Skip to content

Add checksum verification to BuildKit build and packaging workflows #219

@coderabbitai

Description

@coderabbitai

Summary

Add checksum generation and verification to BuildKit workflows to improve supply chain security.

Background

During review of PR #218, a security concern was identified: the BuildKit packaging workflows download binaries without verifying their integrity. This creates a risk if releases are compromised or corrupted.

Implementation Plan

This enhancement requires two phases:

Phase 1: Generate checksums in build workflow

  • Update the BuildKit build workflow (Weekly BuildKit RISC-V64 Build) to generate checksum files (e.g., SHA256SUMS or checksums.txt)
  • Upload the checksum file as a release asset alongside the binaries
  • Include checksums for: buildkitd, buildctl, and any other artifacts

Phase 2: Verify checksums in packaging workflows

  • Update .github/workflows/build-buildkit-package.yml (Debian packaging) to:
    • Download the checksum file from the release
    • Verify downloaded binaries using sha256sum -c
    • Fail the workflow if verification fails
  • Update .github/workflows/build-buildkit-rpm.yml (RPM packaging) with the same verification logic

References

Priority

Medium - Security enhancement that should be implemented before wider distribution of packages.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions