You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
ci: refactor Docker image build and add provenance attestations
- Replace inline Docker build logic with a reusable workflow for image
build and attestation
- Use `docker/build-push-action@v6` to build and push holod and
holo-bundle images to ghcr.io
- Add provenance attestations using `actions/attest-build-provenance@v2`
- Images are now pushed to ghcr.io with corresponding provenance
metadata
Example verification:
$ gh attestation verify oci://ghcr.io/holo-routing/holod:latest -R holo-routing/holo
Loaded digest
sha256:c3b9a8f7979246c6f2c7e8a214189e56d8b43af1eedb19e0c65703762408f0c7
for oci://ghcr.io/holo-routing/holod:latest
Loaded 1 attestation from GitHub API
The following policy criteria will be enforced:
- Predicate type must match:................
https://slsa.dev/provenance/v1
- Source Repository Owner URI must match:...
https://github.com/holo-routing
- Source Repository URI must match:.........
https://github.com/holo-routing/holo
- Subject Alternative Name must match regex:
(?i)^https://github.com/holo-routing/holo/
- OIDC Issuer must match:...................
https://token.actions.githubusercontent.com
✓ Verification succeeded!
The following 1 attestation matched the policy criteria
- Attestation #1
- Build repo:..... holo-routing/holo
- Build workflow:. .github/workflows/ci.yaml@refs/heads/master
- Signer repo:.... holo-routing/holo
- Signer workflow:
.github/workflows/docker-build-and-attest.yml@refs/heads/master
Closes#80
Signed-off-by: Renato Westphal <[email protected]>
0 commit comments