Skip to content

publish docker images for 1.5.3 #101

publish docker images for 1.5.3

publish docker images for 1.5.3 #101

Workflow file for this run

name: release
on:
push:
tags:
- v*.*.*
branches:
- test-provenance-docker
env:
DOCKER_BUILDKIT: 1
DOCKER_REGISTRY: docker.elastic.co
DOCKER_IMAGE_NAME: observability/apm-lambda-extension
permissions:
contents: write
id-token: write
pull-requests: read
jobs:
build:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
ref: 1980cea1de80bce1b1c93bd1d1eaf8eca4f9b13d
- uses: actions/setup-go@v5
with:
go-version-file: 'go.mod'
check-latest: true
- uses: docker/setup-qemu-action@v3
with:
platforms: linux/arm64, linux/amd64
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- uses: elastic/apm-pipeline-library/.github/actions/docker-login@current
with:
registry: docker.elastic.co
secret: secret/observability-team/ci/docker-registry/prod
url: ${{ secrets.VAULT_ADDR }}
roleId: ${{ secrets.VAULT_ROLE_ID }}
secretId: ${{ secrets.VAULT_SECRET_ID }}
- uses: hashicorp/[email protected]
with:
url: ${{ secrets.VAULT_ADDR }}
method: approle
roleId: ${{ secrets.VAULT_ROLE_ID }}
secretId: ${{ secrets.VAULT_SECRET_ID }}
secrets: |
secret/observability-team/ci/service-account/apm-aws-lambda access_key_id | AWS_ACCESS_KEY_ID ;
secret/observability-team/ci/service-account/apm-aws-lambda secret_access_key | AWS_SECRET_ACCESS_KEY
# See https://goreleaser.com/blog/supply-chain-security/
- name: installs syft for generating the SBOM with goreleaser
uses: anchore/sbom-action/[email protected]
- name: Release
run: make release
# Store artifacts to help with troubleshooting
- uses: actions/upload-artifact@v4
if: always()
with:
name: release
path: "dist/*.*"
retention-days: 5
- name: generate build provenance (binaries)
uses: github-early-access/generate-build-provenance@main
with:
subject-path: "${{ github.workspace }}/dist/*.*"
# See https://github.com/github-early-access/generate-build-provenance/issues/162
- name: container image digest
id: image
run: .ci/get-docker-provenance.sh
- name: generate build provenance (containers x86_64)
uses: github-early-access/generate-build-provenance@main
with:
subject-name: ${{ steps.image.outputs.name_1 }}
subject-digest: ${{ steps.image.outputs.digest_1 }}
- name: generate build provenance (containers arm64)
uses: github-early-access/generate-build-provenance@main
with:
subject-name: ${{ steps.image.outputs.name_2 }}
subject-digest: ${{ steps.image.outputs.digest_2 }}