github getsops/sops v3.13.0

6 hours ago

Installation

To install sops, download one of the pre-built binaries provided for your platform from the artifacts attached to this release.

For instance, if you are using Linux on an AMD64 architecture:

# Download the binary
curl -LO https://github.com/getsops/sops/releases/download/v3.13.0/sops-v3.13.0.linux.amd64

# Move the binary in to your PATH
mv sops-v3.13.0.linux.amd64 /usr/local/bin/sops

# Make the binary executable
chmod +x /usr/local/bin/sops

Verify checksums file signature

The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:

# Download the checksums file, certificate and signature
curl -LO https://github.com/getsops/sops/releases/download/v3.13.0/sops-v3.13.0.checksums.txt
curl -LO https://github.com/getsops/sops/releases/download/v3.13.0/sops-v3.13.0.checksums.sigstore.json

# Verify the checksums file
cosign verify-blob sops-v3.13.0.checksums.txt \
  --bundle sops-v3.13.0.checksums.sigstore.json \
  --certificate-identity-regexp=https://github.com/getsops \
  --certificate-oidc-issuer=https://token.actions.githubusercontent.com

Verify binary integrity

To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature:

# Verify the binary using the checksums file
sha256sum -c sops-v3.13.0.checksums.txt --ignore-missing

Verify artifact provenance

The SLSA provenance of the binaries, packages, and SBOMs can be found within the artifacts associated with this release. It is presented through an in-toto link metadata file named sops-v3.13.0.intoto.jsonl. To verify the provenance of an artifact, you can utilize the slsa-verifier tool:

# Download the metadata file
curl -LO  https://github.com/getsops/sops/releases/download/v3.13.0/sops-v3.13.0.intoto.jsonl

# Verify the provenance of the artifact
slsa-verifier verify-artifact <artifact> \
  --provenance-path sops-v3.13.0.intoto.jsonl \
  --source-uri github.com/getsops/sops \
  --source-tag v3.13.0

Container Images

The sops binaries are also available as container images, based on Debian (slim) and Alpine Linux. The Debian-based container images include any dependencies which may be required to make use of certain key services, such as GnuPG, AWS KMS, Azure Key Vault, and Google Cloud KMS. The Alpine-based container images are smaller in size, but do not include these dependencies.

These container images are available for the following architectures: linux/amd64 and linux/arm64.

GitHub Container Registry

  • ghcr.io/getsops/sops:v3.13.0
  • ghcr.io/getsops/sops:v3.13.0-alpine

Quay.io

  • quay.io/getsops/sops:v3.13.0
  • quay.io/getsops/sops:v3.13.0-alpine

Verify container image signature

The container images are signed using Cosign with GitHub OIDC. To validate the signature of an image, run the following command:

cosign verify ghcr.io/getsops/sops:v3.13.0 \
  --certificate-identity-regexp=https://github.com/getsops \
  --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
  -o text

Verify container image provenance

The container images include SLSA provenance attestations. For more information around the verification of this, please refer to the slsa-verifier documentation.

Software Bill of Materials

The Software Bill of Materials (SBOM) for each binary is accessible within the artifacts enclosed with this release. It is presented as an SPDX JSON file, formatted as <binary>.spdx.sbom.json.

What's Changed

  • build(deps): Bump google.golang.org/grpc from 1.79.1 to 1.79.3 by @dependabot[bot] in #2110
  • build(deps): Bump the ci group with 3 updates by @dependabot[bot] in #2117
  • build(deps): Bump the ci group with 3 updates by @dependabot[bot] in #2126
  • build(deps): Bump github.com/go-jose/go-jose/v4 from 4.1.3 to 4.1.4 by @dependabot[bot] in #2133
  • build(deps): Bump docker/login-action from 4.0.0 to 4.1.0 in the ci group by @dependabot[bot] in #2139
  • Improve error message for top-level arrays by @kushal9897 in #2138
  • build(deps): Bump github.com/aws/aws-sdk-go-v2/service/s3 from 1.96.0 to 1.97.3 by @dependabot[bot] in #2142
  • docs: add get key permission requirement for Azure Key Vault when version is omitted by @Hanashiko in #2122
  • build(deps): Bump actions/upload-artifact from 7.0.0 to 7.0.1 in the ci group by @dependabot[bot] in #2149
  • Use prefixed and truncated key hash instead of location as GPG agent cache key by @felixfontein in #2145
  • Drop support for Go 1.24 by @felixfontein in #2141
  • build(deps): Bump go.opentelemetry.io/otel/sdk from 1.40.0 to 1.43.0 by @dependabot[bot] in #2146
  • build(deps): Bump the go group across 1 directory with 21 updates by @dependabot[bot] in #2144
  • Add SOPS_GCP_KMS_ENDPOINT and SOPS_GCP_KMS_UNIVERSE_DOMAIN env vars by @DnR-iData in #2114
  • Preserve YAML inline comments through encrypt/edit roundtrip by @knowald in #2131
  • Update release for cosign v3 by @sabre1041 in #2082
  • build(deps): Bump the ci group with 3 updates by @dependabot[bot] in #2151
  • build(deps): Bump the go group with 12 updates by @dependabot[bot] in #2152
  • Update broken link in README by @manute in #2153
  • sops exec-file: make sure to set GID to correct value instead of UID by @felixfontein in #2154
  • sops exec-file: improve error handling, reject non-local paths in --filename by @felixfontein in #2155
  • Obtain --indent global flag value and pass it to store configs by @skirino in #2156
  • build(deps): Bump the go group with 3 updates by @dependabot[bot] in #2159
  • build(deps): Bump goreleaser/goreleaser-action from 7.1.0 to 7.2.1 in the ci group by @dependabot[bot] in #2158
  • Update all Go dependencies with 'go get -t -u ./...' by @felixfontein in #2165
  • Allow to have space-separated keys in SOPS_AGE_KEY by @felixfontein in #2086
  • HC Vault: add allowlist support for acceptable HC Vault URLs by @felixfontein in #2164
  • build(deps): Bump the go group with 5 updates by @dependabot[bot] in #2171
  • build(deps): Bump github/codeql-action from 4.35.2 to 4.35.3 in the ci group by @dependabot[bot] in #2173
  • Use mapstructure to (de-)serialize internal metadata; move metadata processing from specific stores to general place by @felixfontein in #2120
  • Release 3.13.0 by @felixfontein in #2176

New Contributors

Full Changelog: v3.12.2...v3.13.0

Don't miss a new sops release

NewReleases is sending notifications on new releases.