signing-config=false /tmp/blob
jq ".rekorBundle |= $(jq .rekorBundle /tmp/bundle.2)" /tmp/bundle.1 > /tmp/bundle.3
cosign verify-blob --bundle /tmp/bundle.3 --certificate-identity-regexp='.*' --certificate-oidc-issuer-regexp='.*' /tmp/blob

Patches

Upgrade to Cosign v2.6.2 or Cosign v3.0.4. This does not affect Cosign v1.

Workarounds

You can provide trusted key material via a set of flags under certain conditions. The simplest fix is to upgrade to the latest Cosign v2 or v3 release.

Note that the example below works for cosign verify, cosign verify-blob, cosign verify-blob-attestation, and cosign verify-attestation`.

SIGSTORE_REKOR_PUBLIC_KEY=<path to Rekor pub key> cosign verify-blob --use-signing-config=false --new-bundle-format=false --bundle=<path to bundle> <artifact>

Release Notes

sigstore/cosign (github.com/sigstore/cosign/v2)

v2.6.2

Compare Source

v2.6.2 resolves GHSA-whqx-f9j3-ch6m.

Changes

v2.6.1

Compare Source

Bug Fixes

  • Partially populate the output of cosign verify when working with new bundles (#​4416)
  • Bump sigstore-go, move conformance back to tagged release (#​4426)

v2.6.0

Compare Source

v2.6.0 introduces a number of new features, including:

  • Signing an in-toto statement rather than Cosign constructing one from a predicate, along with verifying a statement's subject using a digest and digest algorithm rather than providing a file reference (#​4306)
  • Uploading a signature and its verification material (a "bundle") as an OCI Image 1.1 referring artifact, completing #​3927 (#​4316)
  • Providing service URLs for signing and attesting using a SigningConfig. Note that this is required when using a Rekor v2 instance (#​4319)

Example generation and verification of a signed in-toto statement:

cosign attest-blob --new-bundle-format=true --bundle="digest-key-test.sigstore.json" --key="cosign.key" --statement="../sigstore-go/examples/sigstore-go-signing/intoto.txt"
cosign verify-blob-attestation --bundle="digest-key-test.sigstore.json" --key=cosign.pub --type=unused --digest="b94d27b9934d3e08a52e52d7da7dabfac484efe37a5380ee9088f7ace2efcde9" --digestAlg="sha256"

Example container signing and verification using the new bundle format and referring artifacts:

cosign sign --new-bundle-format=true ghcr.io/user/alpine@sha256:a19367999603840546b8612572e338ec076c6d1f2fec61760a9e11410f546733
cosign verify --new-bundle-format=true ghcr.io/user/alpine@sha256:a19367999603840546b8612572e338ec076c6d1f2fec61760a9e11410f546733

Example usage of a signing config provided by the public good instance's TUF repository:

cosign sign-blob --use-signing-config --bundle sigstore.json README.md
cosign verify-blob --new-bundle-format --bundle sigstore.json --certificate-identity $EMAIL --certificate-oidc-issuer $ISSUER --use-signed-timestamps README.md

v2.6.0 leverages sigstore-go's signing and verification APIs gated behind these new flags. In an upcoming major release, we will be
updating Cosign to default to producing and consuming bundles to align with all other Sigstore SDKs.

Features

  • Add to attest-blob the ability to supply a complete in-toto statement, and add to verify-blob-attestation the ability to verify with just a digest (#​4306)
  • Have cosign sign support bundle format (#​4316)
  • Add support for SigningConfig for sign-blob/attest-blob, support Rekor v2 (#​4319)
  • Add support for SigningConfig in sign/attest (#​4371)
  • Support self-managed keys when signing with sigstore-go (#​4368)
  • Don't require timestamps when verifying with a key (#​4337)
  • Don't load content from TUF if trusted root path is specified (#​4347)
  • Add a terminal spinner while signing with sigstore-go (#​4402)
  • Require exclusively a SigningConfig or service URLs when signing (#​4403)
  • Remove SHA256 assumption in sign-blob/verify-blob (#​4050)
  • Bump sigstore-go, support alternative hash algorithms with keys (#​4386)

Breaking API Changes

  • sign.SignerFromKeyOpts no longer generates a key. Instead, it returns whether or not the client needs to generate a key, and if so, clients
    should call sign.KeylessSigner. This allows clients to more easily manage key generation.

