Skip to content

Sample Go application project with supply chain security workflows conforms to the SLSA Build Level 3 specification

License

Notifications You must be signed in to change notification settings

janfuhrer/podsalsa

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

PodSalsa

license OpenSSF Scorecard OpenSSF Best Practices release go-version Go Report Card FOSSA Status FOSSA Status SLSA 3

PodSalsa


PodSalsa is a simple web application that only displays information about the release version of the application, the Git commit, and the build date. The goal of this project is to provide a simple example of a Go application on GitHub with GitHub Actions for building and releasing the application in a secure way. The focus is on providing a summary/documentation of GitHub Actions best practices, code scanning workflows, vulnerability scanning, and techniques for releasing secure software to improve the security of the software supply chain. This project serves as a starting point for developers interested in supply chain security, artifact provenance, and verification.

Release

Each release of the application includes Go-binary archives, checksums file, SBOMs and container images.

The release workflow creates provenance for its builds using the SLSA standard, which conforms to the Level 3 specification. Each artifact can be verified using the slsa-verifier or cosign tool.

Artifact Description Verification
Go-binary archives Multi-architecture and platform Go-binary archives SLSA-Provenance
Checksums file Checksums file of the Go-binary archives Cosign signature
SBOMs SBOMs of the Go-binary archives SLSA-Provenance
Container images Multi-architecture container images SLSA-Provenance & Cosign Signature
SBOMs SBOMs of the container images SLSA-Provenance

Documentation

Note

All the used workflows, security best practices and more related themes (e.g. component analysis, enforcement on Kubernetes) are documented in this repository. Have a look at the documentation for more information.

Use Cases

You can use this project as a reference for securely building and releasing Go applications on GitHub with SLSA Build Level 3 provenance. Feel free to fork this repository and adapt it to your needs, use the workflows and security best practices in your projects.

About

Sample Go application project with supply chain security workflows conforms to the SLSA Build Level 3 specification

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Packages

 
 
 

Contributors 3

  •  
  •  
  •