@@ -229,6 +229,7 @@ jobs:
229
229
# generate Docker tags based on the following events/attributes
230
230
tags : |
231
231
type=sha
232
+ type=sha,suffix=-test
232
233
# type=raw,value={{branch}}-latest
233
234
# type=raw,value={{branch}}-{{date 'YYYYMMDDHHmmss'}}
234
235
@@ -242,23 +243,23 @@ jobs:
242
243
run : |
243
244
docker buildx imagetools inspect ${{ env.REGISTRY }}/${{ env.REGISTRY_PATH }}/${{ env.IMAGE_NAME }}-${{ matrix.docker_target }}:${{ steps.meta.outputs.version }}
244
245
245
- # #TODO: Implement signature using generated key: https://docs.sigstore.dev/signing/quickstart/#signing-with-a-generated-key
246
- #
247
- # # Sign the resulting Docker image digest except on PRs.
248
- # # This will only write to the public Rekor transparency log when the Docker
249
- # # repository is public to avoid leaking data. If you would like to publish
250
- # # transparency data even for private images, pass --force to cosign below.
251
- # # https://github.com/sigstore/cosign
252
- # - name: Sign the published Docker image using GitHub OIDC Token
253
- # env:
254
- # # https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
255
- # TAGS: ${{ steps.meta.outputs.tags }}
256
- # DIGEST: ${{ steps.build-and-push.outputs.digest }}
257
- # # This step uses the identity token to provision an ephemeral certificate
258
- # # against the sigstore community Fulcio instance.
259
- # run: |
260
- # images=""
261
- # for tag in ${TAGS}; do
262
- # images+="${tag}@${DIGEST} "
263
- # done
264
- # cosign sign --yes ${images}
246
+ # TODO: Implement signature using generated key: https://docs.sigstore.dev/signing/quickstart/#signing-with-a-generated-key
247
+
248
+ # Sign the resulting Docker image digest except on PRs.
249
+ # This will only write to the public Rekor transparency log when the Docker
250
+ # repository is public to avoid leaking data. If you would like to publish
251
+ # transparency data even for private images, pass --force to cosign below.
252
+ # https://github.com/sigstore/cosign
253
+ - name : Sign the published Docker image using GitHub OIDC Token
254
+ env :
255
+ # https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
256
+ TAGS : ${{ steps.meta.outputs.tags }}
257
+ DIGEST : ${{ steps.build-and-push.outputs.digest }}
258
+ # This step uses the identity token to provision an ephemeral certificate
259
+ # against the sigstore community Fulcio instance.
260
+ run : |
261
+ images=""
262
+ for tag in ${TAGS}; do
263
+ images+="${tag}@${DIGEST} "
264
+ done
265
+ cosign sign --yes ${images}
0 commit comments