Skip to content

Commit

Permalink
Minor formatting
Browse files Browse the repository at this point in the history
  • Loading branch information
danbarr committed Oct 9, 2024
1 parent 0f5316e commit 58831be
Show file tree
Hide file tree
Showing 8 changed files with 9 additions and 14 deletions.
2 changes: 0 additions & 2 deletions .github/workflows/build-image-signed-cosign-malicious.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ env:

jobs:
build:

runs-on: ubuntu-latest
permissions:
contents: read
Expand Down Expand Up @@ -58,7 +57,6 @@ jobs:
cache-from: type=gha
cache-to: type=gha,mode=max


- name: Sign the published Docker image
env:
TAGS: ${{ steps.meta.outputs.tags }}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ env:

jobs:
build:

runs-on: ubuntu-latest
permissions:
contents: read
Expand Down Expand Up @@ -47,8 +46,7 @@ jobs:
push: true
tags: ${{ steps.meta.outputs.tags }}
context: .
file : Dockerfile.static

file: Dockerfile.static

- name: Sign the published Docker image
env:
Expand Down
3 changes: 1 addition & 2 deletions .github/workflows/build-image-signed-cosign-static.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ env:

jobs:
build:

runs-on: ubuntu-latest
permissions:
contents: read
Expand Down Expand Up @@ -47,7 +46,7 @@ jobs:
push: true
tags: ${{ steps.meta.outputs.tags }}
context: .
file : Dockerfile.static
file: Dockerfile.static

- name: Sign the published Docker image
env:
Expand Down
1 change: 0 additions & 1 deletion .github/workflows/build-image-signed-cosign.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ env:

jobs:
build:

runs-on: ubuntu-latest
permissions:
contents: read
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ jobs:
push: true
tags: ${{ steps.meta.outputs.tags }}
context: .
file : Dockerfile.static
file: Dockerfile.static

- name: Attest image
uses: actions/[email protected]
Expand Down
2 changes: 1 addition & 1 deletion .github/workflows/build-image-signed-ghat-static.yml
Original file line number Diff line number Diff line change
Expand Up @@ -41,7 +41,7 @@ jobs:
push: true
tags: ${{ steps.meta.outputs.tags }}
context: .
file : Dockerfile.static
file: Dockerfile.static

- name: Attest image
uses: actions/[email protected]
Expand Down
1 change: 0 additions & 1 deletion .github/workflows/build-image-unsigned.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,6 @@ env:

jobs:
build:

runs-on: ubuntu-latest
permissions:
contents: read
Expand Down
8 changes: 5 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,12 +3,11 @@
## Overview

The `demo-repo-js` project is a repository template primarily intended for testing and
demonstration purposes with stacklok projects. It is a simple JS project that allows you to
demonstration purposes with Stacklok projects. It is a simple JavaScript project that allows you to
quickly get started with testing and demonstrating how you can use Minder and Trusty with
your Python projects. It features continuous integration (CI) workflows that demonstrate how to
your JavaScript projects. It features continuous integration (CI) workflows that demonstrate how to
build, test, and sign artifacts using Sigstore and GitHub Attestations.


## Features

- Pre-configured `package.json` with `react` and `next` dependencies
Expand All @@ -17,18 +16,21 @@ build, test, and sign artifacts using Sigstore and GitHub Attestations.
- Dockerfile for building a container image

GitHub Actions workflows for:

- Producing signed and unsigned artifacts using Sigstore and GitHub attestations API
- Producing artifacts such as container images and binaries
- Producing container images that are reproducible (always the same digest)
- Producing "malicious" container images for testing purposes (e.g., code content was altered while building the image)

Makefile targets for simulating out-of-band signing of artifacts (both intended and not):

- Generating signed container images and "malicious" images
- Pushing container images to container registry (GHCR)
- Generating a local key pair for signing container images
- Sign container images using Sigstore by using a local key pair or by going through the Sigstore OIDC sign-in flow

Branches:

- Set of pre-created branches to use for opening PRs each demonstrating a different feature or use case with Minder and Trusty

## How to Use This Template
Expand Down

0 comments on commit 58831be

Please sign in to comment.