Skip to content
GitLab
Projects
Groups
Snippets
Help
Loading...
Help
Help
Support
Community forum
Keyboard shortcuts
?
Submit feedback
Sign in
Toggle navigation
Open sidebar
SocialGouv
docker
Commits
9f29e1d4
Commit
9f29e1d4
authored
Jan 04, 2022
by
Julien Bouquillon
🐫
Browse files
chore: remove legacy images
parent
2ce24389
Changes
86
Hide whitespace changes
Inline
Side-by-side
Showing
75 changed files
with
2 additions
and
2861 deletions
+2
-2861
.github/workflows/ci-deploy.branches.workflow.yaml
.github/workflows/ci-deploy.branches.workflow.yaml
+0
-116
.github/workflows/ci-deploy.main.workflow.yaml
.github/workflows/ci-deploy.main.workflow.yaml
+0
-115
.github/workflows/curl.branches.workflow.yaml
.github/workflows/curl.branches.workflow.yaml
+0
-116
.github/workflows/curl.main.workflow.yaml
.github/workflows/curl.main.workflow.yaml
+0
-115
.github/workflows/git-deploy.branches.workflow.yaml
.github/workflows/git-deploy.branches.workflow.yaml
+0
-126
.github/workflows/git-deploy.main.workflow.yaml
.github/workflows/git-deploy.main.workflow.yaml
+0
-125
.github/workflows/kosko.branches.workflow.yaml
.github/workflows/kosko.branches.workflow.yaml
+0
-116
.github/workflows/kosko.main.workflow.yaml
.github/workflows/kosko.main.workflow.yaml
+0
-115
.github/workflows/kubectl.branches.workflow.yaml
.github/workflows/kubectl.branches.workflow.yaml
+0
-116
.github/workflows/kubectl.main.workflow.yaml
.github/workflows/kubectl.main.workflow.yaml
+0
-115
.github/workflows/no-k8s.branches.workflow.yaml
.github/workflows/no-k8s.branches.workflow.yaml
+0
-117
.github/workflows/no-k8s.main.workflow.yaml
.github/workflows/no-k8s.main.workflow.yaml
+0
-116
.github/workflows/puppeteer.branches.workflow.yaml
.github/workflows/puppeteer.branches.workflow.yaml
+0
-117
.github/workflows/puppeteer.main.workflow.yaml
.github/workflows/puppeteer.main.workflow.yaml
+0
-116
README.md
README.md
+2
-9
ci-deploy/.env
ci-deploy/.env
+0
-1
ci-deploy/.github/AssemblyLine.dhall
ci-deploy/.github/AssemblyLine.dhall
+0
-23
ci-deploy/.github/branches.workflow.dhall
ci-deploy/.github/branches.workflow.dhall
+0
-8
ci-deploy/.github/main.workflow.dhall
ci-deploy/.github/main.workflow.dhall
+0
-8
ci-deploy/Dockerfile
ci-deploy/Dockerfile
+0
-56
ci-deploy/Makefile
ci-deploy/Makefile
+0
-17
ci-deploy/README.md
ci-deploy/README.md
+0
-12
ci-deploy/docker-compose.yml
ci-deploy/docker-compose.yml
+0
-33
ci-deploy/tests/container-structure-test.yml
ci-deploy/tests/container-structure-test.yml
+0
-29
curl/.env
curl/.env
+0
-1
curl/.github/AssemblyLine.dhall
curl/.github/AssemblyLine.dhall
+0
-22
curl/.github/branches.workflow.dhall
curl/.github/branches.workflow.dhall
+0
-8
curl/.github/main.workflow.dhall
curl/.github/main.workflow.dhall
+0
-8
curl/Dockerfile
curl/Dockerfile
+0
-5
curl/Makefile
curl/Makefile
+0
-17
curl/README.md
curl/README.md
+0
-9
curl/docker-compose.yml
curl/docker-compose.yml
+0
-33
curl/tests/container-structure-test.yml
curl/tests/container-structure-test.yml
+0
-8
git-deploy/.env
git-deploy/.env
+0
-1
git-deploy/.github/AssemblyLine.dhall
git-deploy/.github/AssemblyLine.dhall
+0
-41
git-deploy/.github/branches.workflow.dhall
git-deploy/.github/branches.workflow.dhall
+0
-8
git-deploy/.github/main.workflow.dhall
git-deploy/.github/main.workflow.dhall
+0
-8
git-deploy/Dockerfile
git-deploy/Dockerfile
+0
-15
git-deploy/Makefile
git-deploy/Makefile
+0
-21
git-deploy/README.md
git-deploy/README.md
+0
-66
git-deploy/bin/create-deployment
git-deploy/bin/create-deployment
+0
-56
git-deploy/bin/extract-deploy-id
git-deploy/bin/extract-deploy-id
+0
-13
git-deploy/bin/update-deployment
git-deploy/bin/update-deployment
+0
-36
git-deploy/docker-compose.yml
git-deploy/docker-compose.yml
+0
-33
git-deploy/tests/container-structure-test.yml
git-deploy/tests/container-structure-test.yml
+0
-19
git-deploy/tests/create-deployment.bats
git-deploy/tests/create-deployment.bats
+0
-93
git-deploy/tests/extract-deploy-id.bats
git-deploy/tests/extract-deploy-id.bats
+0
-32
git-deploy/tests/fixtures/deploy_payload.json
git-deploy/tests/fixtures/deploy_payload.json
+0
-39
git-deploy/tests/update-deployment.bats
git-deploy/tests/update-deployment.bats
+0
-32
kosko/.env
kosko/.env
+0
-1
kosko/.github/AssemblyLine.dhall
kosko/.github/AssemblyLine.dhall
+0
-22
kosko/.github/branches.workflow.dhall
kosko/.github/branches.workflow.dhall
+0
-8
kosko/.github/main.workflow.dhall
kosko/.github/main.workflow.dhall
+0
-8
kosko/Dockerfile
kosko/Dockerfile
+0
-43
kosko/Makefile
kosko/Makefile
+0
-17
kosko/README.md
kosko/README.md
+0
-22
kosko/docker-compose.yml
kosko/docker-compose.yml
+0
-33
kosko/package.json
kosko/package.json
+0
-5
kosko/tests/container-structure-test.yml
kosko/tests/container-structure-test.yml
+0
-25
kubectl/.env
kubectl/.env
+0
-1
kubectl/.github/AssemblyLine.dhall
kubectl/.github/AssemblyLine.dhall
+0
-23
kubectl/.github/branches.workflow.dhall
kubectl/.github/branches.workflow.dhall
+0
-8
kubectl/.github/main.workflow.dhall
kubectl/.github/main.workflow.dhall
+0
-8
kubectl/Dockerfile
kubectl/Dockerfile
+0
-34
kubectl/Makefile
kubectl/Makefile
+0
-17
kubectl/README.md
kubectl/README.md
+0
-3
kubectl/docker-compose.yml
kubectl/docker-compose.yml
+0
-33
kubectl/tests/container-structure-test.yml
kubectl/tests/container-structure-test.yml
+0
-9
no-k8s/.env
no-k8s/.env
+0
-1
no-k8s/.github/AssemblyLine.dhall
no-k8s/.github/AssemblyLine.dhall
+0
-27
no-k8s/.github/branches.workflow.dhall
no-k8s/.github/branches.workflow.dhall
+0
-8
no-k8s/.github/main.workflow.dhall
no-k8s/.github/main.workflow.dhall
+0
-8
no-k8s/Dockerfile
no-k8s/Dockerfile
+0
-16
no-k8s/Makefile
no-k8s/Makefile
+0
-17
no-k8s/README.md
no-k8s/README.md
+0
-3
No files found.
.github/workflows/ci-deploy.branches.workflow.yaml
deleted
100644 → 0
View file @
2ce24389
concurrency
:
cancel-in-progress
:
true
group
:
"
ci-deploy-${{
github.ref
}}"
jobs
:
build
:
name
:
Build
needs
:
-
Lint
outputs
:
digest
:
"
${{
steps.docker_push.outputs.digest
}}"
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
id
:
docker_meta
uses
:
"
crazy-max/ghaction-docker-meta@f6efe56d565add159ad605568120f5b22712a870"
with
:
images
:
ghcr.io/socialgouv/docker/ci-deploy
labels
:
|
org.opencontainers.image.title=ci-deploy
org.opencontainers.image.documentation=https://github.com/SocialGouv/docker/tree/${{ github.sha }}/ci-deploy
tags
:
|
type=sha
type=raw,value=sha-${{ github.sha }}
type=ref,event=branch
type=ref,event=pr
type=semver,pattern={{version}}
type=semver,pattern={{major}}.{{minor}}
-
id
:
docker_buildx
name
:
Set up Docker Buildx
uses
:
"
docker/setup-buildx-action@abe5d8f79a1606a2d3e218847032f3f2b1726ab0"
with
:
{}
-
if
:
"
${{
github.event_name
!=
'pull_request'
}}"
name
:
Login to ghcr.io/socialgouv Registry
uses
:
"
docker/login-action@f054a8b539a109f9f41c372932f1ae047eff08c9"
with
:
password
:
"
${{
secrets.GHCR_REGISTRY_TOKEN
}}"
registry
:
ghcr.io
username
:
"
${{
secrets.SOCIALGROOVYBOT_NAME
}}"
-
id
:
docker_push
name
:
Push
uses
:
"
docker/build-push-action@1bc1040caef9e604eb543693ba89b5bf4fc80935"
with
:
builder
:
"
${{
steps.docker_buildx.outputs.name
}}"
cache-from
:
type=gha
cache-to
:
"
type=gha,mode=max"
context
:
"
./ci-deploy"
labels
:
"
${{
steps.docker_meta.outputs.labels
}}"
push
:
'
true'
tags
:
"
${{
steps.docker_meta.outputs.tags
}}"
-
name
:
Image digest
run
:
|
echo "${{ steps.docker_push.outputs.digest }}"
container_test
:
name
:
Container Test
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
name
:
Container structure test
uses
:
"
docker://gcr.io/gcp-runtimes/container-structure-test:v1.10.0@sha256:78c0abfdc3696ec9fb35840d62342cf28f65d890d56beceb2113638d59f2cce8"
with
:
args
:
"
test
--config
ci-deploy/tests/container-structure-test.yml
-v
debug
--image
ghcr.io/socialgouv/docker/ci-deploy@${{
needs.Build.outputs.digest
}}
--pull"
lint
:
name
:
Lint
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
uses
:
"
docker://ghcr.io/hadolint/hadolint:2.4.0@sha256:ed22c9de9b884383094edb8930696a256c4450335945c68153d8fc8fbb27bf03"
with
:
args
:
hadolint ./ci-deploy/Dockerfile
security_scan
:
name
:
Vulnerability Scanner
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
run
:
"
docker
pull
ghcr.io/socialgouv/docker/ci-deploy:sha-${{
github.sha
}}"
-
name
:
Run Trivy vulnerability scanner
uses
:
"
aquasecurity/trivy-action@dba83feec810c70bacbc4bead308ae1e466c572b"
with
:
image-ref
:
"
ghcr.io/socialgouv/docker/ci-deploy:sha-${{
github.sha
}}"
-
name
:
Export Trivy Results as sarif
uses
:
"
aquasecurity/trivy-action@dba83feec810c70bacbc4bead308ae1e466c572b"
with
:
format
:
template
image-ref
:
"
ghcr.io/socialgouv/docker/ci-deploy:sha-${{
github.sha
}}"
output
:
trivy-results.sarif
template
:
"
@/contrib/sarif.tpl"
-
name
:
Change hardcoded Dockerfile path
run
:
"
sed
-i
's/
\"
uri
\"
:
\"
Dockerfile
\"
/
\"
uri
\"
:
\"
ci-deploy
\\
/Dockerfile
\"
/'
trivy-results.sarif"
-
uses
:
"
github/codeql-action/upload-sarif@a3a8231e64d3db0e7da0f3b56b9521dcccdfe412"
with
:
sarif_file
:
trivy-results.sarif
version_test
:
container
:
"
docker://ghcr.io/socialgouv/docker/ci-deploy:sha-${{
github.sha
}}"
name
:
Test Version
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
run
:
kubectl version --client=true
name
:
"
ci-deploy
(branch)"
on
:
push
:
branches-ignore
:
-
master
-
next
-
next-major
-
beta
-
alpha
-
"
+([0-9])?(.{+([0-9]),x}).x"
paths
:
-
"
ci-deploy/**"
-
"
.github/workflows/ci-deploy.branches.workflow.yaml"
.github/workflows/ci-deploy.main.workflow.yaml
deleted
100644 → 0
View file @
2ce24389
concurrency
:
cancel-in-progress
:
true
group
:
"
ci-deploy-${{
github.ref
}}"
jobs
:
build
:
name
:
Build
needs
:
-
Lint
outputs
:
digest
:
"
${{
steps.docker_push.outputs.digest
}}"
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
id
:
docker_meta
uses
:
"
crazy-max/ghaction-docker-meta@f6efe56d565add159ad605568120f5b22712a870"
with
:
images
:
ghcr.io/socialgouv/docker/ci-deploy
labels
:
|
org.opencontainers.image.title=ci-deploy
org.opencontainers.image.documentation=https://github.com/SocialGouv/docker/tree/${{ github.sha }}/ci-deploy
tags
:
|
type=sha
type=raw,value=sha-${{ github.sha }}
type=ref,event=branch
type=ref,event=pr
type=semver,pattern={{version}}
type=semver,pattern={{major}}.{{minor}}
-
id
:
docker_buildx
name
:
Set up Docker Buildx
uses
:
"
docker/setup-buildx-action@abe5d8f79a1606a2d3e218847032f3f2b1726ab0"
with
:
{}
-
if
:
"
${{
github.event_name
!=
'pull_request'
}}"
name
:
Login to ghcr.io/socialgouv Registry
uses
:
"
docker/login-action@f054a8b539a109f9f41c372932f1ae047eff08c9"
with
:
password
:
"
${{
secrets.GHCR_REGISTRY_TOKEN
}}"
registry
:
ghcr.io
username
:
"
${{
secrets.SOCIALGROOVYBOT_NAME
}}"
-
id
:
docker_push
name
:
Push
uses
:
"
docker/build-push-action@1bc1040caef9e604eb543693ba89b5bf4fc80935"
with
:
builder
:
"
${{
steps.docker_buildx.outputs.name
}}"
cache-from
:
type=gha
cache-to
:
"
type=gha,mode=max"
context
:
"
./ci-deploy"
labels
:
"
${{
steps.docker_meta.outputs.labels
}}"
push
:
'
true'
tags
:
"
${{
steps.docker_meta.outputs.tags
}}"
-
name
:
Image digest
run
:
|
echo "${{ steps.docker_push.outputs.digest }}"
container_test
:
name
:
Container Test
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
name
:
Container structure test
uses
:
"
docker://gcr.io/gcp-runtimes/container-structure-test:v1.10.0@sha256:78c0abfdc3696ec9fb35840d62342cf28f65d890d56beceb2113638d59f2cce8"
with
:
args
:
"
test
--config
ci-deploy/tests/container-structure-test.yml
-v
debug
--image
ghcr.io/socialgouv/docker/ci-deploy@${{
needs.Build.outputs.digest
}}
--pull"
lint
:
name
:
Lint
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
uses
:
"
docker://ghcr.io/hadolint/hadolint:2.4.0@sha256:ed22c9de9b884383094edb8930696a256c4450335945c68153d8fc8fbb27bf03"
with
:
args
:
hadolint ./ci-deploy/Dockerfile
security_scan
:
name
:
Vulnerability Scanner
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
run
:
"
docker
pull
ghcr.io/socialgouv/docker/ci-deploy:sha-${{
github.sha
}}"
-
name
:
Run Trivy vulnerability scanner
uses
:
"
aquasecurity/trivy-action@dba83feec810c70bacbc4bead308ae1e466c572b"
with
:
image-ref
:
"
ghcr.io/socialgouv/docker/ci-deploy:sha-${{
github.sha
}}"
-
name
:
Export Trivy Results as sarif
uses
:
"
aquasecurity/trivy-action@dba83feec810c70bacbc4bead308ae1e466c572b"
with
:
format
:
template
image-ref
:
"
ghcr.io/socialgouv/docker/ci-deploy:sha-${{
github.sha
}}"
output
:
trivy-results.sarif
template
:
"
@/contrib/sarif.tpl"
-
name
:
Change hardcoded Dockerfile path
run
:
"
sed
-i
's/
\"
uri
\"
:
\"
Dockerfile
\"
/
\"
uri
\"
:
\"
ci-deploy
\\
/Dockerfile
\"
/'
trivy-results.sarif"
-
uses
:
"
github/codeql-action/upload-sarif@a3a8231e64d3db0e7da0f3b56b9521dcccdfe412"
with
:
sarif_file
:
trivy-results.sarif
version_test
:
container
:
"
docker://ghcr.io/socialgouv/docker/ci-deploy:sha-${{
github.sha
}}"
name
:
Test Version
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
run
:
kubectl version --client=true
name
:
"
ci-deploy
(main)"
on
:
push
:
branches
:
-
master
-
next
-
next-major
-
beta
-
alpha
-
"
+([0-9])?(.{+([0-9]),x}).x"
tags
:
-
"
v*"
.github/workflows/curl.branches.workflow.yaml
deleted
100644 → 0
View file @
2ce24389
concurrency
:
cancel-in-progress
:
true
group
:
"
curl-${{
github.ref
}}"
jobs
:
build
:
name
:
Build
needs
:
-
Lint
outputs
:
digest
:
"
${{
steps.docker_push.outputs.digest
}}"
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
id
:
docker_meta
uses
:
"
crazy-max/ghaction-docker-meta@f6efe56d565add159ad605568120f5b22712a870"
with
:
images
:
ghcr.io/socialgouv/docker/curl
labels
:
|
org.opencontainers.image.title=curl
org.opencontainers.image.documentation=https://github.com/SocialGouv/docker/tree/${{ github.sha }}/curl
tags
:
|
type=sha
type=raw,value=sha-${{ github.sha }}
type=ref,event=branch
type=ref,event=pr
type=semver,pattern={{version}}
type=semver,pattern={{major}}.{{minor}}
-
id
:
docker_buildx
name
:
Set up Docker Buildx
uses
:
"
docker/setup-buildx-action@abe5d8f79a1606a2d3e218847032f3f2b1726ab0"
with
:
{}
-
if
:
"
${{
github.event_name
!=
'pull_request'
}}"
name
:
Login to ghcr.io/socialgouv Registry
uses
:
"
docker/login-action@f054a8b539a109f9f41c372932f1ae047eff08c9"
with
:
password
:
"
${{
secrets.GHCR_REGISTRY_TOKEN
}}"
registry
:
ghcr.io
username
:
"
${{
secrets.SOCIALGROOVYBOT_NAME
}}"
-
id
:
docker_push
name
:
Push
uses
:
"
docker/build-push-action@1bc1040caef9e604eb543693ba89b5bf4fc80935"
with
:
builder
:
"
${{
steps.docker_buildx.outputs.name
}}"
cache-from
:
type=gha
cache-to
:
"
type=gha,mode=max"
context
:
"
./curl"
labels
:
"
${{
steps.docker_meta.outputs.labels
}}"
push
:
'
true'
tags
:
"
${{
steps.docker_meta.outputs.tags
}}"
-
name
:
Image digest
run
:
|
echo "${{ steps.docker_push.outputs.digest }}"
container_test
:
name
:
Container Test
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
name
:
Container structure test
uses
:
"
docker://gcr.io/gcp-runtimes/container-structure-test:v1.10.0@sha256:78c0abfdc3696ec9fb35840d62342cf28f65d890d56beceb2113638d59f2cce8"
with
:
args
:
"
test
--config
curl/tests/container-structure-test.yml
-v
debug
--image
ghcr.io/socialgouv/docker/curl@${{
needs.Build.outputs.digest
}}
--pull"
lint
:
name
:
Lint
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
uses
:
"
docker://ghcr.io/hadolint/hadolint:2.4.0@sha256:ed22c9de9b884383094edb8930696a256c4450335945c68153d8fc8fbb27bf03"
with
:
args
:
hadolint ./curl/Dockerfile
security_scan
:
name
:
Vulnerability Scanner
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
run
:
"
docker
pull
ghcr.io/socialgouv/docker/curl:sha-${{
github.sha
}}"
-
name
:
Run Trivy vulnerability scanner
uses
:
"
aquasecurity/trivy-action@dba83feec810c70bacbc4bead308ae1e466c572b"
with
:
image-ref
:
"
ghcr.io/socialgouv/docker/curl:sha-${{
github.sha
}}"
-
name
:
Export Trivy Results as sarif
uses
:
"
aquasecurity/trivy-action@dba83feec810c70bacbc4bead308ae1e466c572b"
with
:
format
:
template
image-ref
:
"
ghcr.io/socialgouv/docker/curl:sha-${{
github.sha
}}"
output
:
trivy-results.sarif
template
:
"
@/contrib/sarif.tpl"
-
name
:
Change hardcoded Dockerfile path
run
:
"
sed
-i
's/
\"
uri
\"
:
\"
Dockerfile
\"
/
\"
uri
\"
:
\"
curl
\\
/Dockerfile
\"
/'
trivy-results.sarif"
-
uses
:
"
github/codeql-action/upload-sarif@a3a8231e64d3db0e7da0f3b56b9521dcccdfe412"
with
:
sarif_file
:
trivy-results.sarif
version_test
:
container
:
"
docker://ghcr.io/socialgouv/docker/curl:sha-${{
github.sha
}}"
name
:
Test Version
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
run
:
curl --version
name
:
"
curl
(branch)"
on
:
push
:
branches-ignore
:
-
master
-
next
-
next-major
-
beta
-
alpha
-
"
+([0-9])?(.{+([0-9]),x}).x"
paths
:
-
"
curl/**"
-
"
.github/workflows/curl.branches.workflow.yaml"
.github/workflows/curl.main.workflow.yaml
deleted
100644 → 0
View file @
2ce24389
concurrency
:
cancel-in-progress
:
true
group
:
"
curl-${{
github.ref
}}"
jobs
:
build
:
name
:
Build
needs
:
-
Lint
outputs
:
digest
:
"
${{
steps.docker_push.outputs.digest
}}"
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
id
:
docker_meta
uses
:
"
crazy-max/ghaction-docker-meta@f6efe56d565add159ad605568120f5b22712a870"
with
:
images
:
ghcr.io/socialgouv/docker/curl
labels
:
|
org.opencontainers.image.title=curl
org.opencontainers.image.documentation=https://github.com/SocialGouv/docker/tree/${{ github.sha }}/curl
tags
:
|
type=sha
type=raw,value=sha-${{ github.sha }}
type=ref,event=branch
type=ref,event=pr
type=semver,pattern={{version}}
type=semver,pattern={{major}}.{{minor}}
-
id
:
docker_buildx
name
:
Set up Docker Buildx
uses
:
"
docker/setup-buildx-action@abe5d8f79a1606a2d3e218847032f3f2b1726ab0"
with
:
{}
-
if
:
"
${{
github.event_name
!=
'pull_request'
}}"
name
:
Login to ghcr.io/socialgouv Registry
uses
:
"
docker/login-action@f054a8b539a109f9f41c372932f1ae047eff08c9"
with
:
password
:
"
${{
secrets.GHCR_REGISTRY_TOKEN
}}"
registry
:
ghcr.io
username
:
"
${{
secrets.SOCIALGROOVYBOT_NAME
}}"
-
id
:
docker_push
name
:
Push
uses
:
"
docker/build-push-action@1bc1040caef9e604eb543693ba89b5bf4fc80935"
with
:
builder
:
"
${{
steps.docker_buildx.outputs.name
}}"
cache-from
:
type=gha
cache-to
:
"
type=gha,mode=max"
context
:
"
./curl"
labels
:
"
${{
steps.docker_meta.outputs.labels
}}"
push
:
'
true'
tags
:
"
${{
steps.docker_meta.outputs.tags
}}"
-
name
:
Image digest
run
:
|
echo "${{ steps.docker_push.outputs.digest }}"
container_test
:
name
:
Container Test
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
name
:
Container structure test
uses
:
"
docker://gcr.io/gcp-runtimes/container-structure-test:v1.10.0@sha256:78c0abfdc3696ec9fb35840d62342cf28f65d890d56beceb2113638d59f2cce8"
with
:
args
:
"
test
--config
curl/tests/container-structure-test.yml
-v
debug
--image
ghcr.io/socialgouv/docker/curl@${{
needs.Build.outputs.digest
}}
--pull"
lint
:
name
:
Lint
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
uses
:
"
docker://ghcr.io/hadolint/hadolint:2.4.0@sha256:ed22c9de9b884383094edb8930696a256c4450335945c68153d8fc8fbb27bf03"
with
:
args
:
hadolint ./curl/Dockerfile
security_scan
:
name
:
Vulnerability Scanner
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
run
:
"
docker
pull
ghcr.io/socialgouv/docker/curl:sha-${{
github.sha
}}"
-
name
:
Run Trivy vulnerability scanner
uses
:
"
aquasecurity/trivy-action@dba83feec810c70bacbc4bead308ae1e466c572b"
with
:
image-ref
:
"
ghcr.io/socialgouv/docker/curl:sha-${{
github.sha
}}"
-
name
:
Export Trivy Results as sarif
uses
:
"
aquasecurity/trivy-action@dba83feec810c70bacbc4bead308ae1e466c572b"
with
:
format
:
template
image-ref
:
"
ghcr.io/socialgouv/docker/curl:sha-${{
github.sha
}}"
output
:
trivy-results.sarif
template
:
"
@/contrib/sarif.tpl"
-
name
:
Change hardcoded Dockerfile path
run
:
"
sed
-i
's/
\"
uri
\"
:
\"
Dockerfile
\"
/
\"
uri
\"
:
\"
curl
\\
/Dockerfile
\"
/'
trivy-results.sarif"
-
uses
:
"
github/codeql-action/upload-sarif@a3a8231e64d3db0e7da0f3b56b9521dcccdfe412"
with
:
sarif_file
:
trivy-results.sarif
version_test
:
container
:
"
docker://ghcr.io/socialgouv/docker/curl:sha-${{
github.sha
}}"
name
:
Test Version
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
run
:
curl --version
name
:
"
curl
(main)"
on
:
push
:
branches
:
-
master
-
next
-
next-major
-
beta
-
alpha
-
"
+([0-9])?(.{+([0-9]),x}).x"
tags
:
-
"
v*"
.github/workflows/git-deploy.branches.workflow.yaml
deleted
100644 → 0
View file @
2ce24389
concurrency
:
cancel-in-progress
:
true
group
:
"
git-deploy-${{
github.ref
}}"
jobs
:
build
:
name
:
Build
needs
:
-
Lint
outputs
:
digest
:
"
${{
steps.docker_push.outputs.digest
}}"
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
id
:
docker_meta
uses
:
"
crazy-max/ghaction-docker-meta@f6efe56d565add159ad605568120f5b22712a870"
with
:
images
:
ghcr.io/socialgouv/docker/git-deploy
labels
:
|
org.opencontainers.image.title=git-deploy
org.opencontainers.image.documentation=https://github.com/SocialGouv/docker/tree/${{ github.sha }}/git-deploy
