From 8477f4584d398f4d4ea24d16908173b055a3c772 Mon Sep 17 00:00:00 2001 From: Ismo Vuorinen Date: Sat, 8 Feb 2025 23:38:33 +0200 Subject: [PATCH] chore(ci): try to fix pipeline --- .github/workflows/ci.yml | 4 +- .github/workflows/docker-publish.yml | 97 ---------------------------- 2 files changed, 2 insertions(+), 99 deletions(-) delete mode 100644 .github/workflows/docker-publish.yml diff --git a/.github/workflows/ci.yml b/.github/workflows/ci.yml index 68d7b10..014a69c 100644 --- a/.github/workflows/ci.yml +++ b/.github/workflows/ci.yml @@ -53,11 +53,11 @@ jobs: uses: actions/download-artifact@v4 with: name: gibidify-linux - path: ./build + path: . - name: Build Docker image shell: bash run: | - cp ./build/gibidi-linux ./gibidi + cp ./gibidi-linux ./gibidi chmod +x ./gibidi docker build -t ghcr.io/${{ github.repository }}/gibidi:${{ github.ref_name }} . diff --git a/.github/workflows/docker-publish.yml b/.github/workflows/docker-publish.yml deleted file mode 100644 index 37118f6..0000000 --- a/.github/workflows/docker-publish.yml +++ /dev/null @@ -1,97 +0,0 @@ -name: Docker Build and Release - -on: - push: - tags: [ '*.*.*' ] - -env: - # Use docker.io for Docker Hub if empty - REGISTRY: ghcr.io - # github.repository as / - IMAGE_NAME: ${{ github.repository }} - -jobs: - docker: - name: Build and Publish Docker Image - runs-on: ubuntu-latest - if: github.event_name == 'release' - permissions: - contents: read - packages: write - # This is used to complete the identity challenge - # with sigstore/fulcio when releasing. - id-token: write - - steps: - - name: Checkout repository - uses: actions/checkout@v4 - - - name: Set up Go - uses: actions/setup-go@v5 - with: - go-version: '1.23' - - - name: Build binary for linux - shell: bash - run: | - GOOS=linux GOARCH=amd64 go build \ - -ldflags "-X main.Version={{ github.event.release.tag_name }}" \ - -o gibidi-linux \ - . - - # Install the cosign tool except on PR - # https://github.com/sigstore/cosign-installer - - name: Install cosign - uses: sigstore/cosign-installer@c56c2d3e59e4281cc41dea2217323ba5694b171e # v3.8.0 - with: - cosign-release: 'v2.2.4' - - # Set up BuildKit Docker container builder to be able to build - # multi-platform images and export cache - # https://github.com/docker/setup-buildx-action - - name: Set up Docker Buildx - uses: docker/setup-buildx-action@f7ce87c1d6bead3e36075b2ce75da1f6cc28aaca # v3.9.0 - - # Login against a Docker registry except on PR - # https://github.com/docker/login-action - - name: Log into registry ${{ env.REGISTRY }} - uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0 - with: - registry: ${{ env.REGISTRY }} - username: ${{ github.actor }} - password: ${{ secrets.GITHUB_TOKEN }} - - # Extract metadata (tags, labels) for Docker - # https://github.com/docker/metadata-action - - name: Extract Docker metadata - id: meta - uses: docker/metadata-action@369eb591f429131d6889c46b94e711f089e6ca96 # v5.6.1 - with: - images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }} - - # Build and push Docker image with Buildx (don't push on PR) - # https://github.com/docker/build-push-action - - name: Build and push Docker image - id: build-and-push - uses: docker/build-push-action@ca877d9245402d1537745e0e356eab47c3520991 # v6.13.0 - with: - context: . - tags: ${{ steps.meta.outputs.tags }} - labels: ${{ steps.meta.outputs.labels }} - cache-from: type=gha - cache-to: type=gha,mode=max - - # Sign the resulting Docker image digest except on PRs. - # This will only write to the public Rekor transparency log when the Docker - # repository is public to avoid leaking data. If you would like to publish - # transparency data even for private images, pass --force to cosign below. - # https://github.com/sigstore/cosign - - name: Sign the published Docker image - if: ${{ github.event_name != 'pull_request' }} - env: - # https://docs.github.com/en/actions/security-guides/security-hardening-for-github-actions#using-an-intermediate-environment-variable - TAGS: ${{ steps.meta.outputs.tags }} - DIGEST: ${{ steps.build-and-push.outputs.digest }} - # This step uses the identity token to provision an ephemeral certificate - # against the sigstore community Fulcio instance. - run: echo "${TAGS}" | xargs -I {} cosign sign --yes {}@${DIGEST}