You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* ๐ add missing image used in SPECIFICATION.md
This was omitted when docs were copied from the slsa-github-generator-go
repository.
Signed-off-by: Joshua Lock <[email protected]>
* ๐ move verification steps to top-level README
* Move verification steps to top-level README, these are not ecosystem
specific
* Make 'Provenance format' a child of 'Technical design'
* Make 'Generation of provenance' a second-level section
Signed-off-by: Joshua Lock <[email protected]>
* ๐ update README to clarify which requirements are met
Emphasise that the generator and builders can be used to meet the Build
and Provenance requirements only, Source requirements must be met with
other tools.
Signed-off-by: Joshua Lock <[email protected]>
# Generation of SLSA3+ provenance for native GitHub projects
2
2
3
-
This repository contains the implementation for generating non-forgeable [SLSA provenance](https://slsa.dev/) that meets the requirement for the [SLSA level 3 and above](https://slsa.dev/spec/v0.1/levels). The SLSA generation makes use of a [Github Actions reusable workflow](https://docs.github.com/en/actions/using-workflows/reusing-workflows).
3
+
This repository contains tools for generating non-forgeable [SLSA provenance](https://slsa.dev/)on GitHub that meets the [build](https://slsa.dev/spec/v0.1/requirements#build-requirements)and [provenance](https://slsa.dev/spec/v0.1/requirements#provenance-requirements) requirements for [SLSA level 3 and above](https://slsa.dev/spec/v0.1/levels).
4
4
5
-
This repository contains the code, examples and technical design for the blog post on [Non forgeable SLSA provenance using GitHub workflows](https://security.googleblog.com/2022/04/improving-software-supply-chain.html).
5
+
Use of the provided [Github Actions reusable workflow](https://docs.github.com/en/actions/using-workflows/reusing-workflows)s only is not sufficient to meet all of the requirements at SLSA level 3. Specifically, the [source requirements](https://slsa.dev/spec/v0.1/requirements#source-requirements) are not covered by these workflows and must be handled explicitly to meet all requirements at SLSA level 3+.
6
+
7
+
This repository contains the code, examples and technical design for system described in the blog post on [Non forgeable SLSA provenance using GitHub workflows](https://security.googleblog.com/2022/04/improving-software-supply-chain.html).
6
8
7
9
---
8
10
9
-
-[Golang projects](#golang-projects)
10
-
-[Other projects](#other-projects)
11
-
-[Provenance format](#provenance-format)
11
+
-[Generation of provenance](#generation-of-provenance)
12
+
-[Golang projects](#golang-projects)
13
+
-[Other projects](#other-projects)
14
+
-[Verification of provenance](#verification-of-provenance)
15
+
-[Installation](#installation)
16
+
-[Inputs](#inputs)
17
+
-[Command line examples](#command-line-examples)
12
18
-[Technical design](#technical-design)
13
19
-[Blog post](#blog-post)
14
20
-[Specifications](#specifications)
21
+
-[Provenance format](#provenance-format)
15
22
16
23
---
17
24
18
-
## Golang projects
25
+
## Generation of provenance
26
+
27
+
### Golang projects
19
28
20
29
To generate SLSA provenance for your Golang project, follow [internal/builders/go/README.md](internal/builders/go/README.md).
21
30
22
-
## Other projects
31
+
###Other projects
23
32
24
33
To generate SLSA provenance for other programming languages, follow [internal/builders/generic/README.md](internal/builders/generic/README.md).
25
34
This is a pre-release only and we will have the official release in July 2022.
26
35
27
-
## Provenance format
36
+
## Verification of provenance
28
37
29
-
The format of the provenance is available in [PROVENANCE_FORMAT.md](./PROVENANCE_FORMAT.md).
38
+
To verify the provenance, use the [github.com/slsa-framework/slsa-verifier](https://github.com/slsa-framework/slsa-verifier) project.
39
+
40
+
### Installation
41
+
42
+
To install the verifier, see [slsa-framework/slsa-verifier#installation](https://github.com/slsa-framework/slsa-verifier#installation).
43
+
44
+
### Inputs
45
+
46
+
The inputs of the verifier are described in [slsa-framework/slsa-verifier#available-options](https://github.com/slsa-framework/slsa-verifier#available-options).
47
+
48
+
### Command line examples
49
+
50
+
A command line example is provided in [slsa-framework/slsa-verifier#example](https://github.com/slsa-framework/slsa-verifier#example).
30
51
31
52
## Technical design
32
53
@@ -38,5 +59,7 @@ Find our blog post series [here](https://security.googleblog.com/2022/04/improvi
38
59
39
60
For a more in-depth technical dive, read the [SPECIFICATIONS.md](./SPECIFICATIONS.md).
40
61
62
+
### Provenance format
41
63
64
+
The format of the provenance is available in [PROVENANCE_FORMAT.md](./PROVENANCE_FORMAT.md).
To verify the provenance, use the [github.com/slsa-framework/slsa-verifier](https://github.com/slsa-framework/slsa-verifier) project.
284
-
285
-
### Installation
286
-
287
-
To install the verifier, see [slsa-framework/slsa-verifier#installation](https://github.com/slsa-framework/slsa-verifier#installation).
288
-
289
-
### Inputs
290
-
291
-
The inputs of the verifier are described in [slsa-framework/slsa-verifier#available-options](https://github.com/slsa-framework/slsa-verifier#available-options).
292
-
293
-
### Command line examples
294
-
295
-
A command line example is provided in [slsa-framework/slsa-verifier#example](https://github.com/slsa-framework/slsa-verifier#example).
0 commit comments