From d0511090eb9758cb48962edfb529ceb7cb7ce41c Mon Sep 17 00:00:00 2001 From: Mireya Andres Date: Fri, 21 Nov 2025 16:41:49 +0800 Subject: [PATCH 1/3] Add attestations list view Uses the `slsa_provenance_statement` feature flag. This uses the `slsa_provenance_statement` feature flag --- .../projects/attestations_controller.rb | 98 ++++++++++- .../projects/attestations/index.html.haml | 3 +- .../projects/attestations/show.html.haml | 158 ++++++++++++++++++ config/routes/project.rb | 2 +- locale/gitlab.pot | 90 ++++++++++ spec/factories/supply_chain/attestations.rb | 6 +- .../supply_chain/parseable_attestation.json | 40 +++++ .../projects/attestations_controller_spec.rb | 92 +++++++++- .../attestations/index.html.haml_spec.rb | 3 +- .../attestations/show.html.haml_spec.rb | 149 +++++++++++++++++ 10 files changed, 632 insertions(+), 9 deletions(-) create mode 100644 app/views/projects/attestations/show.html.haml create mode 100644 spec/fixtures/supply_chain/parseable_attestation.json create mode 100644 spec/views/projects/attestations/show.html.haml_spec.rb diff --git a/app/controllers/projects/attestations_controller.rb b/app/controllers/projects/attestations_controller.rb index 34f91756d8533d..31e703cc8acf1a 100644 --- a/app/controllers/projects/attestations_controller.rb +++ b/app/controllers/projects/attestations_controller.rb @@ -6,8 +6,8 @@ class AttestationsController < Projects::ApplicationController feature_category :artifact_security - before_action :authorize_read_attestation!, only: [:index, :download] - before_action :check_feature_flag!, only: [:index, :download] + before_action :authorize_read_attestation!, only: [:index, :show, :download] + before_action :check_feature_flag!, only: [:index, :show, :download] def index @project = project @@ -16,6 +16,14 @@ def index .keyset_paginate(cursor: pagination_params[:cursor]) end + def show + @project = project + @attestation_iid_param = safe_params[:id] + @attestation = attestation + @subjects = parsed_metadata['subject'] || [] + @certificate = parsed_certificate_extensions + end + def download return render_404 unless attestation_file @@ -40,8 +48,94 @@ def check_feature_flag! render_404 unless Feature.enabled?(:slsa_provenance_statement, project) end + def clean_extension_value(value) + # Remove ASN.1 type prefixes (dot followed by any character and optional whitespace) + value.to_s.sub(/^\.\S?\s*/, '') + end + def pagination_params params.permit(:cursor) end + + def parsed_metadata + return {} unless attestation && attestation_file + + parsed_file = Gitlab::Json.parse(attestation_file.read) + decoded = Base64.decode64(parsed_file["dsseEnvelope"]["payload"]) + Gitlab::Json.parse(decoded) + + rescue JSON::ParserError, KeyError => e + Gitlab::AppJsonLogger.error( + message: 'Failed to parse attestation metadata.', + error_class: e.class.name, + error_message: e.message, + attestation_id: attestation&.id, + project_id: project.id, + feature_category: 'artifact_security' + ) + {} + end + + def parsed_certificate + return {} unless attestation && attestation_file + + parsed_file = Gitlab::Json.parse(attestation_file.read) + cert_data = parsed_file['verificationMaterial']['certificate']['rawBytes'] + decoded_certificate = Base64.decode64(cert_data) + OpenSSL::X509::Certificate.new(decoded_certificate) + + rescue JSON::ParserError, KeyError => e + Gitlab::AppJsonLogger.error( + message: 'Failed to parse attestation certificate.', + error_class: e.class.name, + error_message: e.message, + attestation_id: attestation&.id, + project_id: project.id, + feature_category: 'artifact_security' + ) + {} + end + + def parsed_certificate_extensions + return {} if parsed_certificate.blank? + + extensions = {} + + extension_map = { + '8' => :issuer, + '9' => :build_signer_uri, + '10' => :build_signer_digest, + '11' => :runner_environment, + '12' => :source_repository_uri, + '13' => :source_repository_digest, + '14' => :source_repository_ref, + '15' => :source_repository_identifier, + '16' => :source_repository_owner_uri, + '17' => :source_repository_owner_identifier, + '18' => :build_config_uri, + '19' => :build_config_digest, + '20' => :build_trigger, + '21' => :runner_invocation_uri, + '22' => :source_repository_visibility + } + + parsed_certificate.extensions.each do |ext| + next unless ext.oid.starts_with?('1.3.6.1.4.1.57264.1.') + + cleaned_key = ext.oid.split('.').last.to_i + cleaned_value = clean_extension_value(ext.value) + + extensions[extension_map[cleaned_key.to_s]] = cleaned_value if cleaned_key >= 8 && cleaned_key <= 22 + end + + extensions + rescue OpenSSL::X509::CertificateError => e + Gitlab::JsonLogger.error( + message: 'Failed to parse certificate extensions', + error: e.message, + attestation_id: attestation&.id + ) + {} + end end end diff --git a/app/views/projects/attestations/index.html.haml b/app/views/projects/attestations/index.html.haml index f90b327b0a24bc..1d192962880fc5 100644 --- a/app/views/projects/attestations/index.html.haml +++ b/app/views/projects/attestations/index.html.haml @@ -29,8 +29,7 @@ = render Pajamas::BadgeComponent.new(attestation.status, icon_only: true, icon: 'status-success', variant: 'success') - else = render Pajamas::BadgeComponent.new(attestation.status, icon_only: true, icon: 'error', variant: 'danger') - -# TODO: add link to show view (gitlab.com/gitlab-org/gitlab/-/issues/566595) - = render Pajamas::ButtonComponent.new(href: '/', variant: :link, block: false, button_options: { class: 'gl-mb-3' }) do + = render Pajamas::ButtonComponent.new(href: project_attestation_path(@project, attestation.iid), variant: :link, block: false, button_options: { class: 'gl-mb-3' }) do = attestation.file.filename .gl-text-subtle.gl-mt-2 - build = attestation.build diff --git a/app/views/projects/attestations/show.html.haml b/app/views/projects/attestations/show.html.haml new file mode 100644 index 00000000000000..f0820df87e508b --- /dev/null +++ b/app/views/projects/attestations/show.html.haml @@ -0,0 +1,158 @@ +- add_to_breadcrumbs s_('Attestations|Attestations'), project_attestations_path(@project) +- page_title "Attestation #{@attestation_iid_param}" +- @breadcrumb_title = @attestation_iid_param + +- if @attestation.nil? + - empty_state_button_text = s_('Attestations|View SLSA Component documentation') + - empty_state_button_link = 'https://gitlab.com/components/slsa#slsa-supply-chain-levels-for-software-artifacts' + = render Pajamas::EmptyStateComponent.new(svg_path: 'illustrations/empty-state/empty-search-md.svg', + title: s_('Attestations|This attestation does not exist'), + primary_button_text: empty_state_button_text, + primary_button_link: empty_state_button_link) do |c| + - c.with_description do + = s_('Attestations|Sign and verify SLSA provenance with a CI/CD Component.') + +- elsif @subjects.blank? + - metadata_error_text = s_('Attestations|View job for this attestation') + - metadata_error_path = project_job_path(@project, @attestation.build) + = render Pajamas::EmptyStateComponent.new(svg_path: 'illustrations/status/status-nothing-md.svg', + title: s_('Attestations|Unable to parse attestation