You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Consolidate attestation action references to actions/attest (#60214)
Co-authored-by: Copilot <223556219+Copilot@users.noreply.github.com>
Co-authored-by: Copilot Autofix powered by AI <175728472+Copilot@users.noreply.github.com>
Copy file name to clipboardExpand all lines: content/actions/concepts/security/kubernetes-admissions-controller.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -23,7 +23,7 @@ To [install the controller](/actions/how-tos/security-for-github-actions/using-a
23
23
24
24
When the Policy Controller is installed, it will intercept all image pull requests and verify the attestation for the image. The attestation must be stored in the image registry as an [OCI attached artifact](https://oras.land/docs/concepts/reftypes/) containing a [Sigstore Bundle](https://docs.sigstore.dev/about/bundle/) which contains the attestation and cryptographic material (e.g. certificates and signatures) used to verify the attestation. A verification process is then performed that ensures the image was built with the specified build provenance and matches any policies enabled by the cluster administrator.
25
25
26
-
In order for an image to be verifiable, it must have a valid provenance attestation in the registry, which can be done by enabling the `push-to-registry: true` attribute in the `actions/attest-build-provenance` action. See [Generating build provenance for container images](/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds#generating-build-provenance-for-container-images) for more details on how to generate attestations for container images.
26
+
In order for an image to be verifiable, it must have a valid provenance attestation in the registry, which can be done by enabling the `push-to-registry: true` attribute in the `actions/attest` action. See [Generating build provenance for container images](/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds#generating-build-provenance-for-container-images) for more details on how to generate attestations for container images.
Copy file name to clipboardExpand all lines: content/actions/how-tos/secure-your-work/use-artifact-attestations/enforce-artifact-attestations.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ category:
14
14
contentType: how-tos
15
15
---
16
16
17
-
>[!NOTE] Before proceeding, ensure you have enabled build provenance for container images, including setting the `push-to-registry` attribute in the [`attest-build-provenance` action](https://github.com/actions/attest-build-provenance) as documented in [Generating build provenance for container images](/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds#generating-build-provenance-for-container-images). This is required for the Policy Controller to verify the attestation.
17
+
>[!NOTE] Before proceeding, ensure you have enabled build provenance for container images, including setting the `push-to-registry` attribute in the [`attest` action](https://github.com/actions/attest) as documented in [Generating build provenance for container images](/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds#generating-build-provenance-for-container-images). This is required for the Policy Controller to verify the attestation.
18
18
19
19
## Getting started with Kubernetes admission controller
Copy file name to clipboardExpand all lines: content/actions/how-tos/secure-your-work/use-artifact-attestations/increase-security-rating.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -51,7 +51,7 @@ To verify the artifact attestations generated with your builds, you can use [`gh
51
51
The `gh attestation verify` command requires either `--owner` or `--repo` flags to be used with it. These flags do two things.
52
52
53
53
* They tell `gh attestation verify` where to fetch the attestation from. This will always be your caller workflow.
54
-
* They tell `gh attestation verify` where the workflow that did the signing came from. This will always be the workflow that uses [`attest-build-provenance` action](https://github.com/actions/attest-build-provenance), which may be a reusable workflow.
54
+
* They tell `gh attestation verify` where the workflow that did the signing came from. This will always be the workflow that uses the [`attest` action](https://github.com/actions/attest), which may be a reusable workflow.
55
55
56
56
You can use optional flags with the `gh attestation verify` command.
Copy file name to clipboardExpand all lines: content/actions/how-tos/secure-your-work/use-artifact-attestations/manage-attestations.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -32,8 +32,8 @@ Use the `created` filter to filter by creation date. To enter a custom date rang
32
32
33
33
Use the `predicate` filter to filter by the kind of attestation. A predicate is the type of claim that an attestation makes about an artifact, such as "this artifact was built during a particular workflow run and originates from this repository."
34
34
35
-
* Provenance attestations were created with the `attest-build-provenance` action.
36
-
* SBOM attestations were created with the `attest-sbom` action.
35
+
* Provenance attestations were created with the `attest` action.
36
+
* SBOM attestations were created with the `attest` action using the `sbom-path` input.
37
37
* Custom predicate type patterns are **not** supported in the search field, but are supported by the API.
Copy file name to clipboardExpand all lines: content/actions/how-tos/secure-your-work/use-artifact-attestations/use-artifact-attestations.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,9 +26,9 @@ You can use {% data variables.product.prodname_actions %} to generate artifact a
26
26
To generate an artifact attestation, you must:
27
27
28
28
* Ensure you have the appropriate permissions configured in your workflow.
29
-
* Include a step in your workflow that uses the [`attest-build-provenance` action](https://github.com/actions/attest-build-provenance).
29
+
* Include a step in your workflow that uses the [`attest` action](https://github.com/actions/attest).
30
30
31
-
When you run your updated workflows, they will build your artifacts and generate an artifact attestation that establishes build provenance. You can view attestations in your repository's **Actions** tab. For more information, see the [`attest-build-provenance`](https://github.com/actions/attest-build-provenance) repository.
31
+
When you run your updated workflows, they will build your artifacts and generate an artifact attestation that establishes build provenance. You can view attestations in your repository's **Actions** tab. For more information, see the [`attest`](https://github.com/actions/attest) repository.
