Skip to content

Conversation

dependabot[bot]
Copy link
Contributor

@dependabot dependabot bot commented on behalf of github Sep 29, 2025

Bumps github.com/getsops/sops/v3 from 3.10.2 to 3.11.0.

Release notes

Sourced from github.com/getsops/sops/v3's releases.

v3.11.0

Installation

To install sops, download one of the pre-built binaries provided for your platform from the artifacts attached to this release.

For instance, if you are using Linux on an AMD64 architecture:

# Download the binary
curl -LO https://github.com/getsops/sops/releases/download/v3.11.0/sops-v3.11.0.linux.amd64
Move the binary in to your PATH
mv sops-v3.11.0.linux.amd64 /usr/local/bin/sops
Make the binary executable
chmod +x /usr/local/bin/sops

Verify checksums file signature

The checksums file provided within the artifacts attached to this release is signed using Cosign with GitHub OIDC. To validate the signature of this file, run the following commands:

# Download the checksums file, certificate and signature
curl -LO https://github.com/getsops/sops/releases/download/v3.11.0/sops-v3.11.0.checksums.txt
curl -LO https://github.com/getsops/sops/releases/download/v3.11.0/sops-v3.11.0.checksums.pem
curl -LO https://github.com/getsops/sops/releases/download/v3.11.0/sops-v3.11.0.checksums.sig
Verify the checksums file
cosign verify-blob sops-v3.11.0.checksums.txt 
--certificate sops-v3.11.0.checksums.pem 
--signature sops-v3.11.0.checksums.sig 
--certificate-identity-regexp=https://github.com/getsops 
--certificate-oidc-issuer=https://token.actions.githubusercontent.com

Verify binary integrity

To verify the integrity of the downloaded binary, you can utilize the checksums file after having validated its signature:

# Verify the binary using the checksums file
sha256sum -c sops-v3.11.0.checksums.txt --ignore-missing

Verify artifact provenance

The SLSA provenance of the binaries, packages, and SBOMs can be found within the artifacts associated with this release. It is presented through an in-toto link metadata file named sops-v3.11.0.intoto.jsonl. To verify the provenance of an artifact, you can utilize the slsa-verifier tool:

</tr></table> 

... (truncated)

Changelog

Sourced from github.com/getsops/sops/v3's changelog.

3.11.0

Security fixes:

  • Ensure temporary file for editing is only read-writable by owner. This was already the case for the directory containing the file (#1903).
  • Ignore encryption selection options for binary store, and warn when they are used. In previous versions, these could have prevented the data to be encrypted (#1927).
  • Do not print sensitive values in error messages when trying to encrypt complex values in DotEnv and exec-env (#1959).

Features:

  • Allow to set values from file with sops set --value-file (#1876, #1940).
  • Allow to set values from stdin with sops set --value-stdin (#1894).
  • Add subcommands to create shell completion scripts (#1892).
  • Allow to provide keys as YAML lists instead of comma-separated strings (#1880).
  • Allow to configure --enable-local-keyservice and --keyservice through environment variables (#1930).
  • Allow to omit AZKV key version in .sops.yaml (#1919, #1947).
  • Allow non-complex non-string values in DotEnv and sops exec-env (#1933).

Improvements:

... (truncated)

Commits
  • 1687363 Merge pull request #1960 from felixfontein/release-3.11.0
  • 4209fbe Bump version to 3.11.0.
  • c53a1fc Add changelog for 3.11.0.
  • 4129207 Merge pull request #1959 from felixfontein/complex-value
  • 4bd0a14 Address review comments.
  • 3dda744 Move dotenv.IsComplexValue to stores.
  • d893aa1 Do not put sensitive value into error message when the key can be printed as ...
  • 2ade87b Merge pull request #1947 from felixfontein/azkv-version
  • 03ff3df Apply review suggestions.
  • 61cc3f7 AZKV: Also allow to omit version for AZKV keys specified in key groups.
  • Additional commits viewable in compare view

Dependabot compatibility score

Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


Dependabot commands and options

You can trigger Dependabot actions by commenting on this PR:

  • @dependabot rebase will rebase this PR
  • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
  • @dependabot merge will merge this PR after your CI passes on it
  • @dependabot squash and merge will squash and merge this PR after your CI passes on it
  • @dependabot cancel merge will cancel a previously requested merge and block automerging
  • @dependabot reopen will reopen this PR if it is closed
  • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
  • @dependabot show <dependency name> ignore conditions will show all of the ignore conditions of the specified dependency
  • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
  • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)

@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Sep 29, 2025
@dependabot dependabot bot requested a review from a team as a code owner September 29, 2025 00:12
@dependabot dependabot bot added dependencies Pull requests that update a dependency file go Pull requests that update Go code labels Sep 29, 2025
Bumps [github.com/getsops/sops/v3](https://github.com/getsops/sops) from 3.10.2 to 3.11.0.
- [Release notes](https://github.com/getsops/sops/releases)
- [Changelog](https://github.com/getsops/sops/blob/main/CHANGELOG.md)
- [Commits](getsops/sops@v3.10.2...v3.11.0)

---
updated-dependencies:
- dependency-name: github.com/getsops/sops/v3
  dependency-version: 3.11.0
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
@dependabot dependabot bot force-pushed the dependabot/go_modules/github.com/getsops/sops/v3-3.11.0 branch from 5b4a333 to e80ecdb Compare September 29, 2025 15:15
@wolf31o2 wolf31o2 merged commit 5c79f46 into main Oct 5, 2025
12 of 15 checks passed
@wolf31o2 wolf31o2 deleted the dependabot/go_modules/github.com/getsops/sops/v3-3.11.0 branch October 5, 2025 13:36
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
dependencies Pull requests that update a dependency file go Pull requests that update Go code
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant