Legacy note: this document describes historical validation paths for the deprecated standalone action repository.
The repository now includes two real-runner managed-mode paths:
.github/workflows/ci.ymlrunsLive Managed Validationon pushes and manual dispatches whenTRUSTSIGNAL_API_KEYis configured..github/workflows/live-test.ymlruns nightly and on manual dispatch using the publishedTrustSignal-dev/TrustSignal-Verify-Artifact@v0.2.0action.
Both workflows target the production endpoint:
https://api.trustsignal.dev
Add this repository secret before expecting live validation to run:
TRUSTSIGNAL_API_KEY
The GitHub repository secret is only half of the setup. The API backend must also be configured to accept that same key.
Required API service configuration:
API_KEYSincludes the exact same key value stored inTRUSTSIGNAL_API_KEYAPI_KEY_SCOPESgrants that same key at leastverify|read
Example:
API_KEYS=your-live-key
API_KEY_SCOPES=your-live-key=verify|read
After changing backend environment variables, redeploy the API service before rerunning the workflow.
- The workflow builds a real
.tgzrelease archive on a GitHub-hosted runner before verification. - The action step completes on a GitHub-hosted runner.
verification_statusisverified.sha256is populated for the archive that was verified.receipt_idis populated.verification_idis populated when the API returns it.
- Local validation still uses the repository mock fetch harness. That keeps unit-style coverage deterministic.
- Live validation is intentionally gated behind a secret so pull requests and forks do not attempt production API calls.
- The nightly workflow now mirrors the demo flow by verifying a real archive instead of a placeholder text file.