@@ -178,9 +178,6 @@ jobs:
178178 pattern : digests-*
179179 merge-multiple : true
180180
181- - name : Checkout repository
182- uses : actions/checkout@v4
183-
184181 # Install the cosign tool
185182 # https://github.com/sigstore/cosign-installer
186183 - name : Install cosign
@@ -215,32 +212,32 @@ jobs:
215212# type=raw,value={{branch}}-{{date 'YYYYMMDDHHmmss'}}
216213
217214 - name : Create manifest list and push
218- working-directory : ${{ runner.temp }}/digests
215+ working-directory : ${{ runner.temp }}/digests/${{ matrix.docker_target }}
219216 run : |
220217 docker buildx imagetools create $(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") \
221218 $(printf '${{ env.REGISTRY }}/${{ env.REGISTRY_PATH }}/${{ env.IMAGE_NAME }}-${{ matrix.docker_target }}@sha256:%s ' *)
222219
223220 - name : Inspect image
224221 run : |
225- docker buildx imagetools inspect ${{ env.REGISTRY_IMAGE }}:${{ steps.meta.outputs.version }}
226-
227- # TODO: Implement signature using generated key: https://docs.sigstore.dev/signing/quickstart/#signing-with-a-generated-key
228-
229- # Sign the resulting Docker image digest except on PRs.
230- # This will only write to the public Rekor transparency log when the Docker
231- # repository is public to avoid leaking data. If you would like to publish
232- # transparency data even for private images, pass --force to cosign below.
233- # https://github.com/sigstore/cosign
234- - name : Sign the published Docker image using GitHub OIDC Token
235- env :
236- # https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
237- TAGS : ${{ steps.meta.outputs.tags }}
238- DIGEST : ${{ steps.build-and-push.outputs.digest }}
239- # This step uses the identity token to provision an ephemeral certificate
240- # against the sigstore community Fulcio instance.
241- run : |
242- images=""
243- for tag in ${TAGS}; do
244- images+="${tag}@${DIGEST} "
245- done
246- cosign sign --yes ${images}
222+ docker buildx imagetools inspect ${{ env.REGISTRY }}/${{ env.REGISTRY_PATH }}/${{ env.IMAGE_NAME }}-${{ matrix.docker_target }}:${{ steps.meta.outputs.version }}
223+
224+ # #TODO: Implement signature using generated key: https://docs.sigstore.dev/signing/quickstart/#signing-with-a-generated-key
225+ #
226+ # # Sign the resulting Docker image digest except on PRs.
227+ # # This will only write to the public Rekor transparency log when the Docker
228+ # # repository is public to avoid leaking data. If you would like to publish
229+ # # transparency data even for private images, pass --force to cosign below.
230+ # # https://github.com/sigstore/cosign
231+ # - name: Sign the published Docker image using GitHub OIDC Token
232+ # env:
233+ # # https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable
234+ # TAGS: ${{ steps.meta.outputs.tags }}
235+ # DIGEST: ${{ steps.build-and-push.outputs.digest }}
236+ # # This step uses the identity token to provision an ephemeral certificate
237+ # # against the sigstore community Fulcio instance.
238+ # run: |
239+ # images=""
240+ # for tag in ${TAGS}; do
241+ # images+="${tag}@${DIGEST} "
242+ # done
243+ # cosign sign --yes ${images}
0 commit comments