Some checks failed
AOC Guard CI / aoc-guard (push) Has been cancelled
AOC Guard CI / aoc-verify (push) Has been cancelled
Concelier Attestation Tests / attestation-tests (push) Has been cancelled
Docs CI / lint-and-preview (push) Has been cancelled
Export Center CI / export-ci (push) Has been cancelled
Mirror Thin Bundle Sign & Verify / mirror-sign (push) Has been cancelled
- Introduced DigestUpsertRequest for handling digest upsert requests with properties like ChannelId, Recipient, DigestKey, Events, and CollectUntil. - Created LockEntity to represent a lightweight distributed lock entry with properties such as Id, TenantId, Resource, Owner, ExpiresAt, and CreatedAt. feat: Implement ILockRepository interface and LockRepository class - Defined ILockRepository interface with methods for acquiring and releasing locks. - Implemented LockRepository class with methods to try acquiring a lock and releasing it, using SQL for upsert operations. feat: Add SurfaceManifestPointer record for manifest pointers - Introduced SurfaceManifestPointer to represent a minimal pointer to a Surface.FS manifest associated with an image digest. feat: Create PolicySimulationInputLock and related validation logic - Added PolicySimulationInputLock record to describe policy simulation inputs and expected digests. - Implemented validation logic for policy simulation inputs, including checks for digest drift and shadow mode requirements. test: Add unit tests for ReplayVerificationService and ReplayVerifier - Created ReplayVerificationServiceTests to validate the behavior of the ReplayVerificationService under various scenarios. - Developed ReplayVerifierTests to ensure the correctness of the ReplayVerifier logic. test: Implement PolicySimulationInputLockValidatorTests - Added tests for PolicySimulationInputLockValidator to verify the validation logic against expected inputs and conditions. chore: Add cosign key example and signing scripts - Included a placeholder cosign key example for development purposes. - Added a script for signing Signals artifacts using cosign with support for both v2 and v3. chore: Create script for uploading evidence to the evidence locker - Developed a script to upload evidence to the evidence locker, ensuring required environment variables are set.
Signals DSSE Evidence Staging (runtime/signals gaps)
Artifacts prepared 2025-12-01 (UTC) for DSSE signing and Evidence Locker ingest:
- Decay config:
docs/modules/signals/decay/confidence_decay_config.yaml - Unknowns scoring manifest:
docs/modules/signals/unknowns/unknowns_scoring_manifest.json - Heuristic catalog + schema + fixtures:
docs/modules/signals/heuristics/ - Checksums:
docs/modules/signals/SHA256SUMS
Planned Evidence Locker paths (to fill post-signing):
evidence-locker/signals/decay/2025-12-01/confidence_decay_config.dsseevidence-locker/signals/unknowns/2025-12-01/unknowns_scoring_manifest.dsseevidence-locker/signals/heuristics/2025-12-01/heuristics_catalog.dsseevidence-locker/signals/heuristics/2025-12-01/fixtures/(golden inputs/outputs)
Pending steps:
0) Provide signing key: CI/ops should supply COSIGN_PRIVATE_KEY_B64 (base64 of private key) and optional COSIGN_PASSWORD. Local dev can place a key at tools/cosign/cosign.key (see tools/cosign/cosign.key.example stub) or decode the env var to /tmp/cosign.key. The helper script tools/cosign/sign-signals.sh auto-detects the key and cosign version.
- Sign each artifact with its predicate (cosign v3.0.2 in
/usr/local/bin, use--bundle; v2.6.0 fallback intools/cosignalso works with--output-signature):stella.ops/confidenceDecayConfig@v1stella.ops/unknownsScoringManifest@v1stella.ops/heuristicCatalog@v1Shortcut:OUT_DIR=evidence-locker/signals/2025-12-01 tools/cosign/sign-signals.shExample (v3, replace KEY):
v2.6.0 fallback (if PATH prefixed withcosign sign-blob \ --key cosign.key \ --predicate-type stella.ops/confidenceDecayConfig@v1 \ --bundle confidence_decay_config.sigstore.json \ decay/confidence_decay_config.yamltools/cosign):cosign sign-blob \ --key cosign.key \ --predicate-type stella.ops/confidenceDecayConfig@v1 \ --output-signature confidence_decay_config.dsse \ decay/confidence_decay_config.yaml - Record SHA256 from
SHA256SUMSin DSSE annotations (or bundle metadata); keep canonical filenames:- v3:
confidence_decay_config.sigstore.json,unknowns_scoring_manifest.sigstore.json,heuristics_catalog.sigstore.json - v2 fallback:
.dssesignatures.
- v3:
- Place signed envelopes + checksums in the Evidence Locker paths above; update sprint tracker Delivery Tracker rows 5–7 and Decisions & Risks with the final URIs.
- Add signer/approver IDs to the sprint Execution Log once signatures are complete.
Notes:
- Use UTC timestamps in DSSE
issuedAt. - Ensure offline parity by copying envelopes + SHA256SUMS into the offline kit bundle when ready.