
- A Workflow Contract is immutable and versioned, new revisions of the contract with new/different requirements can be added over time. This is especially useful for iterative integrations.
- A Workflow Contract can belong to more than one Workflow. This means that a change in a single contract will be propagated to many workflows. This is especially useful for org-wide standardization and fleet management.

Managing Contracts
Contracts can be managed through the “Contracts” section in Chainloop platform:


A Workflow Contract can be provided in json or yaml (cue format is also supported through the Chainloop CLI).
Contract Management Scope
Contracts in Chainloop operate at two different scopes with corresponding management permissions:- Organization-scope contracts: Managed by users with Organization Admin or Organization Owner roles. These contracts can be used across all projects within the organization.
- Project-scope contracts: Managed by Project Admins. These contracts are specific to individual projects and can only be used within their respective project scope.
Associating workflows to contracts
Once contracts are created, they can be attached to as many workflows as needed. Remember that workflows represent a unique source of data ingestion (attestations), usually representing a CI/CD pipeline.In the workflow view, click on the edit icon and associate the contract. Once the contract is associated, new attestations will automatically download and apply it, including required materials, policies, and so on.

Writing contracts
Example
See below a contract schema example:Note that the contract below is just an example crafted for educational purposes. In a real scenario, the contract will not contain such a despaired amount of materials or annotations.

Schema
Name | Required | Description |
---|---|---|
schemaVersion | yes | Version of the schema, it needs to be v1 |
materials | no | List of materials to be added to the attestation |
envAllowList | no | List of environment variables that will be resolved and injected in the attestation |
runner | no | Specific runner type associated with this contract. If not set, this contract will be valid to be run anywhere but you’ll miss out some of its benefits |
annotations | no | Name/Value pairs of arbitrary annotations that will be added to the attestation. If the value is not provided, it will be required during the attestation process. |
policies | no | Attachments to existing Chainloop policies. See policies reference guide for more information |
Materials
The contract can require one or more pieces of evidence (a.k.a material) to be attached during the attestation process.Name | Required | Default | Description |
---|---|---|---|
name | yes | unique identifier of the material | |
type | yes | Refer to material-types for the list of supported material types. | |
output | no | false | If set to true the material will get injected in the subject section of the in-toto statement. |
optional | no | false | if set to true , providing this material during attestation will be optional. This is useful for soft rollouts of new requirements |
annotations | no | Name/Value pairs of arbitrary annotations that will be added to the attestation. If the value is not provided, it will be required during the attestation process. |
Policy attachments
When defining a contract, a newpolicies
section can be specified. Policies can be applied to any material, but also to the attestation statement as a whole.
Runner Context
New runner contexts will be added over time. If yours is not implemented yet, please contact us
skynet.contract.yaml showLineNumbers
- Require the attestation process to be executed in the target runner type unless the
--dry-run
flag is set during initialization. - A link to the workload (i.e Github Action Run link) will be recorded both in the attestation and in the control plane during initialization.
- An additional set of environment variables will be resolved in addition to the ones defined in the contract
envAllowList
.
AZURE_PIPELINE
The following environment variables will be automatically added to the attestation. For more information on what they mean, refer to this link.
BUILD_REQUESTEDFOREMAIL
BUILD_REQUESTEDFOR
BUILD_REPOSITORY_URI
BUILD_REPOSITORY_NAME
BUILD_BUILDID
BUILD_BUILDNUMBER
BUILD_BUILDURI
BUILD_REASON
AGENT_VERSION
TF_BUILD
CIRCLECI_BUILD
The following environment variables will be automatically added to the attestation. For more information on their meaning, refer to the official CircleCI documentation.
CIRCLE_BUILD_URL
CIRCLE_JOB
CIRCLE_BRANCH
(optional)CIRCLE_NODE_TOTAL
CIRCLE_NODE_INDEX
DAGGER_PIPELINE
To use Chainloop With Dagger you can use this Dagger module
GITHUB_ACTION
The following environment variables will be automatically added to the attestation. For more information on what they do refer to this link.
GITHUB_ACTOR
GITHUB_REF
GITHUB_REPOSITORY
GITHUB_REPOSITORY_OWNER
GITHUB_RUN_ID
GITHUB_SHA
RUNNER_NAME
RUNNER_OS
GITLAB_PIPELINE
The following environment variables will be automatically added to the attestation. More information about what they mean in GitLab’s official documentation
GITLAB_USER_EMAIL
GITLAB_USER_LOGIN
CI_PROJECT_URL
CI_COMMIT_SHA
CI_JOB_URL
CI_PIPELINE_URL
CI_RUNNER_VERSION
CI_RUNNER_DESCRIPTION
CI_COMMIT_REF_NAME
JENKINS_JOB
The following environment variables will be automatically added to the attestation. For more information on how to use Jenkins environment variables, refer to the official Jenkins documentation.
JOB_NAME
BUILD_URL
GIT_BRANCH
(optional)GIT_COMMIT
(optional)AGENT_WORKDIR
NODE_NAME
TEAMCITY_PIPELINE
The following environment variables will be automatically added to the attestation. For more information on TeamCity environment variables, refer to the official TeamCity documentation.
BUILD_URL
TEAMCITY_PROJECT_NAME
TEAMCITY_VERSION
BUILD_NUMBER
USER
TEAMCITY_GIT_VERSION
BUILD_VCS_NUMBER
HOME
Remember, if all the env variables that you need are not defined in the context, you can extend such list via the
envAllowList
option.Using Chainloop Plugin
The Chainloop CLI provides a platform plugin that can be used to gather the runner context. When Chainloop CLI is used with the platform plugin it enables automatic retrieval of the following data:- Branch protection rules
- Pull request requirements
- Commit policies
- Verifying that proper protections were in place during the build process
- Understanding what security measures are protecting the code
- Proving that security policies were followed during development