Skip to content

fix: attempt to fix cosign compatibility issues#5959

Merged
gusfcarvalho merged 12 commits intomainfrom
gc-fix-sign-action
Feb 14, 2026
Merged

fix: attempt to fix cosign compatibility issues#5959
gusfcarvalho merged 12 commits intomainfrom
gc-fix-sign-action

Conversation

@gusfcarvalho
Copy link
Copy Markdown
Member

@gusfcarvalho gusfcarvalho commented Feb 13, 2026

attempts to fix our image signature process

Summary

Fixes cosign compatibility issues in the image signature process by upgrading cosign from v3.0.3 to v3.0.4, forcing the older bundle format via --new-bundle-format=false and disabling signing-config via --use-signing-config=false for sign/attest/verify steps, relaxing the certificate identity regexp, and improving signing, SBOM, and provenance logging and verification flows.

Changes

.github/actions/sign/action.yml

  • Upgraded cosign to v3.0.4.
  • Added --new-bundle-format=false and --use-signing-config=false to sign/attest/verify commands.
  • Reworked digest retrieval, signing, SBOM (OS + Go modules) generation/attestation/verification, and provenance attestation into grouped, multi-step blocks with clearer logs and explicit certificate-identity-regexp handling.

.github/workflows/helm.yml

  • Upgraded cosign to v3.0.4.
  • Added --new-bundle-format=false and --use-signing-config=false to cosign sign/verify.
  • Relaxed certificate identity regexp from https://github.com/$GITHUB_REPOSITORY/* to https://github.com/$GITHUB_REPOSITORY/.* for verification.

.github/actions/e2e/action.yml

  • Updated docker/setup-buildx-action reference to v3.12.0 and removed explicit version input.

.github/workflows/e2e.yml

  • Removed DOCKER_BUILDX_VERSION env variable.

Impact

  • No public API changes. Improves CI signing/SBOM/provenance robustness and compatibility with cosign.

@github-actions github-actions bot added kind/bug Categorizes issue or PR as related to a bug. component/github-actions size/s labels Feb 13, 2026
@coderabbitai
Copy link
Copy Markdown

coderabbitai bot commented Feb 13, 2026

Note

Reviews paused

It looks like this branch is under active development. To avoid overwhelming you with review comments due to an influx of new commits, CodeRabbit has automatically paused this review. You can configure this behavior by changing the reviews.auto_review.auto_pause_after_reviewed_commits setting.

Use the following commands to manage reviews:

  • @coderabbitai resume to resume automatic reviews.
  • @coderabbitai review to trigger a single review.

Use the checkboxes below for quick actions:

  • ▶️ Resume reviews
  • 🔍 Trigger review

Walkthrough

Bumps cosign v3.0.3→v3.0.4, adds signing/attestation flags (--new-bundle-format=false, --use-signing-config=false), restructures digest/signing/SBOM/provenance steps into grouped log blocks, loosens certificate identity regexp, updates docker/setup-buildx-action pin, and removes an explicit buildx version env var.

Changes

Cohort / File(s) Summary
Signing action & workflow
.github/actions/sign/action.yml, .github/workflows/helm.yml
Upgrades cosign v3.0.3 → v3.0.4; adds --new-bundle-format=false and --use-signing-config=false to sign/attest/verify commands; wraps digest lookup, sign, SBOM (image & Go modules) generation/attest/verify, and provenance attest/verify in grouped log blocks; relaxes certificate-identity-regexp to https://github.com/$GITHUB_REPOSITORY/.*.
E2E / buildx updates
.github/actions/e2e/action.yml, .github/workflows/e2e.yml
Pins docker/setup-buildx-action to a newer ref (old v2.10.0 commit → v3.12.0 ref) and removes the explicit version: input; removes DOCKER_BUILDX_VERSION env var from e2e workflow and adjusts comment/indentation.

Possibly related PRs

🚥 Pre-merge checks | ✅ 1
✅ Passed checks (1 passed)
Check name Status Explanation
Merge Conflict Detection ✅ Passed ✅ No merge conflicts detected when merging into main

✏️ Tip: You can configure your own custom pre-merge checks in the settings.


Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out.

❤️ Share

Comment @coderabbitai help to get the list of available commands and usage tips.

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
Copy link
Copy Markdown

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Fix all issues with AI agents
In @.github/actions/sign/action.yml:
- Around line 72-76: The cosign workflow uses --new-bundle-format=false for
cosign sign but not for cosign attest, risking mixed bundle formats; update
every cosign attest invocation (the commands invoking "cosign attest") to
include --new-bundle-format=false so all attestation commands match the sign
command's bundle format flag and ensure consistent artifact format across the
action.