metadata'), + primary_button_text: metadata_error_text, + primary_button_link: metadata_error_path) + +- else + - if @certificate.blank? + = render Pajamas::AlertComponent.new(variant: :danger, dismissible: false, alert_options: { class: 'gl-mt-5' }) do |c| + - c.with_body do + = s_('Attestations|Unable to parse attestation certificate.') + + - download_button_options = { rel: 'nofollow', data: { method: :get }, class: 'gl-my-6' } + - download_link = download_namespace_project_attestation_path({ namespace_id: @project.namespace, project_id: @project, id: @attestation.iid}) + - build = @attestation.build + - relative_time = _("%{relative_time} ago") % { relative_time: time_ago_in_words(@attestation.created_at) } + - timestamp = @attestation.created_at.strftime('%a, %b %d %Y %H:%M:%S %Z') + .gl-col-md-12{ 'data-testid': 'attestation-details' } + .gl-mb-5 + .gl-flex.gl-justify-between + %h2.gl-text-size-h2-display.gl-pb-3 + = s_('Attestations|Attestation') + = render Pajamas::ButtonComponent.new(href: download_link, icon: 'download', button_options: download_button_options) + %table.gl-table.gl-w-full.gl-border-separate.gl-border-t{ 'data-testid': 'attestation-table' } + %colgroup + %col{ width: '40%' } + %col{ width: '60%' } + %tbody + %tr + %td + .gl-font-bold= s_('Attestations|Predicate') + %td= @attestation.predicate_type + %tr + %td + .gl-font-bold= s_('Attestations|Created') + %td #{relative_time} (#{timestamp}) + %tr + %td + .gl-font-bold= s_('Attestations|Commit') + %td + = link_to "#{build.commit.id}", project_commit_path(@project, build.commit) + %tr + %td + .gl-font-bold= s_('Attestations|Build') + %td + = link_to "##{build.id}", project_job_path(@project, build) + %tr + %td + .gl-font-bold= s_('Attestations|Workflow') + %td + = link_to 'View CI/CD configuration', project_ci_pipeline_editor_path(@project) + .gl-mb-5 + %h2.gl-text-size-h2-display.gl-mt-8.gl-pb-3 + = s_("Attestations|Subjects") + %table.gl-table.gl-w-full.gl-border-separate.gl-border-t{ 'data-testid': 'subjects-table' } + %colgroup + %col{ width: '40%' } + %col{ width: '60%' } + %thead + %tr + %th + = s_('Attestations|Subject') + %th= s_('Attestations|Digest') + %tbody + - @subjects.each do |subject| + %tr + %td= subject['name'] + %td sha256:#{subject['digest']['sha256']} + - unless @certificate.blank? + .gl-mb-5 + %h2.gl-text-size-h2-display.gl-mt-8.gl-pb-3 + = s_("Attestations|Certificate") + %table.gl-table.gl-w-full.gl-border-separate.gl-border-t{ 'data-testid': 'certificate-table' } + %colgroup + %col{ width: '40%' } + %col{ width: '60%' } + %thead + %tr + %th + = _('Key') + %th= _('Value') + %tbody + %tr{ 'data-testid': 'build-config-digest' } + %td + .gl-font-bold= s_('Attestations|Build Config Digest') + %td= @certificate[:build_config_digest] + %tr{ 'data-testid': 'build-config-uri' } + %td + .gl-font-bold= s_('Attestations|Build Config URI') + %td= link_to @certificate[:build_config_uri], @certificate[:build_config_uri] + %tr{ 'data-testid': 'build-signer-digest' } + %td + .gl-font-bold= s_('Attestations|Build Signer Digest') + %td= @certificate[:build_signer_digest] + %tr{ 'data-testid': 'build-signer-uri' } + %td + .gl-font-bold= s_('Attestations|Build Signer URI') + %td= link_to @certificate[:build_signer_uri], @certificate[:build_signer_uri] + %tr{ 'data-testid': 'build-trigger' } + %td + .gl-font-bold= s_('Attestations|Build Trigger') + %td= @certificate[:build_trigger] + %tr{ 'data-testid': 'issuer' } + %td + .gl-font-bold= s_('Attestations|Issuer') + %td= @certificate[:issuer] + %tr{ 'data-testid': 'runner-environment' } + %td + .gl-font-bold= s_('Attestations|Runner Environment') + %td= @certificate[:runner_environment] + %tr{ 'data-testid': 'runner-invocation-uri' } + %td + .gl-font-bold= s_('Attestations|Runner Invocation URI') + %td= link_to @certificate[:runner_invocation_uri], @certificate[:runner_invocation_uri] + %tr{ 'data-testid': 'source-repository-digest' } + %td + .gl-font-bold= s_('Attestations|Source Repository Digest') + %td= @certificate[:source_repository_digest] + %tr{ 'data-testid': 'source-repository-identifier' } + %td + .gl-font-bold= s_('Attestations|Source Repository Identifier') + %td= @certificate[:source_repository_identifier] + %tr{ 'data-testid': 'source-repository-owner-identifier' } + %td + .gl-font-bold= s_('Attestations|Source Repository Owner Identifier') + %td= @certificate[:source_repository_owner_identifier] + %tr{ 'data-testid': 'source-repository-owner-uri' } + %td + .gl-font-bold= s_('Attestations|Source Repository Owner URI') + %td= link_to @certificate[:source_repository_owner_uri], @certificate[:source_repository_owner_uri] + %tr{ 'data-testid': 'source-repository-ref' } + %td + .gl-font-bold= s_('Attestations|Source Repository Ref') + %td= @certificate[:source_repository_ref] + %tr{ 'data-testid': 'source-repository-uri' } + %td + .gl-font-bold= s_('Attestations|Source Repository URI') + %td= link_to @certificate[:source_repository_uri], @certificate[:source_repository_uri] + %tr{ 'data-testid': 'source-repository-visibility' } + %td + .gl-font-bold= s_('Attestations|Sourcre Repository Visibility') + %td= @certificate[:source_repository_visibility] diff --git a/config/routes/project.rb b/config/routes/project.rb index bf738c26f2b9ab..ca31525846f79b 100644 --- a/config/routes/project.rb +++ b/config/routes/project.rb @@ -514,7 +514,7 @@ end end - resources :attestations, only: [:index] do + resources :attestations, only: [:index, :show] do member do get :download end diff --git a/locale/gitlab.pot b/locale/gitlab.pot index 72d17a5c43a190..ee18d8afa5aee2 100644 --- a/locale/gitlab.pot +++ b/locale/gitlab.pot @@ -1312,6 +1312,9 @@ msgstr "" msgid "%{relation_type} epic is not present." msgstr "" +msgid "%{relative_time} ago" +msgstr "" + msgid "%{releases} release" msgid_plural "%{releases} releases" msgstr[0] "" @@ -9998,18 +10001,105 @@ msgstr "" msgid "Attempted to update the pipeline trigger token but failed" msgstr "" +msgid "Attestations|Attestation" +msgstr "" + msgid "Attestations|Attestations" msgstr "" +msgid "Attestations|Build" +msgstr "" + +msgid "Attestations|Build Config Digest" +msgstr "" + +msgid "Attestations|Build Config URI" +msgstr "" + +msgid "Attestations|Build Signer Digest" +msgstr "" + +msgid "Attestations|Build Signer URI" +msgstr "" + +msgid "Attestations|Build Trigger" +msgstr "" + +msgid "Attestations|Certificate" +msgstr "" + +msgid "Attestations|Commit" +msgstr "" + +msgid "Attestations|Created" +msgstr "" + +msgid "Attestations|Digest" +msgstr "" + +msgid "Attestations|Issuer" +msgstr "" + msgid "Attestations|No attestations found for this project" msgstr "" +msgid "Attestations|Predicate" +msgstr "" + +msgid "Attestations|Runner Environment" +msgstr "" + +msgid "Attestations|Runner Invocation URI" +msgstr "" + msgid "Attestations|Sign and verify SLSA provenance with a CI/CD Component." msgstr "" +msgid "Attestations|Source Repository Digest" +msgstr "" + +msgid "Attestations|Source Repository Identifier" +msgstr "" + +msgid "Attestations|Source Repository Owner Identifier" +msgstr "" + +msgid "Attestations|Source Repository Owner URI" +msgstr "" + +msgid "Attestations|Source Repository Ref" +msgstr "" + +msgid "Attestations|Source Repository URI" +msgstr "" + +msgid "Attestations|Sourcre Repository Visibility" +msgstr "" + +msgid "Attestations|Subject" +msgstr "" + +msgid "Attestations|Subjects" +msgstr "" + +msgid "Attestations|This attestation does not exist" +msgstr "" + +msgid "Attestations|Unable to parse attestation certificate." +msgstr "" + +msgid "Attestations|Unable to parse attestation metadata" +msgstr "" + msgid "Attestations|View SLSA Component documentation" msgstr "" +msgid "Attestations|View job for this attestation" +msgstr "" + +msgid "Attestations|Workflow" +msgstr "" + msgid "Attribute 'container-overrides' is not yet supported" msgstr "" diff --git a/spec/factories/supply_chain/attestations.rb b/spec/factories/supply_chain/attestations.rb index a88efb205d737c..f54d64f75bb45b 100644 --- a/spec/factories/supply_chain/attestations.rb +++ b/spec/factories/supply_chain/attestations.rb @@ -3,7 +3,7 @@ FactoryBot.define do factory :supply_chain_attestation, class: 'SupplyChain::Attestation' do project factory: :project - build factory: [:ci_build, :success] + build factory: [:ci_build, :success, :with_commit] predicate_kind { :provenance } predicate_type { "https://slsa.dev/provenance/v1" } sequence(:subject_digest) { |n| Digest::SHA256.hexdigest("attestation-#{n}") } @@ -13,5 +13,9 @@ trait :with_error_status do status { 'error' } end + + trait :with_parseable_metadata do + file { fixture_file_upload('spec/fixtures/supply_chain/parseable_attestation.json') } + end end end diff --git a/spec/fixtures/supply_chain/parseable_attestation.json b/spec/fixtures/supply_chain/parseable_attestation.json new file mode 100644 index 00000000000000..bed1fe6b7cc69f --- /dev/null +++ b/spec/fixtures/supply_chain/parseable_attestation.json @@ -0,0 +1,40 @@ +{ + "mediaType": "application/vnd.dev.sigstore.bundle.v0.3+json", + "verificationMaterial": { + "certificate": { + "rawBytes": "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" + }, + "tlogEntries": [ + { + "logId": { + "keyId": "Z8Hdyq9v+n+6UxlrNr3J5a2CDOVcOl0KK26KfFslpbA=" + }, + "kindVersion": { + "kind": "dsse", + "version": "0.0.1" + }, + "integratedTime": "1762965975", + "inclusionPromise": { + "signedEntryTimestamp": "MEUCIQDjCRRqUbFbVP55YGiLU2qwCtIHSAXHQy/oOjFMmxxYNQIgTOS4E2qN5yNwAUOhzSQ9SGOPl5EKNnU++KqjkstLbXc=" + }, + "inclusionProof": { + "rootHash": "fRxfuBdcmmpgWTc4zc1eNOXXRTaLWJOBN2ZcS6MbZBs=", + "treeSize": "1", + "checkpoint": { + "envelope": "dfrey--20230612-P74VR - 4353712705270881066\n1\nfRxfuBdcmmpgWTc4zc1eNOXXRTaLWJOBN2ZcS6MbZBs=\n\n— dfrey--20230612-P74VR Z8HdyjBEAiAio+CtGh6YtDuEiZHOMGZOjRGkgQbn/dh3FdyJ3meMZAIgY9pJdXE6pUyGl8gWnmwEstdQ+izwX2sKIqUrT9p3+lU=\n" + } + }, + "canonicalizedBody": "eyJhcGlWZXJzaW9uIjoiMC4wLjEiLCJraW5kIjoiZHNzZSIsInNwZWMiOnsiZW52ZWxvcGVIYXNoIjp7ImFsZ29yaXRobSI6InNoYTI1NiIsInZhbHVlIjoiNzBhYjc3YzAzNWI4MDJhNzc4ZmE0NDU5ZmZjYWMxMDdkNGFhYTgzMGQ4MTM3NjE3YjU0MzM2ZDdmMGQzMjBhNiJ9LCJwYXlsb2FkSGFzaCI6eyJhbGdvcml0aG0iOiJzaGEyNTYiLCJ2YWx1ZSI6IjUwMjdmNzQyMGQ5MzdhOGQ4ZWUyNWU3NTcxOGZhNTRhMWNhYjQ3NjZmNDFhZmUyZTE3M2IwMjUzZTI5NTA5YjkifSwic2lnbmF0dXJlcyI6W3sic2lnbmF0dXJlIjoiTUVVQ0lRQzc5NEpsZEUvbEh5RDg3S292OFJheUpLZWZER1pDTTJHRzc2TkllaDBhbGdJZ2VrazVJaDhXUG4zYVFybi9jNTFnTW0wOGxZWC9ZQVN6S0ludjVhdUZTMXc9IiwidmVyaWZpZXIiOiJMUzB0TFMxQ1JVZEpUaUJEUlZKVVNVWkpRMEZVUlMwdExTMHRDazFKU1VZcmVrTkRRbGxMWjBGM1NVSkJaMGxWUVV0blprVkxabGQyWVVOVmEyeGFTREJqTW1Rck4zY3lja3BuZDBObldVbExiMXBKZW1vd1JVRjNUWGNLWVZSRlRVMUJiMGRCTVZWRlFtaE5SRlpXVGtKTlVrVjNSSGRaUkZaUlVVbEZkMmhDWW01c1VXSkhSbXBhVkVWUlRVRTBSMEV4VlVWQ2VFMUlVVmMxTlFwa1J6a3pZbXBGVlUxQ1NVZEJNVlZGUTFKTlRFMVVTWHBKUlRGb1lWYzBaMVV6VVhoRWVrRk9RbWRPVmtKQ1JWUkNhMFpEVVRCU1JsSnFSVTVOUVhOSENrRXhWVVZEYUUxRldWZE9kRnBVUVdWR2R6QjVUbFJGZUUxVVNYaE9hbEV5VFVSc1lVWjNNSGxPVkVWNFRWUkplRTVxVlRKTlJHeGhUVUZCZDFkVVFWUUtRbWRqY1docmFrOVFVVWxDUW1kbmNXaHJhazlRVVUxQ1FuZE9RMEZCVVRkT04yWlRlVGR5YzNWUlJFRjVOUzlEYVRFeGRsTnRka2RPTkZoRVJuVkdTZ292ZVZSdVJrUTJWa2hySzFseVpGSmtSQzl4T1d0UE1tWjBVR1JhUkd3d2NHeERWR1ZSYlRnMWMzSlBOMXA1Y0hoeVlqWjVielJKUldKNlEwTkNSM04zQ2tSbldVUldVakJRUVZGSUwwSkJVVVJCWjJWQlRVSk5SMEV4VldSS1VWRk5UVUZ2UjBORGMwZEJVVlZHUW5kTlJFMUNNRWRCTVZWa1JHZFJWMEpDVTBnS2NHSlhUWEEzTkdWVVNXTkVhemRKU2poNFVuSkZkSFJWV2xSQlprSm5UbFpJVTAxRlIwUkJWMmRDVkd0dlExaHJja2t4VkVGTE9FOUxiemd2Vkc5c2JBcGpkVFJWVUdwQ2FVSm5UbFpJVWtWQ1FXWTRSVmRFUWxkb2JGSnZaRWhTZDA5cE9IWmFNbEp5VEc1U2JHTXpVVFpOZWtGM1RVTTVhMXBYTVhaamVUbDZDbUpJVG1oTVdGcHNZMjFzYldGWFRtaGtSMngyWW1reGQyTnRPWEZhVjA0d1RIazRkVm95YkRCaVIwWnBURmRPY0V4dWJIUmlSVUo1V2xkYWVrd3lhR3dLV1ZkU2Vrd3lNV2hoVnpSM1NXZFpTMHQzV1VKQ1FVZEVkbnBCUWtGUlVWVmhTRkl3WTBSdmRrd3laR3RoZVRVd1dsaE9NRTlxVFhkTlJFRjNTa0ZaU3dwTGQxbENRa0ZIUkhaNlFVSkRRVkZYUkVKU2IyUklVbmRQYVRoMldqSlNja3h1VW14ak0xRTJUWHBCZDAxRVFtdENaMjl5UW1kRlJVRlpUeTlOUVVWS0NrSkdXVTFXUjJnd1pFaEJOa3g1T1c1YVIzTjFaRWRXZW1SRWIzcE5SRUYzVERKU2JHSlhPWHBNTTA1ell6SkZkR1J0Vm5saFYxcHdXVEpHTUdGWE9YVUtURmhDZVdJeWNHeFpNMUYyVEhrMWJtRllVbk5aVjBsMFdUSnJkV1ZYTVhOUlNFcHNXbTVOZG1GSFZtaGFTRTEyWWxkR2NHSnFRVFJDWjI5eVFtZEZSUXBCV1U4dlRVRkZTMEpEYjAxTFIxRXpUbGRGTlU1dFNURlpWMFpxVDFSb2JVOUVRVFZPZWtKcFdsZE5NVnBFVlROUFJFVTFXa1JaTTFsVWFHaE5WMUV6Q2xsWFRYZElVVmxMUzNkWlFrSkJSMFIyZWtGQ1EzZFJVRVJCTVc1aFdGSnpXVmRKZEdGSE9YcGtSMVpyVFVWRlIwTnBjMGRCVVZGQ1p6YzRkMEZSZDBVS1RYZDNlR0ZJVWpCalJHOTJUREprY0dSSGVHaFphVFZxWWpJd2RscEhWblJpTTAxMll6SjRlbGxUTVRKYVdFcHdXbTFzYWxsWVVuQmlNalIwWTBoS2RncGhiVlpxWkVSQk5FSm5iM0pDWjBWRlFWbFBMMDFCUlU1Q1EyOU5TMGRSTTA1WFJUVk9iVWt4V1ZkR2FrOVVhRzFQUkVFMVRucENhVnBYVFRGYVJGVXpDazlFUlRWYVJGa3pXVlJvYUUxWFVUTlpWMDEzU0hkWlMwdDNXVUpDUVVkRWRucEJRa1JuVVZKRVFUbDVXbGRhZWt3eWFHeFpWMUo2VERJeGFHRlhOSGNLUldkWlMwdDNXVUpDUVVkRWRucEJRa1IzVVVWRVFVbDVUV3BCYmtKbmIzSkNaMFZGUVZsUEwwMUJSVkZDUW10TlJqSm9NR1JJUVRaTWVUbHVZVmhTY3dwWlYwbDFXVEk1ZEV3eVVteGlWemw2VFVKSlIwTnBjMGRCVVZGQ1p6YzRkMEZTUlVWQ1FYZERUMVJWZDFwQldVdExkMWxDUWtGSFJIWjZRVUpGWjFKWENrUkdVbTlrU0ZKM1QyazRkbG95VW5KTWJsSnNZek5STmsxNlFYZE5RemxyV2xjeGRtTjVPWHBpU0U1b1RGaGFiR050YkcxaFYwNW9aRWRzZG1KcE1YY0tZMjA1Y1ZwWFRqQk1lVGgxV2pKc01HSkhSbWxNVjA1d1RHNXNkR0pGUW5sYVYxcDZUREpvYkZsWFVucE1NakZvWVZjMGQwOUJXVXRMZDFsQ1FrRkhSQXAyZWtGQ1JYZFJjVVJEYUd0T2VsWm9UMVJhYVU1WFJtaFplbXMwV21wbmQwOVVZM2RaYlZacVRsZFJNVTU2WjNoUFYxRXlUakpGTkZsVVJtdE9Na1pxQ2sxQ1VVZERhWE5IUVZGUlFtYzNPSGRCVWxGRlFtZDNSV05JVm5waFJFSk5RbWR2Y2tKblJVVkJXVTh2VFVGRlZrSkVORTFRUjJnd1pFaEJOa3g1T1c0S1lWaFNjMWxYU1hWWk1qbDBUREpTYkdKWE9YcE1NMDV6WXpKRmRHUnRWbmxoVjFwd1dUSkdNR0ZYT1hWTVdFSjVZakp3YkZrelVYWk1Vemx4WWpKS2VncE1lazB5VDFSQlYwSm5iM0pDWjBWRlFWbFBMMDFCUlZkQ1FXZE5RbTVDTVZsdGVIQlpla05DYVhkWlMwdDNXVUpDUVVoWFpWRkpSVUZuVWpsQ1NITkJDbVZSUWpOQlRFTktSSG96YVVjeVNUQlNXR2hHY0hnMWJGUXdUbk5TYURVeU5uRjVWRlZPSzNWRFJFVlVkRmxXY1VGQlFVSnRibW94TTBGalFVRkJVVVFLUVVWbmQxSm5TV2hCVEhsTGFIaG1iMjltWm5KMWNUbGxTV2x4VDNsVGVqZHdkVWt3Y1ZZMkswdGxRV1I0WVVkb1NVVnlVa0ZwUlVFNWMxWnJjVTVpVVFwWmMzaFhWMk54WlU1RFIyWkNNWFZGVFV0MlJuQkNkMDFwYURoclRFRktRbmxvV1hkRFoxbEpTMjlhU1hwcU1FVkJkMDFFV25kQmQxcEJTWGRITDBGcUNtSjVhM1pRU3l0a1RYVlJNSEZSY0ZadFF6ZHdUSFIwUWpkdmFrRklXbEZ6TTNSdmIyWlVOM0oyVkVKS1kxRlVTa3gyU2swd1NUYzVTME1yUWtGcVFYb0tTazlzZUdkd1NteFNNa3RVUTNKc1IwbFBXVWRWT0VRMFNtTmxiVUZ3YVhsRVRHWmlRVzR5UWtSc1VXNUNWMGcyZWpkQlEzYzVPR3cxWkhReFZURTRQUW90TFMwdExVVk9SQ0JEUlZKVVNVWkpRMEZVUlMwdExTMHRDZz09In1dfX0=" + } + ] + }, + "dsseEnvelope": { + "payload": "{"_type":"https://in-toto.io/Statement/v0.1","predicateType":"https://slsa.dev/provenance/v1","subject":[{"name":"demodemo.gem","digest":{"sha256":"e6e5f634effc310a2a38bea8f71fec08eca20489763628a6e66951265df2177c"}}],"predicate":{"buildDefinition":{"buildType":"https://docs.gitlab.com/ci/pipeline_security/slsa/provenance_v1","externalParameters":{"entryPoint":"build","source":"http://gdk.test:3000/demos/slsa-verification-project","variables":{"CI":"true","CI_API_GRAPHQL_URL":"http://gdk.test:3000/api/graphql","CI_API_V4_URL":"http://gdk.test:3000/api/v4","CI_COMMIT_AUTHOR":"Darby