-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Sig-Security] Generation of SLSA3+ provenance for KubeEdge release artifacts #4285
Conversation
5f7f4e3
to
7fe80cc
Compare
b9d8ced
to
df4aa1b
Compare
536fc4f
to
5efb1cf
Compare
.github/workflows/release.yml
Outdated
| @@ -20,8 +20,6 @@ jobs: | |||
| - linux | |||
| arch: | |||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
delete this arch part
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
.github/workflows/release.yml
Outdated
|
|
||
| _output/release/${{ github.ref_name }}/${{ matrix.target }}-${{ github.ref_name }}-${{ matrix.os }}-${{ env.output_arch }}.tar.gz | ||
| _output/release/${{ github.ref_name }}/checksum_${{ matrix.target }}-${{ github.ref_name }}-${{ matrix.os }}-${{ env.output_arch }}.tar.gz.txt | ||
| build-hash: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
add a blank line between the two jobs and between the two actions to make it readable
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
b39da38
to
e831628
Compare
|
Is this still relevant? If so, what is blocking it? Is there anything you can do to help move it forward? This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. |
Signed-off-by: vincentgoat <linguohui1@huawei.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
/approve
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: fisherxu The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Signed-off-by: vincentgoat linguohui1@huawei.com
What type of PR is this?
/kind cleanup
What this PR does / why we need it:
Generation of SLSA3+ provenance for KubeEdge, generating non-forgeable SLSA provenance on GitHub that meets the build and provenance requirements for SLSA level 3 and above.
Which issue(s) this PR fixes:
Fixes #
Special notes for your reviewer:
Does this PR introduce a user-facing change?: YES
1. Before merging this PR
Please create a
Repository variablesin the repo kubeedge.Steps: Repo kubeedge > settings > Security/Secretes and variables > Actions > Variables > New repositories variables
New the variable:
DOCKERHUB_USER_NAME: {the value is same with dockerhub username}2. Here is how we verify provenance generated by SLSA generator (Binary artifacts):
Download slsa-verifier tools. FYI: https://github.com/slsa-framework/slsa-verifier
Example:
$ ./slsa-verifier-linux-amd64 verify-artifact kubeedge-v1.xx.xx-linux-arm.tar.gz --provenance-path attestation.intoto.jsonl --source-uri github.com/kubeedge/kubeedge --source-tag v1.xx.xx
If the results return the following means verifying successfully.
PASSED: Verified SLSA provenanceOtherwise failed.
expected hash 'xxx' not found: artifact hash does not match provenance subjectNote: Files
kubeedge-v1.xx.xx-linux-arm.tar.gzandattestation.intoto.jsonlare release artifacts that show at KubeEdge RELEASE pages.3. Verify container images' provenance
FYI: https://github.com/slsa-framework/slsa-github-generator/tree/main/internal/builders/container#verification
Examples:
$ COSIGN_EXPERIMENTAL=1 cosign verify-attestation --type slsaprovenance --policy policy.cue kubeedge/admission:v1.x.x