You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This guide covers configuring a GitHub Action for building Crossplane
20
20
providers and functions and pushing them to an OCI registry such as `ghcr.io`.
@@ -27,22 +27,22 @@ A typical GitHub workflow definition contains the following steps:
27
27
4. Pushing (publishing) the artifact
28
28
29
29
{{< hint "warning" >}}
30
-
The supplied credentials for the remote registry require read+write access, as
31
-
subsequent requests to the registry will specify `push` authorization scope.
30
+
The supplied credentials for the remote registry require read and write access
31
+
as upload requests to the registry specify `push` authorization scope.
32
32
{{< /hint >}}
33
33
34
-
Fortunately, the template repositories for [providers] and [functions] provide
34
+
The template GitHub repositories for [providers] and [functions] provide
35
35
a functional GitHub Action in `.github/workflows/ci.yml`. The following
36
36
sections of this guide cover configuration options and conventions for each.
37
37
38
38
## Common Configuration
39
39
40
40
All workflows require references to credentials for a remote registry.
41
-
Typically, these are stored as [GitHub Actions Secrets], and authentication
42
-
is performed via the`docker/login-action`
41
+
Typically, users configure them as [GitHub Actions Secrets], and the workflow
42
+
performs authentication via the`docker/login-action`
43
43
[action](http://github.com/docker/login-action).
44
44
45
-
For example, adding the following step to a pipeline will authenticate
45
+
For example, adding the following step to a pipeline authenticates
46
46
the job to `ghcr.io` using the workflow's ephemeral GitHub OIDC token.
47
47
48
48
```yaml
@@ -55,12 +55,14 @@ the job to `ghcr.io` using the workflow's ephemeral GitHub OIDC token.
55
55
```
56
56
57
57
{{< hint "important" >}}
58
-
By default, the job's OIDC token will not have permission to write packages
59
-
to `ghcr.io`. This can be configured in the GitHub repository's settings, or
60
-
declared [explicitly](https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/controlling-permissions-for-github_token) in the workflow definition YAML file.
58
+
By default, the job's OIDC token don't have permission to write packages
59
+
to `ghcr.io`. Permissions are configurable in the GitHub repository's settings
This guide covers configuring a GitHub Action for building Crossplane
20
20
providers and functions and pushing them to an OCI registry such as `ghcr.io`.
@@ -27,22 +27,22 @@ A typical GitHub workflow definition contains the following steps:
27
27
4. Pushing (publishing) the artifact
28
28
29
29
{{< hint "warning" >}}
30
-
The supplied credentials for the remote registry require read+write access, as
31
-
subsequent requests to the registry will specify `push` authorization scope.
30
+
The supplied credentials for the remote registry require read and write access
31
+
as upload requests to the registry specify `push` authorization scope.
32
32
{{< /hint >}}
33
33
34
-
Fortunately, the template repositories for [providers] and [functions] provide
34
+
The template GitHub repositories for [providers] and [functions] provide
35
35
a functional GitHub Action in `.github/workflows/ci.yml`. The following
36
36
sections of this guide cover configuration options and conventions for each.
37
37
38
38
## Common Configuration
39
39
40
40
All workflows require references to credentials for a remote registry.
41
-
Typically, these are stored as [GitHub Actions Secrets], and authentication
42
-
is performed via the`docker/login-action`
41
+
Typically, users configure them as [GitHub Actions Secrets], and the workflow
42
+
performs authentication via the`docker/login-action`
43
43
[action](http://github.com/docker/login-action).
44
44
45
-
For example, adding the following step to a pipeline will authenticate
45
+
For example, adding the following step to a pipeline authenticates
46
46
the job to `ghcr.io` using the workflow's ephemeral GitHub OIDC token.
47
47
48
48
```yaml
@@ -55,12 +55,14 @@ the job to `ghcr.io` using the workflow's ephemeral GitHub OIDC token.
55
55
```
56
56
57
57
{{< hint "important" >}}
58
-
By default, the job's OIDC token will not have permission to write packages
59
-
to `ghcr.io`. This can be configured in the GitHub repository's settings, or
60
-
declared [explicitly](https://docs.github.com/en/actions/writing-workflows/choosing-what-your-workflow-does/controlling-permissions-for-github_token) in the workflow definition YAML file.
58
+
By default, the job's OIDC token don't have permission to write packages
59
+
to `ghcr.io`. Permissions are configurable in the GitHub repository's settings
0 commit comments