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
Copy link
Copy Markdown

@coderabbitai coderabbitai bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Actionable comments posted: 1

🤖 Fix all issues with AI agents
In @.github/actions/sign/action.yml:
- Line 114: The cosign verify-attestation command invocation contains a
duplicated flag and a missing space: remove the extra duplicated
"--new-bundle-format=false" and ensure there is a space before "--type spdx" so
the command reads like a single "--new-bundle-format=false --type spdx
${IMAGE_NAME}@${CONTAINER_DIGEST}" invocation; update the line that builds the
cosign command (the cosign verify-attestation call) to contain only one
"--new-bundle-format=false" followed by a spaced "--type spdx" and the existing
${IMAGE_NAME}@${CONTAINER_DIGEST} token.

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
Skarlso
Skarlso previously approved these changes Feb 13, 2026
@Skarlso
Copy link
Copy Markdown
Contributor

Skarlso commented Feb 13, 2026

Oh gods it failed to horribly. :D

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
@gusfcarvalho
Copy link
Copy Markdown
Member Author

Oh gods it failed to horribly. :D

almost there. Some bits failed, but the general idea is correct. One of the tries succeeded in signing and attesting an image, just failed verify-attestation for some reason (need to check / study that eventually). I think this run should work :)

…despite flags)

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
@sonarqubecloud
Copy link
Copy Markdown

uses: sigstore/cosign-installer@faadad0cce49287aee09b3a48701e75088a2c6ad # v4.0.0
with:
cosign-release: 'v3.0.3'
cosign-release: 'v3.0.2'
Copy link
Copy Markdown
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

the PR description says it upgrades to v3.0.4 (which is latest from January this year), but in fact it's downgraded to v3.0.2. I didn't check the commit history as to why it's needed to downgrade it. is it really?

Copy link
Copy Markdown
Member Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We needed to revert because there is a regression on 3.0.4 vs 3.0.2 (don’t know exactly why) - co-sign verify attestation is forcing the checks with the new bundle format all the times (and failing)

this is fairly easy to reproduce locally (once we know it’s a thing)

I didn’t test 3.0.3 though

@moolen
Copy link
Copy Markdown
Member

moolen commented Feb 13, 2026

🚀 LGTM

cosign tree ghcr.io/external-secrets/external-secrets:v2.0.0-30.gb5732e5d4-ubi
📦 Supply Chain Security Related artifacts for an image: ghcr.io/external-secrets/external-secrets:v2.0.0-30.gb5732e5d4-ubi
└── 💾 Attestations for an image tag: ghcr.io/external-secrets/external-secrets:sha256-678418a26b1a7c60e14719072d9066b41c52be30fba2dc702139f2cf868b1bc8.att
   ├── 🍒 sha256:9ddc0f215827f14785d06ec85e043c5c6efdef91b80dc903935adcd75e252190
   ├── 🍒 sha256:79dadffba2221f197709f73ba02ec7fa768b843abe20af3d2e7583be214e88b0
   └── 🍒 sha256:1ddf6c1e70e39bc88c7e79e3b12c8e83181399ea08b8c9ed8575e6931cb8e8b1
└── 🔐 Signatures for an image tag: ghcr.io/external-secrets/external-secrets:sha256-678418a26b1a7c60e14719072d9066b41c52be30fba2dc702139f2cf868b1bc8.sig
   └── 🍒 sha256:7c7466ace918d3e7b7d602a9507a74d8cc1373db39069b15ce2676c67fac3c2d
cosign verify \
  --certificate-identity=https://github.com/external-secrets/external-secrets/.github/workflows/publish.yml@refs/pull/5959/merge \
  --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
  ghcr.io/external-secrets/external-secrets:v2.0.0-30.gb5732e5d4-ubi


Verification for ghcr.io/external-secrets/external-secrets:v2.0.0-30.gb5732e5d4-ubi --
The following checks were performed on each of these signatures:
  - The cosign claims were validated
  - Existence of the claims in the transparency log was verified offline
  - The code-signing certificate was verified using trusted certificate authority certificates

