Skip to content

Commit 2bd852f

Browse files
committed
Comment out cosign and fix paths
1 parent a58b020 commit 2bd852f

File tree

1 file changed

+23
-26
lines changed

1 file changed

+23
-26
lines changed

.github/workflows/ci-pipeline.yml

Lines changed: 23 additions & 26 deletions
Original file line numberDiff line numberDiff line change
@@ -178,9 +178,6 @@ jobs:
178178
pattern: digests-*
179179
merge-multiple: true
180180

181-
- name: Checkout repository
182-
uses: actions/checkout@v4
183-
184181
# Install the cosign tool
185182
# https://github.com/sigstore/cosign-installer
186183
- name: Install cosign
@@ -215,32 +212,32 @@ jobs:
215212
# type=raw,value={{branch}}-{{date 'YYYYMMDDHHmmss'}}
216213

217214
- name: Create manifest list and push
218-
working-directory: ${{ runner.temp }}/digests
215+
working-directory: ${{ runner.temp }}/digests/${{ matrix.docker_target }}
219216
run: |
220217
docker buildx imagetools create $(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") \
221218
$(printf '${{ env.REGISTRY }}/${{ env.REGISTRY_PATH }}/${{ env.IMAGE_NAME }}-${{ matrix.docker_target }}@sha256:%s ' *)
222219
223220
- name: Inspect image
224221
run: |
225-
docker buildx imagetools inspect ${{ env.REGISTRY_IMAGE }}:${{ steps.meta.outputs.version }}
226-
227-
#TODO: Implement signature using generated key: https://docs.sigstore.dev/signing/quickstart/#signing-with-a-generated-key
228-
229-
# Sign the resulting Docker image digest except on PRs.
230-
# This will only write to the public Rekor transparency log when the Docker
231-
# repository is public to avoid leaking data. If you would like to publish
232-
# transparency data even for private images, pass --force to cosign below.
233-
# https://github.com/sigstore/cosign
234-
- name: Sign the published Docker image using GitHub OIDC Token
235-
env:
236-
# https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
237-
TAGS: ${{ steps.meta.outputs.tags }}
238-
DIGEST: ${{ steps.build-and-push.outputs.digest }}
239-
# This step uses the identity token to provision an ephemeral certificate
240-
# against the sigstore community Fulcio instance.
241-
run: |
242-
images=""
243-
for tag in ${TAGS}; do
244-
images+="${tag}@${DIGEST} "
245-
done
246-
cosign sign --yes ${images}
222+
docker buildx imagetools inspect ${{ env.REGISTRY }}/${{ env.REGISTRY_PATH }}/${{ env.IMAGE_NAME }}-${{ matrix.docker_target }}:${{ steps.meta.outputs.version }}
223+
224+
# #TODO: Implement signature using generated key: https://docs.sigstore.dev/signing/quickstart/#signing-with-a-generated-key
225+
#
226+
# # Sign the resulting Docker image digest except on PRs.
227+
# # This will only write to the public Rekor transparency log when the Docker
228+
# # repository is public to avoid leaking data. If you would like to publish
229+
# # transparency data even for private images, pass --force to cosign below.
230+
# # https://github.com/sigstore/cosign
231+
# - name: Sign the published Docker image using GitHub OIDC Token
232+
# env:
233+
# # https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
234+
# TAGS: ${{ steps.meta.outputs.tags }}
235+
# DIGEST: ${{ steps.build-and-push.outputs.digest }}
236+
# # This step uses the identity token to provision an ephemeral certificate
237+
# # against the sigstore community Fulcio instance.
238+
# run: |
239+
# images=""
240+
# for tag in ${TAGS}; do
241+
# images+="${tag}@${DIGEST} "
242+
# done
243+
# cosign sign --yes ${images}

0 commit comments

Comments
 (0)