build-gablue-main #419
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
name: build-gablue-main | |
on: | |
pull_request: | |
branches: | |
- main | |
schedule: | |
- cron: "00 06 * * *" # build at 06:00 UTC every day | |
# (20 minutes after last ublue images start building) | |
push: | |
branches: | |
- main | |
paths-ignore: | |
- '**/README.md' | |
workflow_dispatch: | |
env: | |
MY_IMAGE_NAME: "gablue-main" # the name of the image produced by this build, matches repo names | |
MY_IMAGE_DESC: "Gablue main image" | |
IMAGE_REGISTRY: "ghcr.io/${{ github.repository_owner }}" # do not edit | |
KERNEL_VER: "6.12.6-203.bazzite.fc41.x86_64" | |
jobs: | |
build_push: | |
name: Build and push image | |
runs-on: ubuntu-24.04 | |
permissions: | |
contents: read | |
packages: write | |
id-token: write | |
steps: | |
# Checkout push-to-registry action GitHub repository | |
- name: Checkout Push to Registry action | |
uses: actions/checkout@v4 | |
- name: Maximize build space | |
uses: ublue-os/remove-unwanted-software@v7 | |
- name: Generate tags | |
id: generate-tags | |
shell: bash | |
run: | | |
# Generate a timestamp for creating an image version history | |
TIMESTAMP="$(date +%Y%m%d)" | |
TIMESTAMPWT="$(date -d '+2 hours' +%Y%m%d-%Hh%M)" | |
COMMIT_TAGS=() | |
BUILD_TAGS=() | |
# Have tags for tracking builds during pull request | |
SHA_SHORT="${GITHUB_SHA::7}" | |
COMMIT_TAGS+=("pr-${{ github.event.number }}") | |
COMMIT_TAGS+=("${SHA_SHORT}") | |
# Append matching timestamp tags to keep a version history | |
for TAG in "${BUILD_TAGS[@]}"; do | |
BUILD_TAGS+=("${TAG}-${TIMESTAMP}") | |
done | |
BUILD_TAGS+=("${TIMESTAMP}") | |
BUILD_TAGS+=("${TIMESTAMPWT}") | |
BUILD_TAGS+=("latest") | |
if [[ "${{ github.event_name }}" == "pull_request" ]]; then | |
echo "Generated the following commit tags: " | |
for TAG in "${COMMIT_TAGS[@]}"; do | |
echo "${TAG}" | |
done | |
alias_tags=("${COMMIT_TAGS[@]}") | |
else | |
alias_tags=("${BUILD_TAGS[@]}") | |
fi | |
echo "Generated the following build tags: " | |
for TAG in "${BUILD_TAGS[@]}"; do | |
echo "${TAG}" | |
done | |
echo "alias_tags=${alias_tags[*]}" >> $GITHUB_OUTPUT | |
# Take only the date for versionning | |
echo "alias_date=${TIMESTAMPWT}" >> $GITHUB_OUTPUT | |
# Build metadata | |
- name: Image Metadata | |
uses: docker/metadata-action@v5 | |
id: meta | |
with: | |
images: | | |
${{ env.MY_IMAGE_NAME }} | |
labels: | | |
io.artifacthub.package.readme-url=https://raw.githubusercontent.com/${{ github.repository }}/main/README.md | |
org.opencontainers.image.description=${{ env.MY_IMAGE_DESC }} | |
org.opencontainers.image.title=${{ env.MY_IMAGE_NAME }} | |
- name: Build Image | |
id: build_image | |
shell: bash | |
run: | | |
sudo buildah build \ | |
--file "Containerfile-main" \ | |
--format "docker" \ | |
--tag raw-img . | |
- name: Rechunk Image | |
id: rechunk | |
uses: hhd-dev/[email protected] | |
with: | |
ref: "raw-img" | |
prev-ref: "${{ env.IMAGE_REGISTRY }}/${{ env.MY_IMAGE_NAME }}:latest" | |
skip_compression: true | |
version: "${{ steps.generate-tags.outputs.alias_date }}" | |
rechunk: "ghcr.io/hhd-dev/rechunk:v0.8.6" | |
- name: Load in podman and tag | |
run: | | |
IMAGE=$(podman pull ${{ steps.rechunk.outputs.ref }}) | |
sudo rm -rf ${{ steps.rechunk.outputs.output }} | |
podman tag $IMAGE ${{ env.MY_IMAGE_NAME }}:${{ steps.generate-tags.outputs.alias_tags }} | |
podman tag $IMAGE ${{ env.MY_IMAGE_NAME }}:${{ steps.generate-tags.outputs.alias_date }} | |
podman tag $IMAGE ${{ env.MY_IMAGE_NAME }}:latest | |
# keep for secureboot check | |
podman tag $IMAGE rechunked-img | |
- name: Check Secureboot | |
shell: bash | |
run: | | |
set -x | |
if [[ ! $(command -v sbverify) || ! $(command -v curl) || ! $(command -v openssl) ]]; then | |
sudo apt update | |
sudo apt install sbsigntool curl openssl | |
fi | |
TMP=$(podman create rechunked-img bash) | |
podman cp $TMP:/usr/lib/modules/${{ env.KERNEL_VER }}/vmlinuz . | |
podman rm $TMP | |
sbverify --list vmlinuz | |
curl --retry 3 -Lo kernel-sign.der https://github.com/ublue-os/kernel-cache/raw/main/certs/public_key.der | |
curl --retry 3 -Lo akmods.der https://github.com/ublue-os/kernel-cache/raw/main/certs/public_key_2.der | |
openssl x509 -in kernel-sign.der -out kernel-sign.crt | |
openssl x509 -in akmods.der -out akmods.crt | |
sbverify --cert kernel-sign.crt vmlinuz || exit 1 | |
sbverify --cert akmods.crt vmlinuz || exit 1 | |
# Workaround bug where capital letters in your GitHub username make it impossible to push to GHCR. | |
# https://github.com/macbre/push-to-ghcr/issues/12 | |
- name: Lowercase Registry | |
id: registry_case | |
uses: ASzc/change-string-case-action@v6 | |
with: | |
string: ${{ env.IMAGE_REGISTRY }} | |
- name: Login to GitHub Container Registry | |
uses: docker/login-action@v3 | |
with: | |
registry: ghcr.io | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
# Push the image to GHCR (Image Registry) | |
- name: Push To GHCR | |
uses: Wandalen/[email protected] | |
id: push | |
env: | |
REGISTRY_USER: ${{ github.actor }} | |
REGISTRY_PASSWORD: ${{ github.token }} | |
with: | |
action: redhat-actions/push-to-registry@v2 | |
attempt_limit: 3 | |
attempt_delay: 15000 | |
with: | | |
image: ${{ env.MY_IMAGE_NAME }} | |
tags: ${{ steps.generate-tags.outputs.alias_tags }} | |
registry: ${{ steps.registry_case.outputs.lowercase }} | |
username: ${{ env.REGISTRY_USER }} | |
password: ${{ env.REGISTRY_PASSWORD }} | |
# This section is optional and only needs to be enabled in you plan on distributing | |
# your project to others to consume. You will need to create a public and private key | |
# using Cosign and save the private key as a repository secret in Github for this workflow | |
# to consume. For more details, review the image signing section of the README. | |
# Sign container | |
- uses: sigstore/[email protected] | |
if: github.event_name != 'pull_request' | |
- name: Sign container image | |
if: github.event_name != 'pull_request' | |
run: | | |
cosign sign -y --key env://COSIGN_PRIVATE_KEY ${{ steps.registry_case.outputs.lowercase }}/${{ env.MY_IMAGE_NAME }}@${TAGS} | |
env: | |
TAGS: ${{ steps.push.outputs.outputs && fromJSON(steps.push.outputs.outputs).digest }} | |
COSIGN_EXPERIMENTAL: false | |
COSIGN_PRIVATE_KEY: ${{ secrets.SIGNING_SECRET }} |