Skip to content

Update module github.com/Masterminds/semver/v3 to v3.3.0 (#6) #10

Update module github.com/Masterminds/semver/v3 to v3.3.0 (#6)

Update module github.com/Masterminds/semver/v3 to v3.3.0 (#6) #10

Workflow file for this run

name: Docker Image CI
on:
push:
branches:
- main
env:
REGISTRY: ghcr.io
# github.repository as <account>/<repo>
IMAGE_NAME: ${{ github.repository }}
# Comma separated list of platforms to build the image for.
PLATFORMS: linux/amd64,linux/arm64
jobs:
build:
runs-on: [ default ]
steps:
- name: checkout
uses: actions/checkout@v4
- name: Set up QEMU
uses: docker/setup-qemu-action@v3
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Login to GitHub Container Registry
uses: docker/login-action@v3
with:
registry: ${{ env.REGISTRY }}
username: ${{github.actor}}
password: ${{secrets.GITHUB_TOKEN}}
- name: Extract image metadata
id: meta
uses: docker/metadata-action@v5
with:
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}
tags: |
type=sha
labels: |
org.opencontainers.image.title=Concourse resource for artifacts in an OCI registry
org.opencontainers.image.description=Fetches, verifies and publishes Helm Charts from a running OCI registry.
org.opencontainers.image.url=https://github.com/cloudoperators/concourse-oci-helm-chart-resource
org.opencontainers.image.source=https://github.com/cloudoperators/concourse-oci-helm-chart-resource
org.opencontainers.image.documentation=https://github.com/cloudoperators/concourse-oci-helm-chart-resource/tree/main/README.md
- name: Build and push
uses: docker/build-push-action@v6
with:
context: .
platforms: ${{ env.PLATFORMS }}
push: true
tags: ${{ steps.meta.outputs.tags }}
labels: ${{ steps.meta.outputs.labels }}
provenance: false
vulnerability-scan:
permissions:
contents: read
packages: read
security-events: write
strategy:
fail-fast: false
name: Vulnerability Scan
needs: build
runs-on: [ default ]
steps:
- name: checkout
uses: actions/checkout@v4
- name: Set sha
id: vars
run: echo "sha_short=sha-$(git rev-parse --short HEAD)" >> $GITHUB_OUTPUT
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
if: success()
with:
image-ref: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ steps.vars.outputs.sha_short }}
ignore-unfixed: true
format: 'sarif'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH'
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
if: always()
with:
sarif_file: trivy-results.sarif