[{"critical":{"identity":{"docker-reference":"ghcr.io/external-secrets/external-secrets"},"image":{"docker-manifest-digest":"sha256:678418a26b1a7c60e14719072d9066b41c52be30fba2dc702139f2cf868b1bc8"},"type":"cosign container image signature"},"optional":{"1.3.6.1.4.1.57264.1.1":"https://token.actions.githubusercontent.com","1.3.6.1.4.1.57264.1.2":"pull_request","1.3.6.1.4.1.57264.1.3":"b5732e5d451c0ec99901ee5d4802124c9d87e848","1.3.6.1.4.1.57264.1.4":"CI","1.3.6.1.4.1.57264.1.5":"external-secrets/external-secrets","1.3.6.1.4.1.57264.1.6":"refs/pull/5959/merge","Bundle":{"SignedEntryTimestamp":"MEQCIFemvdK/Fg86a3XayLCxzaRJVllFpkWPWNpiTFDSlRsCAiArVlsvdfcWx9ww6vKZizGqWCtxGXH7dQoFthad02gQzA==","Payload":{"body":"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","integratedTime":1771017751,"logIndex":951057556,"logID":"c0d23d6ad406973f9559f3ba2d1ca01f84147d8ffc5b8445c224f98b9591801d"}},"GITHUB_ACTOR":"gusfcarvalho","Issuer":"https://token.actions.githubusercontent.com","Subject":"https://github.com/external-secrets/external-secrets/.github/workflows/publish.yml@refs/pull/5959/merge","githubWorkflowName":"CI","githubWorkflowRef":"refs/pull/5959/merge","githubWorkflowRepository":"external-secrets/external-secrets","githubWorkflowSha":"b5732e5d451c0ec99901ee5d4802124c9d87e848","githubWorkflowTrigger":"pull_request"}}]
cosign verify-attestation --type slsaprovenance \
  --certificate-identity=https://github.com/external-secrets/external-secrets/.github/workflows/publish.yml@refs/pull/5959/merge \
  --certificate-oidc-issuer=https://token.actions.githubusercontent.com \
  ghcr.io/external-secrets/external-secrets:v2.0.0-30.gb5732e5d4-ubi


Verification for ghcr.io/external-secrets/external-secrets:v2.0.0-30.gb5732e5d4-ubi --
The following checks were performed on each of these signatures:
  - The cosign claims were validated
  - Existence of the claims in the transparency log was verified offline
  - The code-signing certificate was verified using trusted certificate authority certificates
Certificate subject: https://github.com/external-secrets/external-secrets/.github/workflows/publish.yml@refs/pull/5959/merge
Certificate issuer URL: https://token.actions.githubusercontent.com
GitHub Workflow Trigger: pull_request
GitHub Workflow SHA: b5732e5d451c0ec99901ee5d4802124c9d87e848
GitHub Workflow Name: CI
GitHub Workflow Repository: external-secrets/external-secrets
GitHub Workflow Ref: refs/pull/5959/merge
{"payloadType":"application/vnd.in-toto+json","payload":"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","signatures":[{"keyid":"","sig":"MEUCIQDCVmoylqepbg8saPxerPt7iAm/wR4YbsEhGILADm2QmwIgXLbeuABFG/KFDPRTW1Y2NFDHJ50NqFxbLePeBxwMd/c="}]}

Copy link
Copy Markdown
Member

@moolen moolen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM. No need to block PR for version bump

@gusfcarvalho
Copy link
Copy Markdown
Member Author

We needed to revert because there is a regression on 3.0.4 vs 3.0.2 (don’t know exactly why) - co-sign verify attestation is forcing the checks with the new bundle format all the times (and failing)

this is fairly easy to reproduce locally (once we know it’s a thing)

@Skarlso
Copy link
Copy Markdown
Contributor

Skarlso commented Feb 14, 2026

So... is this now mergeable?

@gusfcarvalho gusfcarvalho merged commit 09741b0 into main Feb 14, 2026
32 checks passed
@gusfcarvalho gusfcarvalho deleted the gc-fix-sign-action branch February 14, 2026 16:31
nutmos pushed a commit to nutmos/external-secrets that referenced this pull request Feb 18, 2026
* fix: attempt to fix ci pipeline

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: e2e tests with old docker buildx

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: coderabbit issues -- thanks coderabbit

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: force old bundle format for verify-attestation

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: typo

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: use-signing-config to false

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: verify attestation does not use signing config

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: readd arm64 for -ubi-boringssl

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: remove bundle format from verify attestation

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: cosign regression on 3.0.4 prevents old pipelines from working (despite flags)

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: ci bloat and provenance version

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: replace slsa-provenance-action with custom bash

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

---------

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
Signed-off-by: Nattapong Ekudomsuk <nuttapong_mos@hotmail.com>
dsp0x4 pushed a commit to dsp0x4/external-secrets that referenced this pull request Mar 22, 2026
* fix: attempt to fix ci pipeline

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: e2e tests with old docker buildx

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: coderabbit issues -- thanks coderabbit

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: force old bundle format for verify-attestation

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: typo

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: use-signing-config to false

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: verify attestation does not use signing config

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: readd arm64 for -ubi-boringssl

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: remove bundle format from verify attestation

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: cosign regression on 3.0.4 prevents old pipelines from working (despite flags)

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: ci bloat and provenance version

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

* fix: replace slsa-provenance-action with custom bash

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>

---------

Signed-off-by: Gustavo Carvalho <gustavo.carvalho@container-solutions.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

component/github-actions kind/bug Categorizes issue or PR as related to a bug. size/m size/s

Projects

Status: Done

Development

Successfully merging this pull request may close these issues.

3 participants