-
Notifications
You must be signed in to change notification settings - Fork 9.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add SLSA provenance to your releases #17873
Comments
Contributions are welcomed |
Any further consideration given to moving to goreleaser @serathius as mentioned in #13980 ? Adding provenance is a piece of cake with goreleaser. I'm not sure why your present |
Up to date release instructions are in https://github.com/etcd-io/etcd/blob/main/Documentation/contributor-guide/release.md |
Github announced this yesterday, so will need to compare it to the process originally linked to see if it makes it more straightforward to implement. |
Hello @serathius @udf2457 👋 |
Hi @ArkaSaha30 I am currently focused on some high-priority $work projects, so your offer of assistance is much appreciated @ArkaSaha30 😉 Hopefully when things quiet down a little at $work I will be able to return to this ! |
Before jumping into coding, please start from reading the etcd release documentation to understand our current process and please propose what changes need to be made to provide SLSA provenance. |
cc @idunbarh |
👋 folks! I was talking with @jmhbnz at the etcd project booth at kubecon. I'm happy to contribute signing the etcd release and container images in the build process. Since the release is done locally, it doesn't make sense to generate SLSA attestations. I'm primarily interested in contributing SBOM generation for this project, I'll create a separate issue to track that. |
Thanks @idunbarh was great to chat in person. Letting you know we are also in discussions with Kubernetes sig-release folks about finally moving away from locally produced releases making further use of Kubernetes project infrastructure and well defined build processes. As part of that it would be great to enable provenance. We'll update this issue as we make progress 🙏🏻 |
Sounds good. I'm happy to create a PR knowing that things could change in the future. I'm also happy to support SBOM, SLSA attestations, and signing if the maintainers decide to move to new infra and if needed. |
What would you like to be added?
Please add SLSA provenance to your releases.
It is easy to do on on Github:
https://github.com/slsa-framework/slsa-github-generator/blob/main/internal/builders/generic/README.md#provenance-for-goreleaser
https://goreleaser.com/blog/slsa-generation-for-your-artifacts/#slsa-github-generator
Background info:
https://docs.sigstore.dev/signing/overview/
Why is this needed?
Improving robustness against supply-chain attacks.
The text was updated successfully, but these errors were encountered: