Release #32
release.yml
on: push
bundle-container
/
container
23s
container-main
/
container
4m 15s
bundle-container
/
sign
9s
bundle-container
/
sbom
9s
catalog-container
35s
Annotations
1 error, 3 warnings, and 8 notices
catalog-container
buildx failed with: ERROR: invalid tag "ghcr.io/complianceascode/compliance-operator-catalog:-GITHUB_REF_NAME-": invalid reference format
|
bundle-container / sbom
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: anchore/sbom-action/[email protected]. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
|
catalog-container
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: actions/[email protected], docker/setup-qemu-action@v2, docker/setup-buildx-action@v2, docker/metadata-action@v4. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
|
container-main / sbom
Node.js 16 actions are deprecated. Please update the following actions to use Node.js 20: anchore/sbom-action/[email protected]. For more information see: https://github.blog/changelog/2023-09-22-github-actions-transitioning-from-node-16-to-node-20/.
|
Verify SBOM attestation
COSIGN_EXPERIMENTAL=1 cosign verify-attestation ghcr.io/complianceascode/compliance-operator-bundle@sha256:12d0c4a5eebcbed8ca66a1ca818b612aa391dd3826f9bbf415c664a32c22c3cb | jq '.payload |= @base64d | .payload | fromjson | select(.predicateType == "https://spdx.dev/Document") | .predicate.Data | fromjson'
|
Verify signature
COSIGN_EXPERIMENTAL=1 cosign verify ghcr.io/complianceascode/compliance-operator-bundle@sha256:12d0c4a5eebcbed8ca66a1ca818b612aa391dd3826f9bbf415c664a32c22c3cb | jq '.[0]'
|
Inspect signature bundle
COSIGN_EXPERIMENTAL=1 cosign verify ghcr.io/complianceascode/compliance-operator-bundle@sha256:12d0c4a5eebcbed8ca66a1ca818b612aa391dd3826f9bbf415c664a32c22c3cb | jq '.[0].optional.Bundle.Payload.body |= @base64d | .[0].optional.Bundle.Payload.body | fromjson'
|
Inspect certificate
COSIGN_EXPERIMENTAL=1 cosign verify ghcr.io/complianceascode/compliance-operator-bundle@sha256:12d0c4a5eebcbed8ca66a1ca818b612aa391dd3826f9bbf415c664a32c22c3cb | jq -r '.[0].optional.Bundle.Payload.body |= @base64d | .[0].optional.Bundle.Payload.body | fromjson | .spec.signature.publicKey.content |= @base64d | .spec.signature.publicKey.content' | openssl x509 -text
|
Verify signature
COSIGN_EXPERIMENTAL=1 cosign verify ghcr.io/complianceascode/compliance-operator@sha256:db56052be1399c218509b2f3237586640b09622943d9ef4dd1c10e1eb490698a | jq '.[0]'
|
Inspect signature bundle
COSIGN_EXPERIMENTAL=1 cosign verify ghcr.io/complianceascode/compliance-operator@sha256:db56052be1399c218509b2f3237586640b09622943d9ef4dd1c10e1eb490698a | jq '.[0].optional.Bundle.Payload.body |= @base64d | .[0].optional.Bundle.Payload.body | fromjson'
|
Inspect certificate
COSIGN_EXPERIMENTAL=1 cosign verify ghcr.io/complianceascode/compliance-operator@sha256:db56052be1399c218509b2f3237586640b09622943d9ef4dd1c10e1eb490698a | jq -r '.[0].optional.Bundle.Payload.body |= @base64d | .[0].optional.Bundle.Payload.body | fromjson | .spec.signature.publicKey.content |= @base64d | .spec.signature.publicKey.content' | openssl x509 -text
|
Verify SBOM attestation
COSIGN_EXPERIMENTAL=1 cosign verify-attestation ghcr.io/complianceascode/compliance-operator@sha256:db56052be1399c218509b2f3237586640b09622943d9ef4dd1c10e1eb490698a | jq '.payload |= @base64d | .payload | fromjson | select(.predicateType == "https://spdx.dev/Document") | .predicate.Data | fromjson'
|