Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
5 changes: 1 addition & 4 deletions .github/workflows/build-binary-signed-ghat-malicious.yml
Original file line number Diff line number Diff line change
@@ -1,8 +1,6 @@
name: binary-signed-ghat-malicious

on:
workflow_dispatch:

jobs:
build:
permissions:
Expand All @@ -12,8 +10,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Check out code
uses: actions/checkout@v4

uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4
- name: The malicious step
run: |
echo "# This is a malicious update" >> app.py
Expand Down
4 changes: 1 addition & 3 deletions .github/workflows/build-binary-signed-ghat.yml
Original file line number Diff line number Diff line change
@@ -1,8 +1,6 @@
name: binary-signed-ghat

on:
workflow_dispatch:

jobs:
build:
permissions:
Expand All @@ -12,7 +10,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Check out code
uses: actions/checkout@v4
uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4

# TODO: add that when we support artifacts other than containers
#
Expand Down
4 changes: 1 addition & 3 deletions .github/workflows/build-binary-unsigned.yml
Original file line number Diff line number Diff line change
@@ -1,8 +1,6 @@
name: binary-unsigned

on:
workflow_dispatch:

jobs:
build:
permissions:
Expand All @@ -12,7 +10,7 @@ jobs:
runs-on: ubuntu-latest
steps:
- name: Check out code
uses: actions/checkout@v4
uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4

# TODO: add that when we support artifacts other than containers
#
Expand Down
14 changes: 1 addition & 13 deletions .github/workflows/build-image-signed-cosign-malicious.yml
Original file line number Diff line number Diff line change
@@ -1,47 +1,37 @@
name: image-signed-cosign(latest,daily)-malicious
on:
workflow_dispatch:

env:
REGISTRY: ghcr.io
IMAGE_NAME: ${{ github.repository }}

jobs:
build:

runs-on: ubuntu-latest
permissions:
contents: read
packages: write
id-token: write

steps:
- name: Checkout repository
uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744

- name: The malicious step
run: |
echo "# This is a malicious update" >> app.py

- name: Install Cosign
uses: sigstore/cosign-installer@v3.3.0

uses: sigstore/cosign-installer@9614fae9e5c5eddabb09f90a270fcb487c9f7149 # v3.3.0
- name: Setup Docker buildx
uses: docker/setup-buildx-action@79abd3f86f79a9d68a23c75a09a9a85889262adf

- name: Log into registry ${{ env.REGISTRY }}
uses: docker/login-action@28218f9b04b4f3f62068d7b6ce6ca5b26e35336c
with:
registry: ${{ env.REGISTRY }}
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}

- name: Extract Docker metadata
id: meta
uses: docker/metadata-action@98669ae865ea3cffbcbaa878cf57c20bbf1c6c38
with:
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}

- name: Build and push Docker image
id: build-and-push
uses: docker/build-push-action@ac9327eae2b366085ac7f6a2d02df8aa8ead720a
Expand All @@ -52,8 +42,6 @@ jobs:
labels: ${{ steps.meta.outputs.labels }}
cache-from: type=gha
cache-to: type=gha,mode=max


- name: Sign the published Docker image
env:
DIGEST: ${{ steps.build-and-push.outputs.digest }}
Expand Down
15 changes: 2 additions & 13 deletions .github/workflows/build-image-signed-cosign-static-copied.yml
Original file line number Diff line number Diff line change
@@ -1,53 +1,42 @@
name: image-signed-cosign(static)-copied
on:
workflow_dispatch:

env:
REGISTRY: ghcr.io
IMAGE_NAME: ${{ github.repository }}

jobs:
build:

runs-on: ubuntu-latest
permissions:
contents: read
packages: write
id-token: write

steps:
- name: Checkout repository
uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744

- name: Install Cosign
uses: sigstore/cosign-installer@v3.3.0

uses: sigstore/cosign-installer@9614fae9e5c5eddabb09f90a270fcb487c9f7149 # v3.3.0
- name: Setup Docker buildx
uses: docker/setup-buildx-action@79abd3f86f79a9d68a23c75a09a9a85889262adf

- name: Log into registry ${{ env.REGISTRY }}
uses: docker/login-action@28218f9b04b4f3f62068d7b6ce6ca5b26e35336c
with:
registry: ${{ env.REGISTRY }}
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}

- name: Extract Docker metadata
id: meta
uses: docker/metadata-action@98669ae865ea3cffbcbaa878cf57c20bbf1c6c38
with:
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}

- name: Build and push Docker image
id: build-and-push
uses: docker/build-push-action@ac9327eae2b366085ac7f6a2d02df8aa8ead720a
with:
push: true
tags: ghcr.io/${{ github.repository }}:static
context: .
file : Dockerfile.static


file: Dockerfile.static
- name: Sign the published Docker image
env:
DIGEST: ${{ steps.build-and-push.outputs.digest }}
Expand Down
15 changes: 2 additions & 13 deletions .github/workflows/build-image-signed-cosign-static.yml
Original file line number Diff line number Diff line change
@@ -1,53 +1,42 @@
name: image-signed-cosign(static)
on:
workflow_dispatch:

env:
REGISTRY: ghcr.io
IMAGE_NAME: ${{ github.repository }}

jobs:
build:

runs-on: ubuntu-latest
permissions:
contents: read
packages: write
id-token: write

steps:
- name: Checkout repository
uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744

- name: Install Cosign
uses: sigstore/cosign-installer@v3.3.0

uses: sigstore/cosign-installer@9614fae9e5c5eddabb09f90a270fcb487c9f7149 # v3.3.0
- name: Setup Docker buildx
uses: docker/setup-buildx-action@79abd3f86f79a9d68a23c75a09a9a85889262adf

- name: Log into registry ${{ env.REGISTRY }}
uses: docker/login-action@28218f9b04b4f3f62068d7b6ce6ca5b26e35336c
with:
registry: ${{ env.REGISTRY }}
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}

- name: Extract Docker metadata
id: meta
uses: docker/metadata-action@98669ae865ea3cffbcbaa878cf57c20bbf1c6c38
with:
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}

- name: Build and push Docker image
id: build-and-push
uses: docker/build-push-action@ac9327eae2b366085ac7f6a2d02df8aa8ead720a
with:
push: true
tags: ghcr.io/${{ github.repository }}:static
context: .
file : Dockerfile.static


file: Dockerfile.static
- name: Sign the published Docker image
env:
DIGEST: ${{ steps.build-and-push.outputs.digest }}
Expand Down
13 changes: 1 addition & 12 deletions .github/workflows/build-image-signed-cosign.yml
Original file line number Diff line number Diff line change
@@ -1,43 +1,34 @@
name: image-signed-cosign(latest,daily)
on:
workflow_dispatch:

env:
REGISTRY: ghcr.io
IMAGE_NAME: ${{ github.repository }}

jobs:
build:

runs-on: ubuntu-latest
permissions:
contents: read
packages: write
id-token: write

steps:
- name: Checkout repository
uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744

- name: Install Cosign
uses: sigstore/cosign-installer@v3.3.0

uses: sigstore/cosign-installer@9614fae9e5c5eddabb09f90a270fcb487c9f7149 # v3.3.0
- name: Setup Docker buildx
uses: docker/setup-buildx-action@79abd3f86f79a9d68a23c75a09a9a85889262adf

- name: Log into registry ${{ env.REGISTRY }}
uses: docker/login-action@28218f9b04b4f3f62068d7b6ce6ca5b26e35336c
with:
registry: ${{ env.REGISTRY }}
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}

- name: Extract Docker metadata
id: meta
uses: docker/metadata-action@98669ae865ea3cffbcbaa878cf57c20bbf1c6c38
with:
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}

- name: Build and push Docker image
id: build-and-push
uses: docker/build-push-action@ac9327eae2b366085ac7f6a2d02df8aa8ead720a
Expand All @@ -48,8 +39,6 @@ jobs:
labels: ${{ steps.meta.outputs.labels }}
cache-from: type=gha
cache-to: type=gha,mode=max


- name: Sign the published Docker image
env:
DIGEST: ${{ steps.build-and-push.outputs.digest }}
Expand Down
10 changes: 2 additions & 8 deletions .github/workflows/build-image-signed-ghat-malicious.yml
Original file line number Diff line number Diff line change
@@ -1,41 +1,35 @@
name: image-signed-ghat(latest)-malicious
on:
workflow_dispatch:

jobs:
build:
runs-on: ubuntu-latest
permissions:
id-token: write
packages: write
contents: write

steps:
- name: Checkout repository
uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744

- name: The malicious step
run: |
make build-malicious-image

- name: Log into ghcr.io
uses: docker/login-action@28218f9b04b4f3f62068d7b6ce6ca5b26e35336c
with:
registry: ghcr.io
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}

- name: Build and push image
id: push-step
uses: docker/build-push-action@ac9327eae2b366085ac7f6a2d02df8aa8ead720a
with:
push: true
tags: ghcr.io/${{ github.repository }}:latest
context: .

- name: Attest image
uses: github-early-access/generate-build-provenance@main
uses: github-early-access/generate-build-provenance@3bfd91bfee170b89e21d845828cbe80581656edd # main
with:
subject-name: ghcr.io/${{ github.repository }}
subject-digest: ${{ steps.push-step.outputs.digest }}
push-to-registry: true
push-to-registry: true
9 changes: 2 additions & 7 deletions .github/workflows/build-image-signed-ghat-static-copied.yml
Original file line number Diff line number Diff line change
@@ -1,37 +1,32 @@
name: image-signed-ghat(static)-copied
on:
workflow_dispatch:

jobs:
build:
runs-on: ubuntu-latest
permissions:
id-token: write
packages: write
contents: write

steps:
- name: Checkout repository
uses: actions/checkout@f43a0e5ff2bd294095638e18286ca9a3d1956744

- name: Log into ghcr.io
uses: docker/login-action@28218f9b04b4f3f62068d7b6ce6ca5b26e35336c
with:
registry: ghcr.io
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}

- name: Build and push image
id: push-step
uses: docker/build-push-action@ac9327eae2b366085ac7f6a2d02df8aa8ead720a
with:
push: true
tags: ghcr.io/${{ github.repository }}:static
context: .
file : Dockerfile.static

file: Dockerfile.static
- name: Attest image
uses: github-early-access/generate-build-provenance@main
uses: github-early-access/generate-build-provenance@3bfd91bfee170b89e21d845828cbe80581656edd # main
with:
subject-name: ghcr.io/${{ github.repository }}
subject-digest: ${{ steps.push-step.outputs.digest }}
Expand Down
Loading