tags
:
|
type=sha
type=raw,value=sha-${{ github.sha }}
type=ref,event=branch
type=ref,event=pr
type=semver,pattern={{version}}
type=semver,pattern={{major}}.{{minor}}
-
id
:
docker_buildx
name
:
Set up Docker Buildx
uses
:
"
docker/setup-buildx-action@abe5d8f79a1606a2d3e218847032f3f2b1726ab0"
with
:
{}
-
if
:
"
${{
github.event_name
!=
'pull_request'
}}"
name
:
Login to ghcr.io/socialgouv Registry
uses
:
"
docker/login-action@f054a8b539a109f9f41c372932f1ae047eff08c9"
with
:
password
:
"
${{
secrets.GHCR_REGISTRY_TOKEN
}}"
registry
:
ghcr.io
username
:
"
${{
secrets.SOCIALGROOVYBOT_NAME
}}"
-
id
:
docker_push
name
:
Push
uses
:
"
docker/build-push-action@1bc1040caef9e604eb543693ba89b5bf4fc80935"
with
:
builder
:
"
${{
steps.docker_buildx.outputs.name
}}"
cache-from
:
type=gha
cache-to
:
"
type=gha,mode=max"
context
:
"
./git-deploy"
labels
:
"
${{
steps.docker_meta.outputs.labels
}}"
push
:
'
true'
tags
:
"
${{
steps.docker_meta.outputs.tags
}}"
-
name
:
Image digest
run
:
|
echo "${{ steps.docker_push.outputs.digest }}"
container_test
:
name
:
Container Test
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
name
:
Container structure test
uses
:
"
docker://gcr.io/gcp-runtimes/container-structure-test:v1.10.0@sha256:78c0abfdc3696ec9fb35840d62342cf28f65d890d56beceb2113638d59f2cce8"
with
:
args
:
"
test
--config
git-deploy/tests/container-structure-test.yml
-v
debug
--image
ghcr.io/socialgouv/docker/git-deploy@${{
needs.Build.outputs.digest
}}
--pull"
integration_test
:
name
:
Integration test
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
run
:
yarn --frozen-lockfile --prefer-offline
-
run
:
make e2e
working-directory
:
git-deploy
lint
:
name
:
Lint
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
uses
:
"
docker://ghcr.io/hadolint/hadolint:2.4.0@sha256:ed22c9de9b884383094edb8930696a256c4450335945c68153d8fc8fbb27bf03"
with
:
args
:
hadolint ./git-deploy/Dockerfile
security_scan
:
name
:
Vulnerability Scanner
needs
:
-
Build
runs-on
:
ubuntu-latest
steps
:
-
uses
:
"
actions/checkout@v2"
-
run
:
"
docker
pull
ghcr.io/socialgouv/docker/git-deploy:sha-${{
github.sha
}}"
-
name
:
Run Trivy vulnerability scanner
uses
:
"
aquasecurity/trivy-action@dba83feec810c70bacbc4bead308ae1e466c572b"
with
:
image-ref
:
"
ghcr.io/socialgouv/docker/git-deploy:sha-${{
github.sha
}}"
-
name
:
Export Trivy Results as sarif
uses
:
"
aquasecurity/trivy-action@dba83feec810c70bacbc4bead308ae1e466c572b"
with
:
format
:
template
image-ref
:
"
ghcr.io/socialgouv/docker/git-deploy:sha-${{
github.sha
}}"
output
:
trivy-results.sarif
template
:
"
@/contrib/sarif.tpl"
-
name
:
Change hardcoded Dockerfile path
run
:
"
sed
-i
's/
\"
uri
\"
:
\"
Dockerfile
\"
/
\"
uri
\"
:
\"
git-deploy
\\
/Dockerfile
\"
/'
trivy-results.sarif"
-
uses
:
"
github/codeql-action/upload-sarif@a3a8231e64d3db0e7da0f3b56b9521dcccdfe412"
with
:
sarif_file
:
trivy-results.sarif
version_test
:
container
:
"
docker://ghcr.io/socialgouv/docker/git-deploy:sha-${{
github.sha
}}"
name
:
Test Version