Verify Rakurai Scheduler Binary Attestation
The Rakurai scheduler binary comes with GitHub artifact attestation, providing cryptographic proof of its build provenance and integrity.
Table of Contents
- GitHub Artifact Attestations
- Supply-chain Levels for Software Artifacts (SLSA) Compliance
- Verify Rakurai scheduler binary attestation with the GitHub CLI
GitHub Artifact Attestations
Artifact attestations enable the creation of unfalsifiable provenance and integrity guarantees for software. In turn, software consumers can verify where and how the software was built. GitHub's artifact attestations create cryptographically signed claims that establish build provenance and include the following information:
- A link to the workflow associated with the artifact
- The repository, organization, environment, commit SHA, and triggering event for the artifact
For more information, see Artifact attestations.
Supply-chain Levels for Software Artifacts (SLSA) Compliance
GitHub artifact attestations are SLSA compliant. The SLSA framework is an industry standard used to evaluate supply chain security. This gives you confidence that binary hasn’t been tampered with after the build and can be securely traced back to its source. For more information, see SLSA.
Verify Rakurai scheduler binary attestation with the GitHub CLI
Rakurai generates an attestation for every release. The following steps show how to verify it using the GitHub CLI.
Prerequisites
- GitHub CLI installed
Verification
To verify the Rakurai scheduler binary, use the following GitHub CLI command.
Note: This command assumes you are in an online environment. If you are in an offline or air-gapped environment, see Verifying attestations offline.
gh attestation verify PATH/TO/RAKURAI/SCHEDULER/BINARY -R rakurai-io/rakurai-validator
Results
Check the command output to determine the result. If verification is successful, you will see a message like ✓ Verification succeeded!. If verification fails, you will see an error message such as ✗ Loading attestations from GitHub API failed.
Successful verification
You’ll see the enforced policy, a checkmark, and one or more matched attestations summarizing the build and signer. Example:
$ gh attestation verify ./PATH/TO/BINARY -R rakurai-io/rakurai-validator Loaded digest sha256:<ARTIFACT_DIGEST> for file://... Loaded <N> attestations from GitHub API Policy criteria enforced: - Predicate type: https://slsa.dev/provenance/v1 - Source repository owner: https://github.com/rakurai-io - Source repository: https://github.com/rakurai-io/rakurai-validator - Subject Alternative Name: ^https://github.com/rakurai-io/rakurai-validator/ - OIDC issuer: https://token.actions.githubusercontent.com ✓ Verification succeeded! Matched attestations: - Attestation #<NUMBER> - Build repo: rakurai-io/rakurai-validator - Build workflow: .github/workflows/<WORKFLOW_FILE>@refs/tags/<TAG> - Signer repo: rakurai-io/rakurai-validator - Signer workflow: .github/workflows/<WORKFLOW_FILE>@refs/tags/<TAG>
Failed verification
A failure result means no attestation could be found (HTTP 404), and the binary’s authenticity could not be confirmed. Example:
$ gh attestation verify ./PATH/TO/BINARY -R rakurai-io/rakurai-validator Loaded digest sha256:<artifact-digest> for file://... ✗ Loading attestations from GitHub API failed Error: HTTP 404: Not Found