[ci] Dont sign builds originating from anything other than facebook/react #32738
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
We now generate attestations in
process_artifacts_combined
so we can verify the provenance of the build later in other workflows. However, this requireswrite
permissions forid-token
andattestations
so PRs from forks cannot generate this attestation.To get around this, I added a
--no-verify
flag to scripts/release/download-experimental-build.js. This flag is only passed inruntime_build_and_test.yml
for the sizebot job, since 1) the workflow runs in thepull_request
trigger which has read-only permissions, and 2) the downloaded artifact is only used for sizebot calculation, and not actually used.The flag is explicitly not passed in
runtime_commit_artifacts.yml
since there we actually use the artifact internally. This is fine as once a PR lands on main, it will then run the build on that new commit and generate an attestation.Stack created with Sapling. Best reviewed with ReviewStack.