Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Sigstore Project Update - Nov 2024 #412

Open
haydentherapper opened this issue Nov 21, 2024 · 1 comment · May be fixed by #413
Open

Sigstore Project Update - Nov 2024 #412

haydentherapper opened this issue Nov 21, 2024 · 1 comment · May be fixed by #413

Comments

@haydentherapper
Copy link

As requested, I'm posting an async update for the TAC for the Sigstore project.

Our second SigstoreCon: Supply Chain Day conference just wrapped up. With just over 90 attendees, SigstoreCon brought together individuals and organizations excited about not only Sigstore but other supply chain initiatives such as SLSA, SBOM, or in-toto. Talks are recorded here.

Last year, we saw the first major adoption of Sigstore with npm leveraging Sigstore for signed provenance. This year saw a rapid increase of adoption of Sigstore, with:

  • PyPI's implementation of PEP 740, signed attestations for releases done through trusted publishing. Note that this pattern of leveraging trusted publishing workflows to drive adoption of signed builds and attestations is a pattern we'd like to see repeated across packaging ecosystems.
  • Maven Central supporting uploading and verifying Sigstore signatures in addition to PGP signatures
  • GitHub Artifact Attestations, producing Sigstore-signed SLSA attestations for CI workflows
  • Homebrew's beta release of Sigstore-signed provenance, built on top of GitHub Artifact Attestations.

The client libraries for Sigstore saw active development under the Sigstore clients SIG:

This development was sped up due to the conformance test suite to verify clients are producing and consuming the same content. We began work to make Cosign conformant, producing standardized "bundles" which contain verification metadata, along with consuming a "trust root" on verification to simplify and improve the verification process. Work will continue into next year to simplify Cosign's UX, add bundle support for signed OCI, and reduce code duplication between Cosign and sigstore-go.

Supported by the public good operations SIG and a multi-vendor oncall rotation staffed by Chainguard, GitHub, Google, Red Hat, and Stacklok, the public-good instance maintained its 99.5% availability SLO throughout the year, handling the increased load from additional adoption without issue.

Sigstore also requested TI funding to help modernize the documentation. This work is underway, with an increased focus on the additional clients and a restructuring of documentation. Into the coming year, we'll add more documentation on generating signatures on and verifying signatures from CI.

Looking forward to next year, we'll see continued adoption of Sigstore. RubyGems has approved an RFC for Sigstore bundles, with development underway. OS package registries like Debian have expressed interest, sparked by discussions with the Python community around deprecating PGP-signed cpython releases in favor of Sigstore-signed releases (PEP 761). Bazel Central Registry has also proposed supporting Sigstore-signed SLSA attestations.

For the long-term sustainability of the Sigstore ecosystem, we will be focusing on driving down the operational cost of our transparency log Rekor. Building on recent developments in the Certificate Transparency ecosystem, we will be redesigning Rekor to be backed by a "tile-based" log, which is cheaper and easier to manage. We've created a proposal to summarize what we will be doing, with implementation and rollout in the next year. We will also look to onboard additional log operators once the operational costs are cheaper.

We'll continue to update the community roadmap as we make progress on these various projects.

@steiza
Copy link
Member

steiza commented Nov 22, 2024

Hey @haydentherapper, thanks for providing this update. Could you create a pull request to add this update to https://github.com/ossf/tac/tree/main/TI-reports?

haydentherapper added a commit to haydentherapper/tac that referenced this issue Nov 22, 2024
Closes ossf#412

Signed-off-by: Hayden B <[email protected]>
@haydentherapper haydentherapper linked a pull request Nov 22, 2024 that will close this issue
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants