-
-
Notifications
You must be signed in to change notification settings - Fork 34
93 lines (83 loc) · 3.21 KB
/
build_hypernext.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
name: Push images of hypernext to Docker Hub
on:
push:
branches:
- hypernext
# also run every day at 1:00
schedule:
- cron: "42 01 * * *"
## GITHUB_TOKEN authentication
permissions:
contents: write
jobs:
buildandpush:
runs-on: ubuntu-latest
name: Build images and push to Docker Hub
steps:
# https://github.com/CycodeLabs/cimon-action
- name: Cimon supply chain attack protection
uses: cycodelabs/cimon-action@v0
with:
prevent: true
allowed-hosts: >
codeload.github.com
dl-cdn.alpinelinux.org
docker.io
ghcr.io
index.docker.io
nginx.org
packagist.org
pkg-containers.githubusercontent.com
production.cloudflare.docker.com
raw.githubusercontent.com
registry.yarnpkg.com
repo.yarnpkg.com
registry.npmjs.org
- name: Checkout elabimg repo
uses: actions/checkout@v4
# https://github.com/marketplace/actions/docker-setup-buildx
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
# https://github.com/docker/setup-qemu-action#usage
- name: Set up QEMU
uses: docker/setup-qemu-action@v3
# https://github.com/docker/login-action#docker-hub
- name: Login to Docker Hub
uses: docker/login-action@v3
with:
username: ${{ secrets.DOCKER_HUB_USERNAME }}
password: ${{ secrets.DOCKER_HUB_TOKEN }}
# https://github.com/docker/build-push-action#multi-platform-image
- name: Build latest release for all platforms and push to Docker Hub
uses: docker/build-push-action@v6
with:
context: .
cache-from: type=gha
cache-to: type=gha,mode=max
platforms: linux/arm64,linux/amd64
push: true
build-args: |
ELABFTW_VERSION=${{ github.ref_name }}
tags: |
elabftw/elabimg:${{ github.ref_name }}
# VULN SCAN
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: elabftw/elabimg:${{ github.ref_name }}
format: 'table'
exit-code: '1'
ignore-unfixed: true
vuln-type: 'os,library'
severity: 'CRITICAL,HIGH'
db-repository: 'public.ecr.aws/aquasecurity/trivy-db:2'
# SBOM
- name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph
uses: aquasecurity/trivy-action@master
with:
scan-type: 'fs'
format: 'github'
output: 'dependency-results.sbom.json'
scan-ref: '.'
github-pat: ${{ secrets.GITHUB_TOKEN }}
db-repository: 'public.ecr.aws/aquasecurity/trivy-db:2'