You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Source: chore: Sync workflow to release-4.0 and small doc fix (#191)
Author: Daniel Filipe Bruehmueller Morinigo
Commit: 1e192edf37f1359d3c6faee623e5407cbcebdb59
This commit automatically syncs documentation changes from the source-docs repository.
🔗 View source commit: https://github.com/alaudadevops/tektoncd-operator/commit/1e192edf37f1359d3c6faee623e5407cbcebdb59
🤖 Synced on 2025-07-02 07:57:39 UTC
Copy file name to clipboardExpand all lines: docs/en/chains/architecture.mdx
-2Lines changed: 0 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -84,8 +84,6 @@ Tekton Chains is deployed as a Kubernetes controller within a cluster:
84
84
-**Deployment**: A single deployment manages the controller pods
85
85
-**Service Account**: The controller uses a dedicated service account with appropriate permissions
86
86
-**Configuration**: Configuration is managed through a ConfigMap called `chains-config`
87
-
- By default, Tekton Chains is deployed automatically through the `TektonConfig` resource. You can modify the `TektonConfig` resource to configure Chains.
88
-
- Essentially, Tekton Operator will synchronize the Chains configuration from the `TektonConfig` resource to the `TektonChains` resource, and finally reflect in the `chains-config` ConfigMap.
89
87
-**Secrets**: Signing keys and credentials are stored as Kubernetes secrets
Copy file name to clipboardExpand all lines: docs/en/chains/concepts/core_concepts.mdx
+15-83Lines changed: 15 additions & 83 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,98 +8,21 @@ weight: 10
8
8
9
9
Supply chain security refers to protecting the integrity, security, and reliability of the software development lifecycle from development to deployment. Tekton Chains is designed to address supply chain security concerns by providing mechanisms to verify that artifacts produced by CI/CD pipelines have not been tampered with and can be trusted.
10
10
11
-
## SLSA Framework
12
-
13
-
SLSA (Supply-chain Levels for Software Artifacts) is a security framework that provides a checklist of standards and controls to prevent tampering, improve integrity, and secure packages and infrastructure. Tekton Chains supports multiple SLSA provenance formats:
14
-
15
-
-**SLSA v0.2**: Supported via `slsa/v1` or `in-toto` formatters
16
-
-**SLSA v1.0**: Supported via `slsa/v2alpha3` and `slsa/v2alpha4` formatters
17
-
18
-
As part of the framework, SLSA has multiple levels of assurances. These levels contain industry-recognized best practices to create four levels of increasing assurance.
| Build L1 | Provenance showing how the package was built | Mistakes, documentation |
26
-
| Build L2 | Signed provenance, generated by a hosted build platform | Tampering after the build |
27
-
| Build L3 | Hardened build platform | Tampering during the build |
28
-
29
-
> Tekton can achieve SLSA Level 2 compliance. For more information, please refer to [Getting To SLSA Level 2 with Tekton and Tekton Chains](https://tekton.dev/blog/2023/04/19/getting-to-slsa-level-2-with-tekton-and-tekton-chains/)
30
-
31
-
## Signing
11
+
## Provenance
32
12
33
-
Signing is the process of cryptographically signing provenance to ensure its integrity and authenticity. Tekton Chains supports multiple signing methods:
34
-
35
-
-**x509**: Uses a standard x509 certificate and private key
36
-
-**Cosign**: Uses Sigstore's Cosign tool for signing
-**Keyless**: Uses ephemeral keys with Fulcio certificate authority
39
-
40
-
## Image attestation
41
-
42
-
Image attestation is used for storing and verifying metadata information related to images. It provides richer supply chain security information, such as:
[SLSA Provenance](https://slsa.dev/provenance/v1) is metadata containing verifiable information about software artifacts, describing how they were built, what sources were used, and who built them. In Tekton Chains, provenance is cryptographically signed to ensure its integrity and authenticity.
13
+
Provenance is metadata containing verifiable information about software artifacts, describing how they were built, what sources were used, and who built them. In Tekton Chains, provenance is cryptographically signed to ensure its integrity and authenticity.
52
14
53
15
There are two types of provenance in Tekton Chains:
54
16
55
17
-**Task-level provenance**: Captures details about a specific TaskRun execution
56
18
-**Pipeline-level provenance**: Captures the entire PipelineRun execution, including all child TaskRuns
57
19
58
-
### SBOM (Software bill of materials)
59
-
60
-
[SBOM](https://www.ntia.gov/page/software-bill-materials) is a nested inventory for software, a list of ingredients that make up software components, including:
[Cosign Vulnerability Scan results](https://github.com/sigstore/cosign/blob/main/specs/COSIGN_VULN_ATTESTATION_SPEC.md) record the security assessment of the software build process, including:
73
-
- Scanner information (name, version)
74
-
- Vulnerability database information
75
-
- List of discovered vulnerabilities and their severity
76
-
- Remediation recommendations
77
-
78
-
### Custom metadata
79
-
80
-
Custom metadata can be added as needed to support specific security requirements.
81
-
82
-
For example, grype can generate vulnerability scan results, and these results can be uploaded to the image registry as a custom type.
83
-
84
-
## Attestation verification
85
-
86
-
The verification mechanism is highly flexible and can be customized to validate any metadata present in the attestation. This means that any information stored in the attestation can be used as validation criteria, allowing organizations to implement precise security controls based on their specific requirements.
87
-
88
-
The flexibility of attestation verification is demonstrated through various validation methods:
- Leverages Open Policy Agent (OPA) for complex policy enforcement
95
-
- Supports declarative policy rules and custom validation logic
96
-
- Example: Validating builder information and build environment
20
+
## SLSA Framework
97
21
98
-
-[CUE](https://cuelang.org/) Validation
99
-
- Provides type system and constraint system for validation
100
-
- Enables schema validation and data consistency checks
101
-
- Supports complex data structure validation
22
+
SLSA (Supply-chain Levels for Software Artifacts) is a security framework that provides a checklist of standards and controls to prevent tampering, improve integrity, and secure packages and infrastructure. Tekton Chains supports multiple SLSA provenance formats:
102
23
24
+
-**SLSA v0.2**: Supported via `slsa/v1` or `in-toto` formatters
25
+
-**SLSA v1.0**: Supported via `slsa/v2alpha3` and `slsa/v2alpha4` formatters
103
26
104
27
## Artifacts
105
28
@@ -117,6 +40,15 @@ Type hinting is a mechanism used by Tekton Chains to understand the input and ou
117
40
- For image outputs: `IMAGES` or parameters/results with the suffix `IMAGE_URL` and `IMAGE_DIGEST`
118
41
- For generic outputs: Parameters or results with the suffix `ARTIFACT_OUTPUTS`
119
42
43
+
## Signing
44
+
45
+
Signing is the process of cryptographically signing provenance to ensure its integrity and authenticity. Tekton Chains supports multiple signing methods:
46
+
47
+
-**x509**: Uses a standard x509 certificate and private key
48
+
-**Cosign**: Uses Sigstore's Cosign tool for signing
0 commit comments