Skip to content
GitLab
Menu
Projects
Groups
Snippets
/
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in / Register
Toggle navigation
Menu
Open sidebar
Shawn Webb
Slsa
Commits
81795370
Unverified
Commit
81795370
authored
Jun 29, 2021
by
Tom Hennen
Committed by
GitHub
Jun 29, 2021
Browse files
Merge pull request #79 from slsa-framework/TomHennen-patch-1
Allow a service other than the 'build service' to generate provenance
parents
1e6031d7
1f2d87c7
Changes
1
Hide whitespace changes
Inline
Side-by-side
requirements.md
View file @
81795370
...
...
@@ -294,15 +294,29 @@ all the other requirements.
The provenance's authenticity and integrity can be verified by the consumer.
This SHOULD be through a digital signature from a private key accessible only to
the
build servi
ce.
the
service generating the provenan
ce.
<td>
<td>
✓
<td>
✓
<td>
✓
<tr
id=
"service-generated"
>
<td>
Service Generated
<td>
The provenance was populated by the build service, not by user-provided tooling
running on top of the service.
The data in the provenance MUST be obtained from the build service (either because
the generator _is_ the build service or because the provenance generator reads the
data directly from the build service).
Regular users of the service MUST NOT be
able to inject or alter the contents, except as noted below.
The following provenance fields MAY be generated by the user-controlled build
steps:
*
The output artifact hash from
[
Identifies Artifact
](
#identifies-artifact
)
.
*
Reasoning: This only allows a "bad" build to falsely claim that it
produced a "good" artifact. This is not a security problem because the
consumer MUST accept only "good" builds and reject "bad" builds.
*
The "reproducible" boolean and justification from
[
Reproducible
](
#reproducible
)
.
<td>
<td>
✓
<td>
✓
<td>
✓
<tr
id=
"non-falsifiable"
>
...
...
@@ -311,6 +325,8 @@ running on top of the service.
Provenance cannot be falsified by the build service's users.
NOTE: This requirement is a stricter version of
[
Service Generated
](
#service-generated
)
.
*
The provenance signing key MUST be stored in a secure key management system
accessible only to the build service account.
*
The provenance signing key MUST NOT be accessible to the environment running
...
...
Write
Preview
Supports
Markdown
0%
Try again
or
attach a new file
.
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment