-
Notifications
You must be signed in to change notification settings - Fork 506
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provenance attesattion for artifacts #2300
Conversation
This commit fixes a bug where the parser would register literal "NONE" in DownloadLocation and another where Files woule not have their filename correctly set. Signed-off-by: Adolfo García Veytia (Puerco) <[email protected]>
This commit adds the capability to spdx documents to be exported as SLSA statements. Provenance attestations can now be created from a SPDX SBOM. The statment object now supports returning its contents as JSON besides writing to a file. Signed-off-by: Adolfo García Veytia (Puerco) <[email protected]>
Signed-off-by: Adolfo García Veytia (Puerco) <[email protected]>
The provenance checker now has the capability to create new end-user provenance attestaions by crossing data from the staging provenance and the sbom. Signed-off-by: Adolfo García Veytia (Puerco) <[email protected]>
Signed-off-by: Adolfo García Veytia (Puerco) <[email protected]>
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: puerco The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Sample attestation: provenance.json.gz |
Updated provcenance data with paths to actual release bucket locations: provenance.json.gz And last successfull release run: https://console.cloud.google.com/cloud-build/builds;region=global/9b353695-1d41-48ec-87c3-f542c9158a07?project=kubernetes-release-test |
/cc |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Just a few small nits, LGTM otherwise!
Great work as always! 💯
I had fun reading through the SLSA Provenance specification and understanding it. Looking forward to the update to v0.2 as well. :)
This commit sends the SLSA provenance attestations to the release bucket when pushing during release. Signed-off-by: Adolfo García Veytia (Puerco) <[email protected]>
Signed-off-by: Adolfo García Veytia (Puerco) <[email protected]>
Signed-off-by: Adolfo García Veytia (Puerco) <[email protected]>
Signed-off-by: Adolfo García Veytia (Puerco) <[email protected]>
111ab37
to
a4f6884
Compare
Yay, thank a lot @palnabarun , the two nits are addressed and we are should be ready to get the provenance attestations out of the build after we cut the next releases. The SLSA 0.2 types have not yet merged yet: in-toto/in-toto-golang#156 but ill start working to move to 0.2 based on @priyawadhwa 's PR. |
/lgtm |
Thank you, Adolfo! |
late /lgtm thanks for the hard work on this |
What type of PR is this?
/kind feature
What this PR does / why we need it:
Which issue(s) this PR fixes:
This PR adds the final bit to make all artifacts in the release bucket SLSA1 compliant. We still have to publish the attestations for the container images but we now have a way to check the provenance of all released artifacts.
The final in-toto attestation is composed by parsing the release SBOM, adding the data from the artifacts and then reusing the SLSA predicate from the staging provenance bucket.
Signed-off-by: Adolfo García Veytia (Puerco) [email protected]
Special notes for your reviewer:
Part of #2267
Test run: https://console.cloud.google.com/cloud-build/builds;region=global/66ca2089-2c31-4bdb-8cdd-93342681d166?project=kubernetes-release-test
(Se sample provenance data attached bellow)
Does this PR introduce a user-facing change?