As part of an attestation process, you might want to collect different pieces of evidence such as Software Bill Of Materials (SBOMs), test results, runner logs, etc and then attach them to the final in-toto attestation.Chainloop helps with this process by providing a Content Addressable Storage API proxy that:
Abstracts away the underlying storage backend. Currently, we support OCI registries as storage backends but you can expect blob storage, Artifactory and other storage backends to be supported in the future.
Makes sure that the pieces of evidence are stored in a tamper-proof manner. This is achieved by storing the evidences named after their SHA256 content digest, which is calculated by the client, verified by the CAS server.
Enables support of large pieces of evidence since the content digest reference is what will be stored in the attestation.
You can setup as many CAS backends as you want, but you can only have one enabled as default at the time. This default backend will be used during the attestation process to store the pieces of evidence.
Chainloop periodically validates the credentials of configured CAS backends. Only backends that are marked as default and are not the built-in inline backend are checked. If any of these backends start to fail authentication or access checks, Chainloop will automatically send an email notification to the organization’s owners so they can rotate or fix the credentials.
Chainloop comes pre-configured with what we call an inline backend that embeds the pieces of evidence in the resulting attestations.
Inline backend is useful to get started quickly but since the metadata is embedded in the attestation, its max size is limited.We recommend to switch to a more robust backend such when moving to production.
To connect your AWS account to Chainloop you’ll need:
S3 Bucket Name
Bucket Region
AccessKeyID
SecretAccessKey
Create an S3 bucketCreate an S3 bucket and take note of the bucket name and regionCreate an IAM user with access to that bucketNext we are going to create a policy that has write/read permissions to the bucket.You can use the snippet below by just replacing [bucketName] with the actual name of the bucket you created in the step before.
Then create an user, attach the policy to it and click on “create access Key”Then select third-party service and copy the access key ID and secret access keyWe are now ready to connect our AWS account to Chainloop
To connect your Azure storage account you’ll need the following information
Active Directory Tenant ID
Service Principal ID
Service Principal Secret
Storage account name
We’ll walk you through the process of how to find this informationRegister an application to create the service principalFirst, you’ll need to register an application in your Azure Active Directory tenant. You can do this using the Azure CLI or from the Azure portalOnce done, in the application overview you should be able to find the tenantID, and Service principal IDNext, let’s create a secret for the service principalCreate a storage account and give permissions to the service principalNext, we’ll create a storage account (or you can use an existing one), take a note on the storage account name.And once created, we’ll give permissions to the service principal, go to IAM assign-roles.Search for the application we just registered and assign the Storage Blob Data Contributor roleAt thi point we have all the information we need to connect our Azure storage account to Chainloop
Cloudflare R2 is compatible with AWS S3 and can be configured in Chainloop by providing a custom endpoint.Pre-requisites
AccessKeyID
SecretAccessKey
Bucket Name
Endpoint
Follow this instructions to create a compatible AccessKeyID and SecretAccessKey. Then copy the bucket name and endpoint from the bucket settings.Finally register the Cloudflare R2 bucket using the aws-s3 provider and providing the custom endpoint.
Minio is an S3-compatible blob storage that can be configured in Chainloop by providing a custom endpoint.Pre-requisites
AccessKeyID
SecretAccessKey
Bucket Name
Minio Endpoint
You can create a new AccessKey from the Minio console.Then copy the bucket name and Minio endpoint.Finally register the Minio bucket using the aws-s3 provider and providing the custom endpoint