How to generate SLSA provenance and how to add it to your Chainloop workflow.
CONTAINER_IMAGE
representing our container image. We can add it during the build.
We also included the policyGroups
section and referenced the slsa-checks
that performs all the required checks for the SLSA framework.
id_token write
permission to your GitHub workflow file so Chainloop can verify that you are using a trusted runner.
GITLAB_OIDC
or performing keyless attestations.
In either way, the .gitlab-ci.yml
file could look like this:
Runner is not authenticated
Runner workflow file path is missing or is empty
id_token
permission is set on the workflow level, not job level. For example:Runner environment is not valid
Keyless signing configuration is invalid or not found