Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Apply for SLSA graduation #415

Draft
wants to merge 2 commits into
base: main
Choose a base branch
from
Draft

Apply for SLSA graduation #415

wants to merge 2 commits into from

Conversation

lehors
Copy link
Contributor

@lehors lehors commented Nov 26, 2024

No description provided.

Signed-off-by: Arnaud J Le Hors <[email protected]>
@lehors lehors requested a review from a team as a code owner November 26, 2024 13:10
@lehors lehors marked this pull request as draft November 26, 2024 13:11
Signed-off-by: Arnaud J Le Hors <[email protected]>
* https://github.com/slsa-framework/slsa/blob/main/CONTRIBUTING.md#slsa-versions-management

Projects should harden their build systems in accordance with the SLSA Framework
* Not Applicable but we do use features such as branch protection, Dependabot, and Mend Renovate bot.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we be looking how to apply SLSA in the builds of our reference implementations (e.g. slsa-github-generator)?


### Security Baseline

The project meets all applicable Security Baseline requirements:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do these requirements need to be applied to our demos and reference implementations?

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This something that I think we should clarify. I think in SLSA's case it's the spec and the SLSA GitHub generator.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I'd say that the SLSA Jenkins generator is another tool that needs to be included, only if for the relatively wide use of Jenkins.


### Project adoption
The project must be able to show adoption by multiple parties, which could be production deployments or substantial use by established open source communities, and demonstrate the value of that adoption to either the end users or the open source community.
* Since the release of SLSA 1.0 in April 2023, evidence of its adoption keeps growing. This includes support in build platform offerings from companies like [Google](https://cloud.google.com/build/docs/overview), [IBM](https://cloud.ibm.com/docs/devsecops?topic=devsecops-cd-devsecops-slsa), and [Red Hat](https://developers.redhat.com/products/trusted-software-supply-chain/overview), as well as support for [npm package provenance in GitHub](https://github.blog/security/supply-chain-security/introducing-npm-package-provenance/) and integration with Sigstore among others.
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Would it make sense to also call out GitHub and Tekton adoption of it? We haven't linked the documentation to the SLSA repositories itself, but we also have konflux-ci.dev (which is built on top of Tekton)

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Member

@steiza steiza left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Just 2 minor comments - looking forward to seeing this pull request come out of draft!


### Project adoption
The project must be able to show adoption by multiple parties, which could be production deployments or substantial use by established open source communities, and demonstrate the value of that adoption to either the end users or the open source community.
* Since the release of SLSA 1.0 in April 2023, evidence of its adoption keeps growing. This includes support in build platform offerings from companies like [Google](https://cloud.google.com/build/docs/overview), [IBM](https://cloud.ibm.com/docs/devsecops?topic=devsecops-cd-devsecops-slsa), and [Red Hat](https://developers.redhat.com/products/trusted-software-supply-chain/overview), as well as support for [npm package provenance in GitHub](https://github.blog/security/supply-chain-security/introducing-npm-package-provenance/) and integration with Sigstore among others.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

* https://github.com/slsa-framework/governance

Have a defined and documented roadmap and annual goals for the project
* https://github.com/slsa-framework/slsa/projects?query=is%3Aopen
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

At first I was skeptical, but this is actually not a bad way to indicate the high-level workstreams a TI is undertaking, especially for a larger project like SLSA!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants