You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# There is a single job in this workflow. It's configured to run on the latest available version of Ubuntu.
23
21
jobs:
@@ -72,52 +70,3 @@ jobs:
72
70
subject-digest: ${{ steps.build.outputs.digest }}
73
71
push-to-registry: true
74
72
75
-
build-and-publish-agentless:
76
-
runs-on: ubuntu-latest
77
-
# Sets the permissions granted to the `GITHUB_TOKEN` for the actions in this job.
78
-
permissions:
79
-
contents: read
80
-
packages: write
81
-
attestations: write
82
-
id-token: write
83
-
steps:
84
-
- name: Checkout repository
85
-
uses: actions/checkout@v4
86
-
# Uses the `docker/login-action` action to log in to the Container registry using the account and password that will publish the packages. Once published, the packages are scoped to the account defined here.
# This step generates an artifact attestation for the image, which is an unforgeable statement about where and how it was built. It increases supply chain security for people who consume the image. For more information, see [AUTOTITLE](/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds).
# Defines two custom environment variables for the workflow. These are used for the Container registry domain, and a name for the Docker image that this workflow builds.
17
+
env:
18
+
REGISTRY: ghcr.io
19
+
IMAGE_NAME: ${{ github.repository }}
20
+
DOCKER_CMD: docker
21
+
build-and-publish-agentless:
22
+
runs-on: ubuntu-latest
23
+
# Sets the permissions granted to the `GITHUB_TOKEN` for the actions in this job.
24
+
permissions:
25
+
contents: read
26
+
packages: write
27
+
attestations: write
28
+
id-token: write
29
+
steps:
30
+
- name: Checkout repository
31
+
uses: actions/checkout@v4
32
+
# Uses the `docker/login-action` action to log in to the Container registry using the account and password that will publish the packages. Once published, the packages are scoped to the account defined here.
# This step generates an artifact attestation for the image, which is an unforgeable statement about where and how it was built. It increases supply chain security for people who consume the image. For more information, see [AUTOTITLE](/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds).
0 commit comments