You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Cosign Bundle Specification
Multiple formats exist to attach the attestations to a container registry. We are following the format and mechanism described by the Cosign Bundle Spec
Here is an example implementation of publishing images with their attestations via Github Actions, and for manual steps to verify the validity of the attestation.
The text was updated successfully, but these errors were encountered:
1. Create a multi-architecture container image for Dangerzone, instead
of having two different tarballs (or no option at all)
2. Build the Dangerzone container image on our supported architectures
(linux/amd64 and linux/arm64). It so happens that GitHub also offers
ARM machine runners, which speeds up the build.
3. Combine the images from these two architectures into one, multi-arch
image.
4. Generate provenance info for each manifest, and the root manifest
list.
5. Check the image's reproduciblity.
Also, remove an older CI action, that is now obsolete.
Fixes#1035
Attestations are ways to attest the provenance of the image. Here is an example of an attestation (processed by GitHub).
In our case, we want to ensure that these fields are the expected ones:
Source Repository URI
Runner Environment
github-hosted
Build Signer URI
https://github.com/freedomofpress/dangerzone/.github/workflows/release-container-image.yml*
Note
Cosign Bundle Specification
Multiple formats exist to attach the attestations to a container registry. We are following the format and mechanism described by the Cosign Bundle Spec
Here is an example implementation of publishing images with their attestations via Github Actions, and for manual steps to verify the validity of the attestation.
The text was updated successfully, but these errors were encountered: