Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add the signer image to the bashbrew environment #17283

Conversation

LaurentGoderre
Copy link
Member

No description provided.

This comment has been minimized.

@LaurentGoderre LaurentGoderre force-pushed the bashbrew-image-signer branch from 20bbb76 to 007a2a1 Compare July 31, 2024 16:01

This comment has been minimized.

@LaurentGoderre LaurentGoderre force-pushed the bashbrew-image-signer branch from 007a2a1 to ea107aa Compare July 31, 2024 16:06
Copy link

Diff for ea107aa:
diff --git a/.external-pins/docker/image-signer-verifier___0/bashbrew.json b/.external-pins/docker/image-signer-verifier___0/bashbrew.json
new file mode 100644
index 0000000..cef3f90
--- /dev/null
+++ b/.external-pins/docker/image-signer-verifier___0/bashbrew.json
@@ -0,0 +1,33 @@
+{
+	"arches": {
+		"amd64": [
+			{
+				"digest": "sha256:1a70a4f3edad28dba52a7a5a95bb0450119191666344d6e40b52e46c93bfdcd6",
+				"mediaType": "application/vnd.oci.image.manifest.v1+json",
+				"platform": {
+					"architecture": "amd64",
+					"os": "linux"
+				},
+				"size": 673
+			}
+		],
+		"arm64v8": [
+			{
+				"digest": "sha256:d19b5436dc5d326027c84eab3eccb06c21f2bdac6b0534d2d31dd28eb5807be5",
+				"mediaType": "application/vnd.oci.image.manifest.v1+json",
+				"platform": {
+					"architecture": "arm64",
+					"os": "linux",
+					"variant": "v8"
+				},
+				"size": 673
+			}
+		]
+	},
+	"desc": {
+		"digest": "sha256:c7df9727f33c9b4b63ffe3214a2628860fc160f9d1ea1d601445058a053088d9",
+		"mediaType": "application/vnd.oci.image.index.v1+json",
+		"size": 1607
+	},
+	"ref": "docker.io/docker/image-signer-verifier:0@sha256:c7df9727f33c9b4b63ffe3214a2628860fc160f9d1ea1d601445058a053088d9"
+}
diff --git a/.external-pins/docker/image-signer-verifier___0/manifest-sha256_1a70a4f3edad28dba52a7a5a95bb0450119191666344d6e40b52e46c93bfdcd6-config.json b/.external-pins/docker/image-signer-verifier___0/manifest-sha256_1a70a4f3edad28dba52a7a5a95bb0450119191666344d6e40b52e46c93bfdcd6-config.json
new file mode 100644
index 0000000..2eb39ce
--- /dev/null
+++ b/.external-pins/docker/image-signer-verifier___0/manifest-sha256_1a70a4f3edad28dba52a7a5a95bb0450119191666344d6e40b52e46c93bfdcd6-config.json
@@ -0,0 +1,49 @@
+{
+	"architecture": "amd64",
+	"config": {
+		"Entrypoint": [
+			"/usr/local/bin/image-signer-verifier"
+		],
+		"Env": [
+			"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
+		],
+		"Labels": {
+			"org.opencontainers.image.created": "2024-07-31T14:39:11.875Z",
+			"org.opencontainers.image.description": "Library and CLI to create and verify attestation signatures on container images",
+			"org.opencontainers.image.licenses": "",
+			"org.opencontainers.image.revision": "9b82a793ec5ea7631f987028f797e65457375e09",
+			"org.opencontainers.image.source": "https://github.com/docker/image-signer-verifier",
+			"org.opencontainers.image.title": "image-signer-verifier",
+			"org.opencontainers.image.url": "https://github.com/docker/image-signer-verifier",
+			"org.opencontainers.image.version": "sha-9b82a793ec5ea7631f987028f797e65457375e09"
+		},
+		"WorkingDir": "/"
+	},
+	"created": "2024-07-31T14:39:56.846554094Z",
+	"history": [
+		{
+			"comment": "buildkit.dockerfile.v0",
+			"created": "2024-07-29T16:15:45.519784734Z",
+			"created_by": "COPY /etc/ssl/certs/ca-certificates.crt /etc/ssl/certs/ca-certificates.crt # buildkit"
+		},
+		{
+			"comment": "buildkit.dockerfile.v0",
+			"created": "2024-07-31T14:39:56.846554094Z",
+			"created_by": "COPY /image-signer-verifier /usr/local/bin/image-signer-verifier # buildkit"
+		},
+		{
+			"comment": "buildkit.dockerfile.v0",
+			"created": "2024-07-31T14:39:56.846554094Z",
+			"created_by": "ENTRYPOINT [\"/usr/local/bin/image-signer-verifier\"]",
+			"empty_layer": true
+		}
+	],
+	"os": "linux",
+	"rootfs": {
+		"diff_ids": [
+			"sha256:afdb907a00a449d20f7fc6a02dc128eb464ccd56dfb7bc8a84ac517f20887985",
+			"sha256:fd6a67a96b7df1d3f0ee7b20802f18465cff35b66cb2cf9ed03acae454ce26cd"
+		],
+		"type": "layers"
+	}
+}
diff --git a/.external-pins/docker/image-signer-verifier___0/manifest-sha256_1a70a4f3edad28dba52a7a5a95bb0450119191666344d6e40b52e46c93bfdcd6.json b/.external-pins/docker/image-signer-verifier___0/manifest-sha256_1a70a4f3edad28dba52a7a5a95bb0450119191666344d6e40b52e46c93bfdcd6.json
new file mode 100644
index 0000000..9b57c62
--- /dev/null
+++ b/.external-pins/docker/image-signer-verifier___0/manifest-sha256_1a70a4f3edad28dba52a7a5a95bb0450119191666344d6e40b52e46c93bfdcd6.json
@@ -0,0 +1,21 @@
+{
+	"config": {
+		"digest": "sha256:06870cac2a39da367ab5dc4295deabdd5f983c61127560c95b60f6e195d77724",
+		"mediaType": "application/vnd.oci.image.config.v1+json",
+		"size": 1574
+	},
+	"layers": [
+		{
+			"digest": "sha256:c040518a86f1908306e9c7dc31a5640195ef30f425e977f8daadb418e96a92f5",
+			"mediaType": "application/vnd.oci.image.layer.v1.tar+gzip",
+			"size": 126710
+		},
+		{
+			"digest": "sha256:88ea5b92e175a05cbd612a1809dc449aded74673a70446756929c8e52f428568",
+			"mediaType": "application/vnd.oci.image.layer.v1.tar+gzip",
+			"size": 25166560
+		}
+	],
+	"mediaType": "application/vnd.oci.image.manifest.v1+json",
+	"schemaVersion": 2
+}

Copy link
Member

@tianon tianon left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry, but I would prefer to keep this pinning explicitly closer to the place we're using it, especially while the shape of the tool/process continues to evolve and settle. 🙈

(Otherwise we won't notice breakage unless/until it gets used, because our pins here are a notable blind spot in our automated testing.)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants