Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for sigstore #6

Open
PradyumnaKrishna opened this issue Mar 23, 2024 · 7 comments
Open

Add support for sigstore #6

PradyumnaKrishna opened this issue Mar 23, 2024 · 7 comments

Comments

@PradyumnaKrishna
Copy link

This issue aims to integrate Sigstore support into the in-toto-jenkins plugin.

Description
Currently, the In-toto Jenkins plugin requires users to provide either a credential ID or key path for signing the link metadata during the post-build process. The addition of Sigstore in the In-toto Jenkins plugin enables keyless signing and keyless verification of metadata.
Enhance the metadata transport capabilities within in-toto-jenkins by introducing a Sigstore transport option. The Sigstore transport will facilitate the uploading of generated metadata to the Rekor transparency log.

@HikaruSadashi
Copy link

Hi @PradyumnaKrishna , Hi @SantiagoTorres

I just submitted a proposal for this. I would love any last-minute feedback (I can still edit before the deadline) which is in about 7 hours!

@Nihit25
Copy link

Nihit25 commented May 22, 2024

Hi @PradyumnaKrishna , this project seems really interesting to me. I have been trying to understand the code since last one week. I would really like to contribute to this project in best possible ways and I'll try my best to contribute as much as possible

@PradyumnaKrishna
Copy link
Author

To understand this project, you can read sigstore documentation to get started. There is a sigstore java and maven repository which might be useful for this project, try it out as well.

@Nihit25
Copy link

Nihit25 commented May 23, 2024

Yes @PradyumnaKrishna , I'll definitely read sigstore documentation to get started. I'll try sigstore java and maven repository as well.

@Atharva-Kanherkar
Copy link

@PradyumnaKrishna Hi, do we need to submit a proposal, like action plan on handling the project, or do we need to do any pre tasks for thw project, before applying?

@KiranSatyaRaj
Copy link

KiranSatyaRaj commented May 24, 2024

Hey @PradyumnaKrishna -
I believe InTotoRecorder and InTotoWrapper files will be updated, and a new file sigstoreTransport file in transport directory.

  • So using Sigstore 'KeylessSigner` we are letting the authorized pipeline user to sign the link metadata via OpenID connect (OIDC) without having them to deal with cryptographic keys
  • These signed artifacts and ephemeral keys are recorded in a transparency log (rektor)
  • And the transparency log json file, link metadata, verification options are given to the KeylessVerifier, prior to this we add the verification options
    I hope I understood the given problem statement.
    please help me If I missed any?

@debayangg
Copy link

@PradyumnaKrishna I have applied to contribute to this project under lfx mentorship. I have gone through the sigstore docs and now have a rough idea on how to implement the project, should I include an overview of it in the cover letter or should I explain it somewhere else?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants