Compare commits

..

13 Commits

Author SHA1 Message Date
4688d023a0 Remove old grype version within image scan.
All checks were successful
Build ASU website image / Build-and-release-image (push) Successful in 59s
2025-09-16 10:27:15 +00:00
be0bf9d194 Use network mode host to build image.
Some checks failed
Build ASU website image / Build-and-release-image (push) Failing after 51s
2025-05-06 10:11:07 +00:00
8708923cc4 Schedule to 1am and use new build-push action.
All checks were successful
Build ASU website image / Build-and-release-image (push) Successful in 1m0s
2025-04-30 08:03:54 +00:00
9243375da4 .gitea/workflows/release.yml aktualisiert
All checks were successful
Build ASU website image / Build-and-release-image (push) Successful in 53s
2025-04-01 13:43:35 +02:00
078f0abdfe Remove trivy check. 2025-03-18 12:10:33 +01:00
f969a1efea Change vuln-type for trivy. 2025-03-06 08:28:20 +01:00
3a189363db Test trivy configuration. 2025-03-06 08:07:26 +01:00
329e6df7cc More trivy configuration. 2025-03-06 07:51:54 +01:00
6def3e64b4 Update trivy exit code. 2025-03-05 09:00:32 +01:00
00c21e8d53 Change some trivy parameters. 2025-03-03 16:35:15 +01:00
4069038fec Tryout trivy vulnerability scanner. 2025-03-03 15:49:53 +01:00
b39f0d47fc Use ubuntu:act-latest as container image. 2025-03-03 15:39:45 +01:00
70fabf3fda Use debian:stable-slim as container image. 2025-03-03 15:37:35 +01:00

View File

@@ -1,39 +1,82 @@
name: Build container image
name: Build ASU website image
on:
push:
branches: [ master ]
schedule:
# Run every Sunday at midnight
- cron: '1 0 * * 0'
env:
USER: chris
PASS: q',\H(Od:G3).Xv<#!5P
IMAGE: /arbeitsschutz-ulm/website
jobs:
Build-and-release-image:
runs-on: ubuntu-latest
container:
image: catthehacker/ubuntu:act-latest
steps:
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v2
with:
buildkitd-flags: '--allow-insecure-entitlement network.host'
driver-opts: network=host
- name: Log into registry
- name: Login to Docker Hub
uses: docker/login-action@v3
with:
registry: https://cs-git.ddnss.de
username: ${{ env.USER }}
password: ${{ env.PASS }}
username: ${{ vars.DOCKERHUB_USER }}
password: ${{ vars.DOCKERHUB_TOKEN }}
- name: Log into CS registry
uses: docker/login-action@v3
with:
registry: ${{ vars.CS_REGISTRY_URL }}
username: ${{ vars.CS_REGISTRY_USER }}
password: ${{ vars.CS_REGISTRY_PASS }}
- name: Log into local registry
uses: docker/login-action@v3
with:
registry: ${{ vars.LOCAL_REGISTRY_URL }}
username: ${{ vars.LOCAL_REGISTRY_USER }}
password: ${{ vars.LOCAL_REGISTRY_PASS }}
- name: Extract Docker metadata
id: meta
uses: docker/metadata-action@v5
with:
images: cs-git.ddnss.de/arbeitsschutz-ulm/website
images: ${{ secrets.REGISTRY_URL }}${{ env.IMAGE }}
- name: Build and push Docker image
uses: docker/build-push-action@v4
uses: docker/build-push-action@v6
env:
ACTIONS_RUNTIME_TOKEN: ''
with:
tags: cs-git.ddnss.de/arbeitsschutz-ulm/website:master
push: true
allow: network.host
network: host
tags: ${{ vars.LOCAL_REGISTRY_URL }}${{ env.IMAGE }}:latest
push: true
- name: Scan image
uses: anchore/scan-action@v6
id: scan
with:
image: ${{ vars.LOCAL_REGISTRY_URL }}${{ env.IMAGE }}:latest
fail-build: false
output-format: table
severity-cutoff: critical
registry-username: ${{ vars.LOCAL_REGISTRY_USER }}
registry-password: ${{ vars.LOCAL_REGISTRY_PASS }}
- name: Inspect file
run: cat ${{ steps.scan.outputs.table }}
- name: Upload Artifact
uses: actions/upload-artifact@v3
with:
name: scan-result
path: ${{ steps.scan.outputs.table }}