FEA-Bench / testbed /aws-powertools__powertools-lambda-python /.github /actions /verify-provenance /verify_provenance.sh
| set -uo pipefail # prevent accessing unset env vars, prevent masking pipeline errors to the next command | |
| #docs | |
| #title :verify_provenance.sh | |
| #description :This script will download and verify a signed Powertools for AWS Lambda (Python) release build with SLSA Verifier | |
| #author :@heitorlessa | |
| #date :July 1st 2023 | |
| #version :0.1 | |
| #usage :bash verify_provenance.sh {release version} | |
| #notes :Meant to use in GitHub Actions or locally (MacOS, Linux, WSL). | |
| #os_version :Ubuntu 22.04.2 LTS | |
| #============================================================================== | |
| # Check if RELEASE_VERSION is provided as a command line argument | |
| if [[ $# -eq 1 ]]; then | |
| export readonly RELEASE_VERSION="$1" | |
| else | |
| echo "ERROR: Please provider Powertools release version as a command line argument." | |
| echo "Example: bash verify_provenance.sh 2.20.0" | |
| exit 1 | |
| fi | |
| export readonly ARCHITECTURE=$(uname -m | sed 's/x86_64/amd64/g') # arm64, x86_64 ->amd64 | |
| export readonly OS_NAME=$(uname -s | tr '[:upper:]' '[:lower:]') # darwin, linux | |
| export readonly SLSA_VERIFIER_VERSION="2.3.0" | |
| export readonly SLSA_VERIFIER_CHECKSUM_FILE="SHA256SUM.md" | |
| export readonly SLSA_VERIFIER_BINARY="./slsa-verifier-${OS_NAME}-${ARCHITECTURE}" | |
| export readonly RELEASE_BINARY="aws_lambda_powertools-${RELEASE_VERSION}-py3-none-any.whl" | |
| export readonly ORG="aws-powertools" | |
| export readonly REPO="powertools-lambda-python" | |
| export readonly PROVENANCE_FILE="multiple.intoto.jsonl" | |
| export readonly FILES=("${SLSA_VERIFIER_BINARY}" "${SLSA_VERIFIER_CHECKSUM_FILE}" "${PROVENANCE_FILE}" "${RELEASE_BINARY}") | |
| function debug() { | |
| TIMESTAMP=$(date -u "+%FT%TZ") # 2023-05-10T07:53:59Z | |
| echo ""${TIMESTAMP}" DEBUG - [*] $1" | |
| } | |
| function error() { | |
| cleanup | |
| TIMESTAMP=$(date -u "+%FT%TZ") # 2023-05-10T07:53:59Z | |
| echo ""${TIMESTAMP}" ERROR - [!] $1" | |
| echo ""${TIMESTAMP}" ERROR - [!] exiting" | |
| exit 1 | |
| } | |
| function download_slsa_verifier() { | |
| readonly SLSA_URL="https://github.com/slsa-framework/slsa-verifier/releases/download/v${SLSA_VERIFIER_VERSION}/slsa-verifier-${OS_NAME}-${ARCHITECTURE}" | |
| # debug "Downloading SLSA Verifier for - Binary: slsa-verifier-${OS_NAME}-${ARCHITECTURE}" | |
| debug "Downloading SLSA Verifier binary: ${SLSA_URL}" | |
| curl \ | |
| --location \ | |
| --fail \ | |
| --silent \ | |
| -O "${SLSA_URL}" || error "Failed to download SLSA Verifier binary" | |
| readonly SLSA_CHECKSUM_URL="https://raw.githubusercontent.com/slsa-framework/slsa-verifier/f59b55ef2190581d40fc1a5f3b7a51cab2f4a652/${SLSA_VERIFIER_CHECKSUM_FILE}" | |
| debug "Downloading SLSA Verifier checksums" | |
| curl \ | |
| --location \ | |
| --fail \ | |
| --silent \ | |
| -O "${SLSA_CHECKSUM_URL}" || error "Failed to download SLSA Verifier binary checksum file" | |
| debug "Verifying SLSA Verifier binary integrity" | |
| CURRENT_HASH=$(sha256sum "${SLSA_VERIFIER_BINARY}" | awk '{print $1}') | |
| if [[ $(grep "${CURRENT_HASH}" "${SLSA_VERIFIER_CHECKSUM_FILE}") ]]; then | |
| debug "SLSA Verifier binary integrity confirmed" | |
| chmod +x "${SLSA_VERIFIER_BINARY}" | |
| else | |
| error "Failed integrity check for SLSA Verifier binary: ${SLSA_VERIFIER_BINARY}" | |
| fi | |
| } | |
| function download_provenance() { | |
| readonly PROVENANCE_URL="https://github.com/${ORG}/${REPO}/releases/download/v${RELEASE_VERSION}/${PROVENANCE_FILE}" | |
| debug "Downloading attestation: ${PROVENANCE_URL}" | |
| curl \ | |
| --location \ | |
| --fail \ | |
| --silent \ | |
| -O ${PROVENANCE_URL} || error "Failed to download provenance. Does the release already exist?" | |
| } | |
| function download_release_artifact() { | |
| debug "Downloading ${RELEASE_VERSION} release from PyPi" | |
| python -m pip download \ | |
| --only-binary=:all: \ | |
| --no-deps \ | |
| --quiet \ | |
| aws-lambda-powertools=="${RELEASE_VERSION}" | |
| } | |
| function verify_provenance() { | |
| debug "Verifying attestation with slsa-verifier" | |
| "${SLSA_VERIFIER_BINARY}" verify-artifact \ | |
| --provenance-path "${PROVENANCE_FILE}" \ | |
| --source-uri github.com/${ORG}/${REPO} \ | |
| ${RELEASE_BINARY} | |
| } | |
| function cleanup() { | |
| debug "Cleaning up previously downloaded files" | |
| rm -f "${SLSA_VERIFIER_BINARY}" | |
| rm -f "${SLSA_VERIFIER_CHECKSUM_FILE}" | |
| rm -f "${PROVENANCE_FILE}" | |
| rm -f "${RELEASE_BINARY}" | |
| echo "${FILES[@]}" | xargs -n1 echo "Removed file: " | |
| } | |
| function main() { | |
| download_slsa_verifier | |
| download_provenance | |
| download_release_artifact | |
| verify_provenance | |
| cleanup | |
| } | |
| main | |
| # Lessons learned | |
| # | |
| # 1. If source doesn't match provenance | |
| # | |
| # FAILED: SLSA verification failed: source used to generate the binary does not match provenance: expected source 'awslabs/aws-lambda-powertools-python', got 'heitorlessa/aws-lambda-powertools-test' | |
| # | |
| # 2. Avoid building deps during download in Test registry endpoints | |
| # | |
| # FAILED: Could not find a version that satisfies the requirement poetry-core>=1.3.2 (from versions: 1.2.0) | |
| # | |