docs: bump changelog in prep for 1.8.2 (#2166) #1
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: release | |
on: | |
push: | |
tags: | |
- "v*" | |
permissions: | |
contents: read | |
jobs: | |
goreleaser: | |
runs-on: ubuntu-latest | |
permissions: | |
contents: write | |
packages: write # publish a new github release and container image | |
id-token: write # needed for keyless signing | |
outputs: | |
digest: ${{ steps.image.outputs.digest }} | |
subjects-as-file: ${{ steps.hashes.outputs.handle }} | |
steps: | |
- name: Extract Version from Tag | |
id: tag_name | |
run: | | |
echo "current_version=${GITHUB_REF#refs/tags/v}" >> $GITHUB_OUTPUT | |
shell: bash | |
- name: Checkout | |
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v3.5.2 | |
with: | |
fetch-depth: 0 | |
- name: Set up Go | |
uses: actions/setup-go@3041bf56c941b39c61721a86cd11f3bb1338122a # v5.2.0 | |
with: | |
go-version-file: './go.mod' | |
cache-dependency-path: './go.sum' | |
check-latest: true | |
- name: Login to Docker Hub | |
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0 | |
with: | |
username: ${{ secrets.DOCKERHUB_USERNAME }} | |
password: ${{ secrets.DOCKERHUB_TOKEN }} | |
- name: Log in to GHCR | |
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0 | |
with: | |
registry: ghcr.io | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
- uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0 | |
- uses: anchore/sbom-action/download-syft@55dc4ee22412511ee8c3142cbea40418e6cec693 # v0.17.8 | |
- name: Run GoReleaser | |
id: goreleaser | |
uses: goreleaser/goreleaser-action@9ed2f89a662bf1735a48bc8557fd212fa902bebf # v6.1.0 | |
with: | |
distribution: goreleaser | |
version: '~> v2' | |
args: release --clean --config .goreleaser.yaml | |
env: | |
GITHUB_TOKEN: ${{ secrets.GORELEASER_GITHUB_TOKEN }} | |
- name: Update Docker Hub Description | |
uses: peter-evans/dockerhub-description@e98e4d1628a5f3be2be7c231e50981aee98723ae # v4.0.0 | |
with: | |
username: ${{ secrets.DOCKERHUB_USERNAME }} | |
password: ${{ secrets.DOCKERHUB_TOKEN }} | |
repository: openfga/openfga | |
short-description: ${{ github.event.repository.description }} | |
- name: Generate binary hashes | |
id: binary | |
env: | |
ARTIFACTS: "${{ steps.goreleaser.outputs.artifacts }}" | |
run: | | |
set -euo pipefail | |
hashes=$(echo $ARTIFACTS | jq --raw-output '[.[] | {name, "digest": (.extra.Digest // .extra.Checksum)}] | unique | .[] | select(.digest) | {digest} + {name} | join(" ") | sub("^sha256:";"")' | base64 -w0) | |
echo $hashes > digests.txt | |
- uses: slsa-framework/slsa-github-generator/actions/generator/generic/create-base64-subjects-from-file@5a775b367a56d5bd118a224a811bba288150a563 # [email protected] | |
id: hashes | |
with: | |
path: digests.txt | |
- name: Image digest | |
id: image | |
env: | |
ARTIFACTS: "${{ steps.goreleaser.outputs.artifacts }}" | |
run: | | |
set -euo pipefail | |
artifact=$(echo "$ARTIFACTS" | jq -r '[.[] | select (.type=="Docker Manifest")][0]') | |
image=$(echo "$artifact" | jq -r '.path' | cut -d':' -f1) | |
digest=$(echo "$artifact" | jq -r '.extra.Digest') | |
echo "digest=$digest" >> "$GITHUB_OUTPUT" | |
snyk: | |
needs: [ goreleaser ] | |
runs-on: ubuntu-latest | |
permissions: | |
contents: read | |
security-events: write # needed for uploading results to GitHub Code Scanning | |
steps: | |
- name: Checkout code | |
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v3.5.2 | |
- name: Run Snyk to check Docker image for vulnerabilities | |
continue-on-error: true | |
uses: snyk/actions/docker@cdb760004ba9ea4d525f2e043745dfe85bb9077e # pin@master | |
env: | |
SNYK_TOKEN: ${{ secrets.SNYK_TOKEN }} | |
with: | |
image: openfga/openfga | |
args: --file=Dockerfile | |
# Replace any "undefined" security severity values with 0. The undefined value is used in the case | |
# of license-related findings, which do not do not indicate a security vulnerability. | |
# See https://github.com/github/codeql-action/issues/2187 for more context. | |
- name: Post-process snyk.sarif output | |
run: | | |
sed -i 's/"security-severity": "undefined"/"security-severity": "0"/g' snyk.sarif | |
- name: Upload result to GitHub Code Scanning | |
uses: github/codeql-action/upload-sarif@babb554ede22fd5605947329c4d04d8e7a0b8155 # pin@v2 | |
with: | |
sarif_file: snyk.sarif | |
binary-provenance: | |
needs: [ goreleaser ] | |
permissions: | |
actions: read # To read the workflow path. | |
id-token: write # To sign the provenance. | |
contents: write # To add assets to a release. | |
# Note: this _must_ be referenced by tag. See: https://github.com/slsa-framework/slsa-verifier/issues/12 | |
uses: slsa-framework/slsa-github-generator/.github/workflows/[email protected] | |
with: | |
base64-subjects-as-file: "${{ needs.goreleaser.outputs.subjects-as-file }}" | |
provenance-name: "openfga.intoto.jsonl" | |
upload-assets: true # upload to a new release | |
image-provenance: | |
needs: [ goreleaser ] | |
permissions: | |
actions: read | |
id-token: write | |
packages: write | |
# Note: this _must_ be referenced by tag. See: https://github.com/slsa-framework/slsa-verifier/issues/12 | |
uses: slsa-framework/slsa-github-generator/.github/workflows/[email protected] | |
with: | |
image: openfga/openfga | |
digest: ${{ needs.goreleaser.outputs.digest }} | |
secrets: | |
registry-username: ${{ secrets.DOCKERHUB_USERNAME }} | |
registry-password: ${{ secrets.DOCKERHUB_TOKEN }} | |
verification-with-slsa-verifier: | |
needs: [ goreleaser, binary-provenance ] | |
runs-on: ubuntu-latest | |
permissions: read-all | |
steps: | |
- name: Install the verifier | |
uses: slsa-framework/slsa-verifier/actions/installer@3714a2a4684014deb874a0e737dffa0ee02dd647 # [email protected] | |
- name: Download assets | |
env: | |
GH_TOKEN: ${{ secrets.GITHUB_TOKEN }} | |
PROVENANCE: "${{ needs.binary-provenance.outputs.provenance-name }}" | |
run: | | |
set -euo pipefail | |
gh -R "$GITHUB_REPOSITORY" release download "$GITHUB_REF_NAME" \ | |
-p "$PROVENANCE" -p "*.tar.gz" -p "*.tar.gz.sbom.json" | |
- name: Verify assets | |
env: | |
PROVENANCE: "${{ needs.binary-provenance.outputs.provenance-name }}" | |
run: | | |
slsa-verifier verify-artifact \ | |
--provenance-path "$PROVENANCE" \ | |
--source-uri "github.com/$GITHUB_REPOSITORY" \ | |
--source-tag "$GITHUB_REF_NAME" \ | |
*.tar.gz *.tar.gz.sbom.json | |
verification-with-cosign: | |
needs: [ goreleaser, image-provenance ] | |
runs-on: ubuntu-latest | |
permissions: read-all | |
steps: | |
- name: Login to Docker Hub | |
uses: docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567 # v3.3.0 | |
with: | |
username: ${{ secrets.DOCKERHUB_USERNAME }} | |
password: ${{ secrets.DOCKERHUB_TOKEN }} | |
- name: Install Cosign | |
uses: sigstore/cosign-installer@dc72c7d5c4d10cd6bcb8cf6e3fd625a9e5e537da # v3.7.0 | |
- name: Verify image | |
env: | |
IMAGE: openfga/openfga | |
DIGEST: ${{ needs.goreleaser.outputs.digest }} | |
run: | | |
cosign verify-attestation \ | |
--type slsaprovenance \ | |
--certificate-oidc-issuer https://token.actions.githubusercontent.com \ | |
--certificate-identity-regexp '^https://github.com/slsa-framework/slsa-github-generator/.github/workflows/generator_container_slsa3.yml@refs/tags/v[0-9]+.[0-9]+.[0-9]+$' \ | |
$IMAGE@$DIGEST | |
# homebrew bump happens automagically after a few hours, see https://github.com/Homebrew/homebrew-core/commits/master/Formula/o/openfga.rb |