Frey \u003cdfrey@gitlab.com\u003e","CI_COMMIT_BEFORE_SHA":"0000000000000000000000000000000000000000","CI_COMMIT_BRANCH":"main","CI_COMMIT_DESCRIPTION":"","CI_COMMIT_MESSAGE":"Version bump\n","CI_COMMIT_MESSAGE_IS_TRUNCATED":"false","CI_COMMIT_REF_NAME":"main","CI_COMMIT_REF_PROTECTED":"true","CI_COMMIT_REF_SLUG":"main","CI_COMMIT_SHA":"d75a96b5aac98f80970bec5d57819d67a8a1d7ac","CI_COMMIT_SHORT_SHA":"d75a96b5","CI_COMMIT_TIMESTAMP":"2025-10-31T10:50:18-05:00","CI_COMMIT_TITLE":"Version bump","CI_CONFIG_PATH":".gitlab-ci.yml","CI_DEFAULT_BRANCH":"main","CI_DEFAULT_BRANCH_SLUG":"main","CI_JOB_GROUP_NAME":"build","CI_JOB_ID":"369","CI_JOB_NAME":"build","CI_JOB_NAME_SLUG":"build","CI_JOB_STAGE":"test","CI_JOB_STARTED_AT":"2025-11-12T16:31:58Z","CI_JOB_TOKEN":"[MASKED]","CI_JOB_URL":"http://gdk.test:3000/demos/slsa-verification-project/-/jobs/369","CI_NODE_TOTAL":"1","CI_PAGES_DOMAIN":"172.16.123.1.nip.io","CI_PAGES_HOSTNAME":"slsa-verification-project-0a0688.172.16.123.1.nip.io","CI_PAGES_URL":"http://slsa-verification-project-0a0688.172.16.123.1.nip.io:3010","CI_PIPELINE_CREATED_AT":"2025-11-12T16:31:42Z","CI_PIPELINE_ID":"577","CI_PIPELINE_IID":"1","CI_PIPELINE_NAME":null,"CI_PIPELINE_SOURCE":"push","CI_PIPELINE_URL":"http://gdk.test:3000/demos/slsa-verification-project/-/pipelines/577","CI_PROJECT_CLASSIFICATION_LABEL":null,"CI_PROJECT_DESCRIPTION":null,"CI_PROJECT_ID":"22","CI_PROJECT_NAME":"slsa-verification-project","CI_PROJECT_NAMESPACE":"demos","CI_PROJECT_NAMESPACE_ID":"95","CI_PROJECT_NAMESPACE_SLUG":"demos","CI_PROJECT_PATH":"demos/slsa-verification-project","CI_PROJECT_PATH_SLUG":"demos-slsa-verification-project","CI_PROJECT_REPOSITORY_LANGUAGES":"ruby,shell","CI_PROJECT_ROOT_NAMESPACE":"demos","CI_PROJECT_TITLE":"SLSA Verification Project","CI_PROJECT_TOPICS":"","CI_PROJECT_URL":"http://gdk.test:3000/demos/slsa-verification-project","CI_PROJECT_VISIBILITY":"public","CI_REGISTRY_PASSWORD":"[MASKED]","CI_REGISTRY_USER":"gitlab-ci-token","CI_REPOSITORY_URL":"http://gitlab-ci-token:glcbt-eyJraWQiOiItLURNbVZKRjc5QUQtbjhIaDZYYUd5U0xkbW9OTEhGNUI0WXBpVFdSdXhrIiwidHlwIjoiSldUIiwiYWxnIjoiUlMyNTYifQ.eyJ2ZXJzaW9uIjoiMC4xLjAiLCJjIjoiMSIsIm8iOiIxIiwidSI6IjEiLCJwIjoibSIsImciOiIybiIsImp0aSI6ImEwMGQ1OWQwLTI4YjUtNDc2Yi05MGZhLWQ0ZmM2NDRkMzIzMiIsImF1ZCI6ImdpdGxhYi1hdXRoei10b2tlbiIsInN1YiI6ImdpZDovL2dpdGxhYi9DaTo6QnVpbGQvMzY5IiwiaXNzIjoiZ2RrLnRlc3QiLCJpYXQiOjE3NjI5NjU5NjMsIm5iZiI6MTc2Mjk2NTk1OCwiZXhwIjoxNzYyOTY5ODYzfQ.imArXqqXwMj_f6UMHpAcax8bA2tyh_ptYI4WZ9iZxYoGnGB1ANWzXXuQJ3dB7o5fIBzbe9v7A3poRlrY1Oa0xdbz5X2EToofVTYUXjLU9S6zRstw8Yj5My8ygWEcqPoQThP2uTeEMLjvxF404wiKyqoN7WArS_M0tT-OgbOM5uP_Pe7-DoExYR-SZ7cVWLs5CgdwyJTMtk1h01QyF1gugPZJQdoYoImJzMlBXjZ0mLmgIkkV0vHdnJ42-wlbS8hrciWmvu6GnCB-zcJAT3-dfmsCrvixStcJPNhLB5AX3cZvnGfP28TZsU8X7Bd0UxP2OsL0jIuAhF_yNFUYOjGkgw@gdk.test:3000/demos/slsa-verification-project.git","CI_RUNNER_DESCRIPTION":"","CI_RUNNER_ID":"31","CI_RUNNER_TAGS":"[]","CI_SERVER_FQDN":"gdk.test:3000","CI_SERVER_HOST":"gdk.test","CI_SERVER_NAME":"GitLab","CI_SERVER_PORT":"3000","CI_SERVER_PROTOCOL":"http","CI_SERVER_REVISION":"3b5bed8e2e5","CI_SERVER_SHELL_SSH_HOST":"gdk.test","CI_SERVER_SHELL_SSH_PORT":"2222","CI_SERVER_URL":"http://gdk.test:3000","CI_SERVER_VERSION":"18.6.0-pre","CI_SERVER_VERSION_MAJOR":"18","CI_SERVER_VERSION_MINOR":"6","CI_SERVER_VERSION_PATCH":"0","CI_TEMPLATE_REGISTRY_HOST":"registry.gitlab.com","GEM_NAME":"demodemo.gem","GEM_SPEC":"demodemo.gemspec","GENERATE_PROVENANCE":"true","GITLAB_CI":"true","GITLAB_FEATURES":"audit_events,blocked_issues,blocked_work_items,board_iteration_lists,code_owners,code_review_analytics,data_management,full_codequality_report,group_activity_analytics,group_bulk_edit,issuable_default_templates,issue_weights,iterations,ldap_group_sync,merge_request_approvers,milestone_charts,multiple_issue_assignees,multiple_ldap_servers,multiple_merge_request_assignees,multiple_merge_request_reviewers,project_merge_request_analytics,protected_refs_for_users,push_rules,resource_access_token,seat_link,seat_usage_quotas,pipelines_usage_quotas,transfer_usage_quotas,wip_limits,zoekt_code_search,seat_control,usage_billing,description_diffs,send_emails_from_admin_area,repository_size_limit,maintenance_mode,scoped_issue_board,contribution_analytics,group_webhooks,member_lock,elastic_search,repository_mirrors,ai_chat,ai_catalog,ai_workflows,admin_audit_log,agent_managed_resources,agentic_chat,allow_personal_snippets,auditor_user,blocking_merge_requests,board_assignee_lists,board_milestone_lists,ci_secrets_management,ci_pipeline_cancellation_restrictions,cluster_agents_ci_impersonation,cluster_agents_user_impersonation,cluster_deployments,code_owner_approval_required,code_suggestions,commit_committer_check,commit_committer_name_check,compliance_framework,container_virtual_registry,custom_compliance_frameworks,custom_fields,custom_file_templates,custom_project_templates,cycle_analytics_for_groups,cycle_analytics_for_projects,db_load_balancing,default_branch_protection_restriction_in_groups,default_project_deletion_protection,delete_unconfirmed_users,dependency_proxy_for_packages,disable_extensions_marketplace_for_enterprise_users,disable_name_update_for_users,disable_personal_access_tokens,disable_ssh_keys,domain_verification,epic_colors,epics,extended_audit_events,external_authorization_service_api_management,feature_flags_code_references,file_locks,geo,generic_alert_fingerprinting,git_two_factor_enforcement,group_allowed_email_domains,group_coverage_reports,group_forking_protection,group_level_analytics_dashboard,group_level_compliance_dashboard,group_milestone_project_releases,group_project_templates,group_repository_analytics,group_saml,group_scoped_ci_variables,ide_schema_config,incident_metric_upload,instance_level_scim,jira_issues_integration,ldap_group_sync_filter,linked_items_epics,merge_request_performance_metrics,admin_merge_request_approvers_rules,merge_trains,metrics_reports,mcp_server,multiple_alert_http_integrations,multiple_approval_rules,multiple_group_issue_boards,object_storage,microsoft_group_sync,operations_dashboard,package_forwarding,packages_virtual_registry,pages_size_limit,pages_multiple_versions,productivity_analytics,project_aliases,project_level_analytics_dashboard,protected_environments,reject_non_dco_commits,reject_unsigned_commits,related_epics,remote_development,saml_group_sync,service_accounts,scoped_labels,smartcard_auth,ssh_certificates,swimlanes,