Skip to content

Commit

Permalink
Merge pull request #252 from sethforprivacy/github-ci
Browse files Browse the repository at this point in the history
Enable Github actions build of Docker image
  • Loading branch information
moneroexamples authored Sep 16, 2023
2 parents 578085a + 4017dd0 commit fdf2344
Show file tree
Hide file tree
Showing 5 changed files with 163 additions and 0 deletions.
4 changes: 4 additions & 0 deletions .github/containerscan/allowedlist.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,4 @@
general:
vulnerabilities:
- CIS-DI-0005
- CIS-DI-0008
7 changes: 7 additions & 0 deletions .github/dependabot.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,7 @@
version: 2
updates:
# Maintain dependencies for GitHub Actions
- package-ecosystem: "github-actions"
directory: "/"
schedule:
interval: "daily"
37 changes: 37 additions & 0 deletions .github/workflows/trivy-analysis.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,37 @@
name: Build and scan container for vulnerabilities with Trivy

on:
push:
paths:
- 'Dockerfile'
pull_request:
paths:
- 'Dockerfile'
schedule:
- cron: '22 14 * * 0'

jobs:
build:
name: Build
runs-on: "ubuntu-18.04"
steps:
- name: Checkout code
uses: actions/checkout@v2

- name: Build an image from Dockerfile
run: |
docker build -t docker.io/my-organization/my-app:${{ github.sha }} .
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: 'docker.io/my-organization/my-app:${{ github.sha }}'
format: 'template'
template: '@/contrib/sarif.tpl'
output: 'trivy-results.sarif'
severity: 'CRITICAL,HIGH'

- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v1
with:
sarif_file: 'trivy-results.sarif'
56 changes: 56 additions & 0 deletions .github/workflows/update-base-image.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,56 @@
name: "Update image and push to Github Packages and Docker Hub weekly"
on:
schedule:
- cron: "0 12 * * 1" # Run every Monday at noon.
workflow_dispatch:
jobs:
rebuild-container:
name: "Rebuild Container with the latest base image"
runs-on: ubuntu-latest
steps:
-
name: Set up Docker Buildx
uses: docker/[email protected]
-
name: Login to GitHub Container Registry
uses: docker/[email protected]
with:
registry: ghcr.io
username: ${{ github.repository_owner }}
password: ${{ secrets.GITHUB_TOKEN }}
-
name: Login to DockerHub
uses: docker/[email protected]
with:
username: ${{ secrets.DOCKER_USERNAME }}
password: ${{ secrets.DOCKER_PASSWORD }}
- name: "Checkout repository"
uses: "actions/[email protected]"
-
name: "Get Monero Release Tag"
id: get_tag
run: echo "::set-output name=tag::$(awk -F "=" '/MONERO_BRANCH=/ {print $2}' Dockerfile)"
-
name: Build and push to Docker Hub and Github Packages Docker Registry
id: docker_build
uses: docker/[email protected]
with:
push: true
tags: |
ghcr.io/${{ github.repository_owner }}/xmrblocks:latest
ghcr.io/${{ github.repository_owner }}/xmrblocks:${{ steps.get_tag.outputs.tag }}
${{ secrets.DOCKER_USERNAME }}/xmrblocks:latest
${{ secrets.DOCKER_USERNAME }}/xmrblocks:${{ steps.get_tag.outputs.tag }}
labels: |
org.opencontainers.image.source=${{ github.event.repository.html_url }}
org.opencontainers.image.created=${{ steps.prep.outputs.created }}
org.opencontainers.image.revision=${{ github.sha }}
-
name: Scan new image and output results
uses: Azure/container-scan@v0
with:
image-name: ${{ secrets.DOCKER_USERNAME }}/xmrblocks:${{ steps.get_tag.outputs.tag }}
severity-threshold: HIGH
-
name: Image digest
run: echo ${{ steps.docker_build.outputs.digest }}
59 changes: 59 additions & 0 deletions .github/workflows/update-image-on-push.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,59 @@
name: "Update image and push to Github Packages and Docker Hub when Dockerfile is changed"
# Run this workflow every time a new commit pushed to your repository
on:
push:
paths-ignore:
- 'README.md'
jobs:
rebuild-container:
name: "Rebuild Container with the latest base image"
runs-on: ubuntu-latest
steps:
-
name: Set up Docker Buildx
uses: docker/[email protected]
-
name: Login to GitHub Container Registry
uses: docker/[email protected]
with:
registry: ghcr.io
username: ${{ github.repository_owner }}
password: ${{ secrets.GITHUB_TOKEN }}
-
name: Login to DockerHub
uses: docker/[email protected]
with:
username: ${{ secrets.DOCKER_USERNAME }}
password: ${{ secrets.DOCKER_PASSWORD }}
- name: "Checkout repository"
uses: "actions/[email protected]"
-
name: "Get Monero Release Tag"
id: get_tag
run: echo "::set-output name=tag::$(awk -F "=" '/MONERO_BRANCH=/ {print $2}' Dockerfile)"
-
name: Build and push to Docker Hub and Github Packages Docker Registry
id: docker_build
uses: docker/[email protected]
with:
push: true
tags: |
ghcr.io/${{ github.repository_owner }}/xmrblocks:latest
ghcr.io/${{ github.repository_owner }}/xmrblocks:${{ steps.get_tag.outputs.tag }}
${{ secrets.DOCKER_USERNAME }}/xmrblocks:latest
${{ secrets.DOCKER_USERNAME }}/xmrblocks:${{ steps.get_tag.outputs.tag }}
labels: |
org.opencontainers.image.source=${{ github.event.repository.html_url }}
org.opencontainers.image.created=${{ steps.prep.outputs.created }}
org.opencontainers.image.revision=${{ github.sha }}
cache-from: type=registry,ref=${{ secrets.DOCKER_USERNAME }}/xmrblocks:latest
cache-to: type=inline
-
name: Scan new image and output results
uses: Azure/container-scan@v0
with:
image-name: ${{ secrets.DOCKER_USERNAME }}/xmrblocks:${{ steps.get_tag.outputs.tag }}
severity-threshold: HIGH
-
name: Image digest
run: echo ${{ steps.docker_build.outputs.digest }}

0 comments on commit fdf2344

Please sign in to comment.