-
Notifications
You must be signed in to change notification settings - Fork 2.8k
Add SLSA build provenance attestations to release workflows #7097
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Add actions/attest-build-provenance to release, canary, nightly, and Docker workflows. Every CLI binary, desktop bundle, Linux package, and container image now gets a signed provenance attestation via Sigstore. Users can verify any artifact with: gh attestation verify <artifact> --repo block/goose Changes: - release.yml: attestations:write permission + attestation step - canary.yml: explicit permissions block + attestation step - nightly.yml: explicit permissions block + attestation step - publish-docker.yml: id-token:write, attestations:write, capture image digest, attest with push-to-registry Closes #5994
|
/goose |
PR #7097 Review: Add SLSA build provenance attestations to release workflowsSummary: This PR adds SLSA (Supply Chain Levels for Software Artifacts) build provenance attestations to all release workflows using GitHub's ✅ Highlights
🟢 Suggestions
Overall AssessmentApprove - This is a clean, well-implemented security enhancement. The PR correctly applies the attestation action across all four release workflows with proper permissions, action pinning, and artifact patterns that match the existing release configurations. Review generated by goose |
…provenance * origin/main: (68 commits) Upgraded npm packages for latest security updates (#7183) docs: reasoning effort levels for Codex provider (#6798) Fix speech local (#7181) chore: add .gooseignore to .gitignore (#6826) Improve error message logging from electron (#7130) chore(deps): bump jsonwebtoken from 9.3.1 to 10.3.0 (#6924) docs: standalone mcp apps and apps extension (#6791) workflow: auto-update cli-commands on release (#6755) feat(apps): Integrate AppRenderer from @mcp-ui/client SDK (#7013) fix(MCP): decode resource content (#7155) feat: reasoning_content in API for reasoning models (#6322) Fix/configure add provider custom headers (#7157) fix: handle keyring fallback as success (#7177) Update process-wrap to 9.0.3 (9.0.2 is yanked) (#7176) feat: support extra field in chatcompletion tool_calls for gemini openai compat (#6184) fix: replace panic with proper error handling in get_tokenizer (#7175) Lifei/smoke test for developer (#7174) fix text editor view broken (#7167) docs: White label guide (#6857) Add PATH detection back to developer extension (#7161) ... # Conflicts: # .github/workflows/nightly.yml
Change **/*.flatpak to *.flatpak to match the release step's glob pattern and be consistent with release.yml attestation.
|
/goose |
|
Summary: This PR correctly adds SLSA build provenance attestations to the release, canary, and Docker workflows using the 🟡 Warnings
🟢 Suggestions
✅ Highlights
Review generated by goose |
Add actions/attest-build-provenance to release, canary, nightly, and Docker workflows. Every CLI binary, desktop bundle, Linux package, and container image now gets a signed provenance attestation via Sigstore.
Users can verify any artifact with:
gh attestation verify --repo block/goose
Changes:
Closes #5994