Replies: 1 comment 9 replies
-
|
The docs I've found (https://github.com/actions/attest-build-provenance?tab=readme-ov-file#container-image) show pushing attestations after the image exists in the destionation registry, which is what I would expect. This post shows the author submitting separate attestations for each architecture-specific image - though I'd also expect them to do attestation for the multi-arch manifest at the end and they don't. So I think overall you'd need to have the digests for each of the arch-specific images and the multi-arch inded, and then create attestations for each of those. To get those we do return an MSBuild Item called |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Hey @baronfel,
I'm using the .NET SDK Container Building Tools to publish my multi-manifest / multi-RID images (e.g. this one).
Now I'd like to attest SBOM and build provenance, but I've no clue how to do that 🤔 I assume that this cannot be done via
dotnet publish. But what needs to be done to make this work? I found this in the GitHub docs... in my case, would the GitHub Actions workflow have to look like this?From the docs, I get the impression that the attestation should happen before the container image gets pushed. However, if this is the case, can it still work, considering that the .NET SDK Container Building Tools implicitly push the multi-manifest image?
Furthermore, which hash has to be used for
subject-digest- the one of the multi-manifest image, i.e pointing toghcr.io/mu88/thisisyourlife:dev-chiseled? Or do I have to attest build provenance in this case for the platform-specific images, i.e.ghcr.io/mu88/thisisyourlife:dev-chiseled-linux-arm64andghcr.io/mu88/thisisyourlife:dev-chiseled-linux-x64?More or less the same applies to attesting the SBOM.
As always, thank you for your help 🙏🏻
Beta Was this translation helpful? Give feedback.
All reactions