Skip to content

Commit

Permalink
Merge pull request #38 from mjanez/main
Browse files Browse the repository at this point in the history
Update actions
  • Loading branch information
mjanez authored Sep 15, 2023
2 parents afae125 + ffdd32a commit 93a3cd8
Show file tree
Hide file tree
Showing 2 changed files with 81 additions and 15 deletions.
74 changes: 74 additions & 0 deletions .github/workflows/docker-main.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,74 @@
name: Build and push ckan-pycsw image from main push

on:
push:
branches:
- main

env:
REGISTRY: ghcr.io
IMAGE_NAME: ${{ github.repository }}
TAG: ghcr.io/${{ github.repository }}:${{ github.ref_name }}
CONTEXT: .
BRANCH: ${{ github.ref_name }}
DOCKERFILE_PATH: /ckan-pycsw
DOCKERFILE: Dockerfile

jobs:
docker:
name: runner/build-docker-push:${{ github.ref_name }}
runs-on: ubuntu-latest
if: github.event_name == 'push'

steps:
- name: Set up QEMU
uses: docker/setup-qemu-action@v3

- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3

- name: Check out code
uses: actions/checkout@v4

- name: Login to registry
uses: docker/login-action@v3
with:
registry: ${{ env.REGISTRY }}
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}

- name: Extract Docker metadata
id: meta
uses: docker/metadata-action@v4
with:
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}
labels: |
org.opencontainers.image.documentation=https://github.com/${{ github.repository }}/blob/${{ env.BRANCH }}/README.md
org.opencontainers.image.version=${{ env.BRANCH }}
- name: Build and push
uses: docker/build-push-action@v5
with:
push: true
tags: ${{ env.TAG }}
labels: ${{ steps.meta.outputs.labels }}
context: ${{ env.CONTEXT }}
file: ${{ env.CONTEXT }}${{ env.DOCKERFILE_PATH }}/${{ env.DOCKERFILE }}

- name: Linting Dockerfile with hadolint in GH Actions
uses: hadolint/[email protected]
with:
dockerfile: ${{ env.CONTEXT }}${{ env.DOCKERFILE_PATH }}/${{ env.DOCKERFILE }}

- name: Run Trivy container image vulnerability scanner
uses: aquasecurity/[email protected]
with:
image-ref: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ env.BRANCH }}
format: sarif
output: trivy-results.sarif

- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v2
if: always()
with:
sarif_file: trivy-results.sarif
22 changes: 7 additions & 15 deletions .github/workflows/docker.yaml
Original file line number Diff line number Diff line change
@@ -1,9 +1,6 @@
name: Build and push ckan-pycsw image

on:
push:
branches:
- main
pull_request:
types:
- closed
Expand All @@ -14,23 +11,18 @@ on:
env:
REGISTRY: ghcr.io
IMAGE_NAME: ${{ github.repository }}
TAG: ghcr.io/${{ github.repository }}:${{ github.head_ref }}
CONTEXT: .
BRANCH: ${{ github.head_ref }}
DOCKERFILE_PATH: /ckan-pycsw
DOCKERFILE: Dockerfile
HADOLINT_VERSION: 2.12.0

jobs:
docker:
name: runner/build-docker-push:${{ github.head_ref }}
runs-on: ubuntu-latest
if: github.event.pull_request.merged == true
strategy:
matrix:
include:
- image: ghcr.io/${{ github.repository }}
tag: ghcr.io/${{ github.repository }}:${{ github.head_ref }}
dockerfile: ./ckan-pycsw/Dockerfile

steps:
- name: Set up QEMU
uses: docker/setup-qemu-action@v3
Expand All @@ -52,7 +44,7 @@ jobs:
id: meta
uses: docker/metadata-action@v4
with:
images: ${{ matrix.image }}
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}
labels: |
org.opencontainers.image.documentation=https://github.com/${{ github.repository }}/blob/${{ env.BRANCH }}/README.md
org.opencontainers.image.version=${{ env.BRANCH }}
Expand All @@ -61,20 +53,20 @@ jobs:
uses: docker/build-push-action@v5
with:
push: true
tags: ${{ matrix.tag }}
tags: ${{ env.TAG }}
labels: ${{ steps.meta.outputs.labels }}
context: ${{ env.CONTEXT }}
file: ${{ matrix.dockerfile }}
file: ${{ env.CONTEXT }}${{ env.DOCKERFILE_PATH }}/${{ env.DOCKERFILE }}

- name: Linting Dockerfile with hadolint in GH Actions
uses: hadolint/[email protected]
with:
dockerfile: ${{ matrix.dockerfile }}
dockerfile: ${{ env.CONTEXT }}${{ env.DOCKERFILE_PATH }}/${{ env.DOCKERFILE }}

- name: Run Trivy container image vulnerability scanner
uses: aquasecurity/[email protected]
with:
image-ref: ${{ matrix.tag }}
image-ref: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ env.BRANCH }}
format: sarif
output: trivy-results.sarif

Expand Down

0 comments on commit 93a3cd8

Please sign in to comment.