ci: verify ci-base-clang provenance attestation in GitHub Actions#20171
Merged
falcorocks merged 1 commit intodevelopfrom Apr 20, 2026
Merged
ci: verify ci-base-clang provenance attestation in GitHub Actions#20171falcorocks merged 1 commit intodevelopfrom
falcorocks merged 1 commit intodevelopfrom
Conversation
Adds a workflow that reads the pinned ci-base-clang digest from .circleci/config.yml and runs `gh attestation verify --bundle-from-oci` against it, enforcing the attestation was signed by the factory reusable workflow for `ethereum-optimism/optimism` on `refs/heads/develop`. The workflow runs on push to develop and on PRs that touch the pin or the workflow itself, so a digest swap to any unattested or off-branch image blocks the merge. Also repins `rust_base_image` to the digest built from develop (sha256:00f641689576d7393d83f6fd49fe1592006148305999f1ba2fc4f1f9d2e8a342) so the new check passes on merge. Closes #20122
9610205 to
b9344a2
Compare
Codecov Report✅ All modified and coverable lines are covered by tests. Additional details and impacted files@@ Coverage Diff @@
## develop #20171 +/- ##
==========================================
- Coverage 76.7% 76.6% -0.1%
==========================================
Files 691 691
Lines 76081 76081
==========================================
- Hits 58355 58292 -63
- Misses 17582 17645 +63
Partials 144 144
Flags with carried forward coverage won't be shown. Click here to find out more. 🚀 New features to boost your workflow:
|
raffaele-oplabs
approved these changes
Apr 20, 2026
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
Summary
.github/workflows/verify-ci-base-clang-attestation.yml. It extracts therust_base_imagedigest from.circleci/config.ymland runsgh attestation verify --bundle-from-ociagainst it, enforcing the attestation was signed byethereum-optimism/factoryfor source repoethereum-optimism/optimismonrefs/heads/develop. Triggers onpushtodevelopand on PRs todevelopwhen either the pin or the workflow itself changes, plusworkflow_dispatch.rust_base_imagein.circleci/config.ymlto the digest built fromdevelop(sha256:00f641689576d7393d83f6fd49fe1592006148305999f1ba2fc4f1f9d2e8a342), replacing the PR-build digest from chore(ci): add ci-base-clang image and register for factory builds #20121 so the new check passes.Why
CircleCI config is editable by contributors. A GitHub Actions workflow is protected because it runs from the base branch, so putting the provenance check there prevents a PR from silently swapping the pin to an unattested or off-branch image. Closes the last remaining item of the ci-base-clang rollout.
Test plan
verify ci-base-clang attestationworkflow passes on this PR.curlon the Artifact Registry manifest endpoint).gh attestation verify oci://...@sha256:00f6416... --bundle-from-oci --owner ethereum-optimism --signer-repo ethereum-optimism/factory --source-ref refs/heads/developexits 0.Closes #20122