sbomify logo

GitHub Action module with Attestation

By Viktor > 31 OCT, 2024

Over the last few weeks, we’ve made some significant updates to our GitHub Actions module. Since our last update, we’ve added a few new features.

Changelog

  • Support for Dart lockfiles
  • Support for Docker images (system packages only)
  • Full support for Enrichment and Augmentation, meaning we can automatically complete your SBOMs to make them NTIA Minimum Elements compatible
  • Documentation on how to use attestation with the GitHub Actions module (more on that below)
  • Bumped versions of various sub-components
  • Various bug fixes

Using Attestation

Thanks to recent improvements by GitHub, generating an attestation is now very straightforward. Behind the scenes, the GitHub Actions module attest-build-provenance will automatically generate a SLSA build provenance predicate using the in-toto format. All you need to do is instruct our GitHub Actions module to write the SBOM to disk, and then point the attestation tool to this file — voila! You now have a cryptographically signed attestation of your SBOM.

At sbomify, we are big fans of dogfooding our own product, so we’ve adopted this exact flow in the SBOM we generate for our GitHub Actions module itself, as you can see here.

The job looks something like this:

[...]
      - name: Upload SBOM
        uses: sbomify/github-action@master
        env:
          TOKEN: [...]
          COMPONENT_ID: 'Gu9wem8mkX'
          LOCK_FILE: 'poetry.lock'
          SBOM_VERSION: [...]
          AUGMENT: true
          ENRICH: true
          UPLOAD: true
          OUTPUT_FILE: github-action.cdx.json

      - name: Attest
        uses: actions/attest-build-provenance@v1
        with:
          subject-path: 'path/to/github-action.cdx.json'

What’s great about this is that it removes the need to trust sbomify directly. You can verify the SBOM independently as follows:

  • Download the latest SBOM from the GitHub Action sbomify public page
  • Install the GitHub CLI if you don’t already have it

With this done, you can verify the file against GitHub:

$ gh attestation verify path/to/downloaded-sbom.json --owner sbomify
Loaded digest sha256:aeee57eeb5b34e0f70ace59bfc2328e3332062523796837eb37883eb805cd8f9 for file:///path/to/downloaded-sbom.json
Loaded 1 attestation from GitHub API
✓ Verification succeeded!

sha256:aeee57eeb5b34e0f70ace59bfc2328e3332062523796837eb37883eb805cd8f9 was attested by:
REPO                   PREDICATE_TYPE                  WORKFLOW
sbomify/github-action  https://slsa.dev/provenance/v1  .github/workflows/sbomify.yaml@refs/tags/v0.1.1

And just like that! We can independently verify that sbomify (or any other intermediary) did not tamper with the SBOM in transit.

Found an error or typo? File PR against this file.