Some checks failed
AOC Guard CI / aoc-guard (push) Has been cancelled
AOC Guard CI / aoc-verify (push) Has been cancelled
Concelier Attestation Tests / attestation-tests (push) Has been cancelled
Docs CI / lint-and-preview (push) Has been cancelled
Export Center CI / export-ci (push) Has been cancelled
Mirror Thin Bundle Sign & Verify / mirror-sign (push) Has been cancelled
- Introduced DigestUpsertRequest for handling digest upsert requests with properties like ChannelId, Recipient, DigestKey, Events, and CollectUntil. - Created LockEntity to represent a lightweight distributed lock entry with properties such as Id, TenantId, Resource, Owner, ExpiresAt, and CreatedAt. feat: Implement ILockRepository interface and LockRepository class - Defined ILockRepository interface with methods for acquiring and releasing locks. - Implemented LockRepository class with methods to try acquiring a lock and releasing it, using SQL for upsert operations. feat: Add SurfaceManifestPointer record for manifest pointers - Introduced SurfaceManifestPointer to represent a minimal pointer to a Surface.FS manifest associated with an image digest. feat: Create PolicySimulationInputLock and related validation logic - Added PolicySimulationInputLock record to describe policy simulation inputs and expected digests. - Implemented validation logic for policy simulation inputs, including checks for digest drift and shadow mode requirements. test: Add unit tests for ReplayVerificationService and ReplayVerifier - Created ReplayVerificationServiceTests to validate the behavior of the ReplayVerificationService under various scenarios. - Developed ReplayVerifierTests to ensure the correctness of the ReplayVerifier logic. test: Implement PolicySimulationInputLockValidatorTests - Added tests for PolicySimulationInputLockValidator to verify the validation logic against expected inputs and conditions. chore: Add cosign key example and signing scripts - Included a placeholder cosign key example for development purposes. - Added a script for signing Signals artifacts using cosign with support for both v2 and v3. chore: Create script for uploading evidence to the evidence locker - Developed a script to upload evidence to the evidence locker, ensuring required environment variables are set.
2.7 KiB
2.7 KiB
Orchestrator → Findings Ledger Export Contract
Status: Available (2025-12-03) Scope: defines the deterministic payload Orchestrator emits for job/run exports that Findings Ledger ingests for provenance (LEDGER-34-101).
Payload shape
{
"runId": "uuid", // job/run correlation id
"jobType": "string", // e.g., mirror-build, policy-sim, scan
"artifactHash": "sha256:...", // CAS digest of primary artifact
"policyHash": "sha256:...", // optional; policy bundle hash
"startedAt": "2025-12-02T00:00:00Z",
"completedAt": "2025-12-02T00:05:30Z",
"status": "succeeded|failed|canceled",
"manifestPath": "cas://.../manifest.json", // DSSE or CAS path
"logsPath": "cas://.../logs.ndjson",
"tenantId": "string",
"environment": "prod|stage|dev",
"idempotencyKey": "sha256:...", // runId+artifactHash
"signatures": [ { "type": "dsse", "keyId": "...", "signature": "..." } ]
}
Determinism & ordering
- Entries sorted by
runIdwhen streamed; pagination stable viarunId, startedAtascending. idempotencyKey = sha256(runId + artifactHash + tenantId); duplicate submissions are rejected with 409.- Timestamps UTC ISO-8601; no clock-skew correction performed by Ledger.
Transport
- REST:
POST /internal/orchestrator/exports(Orchestrator) → Findings Ledger ingest queue. - Events:
orchestrator.export.createdcarries the same payload; consumers must verify DSSE before persistence.
Validation rules (Ledger side)
- Require DSSE signature (Ed25519) when
signaturespresent; fail closed if verification fails. - Enforce presence of
runId,artifactHash,startedAt,status. - Hash fields must match
^sha256:[A-Fa-f0-9]{64}$. - Allowed status transitions: pending→running→succeeded/failed/canceled; replays only allowed when
idempotencyKeymatches existing record.
Mapping to Findings Ledger
- Stored in collection/table
orchestrator_exportswith index(artifactHash, runId)and TTL optional on logs if configured. - Timeline entry type
ledger_exportreferencesrunId,artifactHash,policyHash,manifestPath,logsPath, DSSE envelope digest, andidempotencyKey. - Cross-links:
bundleId(if mirror build) orscanId(if scan job) may be added as optional fields; Ledger treats them as opaque strings.
Security / scopes
- Required scope:
orchestrator:exports:writefor producer; Ledger ingress validates tenant headers and scope. - Max payload: 1 MiB; logs must be CAS/DSSE referenced, not inline.
Offline/air-gap considerations
- CAS/DSSE paths must resolve within offline kit bundles; no external URIs permitted.
- Deterministic ordering + idempotency allow replay without side effects; Ledger rejects writes when DSSE or hash mismatch.