target_branch_rules,troubleshoot_job,type_of_work_analytics,minimal_access_role,unprotection_restrictions,ci_project_subscriptions,incident_timeline_view,oncall_schedules,escalation_policies,zentao_issues_integration,coverage_check_approval_rule,issuable_resource_links,group_protected_branches,group_level_merge_checks_setting,oidc_client_groups_claim,disable_deleting_account_for_users,disable_private_profiles,group_saved_replies,requested_changes_block_merge_request,project_saved_replies,default_roles_assignees,ci_component_usages_in_projects,branch_rule_squash_options,work_item_status,glab_ask_git_command,generate_commit_message,summarize_new_merge_request,summarize_review,generate_description,summarize_comments,review_merge_request,board_status_lists,disable_invite_members,self_hosted_models,native_secrets_management,group_ip_restriction,issues_analytics,password_complexity,group_wikis,email_additional_text,custom_file_templates_for_namespace,incident_sla,export_user_permissions,cross_project_pipelines,feature_flags_related_issues,merge_pipelines,ci_cd_projects,github_integration,ai_agents,ai_config_chat,ai_features,amazon_q,api_discovery,api_fuzzing,auto_rollback,cluster_receptive_agents,cluster_image_scanning,external_status_checks,compliance_pipeline_configuration,container_registry_immutable_tag_rules,container_scanning,credentials_inventory,custom_roles,dast,dependency_scanning,dora4_analytics,description_composer,enterprise_templates,environment_alerts,evaluate_group_level_compliance_pipeline,explain_code,external_audit_events,experimental_features,generate_test_file,git_abuse_rate_limit,group_ci_cd_analytics,group_level_compliance_adherence_report,group_level_compliance_violations_report,project_level_compliance_dashboard,project_level_compliance_adherence_report,project_level_compliance_violations_report,incident_management,inline_codequality,insights,integrations_allow_list,issuable_health_status,issues_completed_analytics,jira_vulnerabilities_integration,jira_issue_association_enforcement,kubernetes_cluster_vulnerabilities,license_scanning,okrs,personal_access_token_expiration_policy,secret_push_protection,product_analytics,project_quality_summary,quality_management,release_evidence_test_artifacts,report_approver_rules,required_ci_templates,requirements,runner_maintenance_note,runner_maintenance_note_for_namespace,runner_performance_insights,runner_performance_insights_for_namespace,runner_upgrade_management,runner_upgrade_management_for_namespace,sast,sast_advanced,sast_iac,sast_custom_rulesets,sast_fp_reduction,secret_detection,security_attributes,security_configuration_in_ui,security_dashboard,security_inventory,security_on_demand_scans,security_orchestration_policies,security_training,ssh_key_expiration_policy,summarize_mr_changes,stale_runner_cleanup_for_namespace,status_page,suggested_reviewers,subepics,observability,unique_project_download_limit,vulnerability_finding_signatures,container_scanning_for_registry,secret_detection_validity_checks,security_exclusions,security_scans_api,observability_alerts,measure_comment_temperature,license_information_source,coverage_fuzzing,devops_adoption,group_level_devops_adoption,instance_level_devops_adoption","GITLAB_USER_EMAIL":"gitlab_admin_a515af@example.com","GITLAB_USER_ID":"1","GITLAB_USER_LOGIN":"root","GITLAB_USER_NAME":"Administrator","SIGSTORE_ID_TOKEN":"[MASKED]"}},"internalParameters":{"architecture":"arm64","executor":"docker","job":369,"name":"AuZZj_w6"},"resolvedDependencies":[{"uri":"http://gdk.test:3000/demos/slsa-verification-project","digest":{"gitCommit":"d75a96b5aac98f80970bec5d57819d67a8a1d7ac"}}]},"runDetails":{"builder":{"id":"http://gdk.test:3000/demos/slsa-verification-project/-/runners/31","version":{"gitlab-runner":"bda84871"}},"metadata":{"invocationID":"369","startedOn":"2025-11-12T16:31:58Z","finishedOn":"2025-11-12T16:32:13Z"}}}}", + "payloadType": "application/vnd.in-toto+json", + "signatures": [ + { + "sig": "MEUCIQC794JldE/lHyD87Kov8RayJKefDGZCM2GG76NIeh0algIgekk5Ih8WPn3aQrn/c51gMm08lYX/YASzKInv5auFS1w=" + } + ] + } +} diff --git a/spec/requests/projects/attestations_controller_spec.rb b/spec/requests/projects/attestations_controller_spec.rb index ffcc9e6852af17..46e039503113a8 100644 --- a/spec/requests/projects/attestations_controller_spec.rb +++ b/spec/requests/projects/attestations_controller_spec.rb @@ -4,8 +4,9 @@ RSpec.describe Projects::AttestationsController, feature_category: :artifact_security do let_it_be(:project) { create(:project, :public) } - let_it_be(:attestation) { create(:supply_chain_attestation, project: project) } + let(:attestation) { create(:supply_chain_attestation, :with_parseable_metadata, project: project) } let_it_be(:user) { project.first_owner } + let_it_be(:non_member) { create(:user) } before do sign_in(user) @@ -22,7 +23,6 @@ def get_index context 'when slsa_provenance_statement is enabled' do context 'when user is not authorized to read attestations' do let_it_be(:project) { create(:project, :private) } - let_it_be(:non_member) { create(:user) } it 'returns 404' do sign_in(non_member) @@ -66,6 +66,94 @@ def get_index end end + describe 'GET show' do + def get_show + get project_attestation_path(project, attestation.iid) + end + + context 'when slsa_provenance_statement is enabled' do + context 'when user is not authorized to read attestations' do + let_it_be(:project) { create(:project, :private) } + + it 'returns 404' do + sign_in(non_member) + get_show + + expect(response).to have_gitlab_http_status(:not_found) + end + end + + context 'when user can read attestation' do + before do + # attestation.build doesn't persist; stub build with commit so view can render properly without errors + build = create(:ci_build, :with_commit, project: project) + + # rubocop:disable RSpec/AnyInstanceOf -- multiple tests need the same stub; this generally should not affect + # request tests, it's just so view is rendered properly + allow_any_instance_of(SupplyChain::Attestation).to receive(:build).and_return(build) + # rubocop:enable RSpec/AnyInstanceOf + end + + it 'renders show view of attestation' do + get_show + + expect(response).to have_gitlab_http_status(:ok) + end + + context 'when attestation has valid metadata' do + it 'shows attestation details' do + get_show + + # table should be rendered + expect(response.body).to include('data-testid="attestation-table"') + expect(response.body).to include('data-testid="subjects-table"') + expect(response.body).to include('data-testid="certificate-table"') + + # assert parsed subjects details (subject and digest) + expect(response.body).to include('demodemo.gem') + expect(response.body).to include('sha256:e6e5f634effc310a2a38bea8f71fec08eca20489763628a6e66951265df2177c') + + # assert parsed certificate details (build config URI and build config digest) + expect(response.body).to include('http://gdk.test:3000/demos/slsa-verification-project//.gitlab-ci.yml@refs/heads/main') + expect(response.body).to include('d75a96b5aac98f80970bec5d57819d67a8a1d7ac') + end + end + + context 'when attestation file cannot be parsed' do + before do + # rubocop:disable RSpec/AnyInstanceOf -- file is called multiple times + allow_any_instance_of(SupplyChain::Attestation).to receive(:file).and_return( + instance_double(SupplyChain::AttestationUploader, read: 'invalid json', object_store: 'local') + ) + # rubocop:enable RSpec/AnyInstanceOf + end + + it 'logs error and does not show attestation details' do + expect(Gitlab::AppJsonLogger).to receive(:error).twice + + get_show + + expect(response.body).not_to include('data-testid="attestation-table"') + expect(response.body).not_to include('data-testid="subjects-table"') + expect(response.body).not_to include('data-testid="certificate-table"') + end + end + end + end + + context 'when slsa_provenance_statement is disabled' do + before do + stub_feature_flags(slsa_provenance_statement: false) + end + + it 'returns 404' do + get_show + + expect(response).to have_gitlab_http_status(:not_found) + end + end + end + describe 'GET download' do def download_attestation params = { namespace_id: project.namespace, project_id: project, id: attestation.iid } diff --git a/spec/views/projects/attestations/index.html.haml_spec.rb b/spec/views/projects/attestations/index.html.haml_spec.rb index 4d1b66ac1123f0..27d2d09894c598 100644 --- a/spec/views/projects/attestations/index.html.haml_spec.rb +++ b/spec/views/projects/attestations/index.html.haml_spec.rb @@ -40,7 +40,8 @@ expect(rendered).to have_selector('[data-testid="attestations-table"]') within("[data-testid='attestations-#{attestation.iid}']") do - expect(rendered).to have_content(attestation.file.filename) + expect(rendered).to have_link(attestation.file.filename, + href: project_attestation_path(project, attestation.iid)) expect(rendered).to have_link(attestation.build.iid, href: project_job_path(project, build)) expect(rendered).to have_content(attestation.predicate_type) expect(rendered).to have_content(attestation.predicate_type) diff --git a/spec/views/projects/attestations/show.html.haml_spec.rb b/spec/views/projects/attestations/show.html.haml_spec.rb new file mode 100644 index 00000000000000..e7146d2b1c371b --- /dev/null +++ b/spec/views/projects/attestations/show.html.haml_spec.rb @@ -0,0 +1,149 @@ +# frozen_string_literal: true + +require 'spec_helper' + +RSpec.describe 'projects/attestations/show.html.haml', feature_category: :artifact_security do + let_it_be(:project) { create(:project, :public) } # rubocop:disable RSpec/FactoryBot/AvoidCreate -- needs persisted associations for attestations + let_it_be(:attestation) { create(:supply_chain_attestation, project: project) } # rubocop:disable RSpec/FactoryBot/AvoidCreate -- needs persisted associations to get all the details + let_it_be(:build) { attestation.build } + let_it_be(:user) { project.first_owner } + + before do + sign_in(user) + assign(:project, project) + end + + describe 'when attestation does not exist' do + before do + assign(:attestations, nil) + assign(:attestation_iid_param, '123') + end + + it 'renders the empty state' do + render + + expect(rendered).not_to have_selector('[data-testid="attestation-details"]') + expect(rendered).to have_content('This attestation does not exist') + expect(rendered).to have_link('View SLSA Component documentation', href: 'https://gitlab.com/components/slsa#slsa-supply-chain-levels-for-software-artifacts') + end + end + + describe 'when metadata does not exist' do + before do + assign(:attestation, attestation) + assign(:attestation_iid_param, '123') + assign(:subjects, []) + end + + it 'renders error message' do + render + + expect(rendered).not_to have_selector('[data-testid="attestation-details"]') + expect(rendered).to have_content('Unable to parse attestation metadata') + expect(rendered).to have_link('View job for this attestation', href: project_job_path(project, build)) + end + end + + describe 'when certificate does not exist' do + before do + assign(:attestation, attestation) + assign(:attestation_iid_param, '123') + assign(:subjects, [{ + 'name' => 'demodemo.gem', + 'digest' => { 'sha256' => 'e6e5f634effc310a2a38bea8f71fec08eca20489763628a6e66951265df2177c' } + }]) + assign(:certificate, {}) + end + + it 'renders error message' do + render + + expect(rendered).not_to have_selector('[data-testid="certificate-table"]') + expect(rendered).to have_content('Unable to parse attestation certificate') + end + end + + describe 'when all attestation data are available' do + before do + assign(:attestation, attestation) + assign(:attestation_iid_param, attestation.iid) + assign(:subjects, [{ + 'name' => 'demodemo.gem', + 'digest' => { 'sha256' => 'e6e5f634effc310a2a38bea8f71fec08eca20489763628a6e66951265df2177c' } + }]) + assign(:certificate, { + build_config_uri: 'http://gdk.test:3000/demos/slsa-verification-project//.gitlab-ci.yml@refs/heads/main', + build_config_digest: 'd75a96b5aac98f80970bec5d57819d67a8a1d7ac', + build_signer_uri: 'http://gdk.test:3000/demos/slsa-verification-project//.gitlab-ci.yml@refs/heads/main', + build_signer_digest: 'd75a96b5aac98f80970bec5d57819d67a8a1d7ac', + build_trigger: 'push', + issuer: 'http://gdk.test:3000', + runner_environment: 'gitlab-hosted', + runner_invocation_uri: 'http://gitlab.com/demos/slsa-verification-project/-/jobs/369', + source_repository_digest: 'd75a96b5aac98f80970bec5d57819d67a8a1d7ac', + source_repository_identifier: '22', + source_repository_owner_identifier: '95', + source_repository_owner_uri: 'http://gitlab.com/demos', + source_repository_ref: 'refs/heads/main', + source_repository_uri: 'http://gitlab.com/demos/slsa-verification-project', + source_repository_visibility: 'public' + }) + end + + it 'renders download link' do + render + + expect(rendered).to have_selector('[data-testid="attestation-details"]') + expect(rendered).to have_link(href: download_namespace_project_attestation_path({ + namespace_id: project.namespace, project_id: project, id: attestation.iid + })) + end + + it 'renders attestation details' do + render + + within("[data-testid='attestation-table']") do + timestamp = attestation.created_at.strftime('%a, %b %d %Y %H:%M:%S %Z') + + expect(rendered).to have_content(attestation.predicate_type) + expect(rendered).to have_content("#{time_ago_in_words(attestation.created_at)} ago (#{timestamp})") + expect(rendered).to have_link(build.commit.id, href: project_commit_path(project, build.commit)) + expect(rendered).to have_link(build.iid, href: project_job_path(project, build)) + end + end + + it 'renders subjects details' do + render + + within("[data-testid='subjects-table']") do + expect(rendered).to have_content('demodemo.gem') + expect(rendered).to have_content('sha:e6e5f634effc310a2a38bea8f71fec08eca20489763628a6e66951265df2177c') + end + end + + it 'renders certificate details' do + render + + within("[data-testid='certificate-table']") do + expect(rendered).to have_content("[data-testid='build_config_uri']", text: 'http://gdk.test:3000/demos/slsa-verification-project//.gitlab-ci.yml@refs/heads/main') + expect(rendered).to have_content("[data-testid='build_config_digest']", + text: 'd75a96b5aac98f80970bec5d57819d67a8a1d7ac') + expect(rendered).to