Giter VIP home page Giter VIP logo

slsa-provenance-action's Introduction

Contributors Forks Stargazers Issues MIT License


Logo

SLSA Provenance GitHub Action

Github Action to generate [SLSA provenance][slsa-provenance]
Report Bug · Request Feature

About This Project

This GitHub action implements the level 1 requirements of the SLSA framework. By using this GitHub Action it is possible to easily generate the provenance file for different artifact types. Different artifact types include, but not limited to:

  • Files
  • Push event (Docker Hub, trigger different workflow, etc)

While there are no integrity guarantees on the produced provenance at L1, publishing artifact provenance in a common format opens up opportunities for automated analysis and auditing. Additionally, moving build definitions into source control and onto well-supported, secure build systems represents a marked improvement from the ecosystem's current state.

This is not an official GitHub Action set up and maintained by the SLSA team. This GitHub Action is built for research purposes by Philips Research. It is heavily inspired by the original Provenance Action example built by SLSA.

(back to top)

Background

SLSA is a framework intended to codify and promote secure software supply-chain practices. SLSA helps trace software artifacts (e.g. binaries) back to the build and source control systems that produced them using in-toto's Attestation metadata format.

Built With

(back to top)

Getting Started

Get started quickly by reading the information below.

Prerequisites

Ensure you have the following installed:

  • Golang
  • Docker

Recommendations

The following IDE is recommended when working on this codebase:

Local Installation

  1. Clone the repo.

    git clone [email protected]:philips-labs/slsa-provenance-action.git
  2. Build the binary.

    make build
  3. Execute the binary.

    ./bin/slsa-provenance help

Docker Image

Our Docker images are available at both GitHub Container Registry (ghcr) and Docker Hub.

Docker Hub See all available images here. Run the Docker image by doing:

docker run philipssoftware/slsa-provenance:v0.7.2

GitHub Container Registry See all available images here. Run the Docker image by doing:

docker run ghcr.io/philips-labs/slsa-provenance:v0.7.2

The Docker image includes the working binary that can be executed by using the slsa-provenance command.

(back to top)

Usage

The easiest way to use this action is to add the following into your workflow file. Additional configuration might be necessary to fit your usecase.

GitHub Releases

Add the following part in your workflow file:

See ci workflow for a full example using GitHub releases.

⚠️ NOTE: this job depends on a release job that publishes the release assets to a GitHub Release.

provenance:
  name: provenance
  needs: [release]
  runs-on: ubuntu-20.04
  permissions:
    # required to update the release.
    contents: write

  steps:
    - name: Generate provenance for Release
      uses: philips-labs/[email protected]
      with:
        command: generate
        subcommand: github-release
        arguments: --artifact-path release-assets --output-path 'provenance.json' --tag-name ${{ github.ref_name }}
      env:
        GITHUB_TOKEN: "${{ secrets.GITHUB_TOKEN }}"
GitHub artifacts

Add the following part in your workflow file:

See example workflow for a full example using GitHub artifacts.

generate-provenance:
  name: Generate build provenance
  runs-on: ubuntu-latest
  steps:
    - name: Download build artifact
      uses: actions/download-artifact@v2
      with:
        path: artifact/

    - name: Download extra materials for provenance
      uses: actions/download-artifact@v2
      with:
        name: extra-materials
        path: extra-materials/

    - name: Generate provenance
      uses: philips-labs/[email protected]
      with:
        command: generate
        subcommand: files
        arguments: --artifact-path artifact/ --extra-materials extra-materials/file1.json,extra-materials/some-more.json

    - name: Upload provenance
      uses: actions/upload-artifact@v2
      with:
        path: provenance.json

Description

An action to generate SLSA build provenance for an artifact

Inputs

parameter description required default
command The slsa-provenance command to run false generate
subcommand The subcommand to use when generating provenance false files
github_context internal (do not set): the "github" context object in json true ${{ toJSON(github) }}
runner_context internal (do not set): the "runner" context object in json true ${{ toJSON(runner) }}
arguments the arguments for the given command and subcommand true

(back to top)

Contributing

If you have a suggestion that would make this project better, please fork the repository and create a pull request. You can also simply open an issue with the tag "enhancement".

  1. Fork the Project
  2. Create your Feature Branch (git checkout -b feature/AmazingFeature)
  3. Commit your Changes (git commit -m 'Add some AmazingFeature')
  4. Push to the Branch (git push origin feature/AmazingFeature)
  5. Open a Pull Request

Please refer to the Contributing Guidelines for all the guidelines.

(back to top)

License

Distributed under the MIT License. See LICENSE for more information.

(back to top)

Contact

Powered by Philips SWAT Eindhoven

(back to top)

Acknowledgments

This project is inspired by:

(back to top)

slsa-provenance-action's People

Contributors

anniejovitha avatar brend-smits avatar ckotzbauer avatar claudioandre-br avatar dependabot[bot] avatar jeroenknoops avatar jkremser avatar marcofranssen avatar pieterlexis avatar raboof avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar

slsa-provenance-action's Issues

Sign provenance files

Signing of provenance files should allow for compatibility with:

Both Cosign and notation allow for attaching additional artefacts to the image. Eventually this signed provenance should also be attachable to the container image (#88). That would allow us to fetch the provenance for a given docker image and use the tooling (notation/cosign) to verify the signature.

Implement feature to generate provenance for a Github release

By integrating the logic into our binary we should reduce the attack surface of using third party libraries and actions.

  • Implement logic to fetch an existing Github release
  • Implement logic to download github release assets
  • Implement logic to generate provenance for the assets in the Github release
  • Implement logic to upload the provenance to the Github release
  • Invoke new logic if artifact_path commandline flag is a github release url

Transitive Provenance

Multiple layers with file downloads from previous layers.
Example:
Job 1 creates two artifacts, 1 jar, and 1 provenance file.
Job 2 is depended on job 1 and downloads the artifacts. We should generate a provenance file based on the existing provenance file from job 1

Provenance of single artifact with manual input

Generate a simple use case and provide the provenance of a single artifact with manual input.

This should result in the following changes in the provenance file:

  • a different SHA256 in the Subject part
  • predicate.metadata.completeness should have the content of the manual input
  • predicate.recipe.arguments should have the content of the manual input

Add release job to ci workflow

See tabia, spiffe-vault for some examples on releasing the docker image and the binaries.

We only need to verify if something specific has to be done for the GH action itself.

Investigate Recipe type... Is the unresolvable TypeUri okay?

Description

In the provenance file there is a section on recipe.
This contains a type. In our case: https://github.com/Attestations/GitHubActionsWorkflow@v1

Problem

This is not a valid url. We think this is still under discussion with GitHub.
Or, it's perfectly fine, see the definition: https://github.com/in-toto/attestation/blob/main/spec/field_types.md#TypeURI

Snippet of provenance file

...
    "recipe": {
      "type": "https://github.com/Attestations/GitHubActionsWorkflow@v1",
      "definedInMaterial": 0,
      "entryPoint": "Create a provenance",
      "arguments": {
        "text_input": "Garlic"
      },
      "environment": null
    },
...

Related issues

Similar to #6

Redesign command line interface

Due to adding more and more features the UX of the cli becomes more complicated as well the logic within the CLI to validate the commandline options is becoming more complicated.

e.g. when creating provenance for containers it requires different arguments then generating provenance for file assets.

Draft Proposal:

bin/slsa-provenance containers generate -repo ghcr.io/philips-labs/slsa-provenance -tags v0.4.0,abc12345fe7878d9 -digest 9817abcd1238gfa -output_path provenance.json
bin/slsa-provenance files generate -artifact_path ./build_output  -output_path provenance.json
bin/slsa-provenance gh-release generate -release v0.4.0  -output_path provenance.json
bin/slsa-provenance sign -key signing.key -provenance_file provenance.json -output_path provenance.signed

This should allow us to bring some consistency on options used in the different commands as well bring more clarity/transparency for the end-user on what will be the effect of providing an option.

Current command in the container-provenance branch looks as following and is becoming quite cluttered. Both from an UX perspective as well from a implementation perspective with all the combinations possible/not possible.

USAGE
  slsa-provenance generate

FLAGS
  -artifact_path ...             The file or dir path of the artifacts for which provenance should be generated.
  -container_digest ...          The digest for the oci artifact
  -container_repo ...            The repository for the oci artifact
  -container_tags ...            the given tags for this oci release
  -extra_materials ...           paths to files containing SLSA v0.1 formatted materials (JSON array) in to include in the provenance
  -github_context ...            The '${github}' context value.
  -output_path build.provenance  The path to which the generated provenance should be written.
  -runner_context ...            The '${runner}' context value.
  -tag_name ...                  The github release to generate provenance on.

Implement verify command on slsa-provenance-action cli

Once we have provenance generated, it would also be handy to be able to verify the provenance.

In practice this means we need to be able to execute the attestations from the in-toto statement.

Verifying the provenance file would in general be something that is executed in a admission-controller before something is installed in production.

See here a reference of the in-toto statement

https://github.com/in-toto/attestation

See here another binary implementing in-toto including a verify command.

https://github.com/in-toto/in-toto-golang

Start using cosign transparency log using rekor and fulcio

By using cosigns experimental feature it will start using fulcio and rekor.

This adds additional security by adding a transparancy log as well PKCS11 based certificates.

As the feature is still experimental we might want to hold back for a bit to have this feature mature a bit more.

We need to add the certificate lines back

abc16c4

as well enable the experimental feature see https://github.com/caarlos0/goreleaserfiles/blob/main/cosign_docker.yml#L6

Doing so enables us to do keyless code signing of our releases.

Version is not set in build artifact.

Problem

Version is not set in build artifact.

Evidence

$ docker run ghcr.io/philips-labs/slsa-provenance:v0.5.0 version
GitVersion:
GitCommit:
GitTreeState:  clean
BuildDate:     '2021-12-24T15:39:07Z'
GoVersion:     go1.17.5
Compiler:      gc
Platform:      linux/amd64

Versions

This happens in version v0.2.0, v0.3.0, v0.4.0 and v0.5.0

Investigate Builder ID

What does it do?
Example:

  "predicate": {
    "builder": {
      "id": "https://github.com/philips-labs/SLSA-Provenance-Action/Attestations/GitHubHostedActions@v1"
    },

What does the URL do and what precisely does the Attesations mean?

Add ability to skip github-specific CI in workflows

Right now, CI runs in my own fork (and PRs) fail because some secrets are not available. This is the GITHUB_TOKEN required to query the GitHub APIs. It would be good to have the workflows not run these obviously unrunnable tests :)

See if incrementing the action.yml can be automated

When releasing a new version of our action we push a new tag.

This results in a release of the docker image with that specific tag as well a github release.

Now to ensure people are using this tag the exact same commit referenced by the tag should also point to the to-be released version of our image within action.yml

https://github.com/philips-labs/slsa-provenance-action/blob/github-releases/action.yaml#L29

Basically we have the chicken and egg issue that needs to be resolved to be able to automate this.

Currently we will have to make a new commit on the main branch increasing the version, then tag this commit and do

git push --follow-tags

Dependabot builds are failing because of CODECOV.

Problem

Dependabot do continuous integration tests are failing.

Cause

Dependabot does not have access to the CODECOV secrets.

Possible solutions

Two solutions are possible:

  1. Add CODECOV secret as dependabot secret
  2. Only run CODECOV when code has been changed (or when a release is made)

Example workflow

#55

Add capability to add provenance for building docker images

When releasing docker images to various registries using various tags it would be good to be able to generate provenance using this action independent from the tooling/scripts that create the images and tags.

e.g.:

  • goreleaser
  • bash script

For each registry we would like to be able to generate provenance for the tags that are correlated to each other. We could leverage the docker image digest as a subject.

This provenance file could then be attached using cosign (sigstore) or notation (Notary Project).

ghcr.io/philips-labs/slsa-provenance:latest
ghcr.io/philips-labs/slsa-provenance:v0.2.0
ghcr.io/philips-labs/slsa-provenance:v0.2
ghcr.io/philips-labs/slsa-provenance:v0

philipssoftware/slsa-provenance:latest
philipssoftware/slsa-provenance:v0.2.0
philipssoftware/slsa-provenance:v0.2
philipssoftware/slsa-provenance:v0

In the current spec that would however be some duplication to express the same image using the various tags.

To be discussed:

  • How to make he provenance action aware of the released docker images during a Github release?
  • Will there be a provenance file per registry or per tag or one for all the registries?

Provenance probably incorrect when creating multiple subjects in one workflow.

Problem

When creating multiple subjects in multiple steps in a workflow, all predicates are the same.

Basically the Provenance states: We ran workflow w and it produced subject x with digest y on timestamp z. There is no information on which step and what arguments are used.

Example provenance (from the related issue)

{
  "_type": "https://in-toto.io/Statement/v0.1",
  "predicateType": "https://slsa.dev/provenance/v0.2",
  "subject": [
    {
      "name": "index.docker.io/philipssoftware/blackduck",
      "digest": {
        "sha256": "e4b7db02469ea627818cfd8bcd0cff1c377e64189ef670184e56d0685096374f"
      }
    }
  ],
  "predicate": {
    "builder": {
      "id": "https://github.com/philips-software/docker-blackduck/Attestations/GitHubHostedActions@v1"
    },
    "buildType": "https://github.com/Attestations/GitHubActionsWorkflow@v1",
    "invocation": {
      "configSource": {
        "uri": "git+https://github.com/philips-software/docker-blackduck",
        "digest": {
          "sha1": "64a263c8bb206b256e0507f1998d81e7f647f8fc"
        },
        "entryPoint": "build"
      }
    },
    "metadata": {
      "buildInvocationID": "https://github.com/philips-software/docker-blackduck/actions/runs/1752676715",
      "buildFinishedOn": "2022-01-26T19:39:00Z",
      "completeness": {
        "parameters": true,
        "environment": false,
        "materials": false
      },
      "reproducible": false
    },
    "materials": [
      {
        "uri": "git+https://github.com/philips-software/docker-blackduck",
        "digest": {
          "sha1": "64a263c8bb206b256e0507f1998d81e7f647f8fc"
        }
      }
    ]
  }
}

The invocation node shows which repository with given sha1 and the entryPoint. The entrypoint relates back to the name of the workflow, not the step.
In the metadata we see the buildInvocationID and the buildFinishedOn fields. This is not enough to know what was used to build it. We also need to known what github-action-name is invoked and what arguments were passed.

Possible solution

In the SLSA-provenance v0.2 spec we see an example for "GitHub Actions Workflow".

They are using the entrypoint like we are doing. (they added filename in front of the workflow name). The parameters node is used for workflow_dispatch parameters.
The environment part is to provide context how to reproduce it.. I think we need to add the step / github-action-name and arguments there.

Related issue

See also: philips-software/docker-ci-scripts#97

Fix `make gh-release` to work on MacOS

On MacOS there is a different version of sed.

By installing gsed and adding an alias in your .bashrc/.zshrc you can have compatibility.

Make however is not picking aliases and still uses the version of sed that ships with MacOS.

We should find another way in the Makefile to use gsed when running on MacOS. e.g. Detect the OS from the makefile and then conditionally use gsed as opposed to sed.

GitHub action for install only option

When using the current GH Action, you always have to use the action. In some use cases, you want to only install it and use it later on.
See GoReleaser as an example.

Mock tests for GitHub releases

The current tests use the production GitHub API for testing generating provenance for release assets and attaching it to GitHub.
Instead of using the API, we should mock it to avoid things breaking out of the blue.

Attach slsaprovenance predicate to container.

Problem

The complete provenance.json is attached to the container.

cosign attest --predicate provenance.json --key cosign.key ${{ matrix.repo }}@${{ needs.release.outputs.container_digest }}

This is not recognised by cosign as a slsaprovenance predicate-type.
This results in a custom attestation, which can be seen if you look at the payload of the attestation.
The payload contains a predicate type: cosign.sigstore.dev/attestation/v1 with our escaped provenance.json file.

Example workflow / payload

https://github.com/philips-labs/slsa-provenance-action/runs/4627740174?check_suite_focus=true

Payload:

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

Payload decoded:

{
  "_type": "https://in-toto.io/Statement/v0.1",
  "predicateType": "cosign.sigstore.dev/attestation/v1",
  "subject": [
    {
      "name": "index.docker.io/philipssoftware/slsa-provenance",
      "digest": {
        "sha256": "8eb14bddd14e6ff75c68a9ee61d713f6805f8b323b3e183b9f41e67e86d76914"
      }
    }
  ],
  "predicate": {
    "Data": "{\n  \"_type\": \"https://in-toto.io/Statement/v0.1\",\n  \"subject\": [\n    {\n      \"name\": \"philipssoftware/slsa-provenance:ba29e99fad09a676a55dcc47cee20efe7f980087\",\n      \"digest\": {\n        \"sha256\": \"8eb14bddd14e6ff75c68a9ee61d713f6805f8b323b3e183b9f41e67e86d76914\"\n      }\n    },\n    {\n      \"name\": \"philipssoftware/slsa-provenance:v0.5.0\",\n      \"digest\": {\n        \"sha256\": \"8eb14bddd14e6ff75c68a9ee61d713f6805f8b323b3e183b9f41e67e86d76914\"\n      }\n    }\n  ],\n  \"predicateType\": \"https://slsa.dev/provenance/v0.2\",\n  \"predicate\": {\n    \"builder\": {\n      \"id\": \"https://github.com/philips-labs/slsa-provenance-action/Attestations/GitHubHostedActions@v1\"\n    },\n    \"buildType\": \"https://github.com/Attestations/GitHubActionsWorkflow@v1\",\n    \"invocation\": {\n      \"configSource\": {\n        \"entryPoint\": \"Continuous integration\",\n        \"uri\": \"git+https://github.com/philips-labs/slsa-provenance-action\",\n        \"digest\": {\n          \"sha1\": \"ba29e99fad09a676a55dcc47cee20efe7f980087\"\n        }\n      },\n      \"parameters\": null,\n      \"environment\": null\n    },\n    \"metadata\": {\n      \"buildInvocationId\": \"https://github.com/philips-labs/slsa-provenance-action/actions/runs/1619595723\",\n      \"buildFinishedOn\": \"2021-12-24T15:41:05Z\",\n      \"completeness\": {\n        \"parameters\": true,\n        \"environment\": false,\n        \"materials\": false\n      },\n      \"reproducible\": false\n    },\n    \"materials\": [\n      {\n        \"uri\": \"git+https://github.com/philips-labs/slsa-provenance-action\",\n        \"digest\": {\n          \"sha1\": \"ba29e99fad09a676a55dcc47cee20efe7f980087\"\n        }\n      }\n    ]\n  }\n}",
    "Timestamp": "2021-12-24T15:41:06Z"
  }
}

Probable solution

We can only send the predicate part of our provenance and add the type: slsaprovenance

Action is not able to pull private images

The action is not able to pull private images at this point. This is due to the library that is used internally to retrieve the images is not passing along the proper tokens.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.