# Verification of SLSA provenance This repository contains the implementation for verifying [SLSA provenance](https://slsa.dev/). It currently supports verifying provenance generated by the [SLSA generator for Go projects](https://github.com/slsa-framework/slsa-github-generator/blob/main/.github/workflows/builder_go_slsa3.yml). We are working on support for verifying provenance for other ecosystems. ________ [Installation](#installation) - [Compilation from source](#compilation-from-source) - [Download the binary](#download-the-binary) [Verification of provenance](#verification-of-provenance) - [Available options](#available-options) - [Example](#example) [Technical design](#technial-design) - [Blog posts](#blog-posts) - [Specifications](#specifications) ________ ## Installation You have two options to install the verifier. ### Compilation from source #### Option 1: Install via go ``` $ go install github.com/slsa-framework/slsa-verifier@v1.1.1 $ slsa-verifier ``` #### Option 2: Compile manually ``` $ git clone git@github.com:slsa-framework/slsa-verifier.git $ cd slsa-verifier && git checkout v1.1.1 $ go run . ``` ### Download the binary Download the binary from the latest release at [https://github.com/slsa-framework/slsa-verifier/releases/tag/v1.1.1](https://github.com/slsa-framework/slsa-verifier/releases/tag/v1.1.1) Download the [SHA256SUM.md](https://github.com/slsa-framework/slsa-verifier/blob/main/SHA256SUM.md). Verify the checksum: ``` $ sha256sum -c --strict SHA256SUM.md slsa-verifier-linux-amd64: OK ``` ## Verification of Provenance ### Available options Below is a list of options currently supported. Note that signature verification is handled seamlessly without the need for developers to manipulate public keys. ```bash $ git clone git@github.com:slsa-framework/slsa-verifier.git $ go run . --help Usage of ./slsa-verifier: -artifact-path string path to an artifact to verify -branch string expected branch the binary was compiled from (default "main") -print-provenance output the verified provenance -provenance string path to a provenance file -source string expected source repository that should have produced the binary, e.g. github.com/some/repo -tag string [optional] expected tag the binary was compiled from -versioned-tag string [optional] expected version the binary was compiled from. Uses semantic version to match the tag ``` ### Example ```bash $ go run . -artifact-path ~/Downloads/slsa-verifier-linux-amd64 -provenance ~/Downloads/slsa-verifier-linux-amd64.intoto.jsonl -source github.com/slsa-framework/slsa-verifier -tag v1.1.1 Verified signature against tlog entry index 2727751 at URL: https://rekor.sigstore.dev/api/v1/log/entries/8f3d898ef17d9c4c028fe3da09fb786c900bf786361e75432f325b4848fdba24 Verified build using builder https://github.com/slsa-framework/slsa-github-generator/.github/workflows/builder_go_slsa3.yml@refs/tags/v1.1.0 at commit 76a59d8413f27259b97298da91bbb6511fc775d1 PASSED: Verified SLSA provenance ``` The verified in-toto statement may be written to stdout with the `--print-provenance` flag to pipe into policy engines. ## Technical design ### Blog post Find our blog post series [here](https://security.googleblog.com/2022/04/improving-software-supply-chain.html). ### Specifications For a more in-depth technical dive, read the [SPECIFICATIONS.md](https://github.com/slsa-framework/slsa-github-generator/blob/main/SPECIFICATIONS.md).