Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Using artifact attestations to establish provenance for builds #3636

Open
harism opened this issue May 15, 2024 · 1 comment
Open

Using artifact attestations to establish provenance for builds #3636

harism opened this issue May 15, 2024 · 1 comment
Labels

Comments

@harism
Copy link
Contributor

harism commented May 15, 2024

I came across this following link describing the currently in public beta feature to use artifact assestations to establish provenance for builds here on GitHub; https://docs.github.com/en/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds

And the generation for these assessments, SBOM and signing those should be somewhat straightforward using GitHub Actions CI already now if I understood correctly, and thus I started to wonder would Hono benefit of this kind of supply chain securing too now as an somewhat early adopter already?

I didn't figure it out yet how this would affect publishing the releases to Docker or Maven, where I would expect these assessments are needed to be linked at, but all in all it should be possible to adopt this security measurement on some SLSA build level at least somewhat easily to my best understanding.

@sophokles73
Copy link
Contributor

I would advise (commercial) adopters to build the container images from source themselves when deploying to a production environment. In such an environment you will want to re-build the images frequently in order to take advantage of updated dependencies that contain the latest fixes. IMHO the artifacts published to Maven Central do not have much value except for building demos or command line clients.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants