goreleaser / example-supply-chainLinks
Example goreleaser + github actions config with keyless signing, SBOM generation, and attestations
☆58Updated this week
Alternatives and similar repositories for example-supply-chain
Users that are interested in example-supply-chain are comparing it to the libraries listed below
Sorting:
- A highly configurable build executor and observer designed to generate signed SLSA provenance attestations about build runs.☆65Updated this week
- native go library for installation and management of apk packages☆30Updated last year
- ☆20Updated 4 months ago
- Build and deploy Go applications with Terraform☆29Updated last week
- Transparenty Immutable Container Image Tags☆20Updated 2 years ago
- Tool to automate build instructions generation☆36Updated this week
- 🔍 Rekor transparency log monitoring and alerting☆27Updated 2 years ago
- Container image provenance spec that allows tracing CVEs detected in registry images back to a CVE's source of origin.☆43Updated last year
- Sigstore user stories☆30Updated 2 years ago
- A CLI used to work with the Wolfi OSS project☆67Updated this week
- ☆29Updated last year
- Helper methods for Magefiles☆34Updated 2 years ago
- To manage Docker Content Trust and Notary certificates☆13Updated 2 weeks ago
- A Go implementation of in-toto. in-toto is a framework to protect software supply chain integrity.☆142Updated 2 weeks ago
- ☆57Updated 3 years ago
- ☆35Updated 3 years ago
- ☆22Updated last week
- ☆23Updated 2 years ago
- A simple tool for converting Rego (OPA) rule into command.☆31Updated 3 years ago
- OCI transport plugin for apt-get (i.e., apt-get over ghcr.io)☆113Updated last week
- Go library for Sigstore signing and verification☆18Updated 2 years ago
- Stuff to make standing up sigstore (esp. for testing) easier for e2e/integration testing.☆68Updated last week
- OpenCP shim is a simple HTTP server that implements the Kubernetes API server interface. It is a shim that allows you to use the Kubernet…☆14Updated 2 years ago
- A collection of libraries for supporting sign and verify OCI artifacts. Based on Notary Project specifications.☆41Updated last week
- ☆50Updated last year
- Trust Dexter to ensure that all your images are pinned by digest for better security☆30Updated last year
- Integrates Spiffe and Vault to have secretless authentication☆92Updated 2 weeks ago
- Container image registry that serves images built fresh when you ask for them☆231Updated 8 months ago
- Write controller-runtime based k8s controllers that read/write to git, not k8s☆48Updated 4 years ago
- A library for representing OCI image layers in an abstract filesystem☆27Updated 5 years ago