You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Reorganize and complete the changelog.
Signed-off-by: Mihai Maruseac <[email protected]>
* Fix year in date of past release
Signed-off-by: Mihai Maruseac <[email protected]>
* Bump version to 1.1.0
Signed-off-by: Mihai Maruseac <[email protected]>
* Fix changelog: breaking changes are only in deps.
Signed-off-by: Mihai Maruseac <[email protected]>
---------
Signed-off-by: Mihai Maruseac <[email protected]>
Copy file name to clipboardExpand all lines: CHANGELOG.md
+48-25Lines changed: 48 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,29 +9,51 @@ All versions prior to 1.0.0 are untracked.
9
9
10
10
## [Unreleased]
11
11
12
-
- Added support for signing with PKCS #11 devices
13
-
- Fix handling of certificate that has no KeyUsage
14
-
- Fix ignoring of git-related files
15
-
- Record files in signature that were ignored when signature was created and automatically ignore those files when verifying signature
16
-
- Adjust model name when signing and verifying in model_path '.' and other fixes related to file paths
17
-
- Fix and test the sharded file hasher
18
-
- Added tests for verifying signatures created with v0.3.1
19
-
- cli: `model_signing sign` now supports the `--oauth_force_oob` option (default: False)
20
-
- Added support for specifying `--client_id` and `--client_secret` for OIDC authentication
21
-
- cli: Added support for `--allow_symlinks` option
22
-
- Added more informative signature mismatch errors: The `ValueError` raised during model verification when a signature mismatch occurs now includes detailed information
23
-
- Fix Bundle deserialization error caused by null keyid in DSSE signatures; keyid now serializes as an empty string
24
-
- Implemented public key identifier hash matching for bundle verification
25
-
- Add warning for older verification material formats (e.g., raw public key bytes) during verification, recommending re-signing
26
-
- Added guidance to `README.md` on how to install `model-signing` with PKCS#11 support.
27
-
- Added support trace sigstore sign and verify operations using OpenTelemetry.
28
-
- cli: Added support for `--ignore_unsigned_files` option
29
-
- Implemented a new, minimal container image. This variant excludes optional dependencies (like OTel and PKCS#11) to reduce footprint, focusing solely on core signing and verification mechanisms.
30
-
- The library now requires at least v4.0.0 of `sigstore` due to breaking changes in that library
31
-
- Added support for signing and verifying using private Sigstore instances (`--trust_config`)
32
-
- Added support for BLAKE3 hashing
33
-
34
-
## [1.0.1] - 2024-04-18
12
+
### Added
13
+
- ...
14
+
15
+
### Changed
16
+
- ...
17
+
18
+
### Fixed
19
+
- ...
20
+
21
+
### Removed
22
+
- ...
23
+
24
+
## [1.1.0] - 2025-04-18
25
+
26
+
### Added
27
+
- Added support for signing with PKCS #11 devices ([#411](https://github.com/sigstore/model-transparency/pull/411)), as an optional dependency ([#494](https://github.com/sigstore/model-transparency/pull/494)).
28
+
- Added support for signing and verifying using private Sigstore instances via the `--trust_config` option ([#460](https://github.com/sigstore/model-transparency/pull/460)).
29
+
- Added support for the `--oauth_force_oob` option for the signing CLI flow ([#471](https://github.com/sigstore/model-transparency/pull/471)).
30
+
- Added support for specifying `--client_id` and `--client_secret` for OIDC authentication with custom OAuth clients ([#475](https://github.com/sigstore/model-transparency/pull/475)).
31
+
- Surfaced the `--allow_symlinks` option to the CLI and library API ([#486](https://github.com/sigstore/model-transparency/pull/486)).
32
+
- Implemented public key identifier hash matching for bundle verification ([#493](https://github.com/sigstore/model-transparency/pull/493)).
33
+
- Added warning for older verification material formats (e.g., raw public key bytes) during verification, recommending re-signing ([#493](https://github.com/sigstore/model-transparency/pull/493)).
34
+
- Added more informative signature mismatch errors: The `ValueError` raised during model verification when a signature mismatch occurs now includes detailed information about what caused the signature verification to fail ([#495](https://github.com/sigstore/model-transparency/pull/495)).
35
+
- Created a new, minimal container image. This variant excludes optional dependencies (like OTel and PKCS#11) to reduce footprint, focusing solely on core signing and verification mechanisms ([#499](https://github.com/sigstore/model-transparency/pull/499)).
36
+
- Added support for `--ignore_unsigned_files` option in CLI to ignore files that are not part of the manifest but are still present in the model directory ([#501](https://github.com/sigstore/model-transparency/pull/501)).
37
+
- Added support to trace sign and verify operations using OpenTelemetry ([#503](https://github.com/sigstore/model-transparency/pull/503)).
38
+
- The library was migrated to require at least v4.0.0 of `sigstore` due to breaking changes in that library ([#532](https://github.com/sigstore/model-transparency/pull/532)). There are no breaking changes within the library itself, as these changes should be transparent to the users.
39
+
- The `sigstore_protobuf_specs` dependency was replaced with `sigstore_models` due to the same changes in `sigstore-4.0.0` ([#533](https://github.com/sigstore/model-transparency/pull/533)). These changes should also be transparent to the users.
40
+
- Added support for BLAKE3 hashing ([#538](https://github.com/sigstore/model-transparency/pull/538)).
41
+
42
+
### Changed
43
+
- Adjusted model name when signing and verifying when `model_path` is current directory ([#452](https://github.com/sigstore/model-transparency/pull/452)).
44
+
- Recorded files in signature that were ignored when signature was created and added ability to automatically ignore those files when verifying signature ([#462](https://github.com/sigstore/model-transparency/pull/462)).
45
+
- The Sigstore signer was changed to be lazily initialized to avoid network calls when not using it ([#467](https://github.com/sigstore/model-transparency/pull/467)).
46
+
- Logging was migrated to only be enabled when the user asks to log the certificate fingerprints ([#472](https://github.com/sigstore/model-transparency/pull/472)).
47
+
48
+
### Fixed
49
+
- Fixed bugs related to using `model_path='.'` in the signature, as well as other issues related to file paths ([#452](https://github.com/sigstore/model-transparency/pull/452)).
50
+
- Fixed handling of certificate that has no `KeyUsage` ([#457](https://github.com/sigstore/model-transparency/pull/457)).
51
+
- Fixed bug related to ignoring git files ([#462](https://github.com/sigstore/model-transparency/pull/462)).
52
+
- Fixed handling of ignored files in the sharded file hasher ([#465](https://github.com/sigstore/model-transparency/pull/465)).
53
+
- Fixed handling of path resulting from certificates returned from `certify` API ([#468](https://github.com/sigstore/model-transparency/pull/468)).
54
+
- Fixed deserialization bug related to optional values in protobuf API for keyid ([#490](https://github.com/sigstore/model-transparency/pull/490)).
55
+
56
+
## [1.0.1] - 2025-04-18
35
57
36
58
### Added
37
59
- Added support for pre v1.0 signatures used in production. This is only provided for verification and replicates the experimental behavior at v0.2, bug for bug.
@@ -41,7 +63,7 @@ All versions prior to 1.0.0 are untracked.
41
63
- Fix bug in CLI scripts where even if signature verification failed, the script would also output that verification passed and exit with success error code.
42
64
- Docker containers wrapping around the CLI have been changed to support the updated CLI
43
65
44
-
## [1.0.0] - 2024-04-04
66
+
## [1.0.0] - 2025-04-04
45
67
46
68
### Added
47
69
- First stable release of `model_signing`.
@@ -55,6 +77,7 @@ All versions prior to 1.0.0 are untracked.
55
77
-[Demo notebook](https://colab.sandbox.google.com/drive/18IB_uipduXYq0ohMxJv2xHfeihLIcGMT) to showcase API and CLI examples.
0 commit comments