Skip to content

Conversation

@KornevNikita
Copy link
Contributor

Enable artifact signing with sigstore/cosign in CI. This ensures that the builds were built exactly by the sycl-nightly workflow.

Enable artifact signing with sigstore/cosign in CI.
This ensures that the builds were built exactly by the sycl-nightly
workflow.
@KornevNikita KornevNikita requested a review from a team as a code owner September 10, 2025 10:26
Copy link
Contributor

@aelovikov-intel aelovikov-intel left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Not an expert, so feel free to gather extra feedback, but I don't see anything bad here.

runs-on: ubuntu-latest
permissions:
contents: write
id-token: write
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

any idea why we need write for this?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

https://docs.sigstore.dev/quickstart/quickstart-ci/#signing-files-using-your-ci-system says:
'id-token' needs write permission to retrieve the OIDC token, which is required for authentication.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

comment makes no sense to me, retrieve seems like a read operation, but seems their problem not ours

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I can try to remove this just in case

Copy link
Contributor

@sarnex sarnex left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

cant provide in depth technical review but no flags

@AlexeySachkov AlexeySachkov merged commit 4315ff2 into intel:sycl Sep 11, 2025
2 of 3 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants