-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
podman from Kubic repos (Ubuntu) can not sign using sigstore: Error: initializing private key: decrypt: encrypted: unexpected kdf parameters #20771
Comments
FYI containers/podman.io#240, @lsm5 wants to get rid of the kubic repo. Any chance you can load a get a newer podman there (i.e compile from source) to make sure it is the version and not some environment issue? |
Does the action need to run inside a VM or is it possible to run it inside a container? If the latter is feasible, you may use the |
I don't know if podman/buildah works in a GitHub Action as a container. Will give it a try. |
OK, it works with Fedora's podman from a container: https://github.com/travier/cosign-test/blob/main/.github/workflows/nginx.yml Unfortunately, I can not use the official images as they don't include both podman & buildah in the same image. |
Can a |
@travier or I |
Yes, I can install it in the official image but I was looking for an image that has everything in it so that the GitHub Actions run faster. |
I've made https://github.com/travier/podman-action as an example. Edit: Hum, I should probably base it on https://github.com/containers/podman/blob/main/contrib/podmanimage/stable/Containerfile or the official image directly. |
Can you elaborate on your need for buildah? Is |
I don't strictly need buildah, but https://github.com/redhat-actions/buildah-build relies on it. We could also make either a new GitHub Action or tweak the existing one to use podman if it doesn't find buildah. |
Great idea! |
OK, I now have a fully working multi-arch setup with https://github.com/travier/podman-action & https://github.com/travier/cosign-test so we can close this one if we plan to deprecate the Kubic repo. |
or re-purpose this issue into making an image with both buildah & podman. |
Thanks, @travier ! Since we got it working, I am compelled to close. I'd gently push back on an image with podman and buildah as podman includes buildah-build. |
I opened redhat-actions/buildah-build#131 to track the "use podman as a buildah fallback" approach. |
Issue Description
Using the latest podman from the Kubic project on Ubuntu (https://podman.io/docs/installation#ubuntu), I am unable to sign container images using sigstore keys.
I need to run Ubuntu as I'm working on sigstore signing support for the podman GitHub Actions. See:
Steps to reproduce the issue
Push and sign a container image on Ubuntu using podman from Kubic repos:
Describe the results you received
Describe the results you expected
The container image is pushed and signed.
podman info output
Podman in a container
No
Privileged Or Rootless
Rootless
Upstream Latest Release
No
Additional environment details
This works with podman on Fedora 39 so this looks like an issue specific to the podman build in the Kubic repos or the Ubuntu 22.04 environment available in GitHub Actions.
Additional information
Full reproducer in https://github.com/travier/cosign-test
The text was updated successfully, but these errors were encountered: