veilor-os/.github/workflows/build-bluebuild.yml
s8n f2e36bfead ci(bluebuild): pin blue-build/github-action to commit SHA
Replace @v1 with @24d146df25adc2cf579e918efe2d9bff6adea408 (the commit
v1 currently resolves to). Tag pins on third-party actions are mutable
— a maintainer or attacker can re-point v1 at a malicious commit and
silently change what runs on every push.

Trailing comment '# v1' preserves human readability for future bumps.

Refs: 9-agent CI hardening wave (agent 8), 2026-05-05.
2026-05-06 10:32:13 +01:00

99 lines
3.4 KiB
YAML

name: Build veilor-os OCI (BlueBuild)
# v0.7 spike — builds the bootable OCI image used by the bootstrap
# kickstart's `ostreecontainer` directive. Active only on the
# `v0.7-bluebuild-spike` branch until the spike passes success
# criteria (see bluebuild/README.md).
#
# Reference: https://blue-build.org/how-to/setup-build-action/
#
# Security note: all `${{ }}` interpolations in this file are restricted
# to vetted GitHub-controlled values (repository_owner, run number,
# secrets, signed action outputs). No `github.event.issue.title` or
# similar untrusted-user-input is read in run blocks.
on:
push:
branches: [v0.7-bluebuild-spike]
paths:
- 'bluebuild/**'
- 'overlay/**'
- 'assets/**'
- 'scripts/**'
- '.github/workflows/build-bluebuild.yml'
pull_request:
branches: [main, v0.7-bluebuild-spike]
schedule:
# Rebuild weekly so we pick up upstream secureblue + Fedora updates.
- cron: '0 6 * * 1'
workflow_dispatch:
permissions:
contents: read
jobs:
build:
name: Build + sign + push OCI
runs-on: ubuntu-24.04
timeout-minutes: 30
permissions:
contents: read
packages: write # push to ghcr.io/veilor-org/veilor-os
id-token: write # cosign keyless signing via Sigstore
attestations: write # SLSA build provenance
env:
OCI_IMAGE: ghcr.io/${{ github.repository_owner }}/veilor-os
OCI_TAG: latest
steps:
- name: Checkout
uses: actions/checkout@v4
- name: Free up disk
run: |
sudo rm -rf /opt/hostedtoolcache /usr/share/dotnet /usr/local/lib/android
sudo apt-get clean
df -h
# BlueBuild action wraps: image build, cosign sign (keyless via
# Sigstore), GHCR push. Pinned to a commit SHA per CI hardening
# agent 8 (2026-05-05 wave). The trailing comment records the
# tag the SHA resolved from, so future bumps stay legible.
- name: Build + push veilor-os OCI
id: bluebuild
uses: blue-build/github-action@24d146df25adc2cf579e918efe2d9bff6adea408 # v1
with:
recipe: bluebuild/recipe.yml
registry_token: ${{ secrets.GITHUB_TOKEN }}
pr_event_number: ${{ github.event.number }}
maximize_build_space: true
- name: Smoke-test OCI image
if: github.event_name == 'push' || github.event_name == 'workflow_dispatch'
run: |
podman pull "$OCI_IMAGE:$OCI_TAG"
podman run --rm "$OCI_IMAGE:$OCI_TAG" /bin/bash -c '
set -e
echo "-- os-release"
head -5 /etc/os-release
echo "-- sudo present"; which sudo
echo "-- mullvad-browser present"; which mullvad-browser
echo "-- yggdrasil present"; which yggdrasil
echo "-- tailscale present"; which tailscale
'
- name: SBOM (SPDX)
if: github.event_name == 'push' || github.event_name == 'workflow_dispatch'
uses: anchore/sbom-action@v0
with:
image: ${{ env.OCI_IMAGE }}:${{ env.OCI_TAG }}
format: spdx-json
output-file: veilor-os-oci.spdx.json
- name: Build provenance attestation
if: github.event_name == 'push' || github.event_name == 'workflow_dispatch'
uses: actions/attest-build-provenance@v2
with:
subject-name: ${{ env.OCI_IMAGE }}
subject-digest: ${{ steps.bluebuild.outputs.digest }}