All notable changes to sigstore-python
will be documented in this file.
The format is based on Keep a Changelog.
All versions prior to 0.9.0 are untracked.
-
A cached copy of the trust bundle is now included with the distribution (#611)
-
Stopped emitting .sig and .crt signing outputs by default in
sigstore sign
. Sigstore bundles are now preferred (#614) -
Trust root configuration now assumes that the TUF repository contains a trust bundle, rather than falling back to deprecated individual targets (#626)
-
Updated the
staging-root.json
for recent changes to the Sigstore staging instance (#602) -
Switched TUF requests to their CDN endpoints, rather than direct GCS access (#609)
-
The whole test suite can now be run locally with
make test-interactive
. (#576) Users will be prompted to authenticate with their identity provider twice to generate staging and production OIDC tokens, which are used to test thesigstore.sign
module. All signing tests need to be completed before token expiry, which is currently 60 seconds after issuance. -
Network-related errors from the
sigstore._internal.tuf
module now have better diagnostics.
-
Replaced ambient credential detection logic with the
id
package (#535) -
Revamped error diagnostics reporting. All errors with diagnostics now implement
sigstore.errors.Error
. -
Trust root materials are now retrieved from a single trust bundle, if it is available via TUF (#542)
-
Improved diagnostics around Signed Certificate Timestamp verification failures. (#555)
- Fixed a bug in TUF target handling revealed by changes to the production and staging TUF repos (#522)
-
sigstore sign
now supports Sigstore bundles, which encapsulate the same state as the default{input}.crt
,{input}.sig
, and{input}.rekor
files combined. The default output for the Sigstore bundle is{input}.sigstore
; this can be disabled with--no-bundle
or changed with--bundle <FILE>
(#465) -
sigstore verify
now supports Sigstore bundles. By default,sigstore
looks for an{input}.sigstore
; this can be changed with--bundle <FILE>
or the legacy method of verification can be used instead via the--signature
and--certificate
flags (#478) -
sigstore verify identity
andsigstore verify github
now support the--offline
flag, which tellssigstore
to do offline transparency log entry verification. This option replaces the unstable--require-rekor-offline
option, which has been removed (#478)
- Constrained our dependency on
pyOpenSSL
to>= 23.0.0
to prevent a runtime error caused by incompatible earlier versions (#448)
--rekor-bundle
and--require-rekor-offline
have been removed entirely, as their functionality have been wholly supplanted by Sigstore bundle support and the newsigstore verify --offline
flag (#478)
-
sigstore.rekor
is nowsigstore.transparency
, and its constituent APIs have been renamed to removed implementation detail references (#402) -
sigstore.transparency.RekorEntryMissing
is nowLogEntryMissing
(#414)
- The TUF network timeout has been relaxed from 4 seconds to 30 seconds, which should reduce the likelihood of spurious timeout errors in environments like GitHub Actions (#432)
-
sigstore
now supports the-v
/--verbose
flag as an alternative toSIGSTORE_LOGLEVEL
for debug logging (#372) -
The
sigstore verify identity
has been added, and is functionally equivalent to the existingsigstore verify
subcommand.sigstore verify
is unchanged, but will be marked deprecated in a future stable version ofsigstore-python
(#379) -
sigstore
now has a public, importable Python API! You can find its documentation here (#383) -
sigstore --staging
is now the intended way to request Sigstore's staging instance, rather than per-subcommand options likesigstore sign --staging
. The latter is unchanged, but will be marked deprecated in a future stable version ofsigstore-python
(#383) -
The per-subcommand options
--rekor-url
and--rekor-root-pubkey
have been moved to the top-levelsigstore
command. Their subcommand forms are unchanged and will continue to work, but will be marked deprecated in a future stable version ofsigstore-python
(#381) -
sigstore verify github
has been added, allowing for verification of GitHub-specific claims within given certificate(s) (#381)
-
The default behavior of
SIGSTORE_LOGLEVEL
has changed; the logger configured is now thesigstore.*
hierarchy logger, rather than the "root" logger (#372) -
The caching mechanism used for TUF has been changed slightly, to use more future-proof paths (#373)
- Fulcio certificate handling now includes "inactive" but still valid certificates, allowing users to verify older signatures without custom certificate chains (#386)
sigstore verify
now supports--certificate-chain
and--rekor-url
during verification. Ordinary uses (i.e. the default or--staging
) are not affected (#323)
-
sigstore sign
andsigstore verify
now stream their input, rather than consuming it into a single buffer (#329) -
A series of Python 3.11 deprecation warnings were eliminated (#341)
-
The "splash" page presented to users during the OAuth flow has been updated to reflect the user-friendly page added to
cosign
(#356) -
sigstore
now uses TUF to retrieve its trust material for Fulcio and Rekor, replacing the material that was previously baked intosigstore._store
(#351)