15
15
registry :
16
16
description : The registry to push container images to.
17
17
type : string
18
- required : true
18
+ required : false
19
+ default : ghcr.io
19
20
username :
20
21
description : The username for the registry.
21
22
type : string
33
34
type : string
34
35
required : false
35
36
default : " "
36
- platforms :
37
- description : The platforms to build for
38
- type : string
39
- required : false
40
- default : ' linux/amd64, linux/arm64, linux/arm/v7, linux/s390x'
41
37
secrets :
42
38
token :
43
39
description : The Github token or similar to authenticate with for the registry.
@@ -74,25 +70,34 @@ jobs:
74
70
replace-with : " $1"
75
71
flags : " g"
76
72
77
- # This is the intended approach to multi-arch image and all the other checks scanning,
78
- # signing, etc only trigger from this.
79
- call-build-images :
80
- needs :
81
- - call-build-images-meta
82
- name : Multiarch container images to GHCR
83
- runs-on : ubuntu-latest-8-cores
84
- environment : ${{ inputs.environment }}
73
+ # Taken from https://docs.docker.com/build/ci/github-actions/multi-platform/#distribute-build-across-multiple-runners
74
+ # We split this out to make it easier to restart just one of them if it fails and do all in parallel
75
+ call-build-single-arch-container-images :
76
+ # Allow us to continue to create a manifest if we want
77
+ continue-on-error : true
85
78
permissions :
86
79
contents : read
87
80
packages : write
88
- outputs :
89
- production-digest : ${{ steps.build_push.outputs.digest }}
90
- debug-digest : ${{ steps.debug_build_push.outputs.digest }}
81
+ strategy :
82
+ fail-fast : false
83
+ matrix :
84
+ platform :
85
+ - amd64
86
+ - arm64
87
+ - arm/v7
88
+ - s390x
89
+ target :
90
+ - production
91
+ - debug
92
+ name : ${{ matrix.platform }}/${{ matrix.target }} container image build
93
+ # Use GitHub Actions ARM hosted runners
94
+ runs-on : ${{ (contains(matrix.platform, 'arm') && 'ubuntu-22.04-arm') || 'ubuntu-latest' }}
91
95
steps :
92
- - name : Checkout code for modern style builds
96
+ - name : Checkout code
93
97
uses : actions/checkout@v4
94
98
with :
95
99
ref : ${{ inputs.ref }}
100
+ token : ${{ secrets.token }}
96
101
97
102
- name : Set up QEMU
98
103
uses : docker/setup-qemu-action@v3
@@ -104,37 +109,108 @@ jobs:
104
109
uses : docker/login-action@v3
105
110
with :
106
111
registry : ${{ inputs.registry }}
107
- username : ${{ inputs.username }}
112
+ username : ${{ github.actor }}
108
113
password : ${{ secrets.token }}
109
114
110
- - name : Extract metadata from Github
111
- id : meta
112
- uses : docker/metadata-action@v5
113
- with :
114
- images : ${{ inputs.registry }}/${{ inputs.image }}
115
- tags : |
116
- raw,${{ inputs.version }}
117
- raw,${{ needs.call-build-images-meta.outputs.major-version }}
118
- raw,latest
119
-
120
- - name : Build the production images
121
- id : build_push
115
+ - name : Build and push by digest the standard ${{ matrix.target }} image
116
+ id : build
122
117
uses : docker/build-push-action@v6
123
118
with :
119
+ # Use path context rather than Git context as we want local files
124
120
file : ./dockerfiles/Dockerfile
125
121
context : .
126
- tags : ${{ steps.meta.outputs.tags }}
127
- labels : ${{ steps.meta.outputs.labels }}
128
- platforms : ${{ inputs.platforms }}
129
- target : production
122
+ target : ${{ matrix.target }}
123
+ outputs : type=image,name=${{ inputs.registry }}/${{ inputs.image }},push-by-digest=true,name-canonical=true,push=true
124
+ platforms : linux/${{ matrix.platform }}
130
125
# Must be disabled to provide legacy format images from the registry
131
126
provenance : false
132
127
push : true
133
128
load : false
134
129
build-args : |
135
130
FLB_NIGHTLY_BUILD=${{ inputs.unstable }}
136
131
RELEASE_VERSION=${{ inputs.version }}
132
+ WAMR_BUILD_TARGET=${{ (contains(matrix.platform, 'arm/v7') && 'ARMV7') || '' }}
133
+
134
+ - name : Export ${{ matrix.target }} digest
135
+ run : |
136
+ mkdir -p /tmp/digests
137
+ digest="${{ steps.build.outputs.digest }}"
138
+ touch "/tmp/digests/${digest#sha256:}"
139
+ shell : bash
140
+
141
+ - name : Upload ${{ matrix.target }} digest
142
+ uses : actions/upload-artifact@v4
143
+ with :
144
+ name : ${{ matrix.target }}-digests-${{ (contains(matrix.platform, 'arm/v7') && 'arm-v7') || matrix.platform }}
145
+ path : /tmp/digests/*
146
+ if-no-files-found : error
147
+ retention-days : 1
148
+
149
+ # Take the digests and produce a multi-arch manifest from them.
