diff --git a/.github/workflows/docker-publish-reverse ghcr.yml b/.github/workflows/docker-publish-reverse ghcr.yml deleted file mode 100644 index d91d447..0000000 --- a/.github/workflows/docker-publish-reverse ghcr.yml +++ /dev/null @@ -1,103 +0,0 @@ -name: Reverse on ghcr.io - -# This workflow uses actions that are not certified by GitHub. -# They are provided by a third-party and are governed by -# separate terms of service, privacy policy, and support -# documentation. - -on: - push: - branches: [ master ] - release: - types: [ published ] - workflow_dispatch: - -env: - REGISTRY: ghcr.io - IMAGE_NAME: ssttkkl/pixiv-bot - IMAGE_TYPE: reverse - BASE_TAG: reverse - - -jobs: - build: - - runs-on: ubuntu-latest - permissions: - contents: read - packages: write - # This is used to complete the identity challenge - # with sigstore/fulcio when running outside of PRs. - id-token: write - - steps: - - name: Checkout repository - uses: actions/checkout@v3 - - # https://github.com/sigstore/cosign-installer - - name: Install cosign - if: github.event_name != 'pull_request' - uses: sigstore/cosign-installer@f3c664df7af409cb4873aa5068053ba9d61a57b6 #v2.6.0 - with: - cosign-release: 'v1.11.0' - - - name: Docker Setup QEMU - # You may pin to the exact commit or the version. - # uses: docker/setup-qemu-action@8b122486cedac8393e77aa9734c3528886e4a1a8 - uses: docker/setup-qemu-action@v2.0.0 - with: - # QEMU static binaries Docker image (e.g. tonistiigi/binfmt:latest) - # Platforms to install (e.g. arm64,riscv64,arm) - platforms: arm64 - - # Workaround: https://github.com/docker/build-push-action/issues/461 - - name: Setup Docker buildx - uses: docker/setup-buildx-action@79abd3f86f79a9d68a23c75a09a9a85889262adf - - # Login against a Docker registry except on PR - # https://github.com/docker/login-action - - name: Log into registry ${{ env.REGISTRY }} - if: github.event_name != 'pull_request' - uses: docker/login-action@28218f9b04b4f3f62068d7b6ce6ca5b26e35336c - with: - registry: ${{ env.REGISTRY }} - username: ${{ github.actor }} - password: ${{ secrets.GITHUB_TOKEN }} - - # Extract metadata (tags, labels) for Docker - # https://github.com/docker/metadata-action - - name: Extract Docker metadata - id: meta - uses: docker/metadata-action@98669ae865ea3cffbcbaa878cf57c20bbf1c6c38 - with: - images: ${{ env.IMAGE_NAME }} - tags: | - type=ref,event=branch,suffix=-${{ env.BASE_TAG }} - type=pep440,pattern={{version}},suffix=-${{ env.BASE_TAG }} - type=pep440,pattern={{major}}.{{minor}},suffix=-${{ env.BASE_TAG }} - type=pep440,pattern={{major}},suffix=-${{ env.BASE_TAG }} - type=raw,value=${{ env.BASE_TAG }} - - # Build and push Docker image with Buildx (don't push on PR) - # https://github.com/docker/build-push-action - - name: Build and push Docker image - id: build-and-push - uses: docker/build-push-action@ac9327eae2b366085ac7f6a2d02df8aa8ead720a - with: - context: ./${{ env.IMAGE_TYPE }} - push: ${{ github.event_name != 'pull_request' }} - tags: ${{ steps.meta.outputs.tags }} - labels: ${{ steps.meta.outputs.labels }} - - # Sign the resulting Docker image digest except on PRs. - # This will only write to the public Rekor transparency log when the Docker - # repository is public to avoid leaking data. If you would like to publish - # transparency data even for private images, pass --force to cosign below. - # https://github.com/sigstore/cosign - # - name: Sign the published Docker image - # if: ${{ github.event_name != 'pull_request' }} - # env: - # COSIGN_EXPERIMENTAL: "true" - # # This step uses the identity token to provision an ephemeral certificate - # # against the sigstore community Fulcio instance. - # run: cosign sign ${{ steps.meta.outputs.tags }}@${{ steps.build-and-push.outputs.digest }}