Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sign release artifacts and git tags #1658

Open
JeanChristopheMorinPerso opened this issue Feb 17, 2024 · 0 comments
Open

Sign release artifacts and git tags #1658

JeanChristopheMorinPerso opened this issue Feb 17, 2024 · 0 comments

Comments

@JeanChristopheMorinPerso
Copy link
Member

JeanChristopheMorinPerso commented Feb 17, 2024

As part of the OpenSSF Best Practices badges, we must cryptographically sign our releases, which includes:

I suggest that we use https://www.sigstore.dev/ since that's pretty much the defacto solution nowadays and doesn't require us managing GPG keys. Though, we might actually want to look at https://slsa.dev/ to help our users map built packages back to their canonical sources and dependencies.

One thing to verify is if we need to do both slsa and sigstore. SLSA describes the provenance (what entity built the artifact, what process they used, and what the inputs were). This enables verifying that an artifact was built as expected.

From https://slsa.dev/spec/v1.0/verifying-artifacts:

SLSA uses provenance to indicate whether an artifact is authentic or not, but provenance doesn’t do anything unless somebody inspects it. SLSA calls that inspection verification

https://slsa.dev/attestation-model#model-and-terminology also shows that the attestation contains the artifact sha256 checksum and the attestation is signed. This means that technically the attestation of provenance is the artifact signature. If the artifact sha256 was to change, then the signature would become invalid.

Requirements:

@JeanChristopheMorinPerso JeanChristopheMorinPerso changed the title Sign release artifacts Sign release artifacts and git tags Feb 25, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Status: Todo
Development

No branches or pull requests

1 participant