From 244c10f6341e84c0581f8b4d6c2f0a690f60cab6 Mon Sep 17 00:00:00 2001 From: Lauri Gates Date: Thu, 22 Aug 2024 20:56:25 +0300 Subject: [PATCH] Update cesium-dashboard-image.yml --- .github/workflows/cesium-dashboard-image.yml | 55 ++++++-------------- 1 file changed, 15 insertions(+), 40 deletions(-) diff --git a/.github/workflows/cesium-dashboard-image.yml b/.github/workflows/cesium-dashboard-image.yml index 9a9986f..3d146b2 100644 --- a/.github/workflows/cesium-dashboard-image.yml +++ b/.github/workflows/cesium-dashboard-image.yml @@ -12,39 +12,27 @@ env: IMAGE_NAME: forumviriumhelsinki/cesium-dashboard jobs: - build: + build-and-push: runs-on: ubuntu-latest + permissions: contents: read packages: write - # This is used to complete the identity challenge - # with sigstore/fulcio when running outside of PRs. - id-token: write steps: - - name: Checkout repository - uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 #v4.1.1 - - # Install the cosign tool except on PR - # https://github.com/sigstore/cosign-installer - - name: Install cosign - if: github.event_name != 'pull_request' - uses: sigstore/cosign-installer@e1523de7571e31dbe865fd2e80c5c7c23ae71eb4 #v3.4.0 - with: - cosign-release: 'v2.2.3' + - name: Set up QEMU + uses: docker/setup-qemu-action@v3 - # Set up BuildKit Docker container builder to be able to build - # multi-platform images and export cache - # https://github.com/docker/setup-buildx-action - name: Set up Docker Buildx - uses: docker/setup-buildx-action@2b51285047da1547ffb1b2203d8be4c0af6b1f20 # v3.2.0 + uses: docker/setup-buildx-action@v3 - # Login against a Docker registry except on PR + - uses: actions/checkout@v4 + + # Login against a Docker registry # https://github.com/docker/login-action - name: Log into registry ${{ env.REGISTRY }} - if: github.event_name != 'pull_request' - uses: docker/login-action@e92390c5fb421da1463c202d546fed0ec5c39f20 # v3.1.0 + uses: docker/login-action@v3 with: registry: ${{ env.REGISTRY }} username: ${{ github.actor }} @@ -54,35 +42,22 @@ jobs: # https://github.com/docker/metadata-action - name: Extract Docker metadata id: meta - uses: docker/metadata-action@8e5442c4ef9f78752691e2d8f8d19755c6f78e81 # v5.5.1 + uses: docker/metadata-action@v5 with: images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }} - # Build and push Docker image with Buildx (don't push on PR) + # Build and push Docker image # https://github.com/docker/build-push-action - name: Build and push Docker image - id: build-and-push - uses: docker/build-push-action@2cdde995de11925a030ce8070c3d77a52ffcf1c0 # v5.3.0 + uses: docker/build-push-action@v6 with: + # Don't push on pull requests push: ${{ github.event_name != 'pull_request' }} + platforms: linux/amd64,linux/arm64 tags: ${{ steps.meta.outputs.tags }} labels: ${{ steps.meta.outputs.labels }} + # Use GitHub actions cache cache-from: type=gha cache-to: type=gha,mode=max # Workaround to prevent container image metadata containing unknown/unknown OS arch provenance: false - - # Sign the resulting Docker image digest except on PRs. - # This will only write to the public Rekor transparency log when the Docker - # repository is public to avoid leaking data. If you would like to publish - # transparency data even for private images, pass --force to cosign below. - # https://github.com/sigstore/cosign - - name: Sign the published Docker image - if: ${{ github.event_name != 'pull_request' }} - env: - # https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable - TAGS: ${{ steps.meta.outputs.tags }} - DIGEST: ${{ steps.build-and-push.outputs.digest }} - # This step uses the identity token to provision an ephemeral certificate - # against the sigstore community Fulcio instance. - run: echo "${TAGS}" | xargs -I {} cosign sign --yes {}@${DIGEST}