Bug Fixes

  • Verify subject with bundle only when checking claims (#​4320)
  • Fixes to cosign sign / verify for the new bundle format (#​4346)

v2.5.3

Compare Source

Features

  • Add signing-config create command (#​4280)
  • Allow multiple services to be specified for trusted-root create (#​4285)
  • feat: Add OCI 1.1+ experimental support to tree (#​4205)
  • Add validity period end for trusted-root create (#​4271)

Bug Fixes

  • Fix cert verification logic for trusted-root/SCTs (#​4294)
  • force when copying the latest image to overwrite (#​4298)
  • avoid double-loading trustedroot from file (#​4264)

v2.5.2

Compare Source

Bug Fixes

  • Do not load trusted root when CT env key is set

Documentation

  • docs: improve doc for --no-upload option (#​4206)

v2.5.1

Compare Source

Features

  • Add Rekor v2 support for trusted-root create (#​4242)
  • Add baseUrl and Uri to trusted-root create command
  • Upgrade to TUF v2 client with trusted root
  • Don't verify SCT for a private PKI cert (#​4225)
  • Bump TSA library to relax EKU chain validation rules (#​4219)

Bug Fixes

  • Bump sigstore-go to pick up log index=0 fix (#​4162)
  • remove unused recursive flag on attest command (#​4187)

Docs

  • Fix indentation in verify-blob cmd examples (#​4160)

Releases

  • ensure we copy the latest tags on each release (#​4157)

Contributors

  • arthurus-rex
  • Babak K. Shandiz
  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Colleen Murphy
  • Dmitry Savintsev
  • Emmanuel Ferdman
  • Hayden B
  • Ville Skyttä

v2.5.0

Compare Source

v2.5.0 includes an implementation of the new bundle specification,
attesting and verifying OCI image attestations uploaded as OCI artifacts.
This feature is currently gated behind the --new-bundle-format flag
when running cosign attest.

Features

  • Add support for new bundle specification for attesting/verifying OCI image attestations (#​3889)
  • Feat/non filename completions (#​4115)
  • Add TSA certificate related flags and fields for cosign attest (#​4079)

Fixes

  • cmd/cosign/cli: fix typo in ignoreTLogMessage (#​4111)
  • Fix replace with compliant image mediatype (#​4077)

Contributors

  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Cody Soyland
  • Dmitry Savintsev
  • Hayden B
  • Ramon Petgrave
  • Riccardo Schirone
  • Stef Graces
  • Ville Skyttä

v2.4.3

Compare Source

Features

  • Bump sigstore/sigstore to support KMS plugins (#​4073)
  • Enable fetching signatures without remote get. (#​4047)
  • Feat/file flag completion improvements (#​4028)
  • Update builder to use go1.23.6 (#​4052)

Bug Fixes

  • fix parsing error in --only for cosign copy (#​4049)

Cleanup

  • Refactor verifyNewBundle into library function (#​4013)
  • fix comment typo and imports order (#​4061)
  • sync comment with parameter name in function signature (#​4063)
  • sort properly Go imports (#​4071)

Contributors

  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Cody Soyland
  • Dmitry Savintsev
  • Hayden B
  • Tomasz Janiszewski
  • Ville Skyttä

v2.4.2

Compare Source

Features

  • Updated open-policy-agent to 1.1.0 library (#​4036)
    • Note that only Rego v0 policies are supported at this time
  • Add UseSignedTimestamps to CheckOpts, refactor TSA options (#​4006)
  • Add support for verifying root checksum in cosign initialize (#​3953)
  • Detect if user supplied a valid protobuf bundle (#​3931)
  • Add a log message if user doesn't provide --trusted-root (#​3933)
  • Support mTLS towards container registry (#​3922)
  • Add bundle create helper command (#​3901)
  • Add trusted-root create helper command (#​3876)

