Skip to content

.github/workflows/e2e.container-based.schedule.main.gcp-workload-identity.slsa3.yml #197

.github/workflows/e2e.container-based.schedule.main.gcp-workload-identity.slsa3.yml

.github/workflows/e2e.container-based.schedule.main.gcp-workload-identity.slsa3.yml #197

on:
schedule:
# Twice a month scheduled cron for rebuilding the base builder image.
- cron: "0 3 1,15 * *"
# Verify container-based workflow with the base builder image daily.
- cron: "0 3 * * *"
workflow_dispatch:
inputs:
trigger_build:
description: "Trigger a build"
required: false
default: false
type: boolean
permissions: read-all
concurrency: "e2e.container-based.schedule.main.gcp-workload-identity.slsa3"
env:
# TODO: Replace this token.
GH_TOKEN: ${{ secrets.E2E_CONTAINER_TOKEN }}
ISSUE_REPOSITORY: slsa-framework/slsa-github-generator
PROVENANCE_NAME: attestation.intoto
IMAGE_NAME: slsa-tooling/example-package-repo/e2e.container-based.schedule.main.gcp-workload-identity.slsa3
IMAGE_REGISTRY: us-west2-docker.pkg.dev
SERVICE_ACCOUNT: [email protected]
PROVIDER_NAME: projects/819720953812/locations/global/workloadIdentityPools/example-package-pool/providers/example-package-provider
jobs:
# Rebuild the base image
base-build:
runs-on: ubuntu-latest
if: inputs.trigger_build || (github.event_name == 'schedule' && github.event.schedule == '0 3 1,15 * *')
permissions:
contents: read # For reading repository contents.
packages: write # For writing container images.
id-token: write # For authenticating to Google Cloud Workload Identity
steps:
- id: auth
name: "Authenticate to Google Cloud"
uses: google-github-actions/auth@35b0e87d162680511bf346c299f71c9c5c379033 # v1.1.1
with:
token_format: "access_token"
service_account: ${{ env.SERVICE_ACCOUNT }}
workload_identity_provider: ${{ env.PROVIDER_NAME }}
- name: Checkout the repository
uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@4c0219f9ac95b02789c1075625400b2acbff50b1 # v2.9.1
- name: Authenticate Docker
uses: docker/login-action@465a07811f14bebb1938fbed4728c6a1ff8901fc # v2.2.0
with:
registry: ${{ env.IMAGE_REGISTRY }}
username: oauth2accesstoken
password: ${{ steps.auth.outputs.access_token }}
- name: Extract metadata (tags, labels) for Docker
id: meta
uses: docker/metadata-action@818d4b7b91585d195f67373fd9cb0332e31a7175 # v4.6.0
with:
images: ${{ env.IMAGE_REGISTRY }}/${{ env.IMAGE_NAME }}
- name: Build and push Docker image
uses: docker/build-push-action@2eb1c1961a95fc15694676618e422e8ba1d63825 # v4.1.1
id: build
with:
push: true
tags: ${{ steps.meta.outputs.tags }}
labels: ${{ steps.meta.outputs.labels }}
base:
runs-on: ubuntu-latest
if: ${{ !inputs.trigger_build }}
permissions:
contents: read # For reading repository contents.
packages: write # For writing container images.
id-token: write # For authenticating to Google Cloud Workload Identity
outputs:
image: ${{ steps.image.outputs.image }}
digest: ${{ steps.image.outputs.digest }}
steps:
- id: auth
name: "Authenticate to Google Cloud"
uses: google-github-actions/auth@35b0e87d162680511bf346c299f71c9c5c379033 # v1.1.1
with:
token_format: "access_token"
service_account: ${{ env.SERVICE_ACCOUNT }}
workload_identity_provider: ${{ env.PROVIDER_NAME }}
- name: Authenticate Docker
uses: docker/login-action@465a07811f14bebb1938fbed4728c6a1ff8901fc # v2.2.0
with:
registry: ${{ env.IMAGE_REGISTRY }}
username: oauth2accesstoken
password: ${{ steps.auth.outputs.access_token }}
- name: Output image
id: image
run: |
# NOTE: We need to use the image and digest in order to make sure
# that the image we attest has not been modified.
full_image_name="${IMAGE_REGISTRY}/${IMAGE_NAME}"
docker pull "${full_image_name}:main"
repo_digest=$(docker inspect --format='{{index .RepoDigests 0}}' "${full_image_name}:main")
echo "$repo_digest"
{
echo "image=$full_image_name"
echo "digest=${repo_digest#*@}"
echo "service_account=${SERVICE_ACCOUNT}"
echo "provider_name=${PROVIDER_NAME}"
} >> "${GITHUB_OUTPUT}"
build:
permissions:
id-token: write # For signing
actions: read
contents: write # For asset uploads
needs: [base]
uses: slsa-framework/slsa-github-generator/.github/workflows/builder_container-based_slsa3.yml@main
with:
builder-image: ${{ needs.base.outputs.image }}
builder-digest: ${{ needs.base.outputs.digest }}
config-path: ".github/configs-docker/app-config.toml"
provenance-name: attestation.intoto
compile-builder: true
verify:
runs-on: ubuntu-latest
needs: [base, build]
steps:
- uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
- uses: actions/download-artifact@e9ef242655d12993efdcda9058dee2db83a2cb9b
with:
name: ${{ needs.build.outputs.build-outputs-name }}
path: outputs
- name: Get build artifact
id: build
run: |
name=$(find outputs/ -type f | head -1)
cp "${name}" .
echo "name=$(basename "${name}")" >> "${GITHUB_OUTPUT}"
- uses: actions/download-artifact@e9ef242655d12993efdcda9058dee2db83a2cb9b
with:
name: ${{ needs.build.outputs.attestations-download-name }}
path: attestations
- name: Get attestation
id: att
env:
FOLDER: attestations
run: |
name=$(find "${FOLDER}"/ -type f | head -1)
cp "${name}" .
echo "name=$(basename "${name}")" >> "${GITHUB_OUTPUT}"
- uses: actions/setup-go@fac708d6674e30b6ba41289acaab6d4b75aa0753 # v4.0.1
with:
go-version: "1.20"
- env:
BINARY: ${{ steps.build.outputs.name }}
PROVENANCE: ${{ steps.att.outputs.name }}
run: ./.github/workflows/scripts/e2e.container-based.default.verify.sh
if-succeeded:
runs-on: ubuntu-latest
needs: [build, verify]
# NOTE: The workflow is allowed to run for other event types but don't post
# to issues unless it's a schedule event.
if: github.event_name == 'schedule' && needs.build.result == 'success' && needs.verify.result == 'success'
steps:
- uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
- run: ./.github/workflows/scripts/e2e-report-success.sh
if-failed:
runs-on: ubuntu-latest
needs: [build, verify]
# NOTE: The workflow is allowed to run for other event types but don't post
# to issues unless it's a schedule event.
if: always() && github.event_name == 'schedule' && (needs.build.result == 'failure' || needs.verify.result == 'failure')
steps:
- uses: actions/checkout@c85c95e3d7251135ab7dc9ce3241c5835cc595a9 # v3.5.3
- run: ./.github/workflows/scripts/e2e-report-failure.sh