Skip to content

Document SecureBuild verification path for SDK images#3966

Merged
jdewinne merged 5 commits intomainfrom
jdewinne/sdk-securebuild-verify
Apr 17, 2026
Merged

Document SecureBuild verification path for SDK images#3966
jdewinne merged 5 commits intomainfrom
jdewinne/sdk-securebuild-verify

Conversation

@jdewinne
Copy link
Copy Markdown
Member

Summary

  • Adds a new "Verify a SecureBuild-rebuilt SDK image" section that documents the verify-securebuild-image.sh script merged in securebuildhq/securebuild#85.
  • Adds an "About the SDK image verification lifecycle" section explaining the two phases (original release build vs. SecureBuild rebuild ~6 hours later) and which verification path applies to each.
  • Keeps the existing upstream verify-image.sh instructions (renamed to "Verify an original SDK release image"), because replicated-sdk still builds and signs images on release — SecureBuild only takes over after the rebuild.
  • Removes the "applies to Replicated SDK versions 1.18.1 and earlier" note, since the doc now covers both original and rebuilt images.
  • Light style cleanup (ordered-list 1. convention, sentence-case headings, colon-terminated run-in headings, fixed a 404 link at the bottom).

Context: based on the SLSA provenance generation proposal and the merged verification script PR above.

Test plan

  • Run npm start locally and confirm the page renders with working anchor links to #verify-original and #verify-securebuild.
  • Confirm Vale reports no new errors.
  • Verify the cross-link to /vendor/releases-creating-releases resolves.

Replicated SDK images are rebuilt by SecureBuild roughly 6 hours after
release, which breaks the upstream verification script because the
digest, signing identity, and provenance builder all change. Add a
second verification path using the SecureBuild-provided
verify-securebuild-image.sh script, and explain the two-phase
verification lifecycle so customers know which path to use.
@jdewinne jdewinne requested a review from a team as a code owner April 16, 2026 23:04
@netlify
Copy link
Copy Markdown

netlify bot commented Apr 16, 2026

Deploy Preview for replicated-docs ready!

Name Link
🔨 Latest commit d62e01a
🔍 Latest deploy log https://app.netlify.com/projects/replicated-docs/deploys/69e26c5bb2af71000853a35f
😎 Deploy Preview https://deploy-preview-3966--replicated-docs.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

@netlify
Copy link
Copy Markdown

netlify bot commented Apr 16, 2026

Deploy Preview for replicated-docs-upgrade ready!

Name Link
🔨 Latest commit d62e01a
🔍 Latest deploy log https://app.netlify.com/projects/replicated-docs-upgrade/deploys/69e26c5bd0a2a100086103fb
😎 Deploy Preview https://deploy-preview-3966--replicated-docs-upgrade.netlify.app
📱 Preview on mobile
Toggle QR Code...

QR Code

Use your smartphone camera to open QR code link.

To edit notification comments on pull requests, go to your Netlify project configuration.

@replicated-ci replicated-ci added type::docs Improvements or additions to documentation type::feature labels Apr 16, 2026
Copy link
Copy Markdown
Contributor

@github-actions github-actions bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Remaining comments which cannot be posted as a review comment to avoid GitHub Rate Limit

vale

docs/vendor/replicated-sdk-slsa-validating.md|143 col 37| [Replicated.Passive] In general, use active voice instead of passive voice ('was signed').
docs/vendor/replicated-sdk-slsa-validating.md|143 col 67| [Vale.Spelling] Did you really mean 'keyless'?
docs/vendor/replicated-sdk-slsa-validating.md|147 col 67| [Vale.Spelling] Did you really mean 'keyless'?
docs/vendor/replicated-sdk-slsa-validating.md|148 col 30| [Replicated.Passive] In general, use active voice instead of passive voice ('was signed').
docs/vendor/replicated-sdk-slsa-validating.md|148 col 64| [Vale.Spelling] Did you really mean 'Fulcio'?
docs/vendor/replicated-sdk-slsa-validating.md|148 col 91| [Vale.Spelling] Did you really mean 'Rekor'?
docs/vendor/replicated-sdk-slsa-validating.md|152 col 25| [Replicated.Acronyms] Spell out 'SPDX' on first use, if it's unfamiliar to the audience.
docs/vendor/replicated-sdk-slsa-validating.md|152 col 47| [Replicated.Passive] In general, use active voice instead of passive voice ('was signed').
docs/vendor/replicated-sdk-slsa-validating.md|152 col 77| [Vale.Spelling] Did you really mean 'keyless'?

## Purpose of attestations

Attestations enable the inspection of an image to determine its origin, the identity of its creator, the creation process, and its contents. When building software using the Replicated SDK, the image's Software Bill of Materials (SBOM) and SLSA-based provenance attestations empower your customers to make informed decisions regarding the impact of an image on the supply chain security of your application.
Attestations enable the inspection of an image to determine its origin, the identity of its creator, the creation process, and its contents. When building software using the Replicated SDK, the image's SBOM and SLSA-based provenance attestations empower your customers to make informed decisions regarding the impact of an image on the supply chain security of your application.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

📝 [vale] reported by reviewdog 🐶
[Replicated.SentenceLength] Try to keep your sentence length to 26 words or fewer.

## Purpose of attestations

Attestations enable the inspection of an image to determine its origin, the identity of its creator, the creation process, and its contents. When building software using the Replicated SDK, the image's Software Bill of Materials (SBOM) and SLSA-based provenance attestations empower your customers to make informed decisions regarding the impact of an image on the supply chain security of your application.
Attestations enable the inspection of an image to determine its origin, the identity of its creator, the creation process, and its contents. When building software using the Replicated SDK, the image's SBOM and SLSA-based provenance attestations empower your customers to make informed decisions regarding the impact of an image on the supply chain security of your application.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

📝 [vale] reported by reviewdog 🐶
[Replicated.Acronyms] Spell out 'SLSA' on first use, if it's unfamiliar to the audience.


## About the SDK image verification lifecycle

Replicated SDK images are published in two phases, and the verification method depends on which phase an image is in:
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

📝 [vale] reported by reviewdog 🐶
[Replicated.Passive] In general, use active voice instead of passive voice ('are published').


Replicated SDK images are published in two phases, and the verification method depends on which phase an image is in:

1. **Original release build.** When a new SDK version is released, Replicated builds the image through its own pipeline, which attaches:
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

📝 [vale] reported by reviewdog 🐶
[Replicated.Passive] In general, use active voice instead of passive voice ('is released').

Comment thread docs/vendor/replicated-sdk-slsa-validating.md
Comment thread docs/vendor/replicated-sdk-slsa-validating.md Outdated
Comment thread docs/vendor/replicated-sdk-slsa-validating.md Outdated
The verification script performs three security checks against the SecureBuild signing identity:
1. SLSA v1.0 provenance verification
1. Cosign image signature verification
1. SBOM (SPDX) attestation verification
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

📝 [vale] reported by reviewdog 🐶
[Replicated.Acronyms] Spell out 'SPDX' on first use, if it's unfamiliar to the audience.

Comment thread docs/vendor/replicated-sdk-slsa-validating.md
Comment thread docs/vendor/replicated-sdk-slsa-validating.md Outdated
paigecalvert
paigecalvert previously approved these changes Apr 17, 2026
@jdewinne jdewinne merged commit 5ea393e into main Apr 17, 2026
5 checks passed
@jdewinne jdewinne deleted the jdewinne/sdk-securebuild-verify branch April 17, 2026 17:37
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

type::docs Improvements or additions to documentation type::feature

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants