-
Notifications
You must be signed in to change notification settings - Fork 136
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[feature] e2e tests for new provenance-registry
option
#2981
Comments
@laurentsimon The #2962 is merged. I can work on the e2e test workflow. Is there a consensus on the second registry for the e2e? |
Let's try to use docker (our existing tests use GitHub registry, I think). I'll find a way to create an account for testing. Let me know if you're able to make sense of the e2e tests. We only need to add one test, you can use https://github.com/slsa-framework/example-package/blob/bf2a15594ee748d53bdea8e6b5471c77fe6135dd/.github/workflows/e2e.container.schedule.main.default.slsa3.yml#L86 as a starting point and update the names / options. Verification starts in https://github.com/slsa-framework/example-package/blob/main/.github/workflows/scripts/e2e.container.default.verify.sh. As a first step, it's probably enough to export the Once the slsa-verifier has a dedicated option, we can update the workflow. But let's start with Let me know if that makes sense or not. Thanks again for the help, much appreciated! |
@laurentsimon I looked at the tests and they make sense. I would start with Would you mind sharing the secrets / env values for the new docker repository for hosting provenance? |
I'l add the secrets into the settings. Will let you know this week when done. |
I've created a secret named |
@laurentsimon The current pipeline uses, Github registry (GHCR not gcr) for container image. I was hoping to use docker.io (new registry) for provenance. Did you mean to swap them as per your comment in #2981 (comment)? |
Correct: if possible we can swap them., unless it complicates things too much. My reasoning was that I'd like to delete the images after each run to avoid docker's complaining. I'm not sure how to delete the attestations only... but it's that possible let's do that instead. Maybe cosign has a command to delete all attestations for a given image? |
Okay. If I get this right you would like to:
|
@laurentsimon Here is the PR: slsa-framework/example-package#294. Storage registries:
LMK if anything needs changing. Can you confirm if you expect to delete the container image (workflow name) in the docker hub vs. the provenance package in GHCR vs. both? If so, do the |
deleting the image from docker should be enough. The token should have the right permissions. Thanks |
@laurentsimon After some digging seems like docker is deprecating the Advanced Image management API and hub-tool (experimental) doesn't yet support providing password from env / doesn't obey docker login creds, and is pending. Here are the 3 issues for deleting from dockerhub:
2 Solution alternatives:
Clarifications needed:
|
PR slsa-framework/example-package#294 merged for e2e |
@ianlewis / @laurentsimon let me know if this feature is ready (i.e. the e2e test is working???) to be used and when the tag/release is made? Also is there something that needs to be worked on on the verifier end? |
Looks like it failed for some reason. I'll take a look on Monday. |
It's working now. |
Once #2956 is merged, let's add an e2e tests in the https://github.com/slsa-framework/example-package/tree/main/.github/workflows
Need to figure out which registry / account we use for the second registry.
/cc @saisatishkarra
The text was updated successfully, but these errors were encountered: