Some checks failed
AOC Guard CI / aoc-guard (push) Has been cancelled
AOC Guard CI / aoc-verify (push) Has been cancelled
Concelier Attestation Tests / attestation-tests (push) Has been cancelled
Docs CI / lint-and-preview (push) Has been cancelled
Console CI / console-ci (push) Has been cancelled
Export Center CI / export-ci (push) Has been cancelled
- Added graph.inspect.v1 documentation outlining payload structure and determinism rules. - Created JSON schema for graph.inspect.v1 to enforce payload validation. - Defined mapping rules for graph relationships, advisories, and VEX statements. feat(notifications): establish remediation blueprint for gaps NR1-NR10 - Documented requirements, evidence, and tests for Notifier runtime. - Specified deliverables and next steps for addressing identified gaps. docs(notifications): organize operations and schemas documentation - Created README files for operations, schemas, and security notes to clarify deliverables and policies. feat(advisory): implement PostgreSQL caching for Link-Not-Merge linksets - Created database schema for advisory linkset cache. - Developed repository for managing advisory linkset cache operations. - Added tests to ensure correct functionality of the AdvisoryLinksetCacheRepository.
3.2 KiB
3.2 KiB
Evidence Locker Attestation Contract (v1 · frozen 2025-11-20)
Scope: Evidence Bundle v1 produced by Evidence Locker and consumed by Concelier, Excititor, Export Center, CLI, and Policy Engine.
Predicates & subjects
- Subject (mandatory): Merkle root derived from
checksums.txt(sha256 of the sorted file) for the sealed bundle. OCI digest of the tarball remains recorded asbundle_oci_digestinside the predicate for registry mirroring but is not the DSSE subject. - Predicates (DSSE/In-Toto)
stellaops.evidence.bundle.v1: declares bundle layout (manifests, CAS paths, replay log offsets, Merkle recipe, chunking strategy).stellaops.evidence.transparency.v1: Rekor/log inclusion proof (UUID, log index, root hash at inclusion). Required when network-permitted; when offline, includereason="offline"and omit log pointers.stellaops.evidence.integrity.v1: hashes for each payload (SBOMs, VEX, policy packs, telemetry snapshots), keyed by canonical path; must match entries inbundle.manifest.schema.json.
Required claim set
bundle_id(UUID v4)produced_at(UTC ISO-8601)producer(evidence-locker:<region>)subject_merkle_root(sha256 from checksums.txt)hashes(map: canonicalPath → sha256) sorted lexicographicallysbom(array of SPDX/CycloneDX digests and mediaTypes)vex(array of VEX doc digests and schema versions)replay_manifest(optional; digest + sequence number, ledger URI, dsseEnvelope)transparency(optional; Rekor UUID, logIndex, rootHash, inclusionProof) orreason="offline"signing_profile(sovereign-default|fips|gost|pq-experimental)
Bundling & signing rules
- DSSE envelope is mandatory for every sealed bundle using the configured
ICryptoProviderRegistryprofile; keys must be short-lived (<24h) and recorded in provider registry. - Subject = sha256(Merkle root) from
checksums.txt; verifier must recompute to match. - Hash list must match
bundle.manifest.schema.json(entries + optionalhashSummary), sorted bycanonicalPath. - Rekor/logging policy:
- If outbound log is allowed, submit to configured log and embed UUID/logIndex/rootHash in
transparency. - If outbound log is disallowed/offline, set
transparencyto null and includereason="offline"pluslog_policy="skip"inside the predicate.
- If outbound log is allowed, submit to configured log and embed UUID/logIndex/rootHash in
Verification plan
- Verify DSSE signature against provider registry (per profile) and check key expiry.
- Recompute sha256 for every manifest entry and the Merkle root; fail if subject differs.
- If
transparencypresent, verify inclusion proof against bundled Rekor root; fail closed on mismatch. If absent, requirereason="offline"andlog_policy="skip". - Emit verification report JSON (deterministic key order) and store beside bundle as
verify.json.
Fixtures
- Sample bundle + report:
docs/samples/evidence-locker/bundle-v1-sample.tar.gz(sha256 TBD at publish time). - Sample attestation envelope:
docs/samples/evidence-locker/attestation-v1-sample.json.
Ownership
- Primary: Evidence Locker Guild.
- Reviewers: Concelier Core Guild, Excititor Guild, Export Center Guild, Policy Guild.
This contract is authoritative for Sprint 110 and blocks CONCELIER-ATTEST-73-001/002 and EXCITITOR-ATTEST-01-003/73-001/73-002.