Bug Fixes

  • fix: set tls config while retaining other fields from default http transport (#​4007)
  • policy fuzzer: ignore known panics (#​3993)
  • Fix for multiple WithRemote options (#​3982)
  • Add nightly conformance test workflow (#​3979)
  • Fix copy --only for signatures + update/align docs (#​3904)

Documentation

  • Remove usage.md from spec, point to client spec (#​3918)
  • move reference from gcr to ghcr (#​3897)

Contributors

  • AdamKorcz
  • Aditya Sirish
  • Bob Callaway
  • Carlos Tadeu Panato Junior
  • Cody Soyland
  • Colleen Murphy
  • Hayden B
  • Jussi Kukkonen
  • Marco Franssen
  • Nianyu Shen
  • Slavek Kabrda
  • Søren Juul
  • Warren Hodgkinson
  • Zach Steindler

Configuration

📅 Schedule: Branch creation - "" (UTC), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR was generated by Mend Renovate. View the repository job log.

@renovate
Copy link
Contributor Author

renovate bot commented Jan 13, 2026

ℹ️ Artifact update notice

File name: acceptance/go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 67 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.24.6 -> 1.25.0
cuelang.org/go v0.11.1 -> v0.14.1
github.com/cyberphone/json-canonicalization v0.0.0-20231217050601-ba74d44ecf5f -> v0.0.0-20241213102144-19d51d7fe467
github.com/go-openapi/strfmt v0.23.0 -> v0.25.0
github.com/secure-systems-lab/go-securesystemslib v0.9.0 -> v0.9.1
github.com/sigstore/rekor v1.3.6 -> v1.4.3
github.com/sigstore/sigstore v1.8.9 -> v1.10.3
golang.org/x/exp v0.0.0-20241108190413-2d47ceb2692f -> v0.0.0-20250620022241-b7579e27df2b
cloud.google.com/go/kms v1.20.1 -> v1.23.2
cloud.google.com/go/longrunning v0.6.2 -> v0.6.7
github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 -> v0.0.0-20250102033503-faa5f7b0171c
github.com/containerd/stargz-snapshotter/estargz v0.16.3 -> v0.18.1
github.com/docker/cli v28.2.2+incompatible -> v29.0.3+incompatible
github.com/fatih/color v1.17.0 -> v1.18.0
github.com/go-jose/go-jose/v4 v4.1.2 -> v4.1.3
github.com/go-openapi/analysis v0.23.0 -> v0.24.1
github.com/go-openapi/errors v0.22.0 -> v0.22.4
github.com/go-openapi/jsonpointer v0.21.0 -> v0.22.1
github.com/go-openapi/jsonreference v0.21.0 -> v0.21.3
github.com/go-openapi/loads v0.22.0 -> v0.23.2
github.com/go-openapi/runtime v0.28.0 -> v0.29.2
github.com/go-openapi/spec v0.21.0 -> v0.22.1
github.com/go-openapi/swag v0.23.0 -> v0.25.4
