-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add image attestation workflow step #5158
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: Dan Urson <[email protected]>
Signed-off-by: Dan Urson <[email protected]>
Looks like this needs some additional permissions per step one of the action's docs. |
Signed-off-by: Dan Urson <[email protected]>
I can't see the vuln that Fossa's complaining about. @nitrocode can you take a look? |
Signed-off-by: Dan Urson <[email protected]>
Per @robertchrk, reference `image-name@digest` instead of `name` Co-authored-by: Robert Kugler <[email protected]> Signed-off-by: Dan Urson <[email protected]>
Co-authored-by: Robert Kugler <[email protected]> Signed-off-by: Dan Urson <[email protected]>
Signed-off-by: Dan Urson <[email protected]>
Thanks for the contribution! Could you test this out in your fork by merging your |
the vulnerbility issue should be fixed per #5165 |
Co-authored-by: RB <[email protected]> Signed-off-by: Rui Chen <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
break attestation into its own workflow Signed-off-by: Dan Urson <[email protected]> add permissions back to attestation workflow Signed-off-by: Dan Urson <[email protected]> delete independent attestation wf it's supposed to be contained in the build wf per github best practices Signed-off-by: Dan Urson <[email protected]> add back modified build workflow contains updated attestation step Signed-off-by: Dan Urson <[email protected]> aparently the tag is the path wtf Signed-off-by: Dan Urson <[email protected]> try again with the bare repo name as the path Signed-off-by: Dan Urson <[email protected]> Test Signed-off-by: Dan Urson <[email protected]> Co-authored-by: Robert Kugler <[email protected]> Fix digest Signed-off-by: Dan Urson <[email protected]> Co-authored-by: Robert Kugler <[email protected]> Fix subject name Signed-off-by: Dan Urson <[email protected]> Co-authored-by: Robert Kugler <[email protected]> Try variable Signed-off-by: Dan Urson <[email protected]> Co-authored-by: Robert Kugler <[email protected]>
@nitrocode @chenrui333 Friends, thank you for your patience. We conducted some additional tests and were able to successfully sign/attest to an image in my fork. I would appreciate it if you could review the most recent commit here, and give it a maintainer-grade 👍 if you're okay with it. |
Signed-off-by: Dan Urson <[email protected]>
Signed-off-by: Dan Urson <[email protected]>
Signed-off-by: Dan Urson <[email protected]>
Signed-off-by: Dan Urson <[email protected]>
@jamengual ok - it's still failing, but that's expected. it's because we're hitting this issue in the attest-build-provenance action - tl;dr, the action won't run if it's run as part of a merge from a fork, the merge has to be completed from a branch in the same repo. in my fork, the attestation works on the latest build. are you comfortable approving a merge with this in mind? |
what
why
tests
cosign
run was successful.references