mirror of
https://github.com/astral-sh/uv
synced 2026-01-21 13:30:11 -05:00
This PR contains the following updates: | Package | Type | Update | Change | |---|---|---|---| | [actions/attest-build-provenance](https://redirect.github.com/actions/attest-build-provenance) | action | minor | `v2.2.3` -> `v2.3.0` | --- > [!WARNING] > Some dependencies could not be looked up. Check the Dependency Dashboard for more information. --- ### Release Notes <details> <summary>actions/attest-build-provenance (actions/attest-build-provenance)</summary> ### [`v2.3.0`](https://redirect.github.com/actions/attest-build-provenance/releases/tag/v2.3.0) [Compare Source](https://redirect.github.com/actions/attest-build-provenance/compare/v2.2.3...v2.3.0) #### What's Changed - Bump `actions/attest` from 2.2.1 to 2.3.0 by [@​bdehamer](https://redirect.github.com/bdehamer) in [https://github.com/actions/attest-build-provenance/pull/615](https://redirect.github.com/actions/attest-build-provenance/pull/615) - Updates `@sigstore/oci` from 0.4.0 to 0.5.0 **Full Changelog**: https://github.com/actions/attest-build-provenance/compare/v2.2.3...v2.3.0 </details> --- ### Configuration 📅 **Schedule**: Branch creation - "before 4am on Monday" (UTC), Automerge - At any time (no schedule defined). 🚦 **Automerge**: Disabled by config. Please merge this manually once you are satisfied. ♻ **Rebasing**: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox. 🔕 **Ignore**: Close this PR and you won't be reminded about this update again. --- - [ ] <!-- rebase-check -->If you want to rebase/retry this PR, check this box --- This PR was generated by [Mend Renovate](https://mend.io/renovate/). View the [repository job log](https://developer.mend.io/github/astral-sh/uv). <!--renovate-debug:eyJjcmVhdGVkSW5WZXIiOiI0MC4xNi4wIiwidXBkYXRlZEluVmVyIjoiNDAuMTYuMCIsInRhcmdldEJyYW5jaCI6Im1haW4iLCJsYWJlbHMiOlsiaW50ZXJuYWwiXX0=--> Co-authored-by: renovate[bot] <29139614+renovate[bot]@users.noreply.github.com>
392 lines
17 KiB
YAML
392 lines
17 KiB
YAML
# Build and publish a Docker image.
|
|
#
|
|
# Assumed to run as a subworkflow of .github/workflows/release.yml; specifically, as a local
|
|
# artifacts job within `cargo-dist`.
|
|
#
|
|
# TODO(charlie): Ideally, the publish step would happen as a publish job within `cargo-dist`, but
|
|
# sharing the built image as an artifact between jobs is challenging.
|
|
name: "Build Docker image"
|
|
|
|
on:
|
|
workflow_call:
|
|
inputs:
|
|
plan:
|
|
required: true
|
|
type: string
|
|
pull_request:
|
|
paths:
|
|
# We want to ensure that the maturin builds still work when we change
|
|
# Project metadata
|
|
- pyproject.toml
|
|
- Cargo.toml
|
|
- .cargo/config.toml
|
|
# Toolchain or dependency versions
|
|
- Cargo.lock
|
|
- rust-toolchain.toml
|
|
# The Dockerfile itself
|
|
- Dockerfile
|
|
# And the workflow itself
|
|
- .github/workflows/build-docker.yml
|
|
|
|
env:
|
|
UV_BASE_IMG: ghcr.io/${{ github.repository_owner }}/uv
|
|
|
|
jobs:
|
|
docker-build:
|
|
if: ${{ !contains(github.event.pull_request.labels.*.name, 'no-build') }}
|
|
name: Build Docker image (ghcr.io/astral-sh/uv) for ${{ matrix.platform }}
|
|
runs-on: ubuntu-latest
|
|
environment:
|
|
name: release
|
|
strategy:
|
|
fail-fast: false
|
|
matrix:
|
|
platform:
|
|
- linux/amd64
|
|
- linux/arm64
|
|
steps:
|
|
- uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
|
|
with:
|
|
submodules: recursive
|
|
|
|
# Login to DockerHub first, to avoid rate-limiting
|
|
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
|
# PRs from forks don't have access to secrets, disable this step in that case.
|
|
if: ${{ github.event.pull_request.head.repo.full_name == 'astral-sh/uv' }}
|
|
with:
|
|
username: astralshbot
|
|
password: ${{ secrets.DOCKERHUB_TOKEN_RO }}
|
|
|
|
- uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
|
|
|
|
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
|
with:
|
|
registry: ghcr.io
|
|
username: ${{ github.repository_owner }}
|
|
password: ${{ secrets.GITHUB_TOKEN }}
|
|
|
|
- name: Check tag consistency
|
|
if: ${{ inputs.plan != '' && !fromJson(inputs.plan).announcement_tag_is_implicit }}
|
|
run: |
|
|
version=$(grep "version = " pyproject.toml | sed -e 's/version = "\(.*\)"/\1/g')
|
|
if [ "${{ fromJson(inputs.plan).announcement_tag }}" != "${version}" ]; then
|
|
echo "The input tag does not match the version from pyproject.toml:" >&2
|
|
echo "${{ fromJson(inputs.plan).announcement_tag }}" >&2
|
|
echo "${version}" >&2
|
|
exit 1
|
|
else
|
|
echo "Releasing ${version}"
|
|
fi
|
|
|
|
- name: Extract metadata (tags, labels) for Docker
|
|
id: meta
|
|
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
|
with:
|
|
images: ${{ env.UV_BASE_IMG }}
|
|
# Defining this makes sure the org.opencontainers.image.version OCI label becomes the actual release version and not the branch name
|
|
tags: |
|
|
type=raw,value=dry-run,enable=${{ inputs.plan == '' || fromJson(inputs.plan).announcement_tag_is_implicit }}
|
|
type=pep440,pattern={{ version }},value=${{ inputs.plan != '' && fromJson(inputs.plan).announcement_tag || 'dry-run' }},enable=${{ inputs.plan != '' && !fromJson(inputs.plan).announcement_tag_is_implicit }}
|
|
|
|
- name: Normalize Platform Pair (replace / with -)
|
|
run: |
|
|
platform=${{ matrix.platform }}
|
|
echo "PLATFORM_TUPLE=${platform//\//-}" >> $GITHUB_ENV
|
|
|
|
# Adapted from https://docs.docker.com/build/ci/github-actions/multi-platform/
|
|
- name: Build and push by digest
|
|
id: build
|
|
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
|
|
with:
|
|
context: .
|
|
platforms: ${{ matrix.platform }}
|
|
cache-from: type=gha,scope=uv-${{ env.PLATFORM_TUPLE }}
|
|
cache-to: type=gha,mode=min,scope=uv-${{ env.PLATFORM_TUPLE }}
|
|
labels: ${{ steps.meta.outputs.labels }}
|
|
outputs: type=image,name=${{ env.UV_BASE_IMG }},push-by-digest=true,name-canonical=true,push=${{ inputs.plan != '' && !fromJson(inputs.plan).announcement_tag_is_implicit }}
|
|
|
|
- name: Export digests
|
|
run: |
|
|
mkdir -p /tmp/digests
|
|
digest="${{ steps.build.outputs.digest }}"
|
|
touch "/tmp/digests/${digest#sha256:}"
|
|
|
|
- name: Upload digests
|
|
uses: actions/upload-artifact@ea165f8d65b6e75b540449e92b4886f43607fa02 # v4.6.2
|
|
with:
|
|
name: digests-${{ env.PLATFORM_TUPLE }}
|
|
path: /tmp/digests/*
|
|
if-no-files-found: error
|
|
retention-days: 1
|
|
|
|
docker-publish:
|
|
name: Publish Docker image (ghcr.io/astral-sh/uv)
|
|
runs-on: ubuntu-latest
|
|
environment:
|
|
name: release
|
|
needs:
|
|
- docker-build
|
|
if: ${{ inputs.plan != '' && !fromJson(inputs.plan).announcement_tag_is_implicit }}
|
|
steps:
|
|
# Login to DockerHub first, to avoid rate-limiting
|
|
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
|
with:
|
|
username: astralshbot
|
|
password: ${{ secrets.DOCKERHUB_TOKEN_RO }}
|
|
|
|
- name: Download digests
|
|
uses: actions/download-artifact@d3f86a106a0bac45b974a628896c90dbdf5c8093 # v4.3.0
|
|
with:
|
|
path: /tmp/digests
|
|
pattern: digests-*
|
|
merge-multiple: true
|
|
|
|
- uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
|
|
|
|
- name: Extract metadata (tags, labels) for Docker
|
|
id: meta
|
|
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
|
with:
|
|
images: ${{ env.UV_BASE_IMG }}
|
|
# Order is on purpose such that the label org.opencontainers.image.version has the first pattern with the full version
|
|
tags: |
|
|
type=pep440,pattern={{ version }},value=${{ fromJson(inputs.plan).announcement_tag }}
|
|
type=pep440,pattern={{ major }}.{{ minor }},value=${{ fromJson(inputs.plan).announcement_tag }}
|
|
|
|
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
|
with:
|
|
registry: ghcr.io
|
|
username: ${{ github.repository_owner }}
|
|
password: ${{ secrets.GITHUB_TOKEN }}
|
|
|
|
# Adapted from https://docs.docker.com/build/ci/github-actions/multi-platform/
|
|
- name: Create manifest list and push
|
|
working-directory: /tmp/digests
|
|
# The jq command expands the docker/metadata json "tags" array entry to `-t tag1 -t tag2 ...` for each tag in the array
|
|
# The printf will expand the base image with the `<UV_BASE_IMG>@sha256:<sha256> ...` for each sha256 in the directory
|
|
# The final command becomes `docker buildx imagetools create -t tag1 -t tag2 ... <UV_BASE_IMG>@sha256:<sha256_1> <UV_BASE_IMG>@sha256:<sha256_2> ...`
|
|
run: |
|
|
docker buildx imagetools create \
|
|
$(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") \
|
|
$(printf '${{ env.UV_BASE_IMG }}@sha256:%s ' *)
|
|
|
|
docker-publish-extra:
|
|
name: Publish additional Docker image based on ${{ matrix.image-mapping }}
|
|
runs-on: ubuntu-latest
|
|
environment:
|
|
name: release
|
|
needs:
|
|
- docker-publish
|
|
if: ${{ inputs.plan != '' && !fromJson(inputs.plan).announcement_tag_is_implicit }}
|
|
permissions:
|
|
packages: write
|
|
attestations: write # needed to push image attestations to the Github attestation store
|
|
id-token: write # needed for signing the images with GitHub OIDC Token
|
|
strategy:
|
|
fail-fast: false
|
|
matrix:
|
|
# Mapping of base image followed by a comma followed by one or more base tags (comma separated)
|
|
# Note, org.opencontainers.image.version label will use the first base tag (use the most specific tag first)
|
|
image-mapping:
|
|
- alpine:3.21,alpine3.21,alpine
|
|
- debian:bookworm-slim,bookworm-slim,debian-slim
|
|
- buildpack-deps:bookworm,bookworm,debian
|
|
- python:3.14-rc-alpine,python3.14-rc-alpine
|
|
- python:3.13-alpine,python3.13-alpine
|
|
- python:3.12-alpine,python3.12-alpine
|
|
- python:3.11-alpine,python3.11-alpine
|
|
- python:3.10-alpine,python3.10-alpine
|
|
- python:3.9-alpine,python3.9-alpine
|
|
- python:3.8-alpine,python3.8-alpine
|
|
- python:3.14-rc-bookworm,python3.14-rc-bookworm
|
|
- python:3.13-bookworm,python3.13-bookworm
|
|
- python:3.12-bookworm,python3.12-bookworm
|
|
- python:3.11-bookworm,python3.11-bookworm
|
|
- python:3.10-bookworm,python3.10-bookworm
|
|
- python:3.9-bookworm,python3.9-bookworm
|
|
- python:3.8-bookworm,python3.8-bookworm
|
|
- python:3.14-rc-slim-bookworm,python3.14-rc-bookworm-slim
|
|
- python:3.13-slim-bookworm,python3.13-bookworm-slim
|
|
- python:3.12-slim-bookworm,python3.12-bookworm-slim
|
|
- python:3.11-slim-bookworm,python3.11-bookworm-slim
|
|
- python:3.10-slim-bookworm,python3.10-bookworm-slim
|
|
- python:3.9-slim-bookworm,python3.9-bookworm-slim
|
|
- python:3.8-slim-bookworm,python3.8-bookworm-slim
|
|
steps:
|
|
# Login to DockerHub first, to avoid rate-limiting
|
|
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
|
with:
|
|
username: astralshbot
|
|
password: ${{ secrets.DOCKERHUB_TOKEN_RO }}
|
|
|
|
- uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
|
|
|
|
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
|
with:
|
|
registry: ghcr.io
|
|
username: ${{ github.repository_owner }}
|
|
password: ${{ secrets.GITHUB_TOKEN }}
|
|
|
|
- name: Generate Dynamic Dockerfile Tags
|
|
shell: bash
|
|
run: |
|
|
set -euo pipefail
|
|
|
|
# Extract the image and tags from the matrix variable
|
|
IFS=',' read -r BASE_IMAGE BASE_TAGS <<< "${{ matrix.image-mapping }}"
|
|
|
|
# Generate Dockerfile content
|
|
cat <<EOF > Dockerfile
|
|
FROM ${BASE_IMAGE}
|
|
COPY --from=${{ env.UV_BASE_IMG }}:latest /uv /uvx /usr/local/bin/
|
|
ENTRYPOINT []
|
|
CMD ["/usr/local/bin/uv"]
|
|
EOF
|
|
|
|
# Initialize a variable to store all tag docker metadata patterns
|
|
TAG_PATTERNS=""
|
|
|
|
# Loop through all base tags and append its docker metadata pattern to the list
|
|
# Order is on purpose such that the label org.opencontainers.image.version has the first pattern with the full version
|
|
IFS=','; for TAG in ${BASE_TAGS}; do
|
|
TAG_PATTERNS="${TAG_PATTERNS}type=pep440,pattern={{ version }},suffix=-${TAG},value=${{ fromJson(inputs.plan).announcement_tag }}\n"
|
|
TAG_PATTERNS="${TAG_PATTERNS}type=pep440,pattern={{ major }}.{{ minor }},suffix=-${TAG},value=${{ fromJson(inputs.plan).announcement_tag }}\n"
|
|
TAG_PATTERNS="${TAG_PATTERNS}type=raw,value=${TAG}\n"
|
|
done
|
|
|
|
# Remove the trailing newline from the pattern list
|
|
TAG_PATTERNS="${TAG_PATTERNS%\\n}"
|
|
|
|
# Export image cache name
|
|
echo "IMAGE_REF=${BASE_IMAGE//:/-}" >> $GITHUB_ENV
|
|
|
|
# Export tag patterns using the multiline env var syntax
|
|
{
|
|
echo "TAG_PATTERNS<<EOF"
|
|
echo -e "${TAG_PATTERNS}"
|
|
echo EOF
|
|
} >> $GITHUB_ENV
|
|
|
|
- name: Extract metadata (tags, labels) for Docker
|
|
id: meta
|
|
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
|
# ghcr.io prefers index level annotations
|
|
env:
|
|
DOCKER_METADATA_ANNOTATIONS_LEVELS: index
|
|
with:
|
|
images: ${{ env.UV_BASE_IMG }}
|
|
flavor: |
|
|
latest=false
|
|
tags: |
|
|
${{ env.TAG_PATTERNS }}
|
|
|
|
- name: Build and push
|
|
id: build-and-push
|
|
uses: docker/build-push-action@1dc73863535b631f98b2378be8619f83b136f4a0 # v6.17.0
|
|
with:
|
|
context: .
|
|
platforms: linux/amd64,linux/arm64
|
|
# We do not really need to cache here as the Dockerfile is tiny
|
|
#cache-from: type=gha,scope=uv-${{ env.IMAGE_REF }}
|
|
#cache-to: type=gha,mode=min,scope=uv-${{ env.IMAGE_REF }}
|
|
push: true
|
|
tags: ${{ steps.meta.outputs.tags }}
|
|
labels: ${{ steps.meta.outputs.labels }}
|
|
annotations: ${{ steps.meta.outputs.annotations }}
|
|
|
|
- name: Generate artifact attestation
|
|
uses: actions/attest-build-provenance@db473fddc028af60658334401dc6fa3ffd8669fd # v2.3.0
|
|
with:
|
|
subject-name: ${{ env.UV_BASE_IMG }}
|
|
subject-digest: ${{ steps.build-and-push.outputs.digest }}
|
|
# push-to-registry is explicitly not enabled to maintain full control over the top image
|
|
|
|
# This is effectively a duplicate of `docker-publish` to make https://github.com/astral-sh/uv/pkgs/container/uv
|
|
# show the uv base image first since GitHub always shows the last updated image digests
|
|
# This works by annotating the original digests (previously non-annotated) which triggers an update to ghcr.io
|
|
docker-republish:
|
|
name: Annotate Docker image (ghcr.io/astral-sh/uv)
|
|
runs-on: ubuntu-latest
|
|
environment:
|
|
name: release
|
|
needs:
|
|
- docker-publish-extra
|
|
if: ${{ inputs.plan != '' && !fromJson(inputs.plan).announcement_tag_is_implicit }}
|
|
permissions:
|
|
packages: write
|
|
attestations: write # needed to push image attestations to the Github attestation store
|
|
id-token: write # needed for signing the images with GitHub OIDC Token
|
|
steps:
|
|
# Login to DockerHub first, to avoid rate-limiting
|
|
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
|
with:
|
|
username: astralshbot
|
|
password: ${{ secrets.DOCKERHUB_TOKEN_RO }}
|
|
|
|
- name: Download digests
|
|
uses: actions/download-artifact@d3f86a106a0bac45b974a628896c90dbdf5c8093 # v4.3.0
|
|
with:
|
|
path: /tmp/digests
|
|
pattern: digests-*
|
|
merge-multiple: true
|
|
|
|
- uses: docker/setup-buildx-action@b5ca514318bd6ebac0fb2aedd5d36ec1b5c232a2 # v3.10.0
|
|
|
|
- name: Extract metadata (tags, labels) for Docker
|
|
id: meta
|
|
uses: docker/metadata-action@902fa8ec7d6ecbf8d84d538b9b233a880e428804 # v5.7.0
|
|
env:
|
|
DOCKER_METADATA_ANNOTATIONS_LEVELS: index
|
|
with:
|
|
images: ${{ env.UV_BASE_IMG }}
|
|
# Order is on purpose such that the label org.opencontainers.image.version has the first pattern with the full version
|
|
tags: |
|
|
type=pep440,pattern={{ version }},value=${{ fromJson(inputs.plan).announcement_tag }}
|
|
type=pep440,pattern={{ major }}.{{ minor }},value=${{ fromJson(inputs.plan).announcement_tag }}
|
|
|
|
- uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0
|
|
with:
|
|
registry: ghcr.io
|
|
username: ${{ github.repository_owner }}
|
|
password: ${{ secrets.GITHUB_TOKEN }}
|
|
|
|
# Adapted from https://docs.docker.com/build/ci/github-actions/multi-platform/
|
|
- name: Create manifest list and push
|
|
working-directory: /tmp/digests
|
|
# The readarray part is used to make sure the quoting and special characters are preserved on expansion (e.g. spaces)
|
|
# The jq command expands the docker/metadata json "tags" array entry to `-t tag1 -t tag2 ...` for each tag in the array
|
|
# The printf will expand the base image with the `<UV_BASE_IMG>@sha256:<sha256> ...` for each sha256 in the directory
|
|
# The final command becomes `docker buildx imagetools create -t tag1 -t tag2 ... <UV_BASE_IMG>@sha256:<sha256_1> <UV_BASE_IMG>@sha256:<sha256_2> ...`
|
|
run: |
|
|
readarray -t lines <<< "$DOCKER_METADATA_OUTPUT_ANNOTATIONS"; annotations=(); for line in "${lines[@]}"; do annotations+=(--annotation "$line"); done
|
|
docker buildx imagetools create \
|
|
"${annotations[@]}" \
|
|
$(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") \
|
|
$(printf '${{ env.UV_BASE_IMG }}@sha256:%s ' *)
|
|
|
|
- name: Share manifest digest
|
|
id: manifest-digest
|
|
# To sign the manifest, we need it's digest. Unfortunately "docker
|
|
# buildx imagetools create" does not (yet) have a clean way of sharing
|
|
# the digest of the manifest it creates (see docker/buildx#2407), so
|
|
# we use a separate command to retrieve it.
|
|
# imagetools inspect [TAG] --format '{{json .Manifest}}' gives us
|
|
# the machine readable JSON description of the manifest, and the
|
|
# jq command extracts the digest from this. The digest is then
|
|
# sent to the Github step output file for sharing with other steps.
|
|
run: |
|
|
digest="$(
|
|
docker buildx imagetools inspect \
|
|
"${UV_BASE_IMG}:${DOCKER_METADATA_OUTPUT_VERSION}" \
|
|
--format '{{json .Manifest}}' \
|
|
| jq -r '.digest'
|
|
)"
|
|
echo "digest=${digest}" >> "$GITHUB_OUTPUT"
|
|
|
|
- name: Generate artifact attestation
|
|
uses: actions/attest-build-provenance@db473fddc028af60658334401dc6fa3ffd8669fd # v2.3.0
|
|
with:
|
|
subject-name: ${{ env.UV_BASE_IMG }}
|
|
subject-digest: ${{ steps.manifest-digest.outputs.digest }}
|
|
# push-to-registry is explicitly not enabled to maintain full control over the top image
|