have_content("[data-testid='build_signer_uri']", text: 'http://gdk.test:3000/demos/slsa-verification-project//.gitlab-ci.yml@refs/heads/main') + expect(rendered).to have_content("[data-testid='build_signer_digest']", + text: 'd75a96b5aac98f80970bec5d57819d67a8a1d7ac') + expect(rendered).to have_content("[data-testid='build_trigger']", text: 'push') + expect(rendered).to have_content("[data-testid='issuer']", text: 'http://gdk.test:3000') + expect(rendered).to have_content("[data-testid='runner_environment']", text: 'gitlab-hosted') + expect(rendered).to have_content("[data-testid='runner_invocation_uri']", text: 'http://gitlab.com/demos/slsa-verification-project/-/jobs/369') + expect(rendered).to have_content("[data-testid='source_repository_digest']", + text: 'd75a96b5aac98f80970bec5d57819d67a8a1d7ac') + expect(rendered).to have_content("[data-testid='source_repository_identifier']", text: '22') + expect(rendered).to have_content("[data-testid='source_repository_owner_identifier']", text: '95') + expect(rendered).to have_content("[data-testid='source_repository_owner_uri']", text: 'http://gitlab.com/demos') + expect(rendered).to have_content("[data-testid='source_repository_ref']", text: 'refs/heads/main') + expect(rendered).to have_content("[data-testid='source_repository_uri']", text: 'http://gitlab.com/demos/slsa-verification-project') + expect(rendered).to have_content("[data-testid='source_repository_visibility']", text: 'public') + end + end + end +end -- GitLab From 9a2e51581b02a94657271a5da49e7a580e080498 Mon Sep 17 00:00:00 2001 From: Mireya Andres Date: Thu, 11 Dec 2025 20:58:01 +0800 Subject: [PATCH 2/3] Cache file reading, update logger, fix typo --- .../projects/attestations_controller.rb | 37 ++++++++++--------- .../projects/attestations/show.html.haml | 2 +- locale/gitlab.pot | 2 +- 3 files changed, 22 insertions(+), 19 deletions(-) diff --git a/app/controllers/projects/attestations_controller.rb b/app/controllers/projects/attestations_controller.rb index 31e703cc8acf1a..91885f193226d2 100644 --- a/app/controllers/projects/attestations_controller.rb +++ b/app/controllers/projects/attestations_controller.rb @@ -58,22 +58,25 @@ def pagination_params end def parsed_metadata - return {} unless attestation && attestation_file - - parsed_file = Gitlab::Json.parse(attestation_file.read) - decoded = Base64.decode64(parsed_file["dsseEnvelope"]["payload"]) - Gitlab::Json.parse(decoded) - - rescue JSON::ParserError, KeyError => e - Gitlab::AppJsonLogger.error( - message: 'Failed to parse attestation metadata.', - error_class: e.class.name, - error_message: e.message, - attestation_id: attestation&.id, - project_id: project.id, - feature_category: 'artifact_security' - ) - {} + @parsed_metadata ||= begin + if attestation && attestation_file + parsed_file = Gitlab::Json.parse(attestation_file.read) + decoded = Base64.decode64(parsed_file["dsseEnvelope"]["payload"]) + Gitlab::Json.parse(decoded) + else + {} + end + rescue JSON::ParserError, KeyError => e + Gitlab::AppJsonLogger.error( + message: 'Failed to parse attestation metadata.', + error_class: e.class.name, + error_message: e.message, + attestation_id: attestation&.id, + project_id: project.id, + feature_category: 'artifact_security' + ) + {} + end end def parsed_certificate @@ -130,7 +133,7 @@ def parsed_certificate_extensions extensions rescue OpenSSL::X509::CertificateError => e - Gitlab::JsonLogger.error( + Gitlab::AppJsonLogger.error( message: 'Failed to parse certificate extensions', error: e.message, attestation_id: attestation&.id diff --git a/app/views/projects/attestations/show.html.haml b/app/views/projects/attestations/show.html.haml index f0820df87e508b..0cca0071bf5b0e 100644 --- a/app/views/projects/attestations/show.html.haml +++ b/app/views/projects/attestations/show.html.haml @@ -154,5 +154,5 @@ %td= link_to @certificate[:source_repository_uri], @certificate[:source_repository_uri] %tr{ 'data-testid': 'source-repository-visibility' } %td - .gl-font-bold= s_('Attestations|Sourcre Repository Visibility') + .gl-font-bold= s_('Attestations|Source Repository Visibility') %td= @certificate[:source_repository_visibility] diff --git a/locale/gitlab.pot b/locale/gitlab.pot index ee18d8afa5aee2..0dbfed06378ea6 100644 --- a/locale/gitlab.pot +++ b/locale/gitlab.pot @@ -10073,7 +10073,7 @@ msgstr "" msgid "Attestations|Source Repository URI" msgstr "" -msgid "Attestations|Sourcre Repository Visibility" +msgid "Attestations|Source Repository Visibility" msgstr "" msgid "Attestations|Subject" -- GitLab From 26c6fcd8238bdc7e671b9d2bd7e0d20ea602276e Mon Sep 17 00:00:00 2001 From: Mireya Andres Date: Mon, 15 Dec 2025 21:37:56 +0800 Subject: [PATCH 3/3] Move certificate to partial and create `parsed_attestation_file` --- .../projects/attestations_controller.rb | 40 +++++----- .../_attestation_certificate.haml | 73 ++++++++++++++++++ .../projects/attestations/show.html.haml | 74 +------------------ .../projects/attestations_controller_spec.rb | 2 +- 4 files changed, 93 insertions(+), 96 deletions(-) create mode 100644 app/views/projects/attestations/_attestation_certificate.haml diff --git a/app/controllers/projects/attestations_controller.rb b/app/controllers/projects/attestations_controller.rb index 91885f193226d2..aa3a111852c595 100644 --- a/app/controllers/projects/attestations_controller.rb +++ b/app/controllers/projects/attestations_controller.rb @@ -57,12 +57,10 @@ def pagination_params params.permit(:cursor) end - def parsed_metadata - @parsed_metadata ||= begin + def parsed_attestation_file + @parsed_attestation_file ||= begin if attestation && attestation_file - parsed_file = Gitlab::Json.parse(attestation_file.read) - decoded = Base64.decode64(parsed_file["dsseEnvelope"]["payload"]) - Gitlab::Json.parse(decoded) + Gitlab::Json.parse(attestation_file.read) else {} end @@ -79,22 +77,27 @@ def parsed_metadata end end + def parsed_metadata + @parsed_metadata ||= if parsed_attestation_file.blank? + {} + else + decoded = Base64.decode64(parsed_attestation_file["dsseEnvelope"]["payload"]) + Gitlab::Json.parse(decoded) + end + end + def parsed_certificate - return {} unless attestation && attestation_file + return {} if parsed_attestation_file.blank? - parsed_file = Gitlab::Json.parse(attestation_file.read) - cert_data = parsed_file['verificationMaterial']['certificate']['rawBytes'] + cert_data = parsed_attestation_file['verificationMaterial']['certificate']['rawBytes'] decoded_certificate = Base64.decode64(cert_data) OpenSSL::X509::Certificate.new(decoded_certificate) - rescue JSON::ParserError, KeyError => e + rescue OpenSSL::X509::CertificateError => e Gitlab::AppJsonLogger.error( - message: 'Failed to parse attestation certificate.', - error_class: e.class.name, - error_message: e.message, - attestation_id: attestation&.id, - project_id: project.id, - feature_category: 'artifact_security' + message: 'Failed to parse certificate extensions', + error: e.message, + attestation_id: attestation&.id ) {} end @@ -132,13 +135,6 @@ def parsed_certificate_extensions end extensions - rescue OpenSSL::X509::CertificateError => e - Gitlab::AppJsonLogger.error( - message: 'Failed to parse certificate extensions', - error: e.message, - attestation_id: attestation&.id - ) - {} end end end diff --git a/app/views/projects/attestations/_attestation_certificate.haml b/app/views/projects/attestations/_attestation_certificate.haml new file mode 100644 index 00000000000000..b8f7b1077c904b --- /dev/null +++ b/app/views/projects/attestations/_attestation_certificate.haml @@ -0,0 +1,73 @@ +.gl-mb-5 + %h2.gl-text-size-h2-display.gl-mt-8.gl-pb-3 + = s_("Attestations|Certificate") + %table.gl-table.gl-w-full.gl-border-separate.gl-border-t{ 'data-testid': 'certificate-table' } + %colgroup + %col{ width: '40%' } + %col{ width: '60%' } + %thead + %tr + %th + = _('Key') + %th= _('Value') + %tbody + %tr{ 'data-testid': 'build-config-digest' } + %td + .gl-font-bold= s_('Attestations|Build Config Digest') + %td= @certificate[:build_config_digest] + %tr{ 'data-testid': 'build-config-uri' } + %td + .gl-font-bold= s_('Attestations|Build Config URI') + %td= link_to @certificate[:build_config_uri], @certificate[:build_config_uri] + %tr{ 'data-testid': 'build-signer-digest' } + %td + .gl-font-bold= s_('Attestations|Build Signer Digest') + %td= @certificate[:build_signer_digest] + %tr{ 'data-testid': 'build-signer-uri' } + %td + .gl-font-bold= s_('Attestations|Build Signer URI') + %td= link_to @certificate[:build_signer_uri], @certificate[:build_signer_uri] + %tr{ 'data-testid': 'build-trigger' } + %td + .gl-font-bold= s_('Attestations|Build Trigger') + %td= @certificate[:build_trigger] + %tr{ 'data-testid': 'issuer' } + %td + .gl-font-bold= s_('Attestations|Issuer') + %td= @certificate[:issuer] + %tr{ 'data-testid': 'runner-environment' } + %td + .gl-font-bold= s_('Attestations|Runner Environment') + %td= @certificate[:runner_environment] + %tr{ 'data-testid': 'runner-invocation-uri' } + %td + .gl-font-bold= s_('Attestations|Runner Invocation URI') + %td= link_to @certificate[:runner_invocation_uri], @certificate[:runner_invocation_uri] + %tr{ 'data-testid': 'source-repository-digest' } + %td + .gl-font-bold= s_('Attestations|Source Repository Digest') + %td= @certificate[:source_repository_digest] + %tr{ 'data-testid': 'source-repository-identifier' } + %td + .gl-font-bold= s_('Attestations|Source Repository Identifier') + %td= @certificate[:source_repository_identifier] + %tr{ 'data-testid': 'source-repository-owner-identifier' } + %td + .gl-font-bold= s_('Attestations|Source Repository Owner Identifier') + %td= @certificate[:source_repository_owner_identifier] + %tr{ 'data-testid': 'source-repository-owner-uri' } + %td + .gl-font-bold= s_('Attestations|Source Repository Owner URI') + %td= link_to @certificate[:source_repository_owner_uri], @certificate[:source_repository_owner_uri] + %tr{ 'data-testid': 'source-repository-ref' } + %td + .gl-font-bold= s_('Attestations|Source Repository Ref') + %td= @certificate[:source_repository_ref] + %tr{ 'data-testid': 'source-repository-uri' } + %td + .gl-font-bold= s_('Attestations|Source Repository URI') + %td= link_to @certificate[:source_repository_uri], @certificate[:source_repository_uri] + %tr{ 'data-testid': 'source-repository-visibility' } + %td + .gl-font-bold= s_('Attestations|Source Repository Visibility') + %td= @certificate[:source_repository_visibility] diff --git a/app/views/projects/attestations/show.html.haml b/app/views/projects/attestations/show.html.haml index 0cca0071bf5b0e..fed64fded62d56 100644 --- a/app/views/projects/attestations/show.html.haml +++ b/app/views/projects/attestations/show.html.haml @@ -83,76 +83,4 @@ %td= subject['name'] %td sha256:#{subject['digest']['sha256']} - unless @certificate.blank? - .gl-mb-5 - %h2.gl-text-size-h2-display.gl-mt-8.gl-pb-3 - = s_("Attestations|Certificate") - %table.gl-table.gl-w-full.gl-border-separate.gl-border-t{ 'data-testid': 'certificate-table' } - %colgroup - %col{ width: '40%' } - %col{ width: '60%' } - %thead - %tr - %th - = _('Key') - %th= _('Value') - %tbody - %tr{ 'data-testid': 'build-config-digest' } - %td - .gl-font-bold= s_('Attestations|Build Config Digest') - %td= @certificate[:build_config_digest] - %tr{ 'data-testid': 'build-config-uri' } - %td - .gl-font-bold= s_('Attestations|Build Config URI') - %td= link_to @certificate[:build_config_uri], @certificate[:build_config_uri] - %tr{ 'data-testid': 'build-signer-digest' } - %td - .gl-font-bold= s_('Attestations|Build Signer Digest') - %td= @certificate[:build_signer_digest] - %tr{ 'data-testid': 'build-signer-uri' } - %td - .gl-font-bold= s_('Attestations|Build Signer URI') - %td= link_to @certificate[:build_signer_uri], @certificate[:build_signer_uri] - %tr{ 'data-testid': 'build-trigger' } - %td - .gl-font-bold= s_('Attestations|Build Trigger') - %td= @certificate[:build_trigger] - %tr{ 'data-testid': 'issuer' } - %td - .gl-font-bold= s_('Attestations|Issuer') - %td= @certificate[:issuer] - %tr{ 'data-testid': 'runner-environment' } - %td - .gl-font-bold= s_('Attestations|Runner Environment') - %td= @certificate[:runner_environment] - %tr{ 'data-testid': 'runner-invocation-uri' } - %td - .gl-font-bold= s_('Attestations|Runner Invocation URI') - %td= link_to @certificate[:runner_invocation_uri], @certificate[:runner_invocation_uri] - %tr{ 'data-testid': 'source-repository-digest' } - %td - .gl-font-bold= s_('Attestations|Source Repository Digest') - %td= @certificate[:source_repository_digest] - %tr{ 'data-testid': 'source-repository-identifier' } - %td - .gl-font-bold= s_('Attestations|Source Repository Identifier') - %td= @certificate[:source_repository_identifier] - %tr{ 'data-testid': 'source-repository-owner-identifier' } - %td - .gl-font-bold= s_('Attestations|Source Repository Owner Identifier') - %td= @certificate[:source_repository_owner_identifier] - %tr{ 'data-testid': 'source-repository-owner-uri' } - %td - .gl-font-bold= s_('Attestations|Source Repository Owner URI') - %td= link_to @certificate[:source_repository_owner_uri], @certificate[:source_repository_owner_uri] - %tr{ 'data-testid': 'source-repository-ref' } - %td - .gl-font-bold= s_('Attestations|Source Repository Ref') - %td= @certificate[:source_repository_ref] - %tr{ 'data-testid': 'source-repository-uri' } - %td - .gl-font-bold= s_('Attestations|Source Repository URI') - %td= link_to @certificate[:source_repository_uri], @certificate[:source_repository_uri] - %tr{ 'data-testid': 'source-repository-visibility' } - %td - .gl-font-bold= s_('Attestations|Source Repository Visibility') - %td= @certificate[:source_repository_visibility] + = render 'attestation_certificate' diff --git a/spec/requests/projects/attestations_controller_spec.rb b/spec/requests/projects/attestations_controller_spec.rb index 46e039503113a8..04eed0d35cdc51 100644 --- a/spec/requests/projects/attestations_controller_spec.rb +++ b/spec/requests/projects/attestations_controller_spec.rb @@ -129,7 +129,7 @@ def get_show end it 'logs error and does not show attestation details' do - expect(Gitlab::AppJsonLogger).to receive(:error).twice + expect(Gitlab::AppJsonLogger).to receive(:error) get_show -- GitLab