Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore: update verifier to v1.3.0 #718

Merged
merged 1 commit into from
Aug 15, 2022

Conversation

asraa
Copy link
Collaborator

@asraa asraa commented Aug 15, 2022

Signed-off-by: Asra Ali [email protected]

This sets the expected sha256 of the v1.3.0 slsa-verifier released binary.

Download the binary and provenance from https://github.com/slsa-framework/slsa-verifier/releases/tag/v1.3.0
Clone the slsa-verifier repo, compile and verify the provenance:
$ git clone [email protected]:slsa-framework/slsa-verifier.git
$ cd slsa-verifier
$ (Optional: git checkout tags/v1.3.0)
$ go run ./cli/slsa-verifier -artifact-path slsa-verifier-linux-amd64 -provenance slsa-verifier-linux-amd64.intoto.jsonl -source github.com/slsa-framework/slsa-verifier -tag v1.3.0
Get the hash.
Either:
cat slsa-verifier-linux-amd64.intoto.jsonl | jq -r '.payload' | base64 -d | jq -r '.subject[0].digest.sha256'
or

sha256sum slsa-verifier-linux-amd64
The output hash should be the hash I'm updating to in this PR. If they match, LGTM. If they don't, someone tampered with the released binary and don't LGTM

Copy link
Collaborator

@laurentsimon laurentsimon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks.

The same hash 1326430d044e8a9522c51e5f721e237b5f75acb6b4e518d129f669403cf7a79a was verified and merged on the verifier repo: #718

@laurentsimon laurentsimon merged commit 869ca2c into slsa-framework:main Aug 15, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants