@@ -178,9 +178,6 @@ jobs:
178
178
pattern : digests-*
179
179
merge-multiple : true
180
180
181
- - name : Checkout repository
182
- uses : actions/checkout@v4
183
-
184
181
# Install the cosign tool
185
182
# https://github.com/sigstore/cosign-installer
186
183
- name : Install cosign
@@ -215,32 +212,32 @@ jobs:
215
212
# type=raw,value={{branch}}-{{date 'YYYYMMDDHHmmss'}}
216
213
217
214
- name : Create manifest list and push
218
- working-directory : ${{ runner.temp }}/digests
215
+ working-directory : ${{ runner.temp }}/digests/${{ matrix.docker_target }}
219
216
run : |
220
217
docker buildx imagetools create $(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") \
221
218
$(printf '${{ env.REGISTRY }}/${{ env.REGISTRY_PATH }}/${{ env.IMAGE_NAME }}-${{ matrix.docker_target }}@sha256:%s ' *)
222
219
223
220
- name : Inspect image
224
221
run : |
225
- docker buildx imagetools inspect ${{ env.REGISTRY_IMAGE }}:${{ steps.meta.outputs.version }}
226
-
227
- # TODO: Implement signature using generated key: https://docs.sigstore.dev/signing/quickstart/#signing-with-a-generated-key
228
-
229
- # Sign the resulting Docker image digest except on PRs.
230
- # This will only write to the public Rekor transparency log when the Docker
231
- # repository is public to avoid leaking data. If you would like to publish
232
- # transparency data even for private images, pass --force to cosign below.
233
- # https://github.com/sigstore/cosign
234
- - name : Sign the published Docker image using GitHub OIDC Token
235
- env :
236
- # https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
237
- TAGS : ${{ steps.meta.outputs.tags }}
238
- DIGEST : ${{ steps.build-and-push.outputs.digest }}
239
- # This step uses the identity token to provision an ephemeral certificate
240
- # against the sigstore community Fulcio instance.
241
- run : |
242
- images=""
243
- for tag in ${TAGS}; do
244
- images+="${tag}@${DIGEST} "
245
- done
246
- cosign sign --yes ${images}
222
+ docker buildx imagetools inspect ${{ env.REGISTRY }}/${{ env.REGISTRY_PATH }}/${{ env.IMAGE_NAME }}-${{ matrix.docker_target }}:${{ steps.meta.outputs.version }}
223
+
224
+ # #TODO: Implement signature using generated key: https://docs.sigstore.dev/signing/quickstart/#signing-with-a-generated-key
225
+ #
226
+ # # Sign the resulting Docker image digest except on PRs.
227
+ # # This will only write to the public Rekor transparency log when the Docker
228
+ # # repository is public to avoid leaking data. If you would like to publish
229
+ # # transparency data even for private images, pass --force to cosign below.
230
+ # # https://github.com/sigstore/cosign
231
+ # - name: Sign the published Docker image using GitHub OIDC Token
232
+ # env:
233
+ # # https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
234
+ # TAGS: ${{ steps.meta.outputs.tags }}
235
+ # DIGEST: ${{ steps.build-and-push.outputs.digest }}
236
+ # # This step uses the identity token to provision an ephemeral certificate
237
+ # # against the sigstore community Fulcio instance.
238
+ # run: |
239
+ # images=""
240
+ # for tag in ${TAGS}; do
241
+ # images+="${tag}@${DIGEST} "
242
+ # done
243
+ # cosign sign --yes ${images}
0 commit comments