github.com/google/certificate-transparency-go v1.2.1 -> v1.3.2
github.com/grpc-ecosystem/grpc-gateway/v2 v2.26.3 -> v2.27.3
github.com/in-toto/attestation v1.1.0 -> v1.1.2
github.com/letsencrypt/boulder v0.0.0-20240830194243-1fcf0ee08180 -> v0.20251110.0
github.com/mailru/easyjson v0.7.7 -> v0.9.0
github.com/mattn/go-colorable v0.1.13 -> v0.1.14
github.com/mitchellh/mapstructure v1.5.0 -> v1.5.1-0.20231216201459-8508981c8b6c
github.com/moby/term v0.5.0 -> v0.5.2
github.com/open-policy-agent/opa v1.6.0 -> v1.8.0
github.com/prometheus/common v0.66.1 -> v0.67.4
github.com/prometheus/procfs v0.16.1 -> v0.17.0
github.com/rogpeppe/go-internal v1.13.1 -> v1.14.1
github.com/sagikazarmark/locafero v0.7.0 -> v0.11.0
github.com/sergi/go-diff v1.3.2-0.20230802210424-5b0b94c5c0d3 -> v1.4.0
github.com/sigstore/protobuf-specs v0.3.2 -> v0.5.0
github.com/sourcegraph/conc v0.3.0 -> v0.3.1-0.20240121214520-5f936abd7ae8
github.com/spf13/afero v1.12.0 -> v1.15.0
github.com/spf13/cast v1.7.1 -> v1.10.0
github.com/spf13/cobra v1.9.1 -> v1.10.2
github.com/spf13/pflag v1.0.6 -> v1.0.10
github.com/spf13/viper v1.20.1 -> v1.21.0
github.com/vbatts/tar-split v0.12.1 -> v0.12.2
go.mongodb.org/mongo-driver v1.16.1 -> v1.17.6
go.opentelemetry.io/auto/sdk v1.1.0 -> v1.2.1
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.61.0 -> v0.63.0
go.opentelemetry.io/otel v1.37.0 -> v1.38.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.36.0 -> v1.37.0
go.opentelemetry.io/otel/metric v1.37.0 -> v1.38.0
go.opentelemetry.io/otel/trace v1.37.0 -> v1.38.0
go.uber.org/zap v1.27.0 -> v1.27.1
go.yaml.in/yaml/v2 v2.4.2 -> v2.4.3
golang.org/x/crypto v0.41.0 -> v0.46.0
golang.org/x/mod v0.29.0 -> v0.30.0
golang.org/x/net v0.43.0 -> v0.48.0
golang.org/x/oauth2 v0.30.0 -> v0.33.0
golang.org/x/sync v0.17.0 -> v0.19.0
golang.org/x/sys v0.37.0 -> v0.39.0
golang.org/x/term v0.34.0 -> v0.38.0
golang.org/x/text v0.28.0 -> v0.32.0
google.golang.org/api v0.215.0 -> v0.257.0
google.golang.org/genproto/googleapis/api v0.0.0-20250804133106-a7a43d27e69b -> v0.0.0-20251022142026-3a174f9686a8
google.golang.org/genproto/googleapis/rpc v0.0.0-20250804133106-a7a43d27e69b -> v0.0.0-20251213004720-97cd9d5aeac2
google.golang.org/grpc v1.76.0 -> v1.77.0
google.golang.org/protobuf v1.36.10 -> v1.36.11
k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 -> v0.0.0-20250820121507-0af2bda4dd1d
File name: go.mod

