Release Integrity
Release Integrity
Release checks
- Deterministic test gates in release workflow.
- Contract and scenario validation before artifact generation.
- Node24-ready action refs on the release path for all remediable workflow helpers, enforced by
make lint-fast. - SBOM generation and vulnerability scanning in release pipeline.
- Exact release scanner/signing versions are pinned in CI and checked by local/CI hygiene gates.
CHANGELOG.mdrelease-note entries finalized before tag publication withscripts/finalize_release_changelog.py, and tag builds verify them withscripts/validate_release_changelog.py.- Current bounded release-path exceptions are explicit and reviewed during every runtime uplift:
Homebrew/actions/setup-homebrew@cced187498280712e078aaba62dc13a3e9cd80bfanchore/sbom-action@v0anchore/scan-action@v4
Command anchors
make lint-fast
python3 scripts/resolve_release_version.py --json
python3 scripts/finalize_release_changelog.py --json
python3 scripts/validate_release_changelog.py --release-version v1.0.0 --json
go test ./... -count=1
make test-contracts
scripts/validate_contracts.sh
make test-release-smokeWorkflow rerun evidence
After changing release or docs workflow refs, rerun the affected workflow class on the branch and confirm the previous Node20 deprecation warning is gone for the upgraded refs:
gh workflow run release.yml --ref <branch>
gh workflow run docs.yml --ref <branch>
gh run watch --repo Clyra-AI/wrkr <run-id>If a release-path helper still lacks a published Node24-ready upstream release, treat it as a bounded exception, document it in the same PR, and do not widen that exception set silently.
Install-path UAT (release-candidate)
Run install-path UAT locally before cutting a release tag:
Treat README.md, this page, and docs/install/minimal-dependencies.md as the shared install and release-parity contract: Homebrew, pinned Go install, wrkr version --json verification, and optional secondary @latest convenience guidance.
# Full local gate set + source/release/homebrew-path checks
scripts/test_uat_local.sh
# Fast smoke lane used by release CI job
scripts/test_uat_local.sh --skip-global-gates
# Validate exact public install commands (brew + pinned go install) for a published tag
scripts/test_uat_local.sh --release-version v1.0.0 --brew-formula Clyra-AI/tap/wrkrChangelog finalization
Before tagging a release, resolve the next version from ## [Unreleased], then finalize the changelog and validate that the prepared versioned section matches the intended tag:
python3 scripts/resolve_release_version.py --json
python3 scripts/finalize_release_changelog.py --json
python3 scripts/validate_release_changelog.py --release-version v1.0.0 --jsonThe finalizer promotes releasable Unreleased entries into ## [vX.Y.Z] - YYYY-MM-DD, adds a hidden semver hint for CI validation, and resets Unreleased to the canonical empty template so the next release only considers new entries. Publish that changelog update through a short-lived release-prep PR before creating the tag; the tag workflow validates the changelog content from the tagged commit itself.
For the full changelog ownership model, planning/implementation handoff, and file/script reference, see `docs/trust/changelog-and-release-versioning.md`.
After any public install path, verify the installed CLI deterministically:
wrkr version --jsonOperational note
Consumers should verify published release checksums and provenance metadata before promotion.
Maintainers should treat changelog updates as release-gating documentation work, not an optional follow-up.
When using wrkr verify --chain --json as a release/promotion gate, inspect chain.verification_mode and chain.authenticity_status in addition to exit code 0; chain_only/unavailable is an explicit structural-only result, not authenticated proof verification.
Q&A
Which checks should pass before trusting a Wrkr release?
Deterministic test gates, contract validation, Node24 runtime policy checks, and integrity outputs (checksums/provenance) should all pass before promotion.
How do I verify artifact integrity after download?
Validate published checksums and provenance metadata against the release artifact you intend to promote.
Do docs-site development dependency advisories affect Wrkr runtime guarantees?
Wrkr runtime guarantees are tied to the Go CLI contract surfaces. Docs-site advisories should still be tracked, and production/runtime audit gates should remain green.