Re: SPDX Signing #spdx
Brandon Lum
I've been signing and uploading them with sigstore as an intoto predicate, but not using the intoto specified spdx schema but instead pointing to a URI. Since sigstore has a limit on attestation size and this (point to a URI) also allows one to defer authorization of the blob to a storage server and point to a collection of documents. Still in draft, but this is a approximation of what we're using { "_type": "https://in-toto.io/Statement/v0.1", "predicateType": "http://google.com/sbom", "subject": [ { "name": "binary-linux-amd64", "digest": { "sha256": "f2e59e0e82c6a1b2c18ceea1dcb739f680f50ad588759217fc564b6aa5234791" } } ], "predicate": { "sboms": [ { "format": "SPDX", "digest": { "sha256": "02948ad50464ee57fe237b09054c45b1bff6c7d18729eea1eb740d89d9563209" }, "uri": "https://github.com/lumjjb/sample-golang-prov/releases/download/v1.3/binary.spdx" } ], // BuildMetadata is optional, but is used for provenance verification in the event SLSA // provenance is not available. Specific to github actions workflow. "build-metadata": { "artifact-source-repo": "https://github.com/lumjjb/sample-golang-prov", "artifact-source-repo-commit": "c8cb5f292c77064aeabb488ea4f5e483a5073076", "attestation-generator-repo": "https://github.com/lumjjb/slsa-github-generator-go", "attestation-generator-repo-commit": "6948f4c67f6bca55657fe1fb3630b55b1714ef2d" } } }
On Mon, Aug 8, 2022 at 7:51 AM Steve Kilbane <stephen.kilbane@...> wrote:
|
|
|