In order to perform the update(s) described in the table above, Renovate ran the go get command, which resulted in the following additional change(s):

  • 115 additional dependencies were updated
  • The go directive was updated for compatibility reasons

Details:

Package Change
go 1.24.6 -> 1.25.0
cuelang.org/go v0.13.2 -> v0.14.1
github.com/go-openapi/strfmt v0.23.0 -> v0.25.0
github.com/open-policy-agent/opa v1.6.0 -> v1.8.0
github.com/secure-systems-lab/go-securesystemslib v0.9.0 -> v0.9.1
github.com/sigstore/rekor v1.3.6 -> v1.4.3
github.com/sigstore/sigstore v1.8.9 -> v1.10.3
github.com/spf13/afero v1.14.0 -> v1.15.0
github.com/spf13/cobra v1.9.1 -> v1.10.2
github.com/spf13/pflag v1.0.6 -> v1.0.10
github.com/spf13/viper v1.20.1 -> v1.21.0
golang.org/x/exp v0.0.0-20250408133849-7e4ce0ab07d0 -> v0.0.0-20250620022241-b7579e27df2b
golang.org/x/net v0.44.0 -> v0.48.0
golang.org/x/sync v0.17.0 -> v0.19.0
cloud.google.com/go v0.116.0 -> v0.121.6
cloud.google.com/go/auth v0.13.0 -> v0.17.0
cloud.google.com/go/auth/oauth2adapt v0.2.6 -> v0.2.8
cloud.google.com/go/compute/metadata v0.7.0 -> v0.9.0
cloud.google.com/go/iam v1.2.2 -> v1.5.3
cloud.google.com/go/monitoring v1.21.2 -> v1.24.2
cloud.google.com/go/storage v1.49.0 -> v1.57.1
github.com/Azure/go-ansiterm v0.0.0-20230124172434-306776ec8161 -> v0.0.0-20250102033503-faa5f7b0171c
github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp v1.29.0 -> v1.30.0
github.com/GoogleCloudPlatform/opentelemetry-operations-go/exporter/metric v0.48.1 -> v0.54.0
github.com/GoogleCloudPlatform/opentelemetry-operations-go/internal/resourcemapping v0.48.1 -> v0.54.0
github.com/aws/aws-sdk-go v1.55.5 -> v1.55.8
github.com/aws/aws-sdk-go-v2 v1.30.5 -> v1.41.0
github.com/aws/aws-sdk-go-v2/config v1.27.33 -> v1.32.5
github.com/aws/aws-sdk-go-v2/credentials v1.17.32 -> v1.19.5
github.com/aws/aws-sdk-go-v2/feature/ec2/imds v1.16.13 -> v1.18.16
github.com/aws/aws-sdk-go-v2/internal/configsources v1.3.17 -> v1.4.16
github.com/aws/aws-sdk-go-v2/internal/endpoints/v2 v2.6.17 -> v2.7.16
github.com/aws/aws-sdk-go-v2/internal/ini v1.8.1 -> v1.8.4
github.com/aws/aws-sdk-go-v2/service/ecr v1.32.2 -> v1.45.1
github.com/aws/aws-sdk-go-v2/service/ecrpublic v1.25.4 -> v1.33.2
github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding v1.11.4 -> v1.13.4
github.com/aws/aws-sdk-go-v2/service/internal/presigned-url v1.11.19 -> v1.13.16
github.com/aws/aws-sdk-go-v2/service/sso v1.22.7 -> v1.30.7
github.com/aws/aws-sdk-go-v2/service/ssooidc v1.26.7 -> v1.35.12
github.com/aws/aws-sdk-go-v2/service/sts v1.30.7 -> v1.41.5
github.com/aws/smithy-go v1.20.4 -> v1.24.0
github.com/awslabs/amazon-ecr-credential-helper/ecr-login v0.0.0-20240826150212-5dc58b6e29f8 -> v0.10.1
github.com/cenkalti/backoff/v5 v5.0.2 -> v5.0.3
github.com/cncf/xds/go v0.0.0-20250501225837-2ac532fd4443 -> v0.0.0-20251022180443-0feb69152e9f
github.com/containerd/stargz-snapshotter/estargz v0.16.3 -> v0.18.1
github.com/coreos/go-oidc/v3 v3.11.0 -> v3.17.0
github.com/cyberphone/json-canonicalization v0.0.0-20231217050601-ba74d44ecf5f -> v0.0.0-20241213102144-19d51d7fe467
github.com/dgraph-io/badger/v4 v4.7.0 -> v4.8.0
github.com/docker/cli v28.2.2+incompatible -> v29.0.3+incompatible
github.com/envoyproxy/go-control-plane/envoy v1.32.4 -> v1.35.0
github.com/go-jose/go-jose/v4 v4.1.2 -> v4.1.3
github.com/go-openapi/analysis v0.23.0 -> v0.24.1
github.com/go-openapi/errors v0.22.0 -> v0.22.4
github.com/go-openapi/jsonpointer v0.21.0 -> v0.22.1
github.com/go-openapi/jsonreference v0.21.0 -> v0.21.3
github.com/go-openapi/loads v0.22.0 -> v0.23.2
github.com/go-openapi/runtime v0.28.0 -> v0.29.2
github.com/go-openapi/spec v0.21.0 -> v0.22.1
github.com/go-openapi/swag v0.23.0 -> v0.25.4
github.com/google/cel-go v0.26.0 -> v0.26.1
github.com/google/certificate-transparency-go v1.2.1 -> v1.3.2
github.com/google/s2a-go v0.1.8 -> v0.1.9
github.com/googleapis/enterprise-certificate-proxy v0.3.4 -> v0.3.7
github.com/googleapis/gax-go/v2 v2.14.1 -> v2.15.0
github.com/grpc-ecosystem/grpc-gateway/v2 v2.26.3 -> v2.27.3
github.com/hashicorp/go-retryablehttp v0.7.7 -> v0.7.8
github.com/hashicorp/hcl v1.0.1-vault-5 -> v1.0.1-vault-7
github.com/jmespath/go-jmespath v0.4.0 -> v0.4.1-0.20220621161143-b0104c826a24
github.com/mailru/easyjson v0.7.7 -> v0.9.0
github.com/mitchellh/mapstructure v1.5.0 -> v1.5.1-0.20231216201459-8508981c8b6c
github.com/moby/term v0.5.0 -> v0.5.2
github.com/prometheus/common v0.66.1 -> v0.67.4
github.com/prometheus/procfs v0.16.1 -> v0.17.0
github.com/sagikazarmark/locafero v0.7.0 -> v0.11.0
github.com/sergi/go-diff v1.3.2-0.20230802210424-5b0b94c5c0d3 -> v1.4.0
github.com/sigstore/fulcio v1.6.3 -> v1.8.4
github.com/sigstore/protobuf-specs v0.3.2 -> v0.5.0
github.com/sourcegraph/conc v0.3.0 -> v0.3.1-0.20240121214520-5f936abd7ae8
github.com/spf13/cast v1.7.1 -> v1.10.0
github.com/spiffe/go-spiffe/v2 v2.5.0 -> v2.6.0
github.com/stoewer/go-strcase v1.3.0 -> v1.3.1
github.com/ulikunitz/xz v0.5.12 -> v0.5.14
github.com/vbatts/tar-split v0.12.1 -> v0.12.2
github.com/vektah/gqlparser/v2 v2.5.28 -> v2.5.30
go.mongodb.org/mongo-driver v1.16.1 -> v1.17.6
go.opentelemetry.io/auto/sdk v1.1.0 -> v1.2.1
go.opentelemetry.io/contrib/detectors/gcp v1.36.0 -> v1.38.0
go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc v0.60.0 -> v0.63.0
go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp v0.61.0 -> v0.63.0
go.opentelemetry.io/otel v1.37.0 -> v1.38.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace v1.36.0 -> v1.38.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc v1.36.0 -> v1.38.0
go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracehttp v1.36.0 -> v1.37.0
go.opentelemetry.io/otel/metric v1.37.0 -> v1.38.0
go.opentelemetry.io/otel/sdk v1.37.0 -> v1.38.0
go.opentelemetry.io/otel/sdk/metric v1.37.0 -> v1.38.0
go.opentelemetry.io/otel/trace v1.37.0 -> v1.38.0
go.opentelemetry.io/proto/otlp v1.6.0 -> v1.7.1
go.step.sm/crypto v0.51.2 -> v0.75.0
go.uber.org/zap v1.27.0 -> v1.27.1
go.yaml.in/yaml/v2 v2.4.2 -> v2.4.3
golang.org/x/crypto v0.42.0 -> v0.46.0
golang.org/x/mod v0.29.0 -> v0.30.0
golang.org/x/oauth2 v0.30.0 -> v0.33.0
golang.org/x/sys v0.37.0 -> v0.39.0
golang.org/x/term v0.35.0 -> v0.38.0
golang.org/x/text v0.29.0 -> v0.32.0
golang.org/x/tools v0.37.0 -> v0.39.0
google.golang.org/api v0.215.0 -> v0.257.0
google.golang.org/genproto v0.0.0-20241118233622-e639e219e697 -> v0.0.0-20250922171735-9219d122eba9
google.golang.org/genproto/googleapis/api v0.0.0-20250804133106-a7a43d27e69b -> v0.0.0-20251022142026-3a174f9686a8
google.golang.org/genproto/googleapis/rpc v0.0.0-20250804133106-a7a43d27e69b -> v0.0.0-20251213004720-97cd9d5aeac2
google.golang.org/grpc v1.76.0 -> v1.77.0
google.golang.org/protobuf v1.36.10 -> v1.36.11
k8s.io/utils v0.0.0-20250604170112-4c0f3b243397 -> v0.0.0-20250820121507-0af2bda4dd1d
sigs.k8s.io/release-utils v0.8.4 -> v0.12.2

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

0 participants