feat: add BCR publish workflow

Includes pre-built protoc integrity hashes in the release artifact

tested on my fork of protobuf: https://github.com/alexeagle/protobuf/releases/tag/v0.1000.10
diff --git a/.bcr/source.template.json b/.bcr/source.template.json
index ce4bbcc..d25b066 100644
--- a/.bcr/source.template.json
+++ b/.bcr/source.template.json
@@ -1,5 +1,5 @@
 {
   "integrity": "**leave this alone**",
   "strip_prefix": "{REPO}-{VERSION}",
-  "url": "https://github.com/{OWNER}/{REPO}/releases/download/{TAG}/{REPO}-{VERSION}.zip"
+  "url": "https://github.com/{OWNER}/{REPO}/releases/download/{TAG}/{REPO}-{VERSION}.tar.gz"
 }
diff --git a/.gitattributes b/.gitattributes
new file mode 100644
index 0000000..99fc84c
--- /dev/null
+++ b/.gitattributes
@@ -0,0 +1,4 @@
+# Configuration for 'git archive'
+# see https://git-scm.com/docs/git-archive/2.40.0#ATTRIBUTES
+# Don't include compatibility folder in the distribution artifact, just to reduce size
+compatibility/ export-ignore
\ No newline at end of file
diff --git a/.github/workflows/publish_to_bcr.yaml b/.github/workflows/publish_to_bcr.yaml
new file mode 100644
index 0000000..d20dc19
--- /dev/null
+++ b/.github/workflows/publish_to_bcr.yaml
@@ -0,0 +1,36 @@
+# Publish new releases to Bazel Central Registry.
+name: Publish to BCR
+on:
+  # Run the publish workflow after a successful release
+  # Will be triggered from the release.yaml workflow
+  workflow_call:
+    inputs:
+      tag_name:
+        required: true
+        type: string
+    secrets:
+      # This token should be owned by https://github.com/protobuf-team-bot
+      BCR_PUBLISH_TOKEN:
+        required: true
+  # In case of problems, let release engineers retry by manually dispatching
+  # the workflow from the GitHub UI
+  workflow_dispatch:
+    inputs:
+      tag_name:
+        description: git tag being released
+        required: true
+        type: string
+jobs:
+  publish:
+    uses: bazel-contrib/publish-to-bcr/.github/workflows/publish.yaml@v1.0.0
+    with:
+      tag_name: ${{ inputs.tag_name }}
+      # GitHub repository which is a fork of the upstream where the Pull Request will be opened.
+      registry_fork: protocolbuffers/bazel-central-registry
+    permissions:
+      attestations: write
+      contents: write
+      id-token: write
+    secrets:
+      # Necessary to push to the BCR fork, and to open a pull request against a registry
+      publish_token: ${{ secrets.BCR_PUBLISH_TOKEN }}
diff --git a/.github/workflows/release_bazel_module.yaml b/.github/workflows/release_bazel_module.yaml
new file mode 100644
index 0000000..ca7acf7
--- /dev/null
+++ b/.github/workflows/release_bazel_module.yaml
@@ -0,0 +1,30 @@
+# Prepare a release specifically for Bazel users, including a pre-built protoc.
+name: Bazel Release
+on:
+  # Can be triggered from the GitHub Actions ui, using the "Run workflow" button on
+  # https://github.com/protocolbuffers/protobuf/actions/workflows/release_bazel_module.yaml
+  workflow_dispatch:
+    inputs:
+      tag_name:
+        description: git tag that has the protoc release artifact
+        required: true
+        type: string
+permissions:
+  id-token: write
+  attestations: write
+  contents: write
+jobs:
+  release:
+    uses: bazel-contrib/.github/.github/workflows/release_ruleset.yaml@v7.2.3
+    with:
+      release_files: protobuf-*.tar.gz
+      prerelease: false
+      tag_name: ${{ inputs.tag_name || github.ref_name }}
+      bazel_test_command: bazel query @com_google_protobuf//:protoc
+  publish:
+    needs: release
+    uses: ./.github/workflows/publish_to_bcr.yaml
+    with:
+      tag_name: ${{ inputs.tag_name || github.ref_name }}
+    secrets:
+      BCR_PUBLISH_TOKEN: ${{ secrets.BCR_PUBLISH_TOKEN }}
\ No newline at end of file
diff --git a/.github/workflows/release_prep.sh b/.github/workflows/release_prep.sh
new file mode 100755
index 0000000..cd7c9eb
--- /dev/null
+++ b/.github/workflows/release_prep.sh
@@ -0,0 +1,42 @@
+#!/usr/bin/env bash
+# NB: this file must be named release_prep.sh because the attestation generation doesn't trust user control.
+# see https://github.com/bazel-contrib/.github/blob/v7.2.3/.github/workflows/release_ruleset.yaml#L33-L45
+set -o errexit -o nounset -o pipefail
+
+# Argument provided by reusable workflow caller, see
+# https://github.com/bazel-contrib/.github/blob/v7.2.3/.github/workflows/release_ruleset.yaml#L104
+TAG=$1
+# HACK during debugging, to allow us to fetch older release artifacts.
+RELEASE_ARTIFACT_TAG=v32.0
+PREFIX="protobuf-${TAG:1}"
+ARCHIVE="$PREFIX.tar.gz"
+ARCHIVE_TMP=$(mktemp)
+INTEGRITY_FILE=${PREFIX}/bazel/private/prebuilt_tool_integrity.bzl
+
+# NB: configuration for 'git archive' is in /.gitattributes
+git archive --format=tar --prefix=${PREFIX}/ ${TAG} > $ARCHIVE_TMP
+############
+# Patch up the archive to have integrity hashes for built binaries that we downloaded in the GHA workflow.
+# Now that we've run `git archive` we are free to pollute the working directory.
+
+# Delete the placeholder file
+tar --file $ARCHIVE_TMP --delete $INTEGRITY_FILE
+
+mkdir -p ${PREFIX}/bazel/private
+cat >${INTEGRITY_FILE} <<EOF
+"Generated during release by release_prep.sh"
+
+RELEASED_BINARY_INTEGRITY = $(
+curl -s https://api.github.com/repos/protocolbuffers/protobuf/releases/tags/${RELEASE_ARTIFACT_TAG} \
+  | jq 'reduce .assets[] as $a ({}; . + { ($a.name): ($a.digest | sub("^sha256:"; "")) })'
+)
+EOF
+
+# Append that generated file back into the archive
+tar --file $ARCHIVE_TMP --append ${INTEGRITY_FILE}
+
+# END patch up the archive
+############
+
+gzip < $ARCHIVE_TMP > $ARCHIVE
+SHA=$(shasum -a 256 $ARCHIVE | awk '{print $1}')
diff --git a/bazel/private/prebuilt_tool_integrity.bzl b/bazel/private/prebuilt_tool_integrity.bzl
new file mode 100644
index 0000000..1965279
--- /dev/null
+++ b/bazel/private/prebuilt_tool_integrity.bzl
@@ -0,0 +1,21 @@
+
+"""Release binary integrity hashes.
+
+This file contents are entirely replaced during release publishing, by .github/workflows/release_prep.sh
+so that the integrity of the prebuilt tools is included in the release artifact.
+
+The checked in content is only here to allow load() statements in the sources to resolve.
+"""
+
+# Create a mapping for every tool name to the hash of /dev/null
+NULLSHA = "e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855"
+RELEASED_BINARY_INTEGRITY = {
+    "-".join([
+        "protoc",
+        os,
+        arch,
+    ]): NULLSHA
+    for [os, arch] in {
+        "linux": ["aarch_64", "x86_64"],
+    }
+}
\ No newline at end of file