32
32
33
33
### Generating build provenance for binaries
34
34
@@ -45,7 +45,7 @@ When you run your updated workflows, they will build your artifacts and generate
45
45
46
46
```yaml
47
47
- name: Generate artifact attestation
48
-
uses: actions/attest-build-provenance@v3
48
+
uses: actions/attest@v4
49
49
with:
50
50
subject-path: 'PATH/TO/ARTIFACT'
51
51
```
@@ -68,7 +68,7 @@ When you run your updated workflows, they will build your artifacts and generate
68
68
69
69
```yaml
70
70
- name: Generate artifact attestation
71
-
uses: actions/attest-build-provenance@v3
71
+
uses: actions/attest@v4
72
72
with:
73
73
subject-name: {% raw %}${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}{% endraw %}
74
74
subject-digest: 'sha256:fedcba0...'
@@ -87,9 +87,9 @@ To generate an attestation for an SBOM, you must:
87
87
88
88
* Ensure you have the appropriate permissions configured in your workflow.
89
89
* Create an SBOM for your artifact. For more information, see [`anchore-sbom-action`](https://github.com/marketplace/actions/anchore-sbom-action) in the {% data variables.product.prodname_marketplace %}.
90
-
* Include a step in your workflow that uses the [`attest-sbom` action](https://github.com/actions/attest-sbom).
90
+
* Include a step in your workflow that uses the [`attest` action](https://github.com/actions/attest) with the `sbom-path` input.
91
91
92
-
When you run your updated workflows, they will build your artifacts and generate an SBOM attestation. You can view attestations in your repository's **Actions** tab. For more information, see the [`attest-sbom` action](https://github.com/actions/attest-sbom) repository.
92
+
When you run your updated workflows, they will build your artifacts and generate an SBOM attestation. You can view attestations in your repository's **Actions** tab. For more information, see the [`attest`](https://github.com/actions/attest) repository.
93
93
94
94
### Generating an SBOM attestation for binaries
95
95
@@ -106,7 +106,7 @@ When you run your updated workflows, they will build your artifacts and generate
106
106
107
107
```yaml
108
108
- name: Generate SBOM attestation
109
-
uses: actions/attest-sbom@v2
109
+
uses: actions/attest@v4
110
110
with:
111
111
subject-path: 'PATH/TO/ARTIFACT'
112
112
sbom-path: 'PATH/TO/SBOM'
@@ -130,7 +130,7 @@ When you run your updated workflows, they will build your artifacts and generate
130
130
131
131
```yaml
132
132
- name: Generate SBOM attestation
133
-
uses: actions/attest-sbom@v2
133
+
uses: actions/attest@v4
134
134
with:
135
135
subject-name: {% raw %}${{ env.REGISTRY }}/PATH/TO/IMAGE{% endraw %}
To verify SBOM attestations, you have to provide the `--predicate-type` flag to reference a non-default predicate. For more information, see [Vetted predicates](https://github.com/in-toto/attestation/tree/main/spec/predicates#vetted-predicates) in the `in-toto/attestation` repository.
182
182
183
-
For example, the [`attest-sbom` action](https://github.com/actions/attest-sbom) currently supports either SPDX or CycloneDX SBOM predicates. To verify an SBOM attestation in the SPDX format, you can use the following {% data variables.product.prodname_cli %} command.
183
+
For example, the [`attest` action](https://github.com/actions/attest) currently supports either SPDX or CycloneDX SBOM predicates. To verify an SBOM attestation in the SPDX format, you can use the following {% data variables.product.prodname_cli %} command.
Copy file name to clipboardExpand all lines: content/code-security/how-tos/secure-your-supply-chain/establish-provenance-and-integrity/upload-linked-artifacts.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -77,7 +77,7 @@ You can upload data to the {% data variables.product.virtual_registry %} in the
77
77
78
78
In the following example, we build and publish a Docker image, then use the `{% raw %}${{ steps.push.outputs.digest }}{% endraw %}` output in the next step to generate a provenance attestation.
79
79
80
-
The `attest-build-provenance` action automatically uploads a storage record to the {% data variables.product.virtual_registry %} when `push-to-registry: true` is set and the workflow includes the `artifact-metadata: write` permission.
80
+
The `attest` action automatically uploads a storage record to the {% data variables.product.virtual_registry %} when `push-to-registry: true` is set and the workflow includes the `artifact-metadata: write` permission.
The [attest](https://github.com/actions/attest)and [attest-build-provenance](https://github.com/actions/attest-build-provenance) actions automatically create storage records on the {% data variables.product.virtual_registry %} if both:
1
+
The [attest](https://github.com/actions/attest)action automatically creates storage records on the {% data variables.product.virtual_registry %} if both:
2
2
3
3
* The `push-to-registry` option is set to `true`
4
4
* The workflow that includes the action has the `artifact-metadata: write` permission
Copy file name to clipboardExpand all lines: data/reusables/package_registry/publish-docker-image.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -57,7 +57,7 @@ jobs:
57
57
{% ifversion artifact-attestations %}
58
58
# This step generates an artifact attestation for the image, which is an unforgeable statement about where and how it was built. It increases supply chain security for people who consume the image. For more information, see [Using artifact attestations to establish provenance for builds](/actions/security-guides/using-artifact-attestations-to-establish-provenance-for-builds).
59
59
- name: Generate artifact attestation
60
-
uses: actions/attest-build-provenance@v3
60
+
uses: actions/attest@v4
61
61
with:
62
62
subject-name: {% raw %}${{ env.REGISTRY }}/${{ env.IMAGE_NAME}}{% endraw %}
63
63
subject-digest: {% raw %}${{ steps.push.outputs.digest }}{% endraw %}
0 commit comments