Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 3 additions & 1 deletion .github/workflows/source-provenance.yml
Original file line number Diff line number Diff line change
Expand Up @@ -39,7 +39,9 @@ jobs:
persist-credentials: false

- name: Attest source governance (SLSA Source Track)
uses: slsa-framework/slsa-source-corroborator@v0.1.0
uses: slsa-framework/source-actions/slsa_with_provenance@v0.1.0
with:
version: v0.6.3

attest-source:
name: Generate source provenance
Expand Down
2 changes: 1 addition & 1 deletion doc/explanation/threat_model_supply_chain.rst
Original file line number Diff line number Diff line change
Expand Up @@ -324,7 +324,7 @@ Controls
- Low
- Repudiation, Spoofing
- DFT-31
- Mitigates: Source Provenance Attestations are published via ``slsa-framework/slsa-source-corroborator`` on every push to ``main``. These attestations prove the specific source-level governance controls applied on each commit: branch protection, mandatory code review, and ancestry enforcement (C-038). Predicate type ``https://slsa.dev/source_provenance/v1`` is signed by GitHub Actions via Sigstore and stored in the GitHub Attestation registry. Consumers can verify using ``gh attestation verify`` with ``--predicate-type https://slsa.dev/source_provenance/v1`` and ``--cert-identity`` pinned to ``source-provenance.yml@refs/heads/main``. ``.github/workflows/source-provenance.yml``
- Mitigates: Source Provenance Attestations are published via ``slsa-framework/source-actions/slsa_with_provenance`` on every push to ``main``. These attestations prove the specific source-level governance controls applied on each commit: branch protection, mandatory code review, and ancestry enforcement (C-038). Predicate type ``https://slsa.dev/source_provenance/v1`` is signed by GitHub Actions via Sigstore and stored in the GitHub Attestation registry. Consumers can verify using ``gh attestation verify`` with ``--predicate-type https://slsa.dev/source_provenance/v1`` and ``--cert-identity`` pinned to ``source-provenance.yml@refs/heads/main``. ``.github/workflows/source-provenance.yml``
* - C-038
- Ancestry enforcement on dfetch main branch
- Low
Expand Down
2 changes: 1 addition & 1 deletion doc/howto/verify-integrity.rst
Original file line number Diff line number Diff line change
Expand Up @@ -211,7 +211,7 @@ any binary was produced):
Every commit merged to ``main`` has a Source Provenance Attestation proving that
branch protection, mandatory code review, and ancestry enforcement were in place
when the commit landed. These attestations are published by
``slsa-framework/slsa-source-corroborator`` and stored in the
``slsa-framework/source-actions/slsa_with_provenance`` and stored in the
`attestation registry <https://github.com/dfetch-org/dfetch/attestations>`_.
Replace ``<sha>`` with the 40-character commit SHA you want to verify:

Expand Down
2 changes: 1 addition & 1 deletion security/tm_supply_chain.py
Original file line number Diff line number Diff line change
Expand Up @@ -670,7 +670,7 @@ def build_model() -> TM:
),
description=(
"Source Provenance Attestations are published via "
"``slsa-framework/slsa-source-corroborator`` on every push to ``main``. "
"``slsa-framework/source-actions/slsa_with_provenance`` on every push to ``main``. "
"These attestations prove the specific source-level governance controls "
"applied on each commit: branch protection, mandatory code review, and "
"ancestry enforcement (C-038). "
Expand Down
Loading