150
+ call-build-container-image-manifests :
151
+ permissions :
152
+ contents : read
153
+ packages : write
154
+ name : Upload multi-arch container image manifests
155
+ runs-on : ubuntu-latest
156
+ needs :
157
+ - call-build-images-meta
158
+ - call-build-single-arch-container-images
159
+ outputs :
160
+ version : ${{ steps.meta.outputs.version }}
161
+ steps :
162
+ - name : Extract metadata from Github
163
+ id : meta
164
+ uses : docker/metadata-action@v5
165
+ with :
166
+ images : ${{ inputs.registry }}/${{ inputs.image }}
167
+ tags : |
168
+ raw,${{ inputs.version }}
169
+ raw,${{ needs.call-build-images-meta.outputs.major-version }}
170
+ raw,latest
171
+
172
+ - name : Download production digests
173
+ uses : actions/download-artifact@v4
174
+ with :
175
+ pattern : production-digests-*
176
+ path : /tmp/production-digests
177
+ merge-multiple : true
178
+
179
+ - name : Set up Docker Buildx
180
+ uses : docker/setup-buildx-action@v3
181
+
182
+ - name : Log in to the Container registry
183
+ uses : docker/login-action@v3
184
+ with :
185
+ registry : ${{ inputs.registry }}
186
+ username : ${{ github.actor }}
187
+ password : ${{ secrets.token }}
188
+
189
+ - name : Create production manifest
190
+ run : |
191
+ docker buildx imagetools create $(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") \
192
+ $(printf '${{ inputs.registry }}/${{ inputs.image }}@sha256:%s ' *)
193
+ shell : bash
194
+ working-directory : /tmp/production-digests
137
195
196
+ - name : Inspect image
197
+ run : |
198
+ docker buildx imagetools inspect ${{ inputs.registry }}/${{ inputs.image }}:${{ steps.meta.outputs.version }}
199
+ shell : bash
200
+
201
+ # Take the digests and produce a multi-arch manifest from them.
202
+ call-build-debug-container-image-manifests :
203
+ permissions :
204
+ contents : read
205
+ packages : write
206
+ name : Upload debug multi-arch container image manifests
207
+ runs-on : ubuntu-latest
208
+ needs :
209
+ - call-build-images-meta
210
+ - call-build-single-arch-container-images
211
+ outputs :
212
+ version : ${{ steps.debug-meta.outputs.version }}
213
+ steps :
138
214
- id : debug-meta
139
215
uses : docker/metadata-action@v5
140
216
with :
@@ -144,28 +220,39 @@ jobs:
144
220
raw,${{ needs.call-build-images-meta.outputs.major-version }}-debug
145
221
raw,latest-debug
146
222
147
- - name : Build the debug multi-arch images
148
- id : debug_build_push
149
- uses : docker/build-push-action@v6
223
+ - name : Download debug digests
224
+ uses : actions/download-artifact@v4
150
225
with :
151
- file : ./dockerfiles/Dockerfile
152
- context : .
