hc99's picture
Add files using upload-large-folder tool
26e6f31 verified
#!/bin/bash
set -uo pipefail # prevent accessing unset env vars, prevent masking pipeline errors to the next command
#docs
#title :verify_provenance.sh
#description :This script will download and verify a signed Powertools for AWS Lambda (Python) release build with SLSA Verifier
#author :@heitorlessa
#date :July 1st 2023
#version :0.1
#usage :bash verify_provenance.sh {release version}
#notes :Meant to use in GitHub Actions or locally (MacOS, Linux, WSL).
#os_version :Ubuntu 22.04.2 LTS
#==============================================================================
# Check if RELEASE_VERSION is provided as a command line argument
if [[ $# -eq 1 ]]; then
export readonly RELEASE_VERSION="$1"
else
echo "ERROR: Please provider Powertools release version as a command line argument."
echo "Example: bash verify_provenance.sh 2.20.0"
exit 1
fi
export readonly ARCHITECTURE=$(uname -m | sed 's/x86_64/amd64/g') # arm64, x86_64 ->amd64
export readonly OS_NAME=$(uname -s | tr '[:upper:]' '[:lower:]') # darwin, linux
export readonly SLSA_VERIFIER_VERSION="2.3.0"
export readonly SLSA_VERIFIER_CHECKSUM_FILE="SHA256SUM.md"
export readonly SLSA_VERIFIER_BINARY="./slsa-verifier-${OS_NAME}-${ARCHITECTURE}"
export readonly RELEASE_BINARY="aws_lambda_powertools-${RELEASE_VERSION}-py3-none-any.whl"
export readonly ORG="aws-powertools"
export readonly REPO="powertools-lambda-python"
export readonly PROVENANCE_FILE="multiple.intoto.jsonl"
export readonly FILES=("${SLSA_VERIFIER_BINARY}" "${SLSA_VERIFIER_CHECKSUM_FILE}" "${PROVENANCE_FILE}" "${RELEASE_BINARY}")
function debug() {
TIMESTAMP=$(date -u "+%FT%TZ") # 2023-05-10T07:53:59Z
echo ""${TIMESTAMP}" DEBUG - [*] $1"
}
function error() {
cleanup
TIMESTAMP=$(date -u "+%FT%TZ") # 2023-05-10T07:53:59Z
echo ""${TIMESTAMP}" ERROR - [!] $1"
echo ""${TIMESTAMP}" ERROR - [!] exiting"
exit 1
}
function download_slsa_verifier() {
readonly SLSA_URL="https://github.com/slsa-framework/slsa-verifier/releases/download/v${SLSA_VERIFIER_VERSION}/slsa-verifier-${OS_NAME}-${ARCHITECTURE}"
# debug "Downloading SLSA Verifier for - Binary: slsa-verifier-${OS_NAME}-${ARCHITECTURE}"
debug "Downloading SLSA Verifier binary: ${SLSA_URL}"
curl \
--location \
--fail \
--silent \
-O "${SLSA_URL}" || error "Failed to download SLSA Verifier binary"
readonly SLSA_CHECKSUM_URL="https://raw.githubusercontent.com/slsa-framework/slsa-verifier/f59b55ef2190581d40fc1a5f3b7a51cab2f4a652/${SLSA_VERIFIER_CHECKSUM_FILE}"
debug "Downloading SLSA Verifier checksums"
curl \
--location \
--fail \
--silent \
-O "${SLSA_CHECKSUM_URL}" || error "Failed to download SLSA Verifier binary checksum file"
debug "Verifying SLSA Verifier binary integrity"
CURRENT_HASH=$(sha256sum "${SLSA_VERIFIER_BINARY}" | awk '{print $1}')
if [[ $(grep "${CURRENT_HASH}" "${SLSA_VERIFIER_CHECKSUM_FILE}") ]]; then
debug "SLSA Verifier binary integrity confirmed"
chmod +x "${SLSA_VERIFIER_BINARY}"
else
error "Failed integrity check for SLSA Verifier binary: ${SLSA_VERIFIER_BINARY}"
fi
}
function download_provenance() {
readonly PROVENANCE_URL="https://github.com/${ORG}/${REPO}/releases/download/v${RELEASE_VERSION}/${PROVENANCE_FILE}"
debug "Downloading attestation: ${PROVENANCE_URL}"
curl \
--location \
--fail \
--silent \
-O ${PROVENANCE_URL} || error "Failed to download provenance. Does the release already exist?"
}
function download_release_artifact() {
debug "Downloading ${RELEASE_VERSION} release from PyPi"
python -m pip download \
--only-binary=:all: \
--no-deps \
--quiet \
aws-lambda-powertools=="${RELEASE_VERSION}"
}
function verify_provenance() {
debug "Verifying attestation with slsa-verifier"
"${SLSA_VERIFIER_BINARY}" verify-artifact \
--provenance-path "${PROVENANCE_FILE}" \
--source-uri github.com/${ORG}/${REPO} \
${RELEASE_BINARY}
}
function cleanup() {
debug "Cleaning up previously downloaded files"
rm -f "${SLSA_VERIFIER_BINARY}"
rm -f "${SLSA_VERIFIER_CHECKSUM_FILE}"
rm -f "${PROVENANCE_FILE}"
rm -f "${RELEASE_BINARY}"
echo "${FILES[@]}" | xargs -n1 echo "Removed file: "
}
function main() {
download_slsa_verifier
download_provenance
download_release_artifact
verify_provenance
cleanup
}
main
# Lessons learned
#
# 1. If source doesn't match provenance
#
# FAILED: SLSA verification failed: source used to generate the binary does not match provenance: expected source 'awslabs/aws-lambda-powertools-python', got 'heitorlessa/aws-lambda-powertools-test'
#
# 2. Avoid building deps during download in Test registry endpoints
#
# FAILED: Could not find a version that satisfies the requirement poetry-core>=1.3.2 (from versions: 1.2.0)
#