build: provenance attempt #182
Open
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Summary
Implements binary provenance for WASM binaries distributed with OpenFeature providers. When any
provider is released, the WASM binary is automatically built, cryptographically attested, and
uploaded to all relevant GitHub releases with a SHA-256 checksum.
How It Works
Release flow: When Release Please creates a provider release (Java, JS, or Go), a new
publish-wasm-binaryjob:Verification: The idea is that consumers can verify the binary authenticity with:
This proves the binary was built from the claimed source code in GitHub Actions and hasn't been
tampered with.
Changes
Related