~ajhalili2006's personal website, built with Zensical (successor of Material for Mkdocs) [old repo name got bugged while attempting to do manual knot migration via repo deletion] andreijiroh.dev
zensical mkdocs-material website

More config related chaos like hell

Signed-off-by: Andrei Jiroh Halili <ajhalili2006@gmail.com>

Changed files
+96 -1
.github
workflows
+96 -1
.github/workflows/docker.yml
···
- name: Workaround pushbot for misbehaving reverse proxies
if: ${{ github.event_name != 'pull_request' }}
run: |
+
set +xe
for each ${{ steps.meta.outputs.tags }} in tag;
do
docker push $tag
···
# against the sigstore community Fulcio instance.
run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign {}@${{ steps.build-and-push.outputs.digest }}
devenv:
-
name: Generate Gitpod workspace image snapshot
+
name: Generate Gitpod workspace image snapshot
+
runs-on: ubuntu-latest
+
permissions:
+
contents: read
+
packages: write
+
# This is used to complete the identity challenge
+
# with sigstore/fulcio when running outside of PRs.
+
id-token: write
+
steps:
+
- name: Checkout repository
+
uses: actions/checkout@v3
+
+
# Install the cosign tool except on PR
+
# https://github.com/sigstore/cosign-installer
+
- name: Install cosign
+
if: github.event_name != 'pull_request'
+
uses: sigstore/cosign-installer@f3c664df7af409cb4873aa5068053ba9d61a57b6 #v2.6.0
+
with:
+
cosign-release: 'v1.13.1'
+
+
# Workaround: https://github.com/docker/build-push-action/issues/461
+
- name: Setup Docker buildx
+
uses: docker/setup-buildx-action@v2
+
+
# Login against a Docker registry except on PR
+
# https://github.com/docker/login-action
+
- name: Log into GHCR
+
if: github.event_name != 'pull_request'
+
uses: docker/login-action@v2
+
with:
+
registry: ghcr.io
+
username: ${{ secrets.HUB_USERNAME }}
+
password: ${{ secrets.HUB_TOKEN }}
+
- name: Log into RHQCR
+
if: github.event_name != 'pull_request'
+
uses: docker/login-action@v2
+
with:
+
registry: quay.io
+
username: ${{ secrets.RHQCR_BOT_USERNAME }}
+
password: ${{ secrets.RHQCR_BOT_TOKEN }}
+
+
# Extract metadata (tags, labels) for Docker
+
# https://github.com/docker/metadata-action
+
- name: Extract Docker metadata
+
id: meta
+
uses: docker/metadata-action@v4
+
with:
+
images: |
+
ghcr.io/${{ env.IMAGE_NAME }}/devenv
+
tags: |
+
type=raw,value=latest,enable={{is_default_branch}}
+
type=sha,enable=true,priority=100,prefix=commit-,suffix=,format=long
+
type=schedule,pattern=nightly
+
+
- uses: actions/checkout@v3
+
- uses: hadolint/hadolint-action@v3.1.0
+
with:
+
dockerfile: docker/Dockerfile
+
+
# Build and push Docker image with Buildx (don't push on PR)
+
# https://github.com/docker/build-push-action
+
- name: Build and push Docker image
+
id: build-and-push
+
uses: docker/build-push-action@v4.1.1
+
with:
+
context: .
+
#file: Dockerfile
+
# workaround: https://github.com/moby/buildkit/issues/2713#issuecomment-1068540101
+
push: false
+
load: true
+
tags: ${{ steps.meta.outputs.tags }}
+
labels: ${{ steps.meta.outputs.labels }}
+
cache-from: type=gha
+
cache-to: type=gha,mode=max
+
- name: Workaround pushbot for misbehaving reverse proxies
+
if: ${{ github.event_name != 'pull_request' }}
+
run: |
+
set +xe
+
for each ${{ steps.meta.outputs.tags }} in tag;
+
do
+
docker push $tag
+
done
+
+
# Sign the resulting Docker image digest except on PRs.
+
# This will only write to the public Rekor transparency log when the Docker
+
# repository is public to avoid leaking data. If you would like to publish
+
# transparency data even for private images, pass --force to cosign below.
+
# https://github.com/sigstore/cosign
+
- name: Sign the published Docker image
+
if: ${{ github.event_name != 'pull_request' }}
+
env:
+
COSIGN_EXPERIMENTAL: "true"
+
# This step uses the identity token to provision an ephemeral certificate
+
# against the sigstore community Fulcio instance.
+
run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign {}@${{ steps.build-and-push.outputs.digest }}