veilor-os/.github/workflows
veilor-org e93ef644e1 ci: add cosign keyless sigs, SBOM, and provenance attestation
Sign each ISO chunk with cosign keyless OIDC, generate an SPDX SBOM
of the build output, and attach an in-toto build-provenance
attestation. Sigs/certs/SBOM are uploaded alongside the ISO parts in
the ci-latest rolling prerelease so the test/auto-install.sh path
can verify before reassembling.

Action versions are major-version tags (@v3, @v0, @v2). SHA-pinning
is tracked separately to keep this PR small and avoid the long web
lookups that stalled the previous attempt.
2026-05-06 16:10:03 +01:00
..
build-bluebuild.yml ci(bluebuild): pin actions to node20-safe tags 2026-05-06 13:54:12 +01:00
build-iso.yml ci: add cosign keyless sigs, SBOM, and provenance attestation 2026-05-06 16:10:03 +01:00
lint.yml ci(bluebuild): pin actions to node20-safe tags 2026-05-06 13:54:12 +01:00