153
- tags : ${{ steps.debug-meta.outputs.tags }}
154
- labels : ${{ steps.debug-meta.outputs.labels }}
155
- platforms : ${{ inputs.platforms }}
156
- # Must be disabled to provide legacy format images from the registry
157
- provenance : false
158
- target : debug
159
- push : true
160
- load : false
161
- build-args : |
162
- FLB_NIGHTLY_BUILD=${{ inputs.unstable }}
163
- RELEASE_VERSION=${{ inputs.version }}
226
+ pattern : debug-digests-*
227
+ path : /tmp/debug-digests
228
+ merge-multiple : true
229
+
230
+ - name : Set up Docker Buildx
231
+ uses : docker/setup-buildx-action@v3
232
+
233
+ - name : Log in to the Container registry
234
+ uses : docker/login-action@v3
235
+ with :
236
+ registry : ${{ inputs.registry }}
237
+ username : ${{ github.actor }}
238
+ password : ${{ secrets.token }}
239
+
240
+ - name : Create debug manifest
241
+ run : |
242
+ docker buildx imagetools create $(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") \
243
+ $(printf '${{ inputs.registry }}/${{ inputs.image }}@sha256:%s ' *)
244
+ shell : bash
245
+ working-directory : /tmp/debug-digests
246
+
247
+ - name : Inspect image
248
+ run : |
249
+ docker buildx imagetools inspect ${{ inputs.registry }}/${{ inputs.image }}:${{ steps.debug-meta.outputs.version }}
250
+ shell : bash
164
251
165
252
call-build-images-generate-schema :
166
253
needs :
167
254
- call-build-images-meta
168
- - call-build-images
255
+ - call-build-container-image-manifests
169
256
runs-on : ubuntu-latest
170
257
environment : ${{ inputs.environment }}
171
258
permissions :
@@ -195,7 +282,7 @@ jobs:
195
282
call-build-images-scan :
196
283
needs :
197
284
- call-build-images-meta
198
- - call-build-images
285
+ - call-build-container-image-manifests
199
286
name : Trivy + Dockle image scan
200
287
runs-on : ubuntu-latest
201
288
environment : ${{ inputs.environment }}
@@ -230,7 +317,8 @@ jobs:
230
317
call-build-images-sign :
231
318
needs :
232
319
- call-build-images-meta
233
- - call-build-images
320
+ - call-build-container-image-manifests
321
+ - call-build-debug-container-image-manifests
234
322
name : Deploy and sign multi-arch container image manifests
235
323
permissions :
236
324
contents : read
@@ -251,13 +339,13 @@ jobs:
251
339
#
252
340
# We use recursive signing on the manifest to cover all the images.
253
341
run : |
254
- cosign sign --recursive \
342
+ cosign sign --recursive --force \
255
343
-a "repo=${{ github.repository }}" \
256
344
-a "workflow=${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}" \
257
345
-a "ref=${{ github.sha }}" \
258
346
-a "release=${{ inputs.version }}" \
259
- "${{ inputs.registry }}/${{ inputs.image }}@${{ needs.call-build-images .outputs.production-digest }}" \
260
- "${{ inputs.registry }}/${{ inputs.image }}@${{ needs.call-build-images .outputs.debug-digest }}"
347
+ "${{ inputs.registry }}/${{ inputs.image }}@${{ needs.call-build-container-image-manifests .outputs.version }}" \
348
+ "${{ inputs.registry }}/${{ inputs.image }}@${{ needs.call-build-debug-container-image-manifests .outputs.version }}"
261
349
shell : bash
262
350
# Ensure we move on to key-based signing as well
263
351
continue-on-error : true
@@ -270,13 +358,13 @@ jobs:
270
358
# The key needs to cope with newlines
271
359
run : |
272
360
echo -e "${COSIGN_PRIVATE_KEY}" > /tmp/my_cosign.key
273
- cosign sign --key /tmp/my_cosign.key --recursive \
361
+ cosign sign --key /tmp/my_cosign.key --recursive --force \
274
362
-a "repo=${{ github.repository }}" \
275
363
-a "workflow=${{ github.server_url }}/${{ github.repository }}/actions/runs/${{ github.run_id }}" \
276
364
-a "ref=${{ github.sha }}" \
277
365
-a "release=${{ inputs.version }}" \
278
- "${{ inputs.registry }}/${{ inputs.image }}@${{ needs.call-build-images .outputs.production-digest }}" \
279
- "${{ inputs.registry }}/${{ inputs.image }}@${{ needs.call-build-images .outputs.debug-digest }}"
366
+ "${{ inputs.registry }}/${{ inputs.image }}@${{ needs.call-build-container-image-manifests .outputs.version }}" \
367
+ "${{ inputs.registry }}/${{ inputs.image }}@${{ needs.call-build-debug-container-image-manifests .outputs.version }}"
280
368
rm -f /tmp/my_cosign.key
281
369
shell : bash
282
370
continue-on-error : true
0 commit comments