From 5d0c035607635cfe1a73caf808b799a12603a38d Mon Sep 17 00:00:00 2001 From: Tommy Date: Sun, 8 Sep 2024 12:52:36 -0700 Subject: [PATCH] Create build-unprivileged-slim.yml Signed-off-by: Tommy --- .github/workflows/build-unprivileged-slim.yml | 109 ++++++++++++++++++ 1 file changed, 109 insertions(+) create mode 100644 .github/workflows/build-unprivileged-slim.yml diff --git a/.github/workflows/build-unprivileged-slim.yml b/.github/workflows/build-unprivileged-slim.yml new file mode 100644 index 0000000..3fb8e39 --- /dev/null +++ b/.github/workflows/build-unprivileged-slim.yml @@ -0,0 +1,109 @@ +name: Build Unprivileged Slim + +on: + workflow_dispatch: + push: + branches: + - unprivileged-slim + # Ignore Markdown files + paths-ignore: + - '**.md' + schedule: + # Build the image daily + - cron: '15 0 * * *' + +env: + REGISTRY: ghcr.io + IMAGE_NAME: polarix-containers/nginx + TAG: unprivileged-slim + +jobs: + build: + name: Build & push new image + permissions: + contents: read + packages: write + timeout-minutes: 10 + runs-on: ubuntu-24.04 + + steps: + - name: Checkout code + uses: actions/checkout@v4 + + # Add support for more platforms with QEMU + - name: Set up QEMU + uses: docker/setup-qemu-action@v3 + + - name: Set up Docker Buildx + uses: docker/setup-buildx-action@v3 + + - name: Login to registry + if: github.event_name != 'pull_request' + uses: docker/login-action@v3 + with: + registry: ${{ env.REGISTRY }} + username: ${{ github.repository_owner }} + password: ${{ secrets.GITHUB_TOKEN }} + + - name: Set Docker metadata + id: meta + uses: docker/metadata-action@v5 + with: + images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }} + tags: | + ${{ env.TAG }} + + - name: Build and push Docker image + id: build-and-push + uses: docker/build-push-action@v6 + with: + context: . + platforms: linux/amd64,linux/arm64 + push: ${{ github.event_name != 'pull_request' }} + tags: ${{ steps.meta.outputs.tags }} + labels: ${{ steps.meta.outputs.labels }} + + trivy: + name: Scan current image with Trivy + needs: build + permissions: + security-events: write + timeout-minutes: 10 + runs-on: ubuntu-24.04 + steps: + - name: Run Trivy vulnerability scanner + uses: aquasecurity/trivy-action@master + with: + image-ref: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ env.TAG }} + format: template + template: '@/contrib/sarif.tpl' + output: trivy-results.sarif + severity: UNKNOWN,LOW,MEDIUM,HIGH,CRITICAL + vuln-type: os,library + + - name: Upload Trivy scan results to GitHub Security tab + uses: github/codeql-action/upload-sarif@v3 + with: + sarif_file: trivy-results.sarif + category: trivy + + grype: + name: Scan current image with Grype + needs: build + permissions: + security-events: write + timeout-minutes: 10 + runs-on: ubuntu-24.04 + steps: + - name: Run Grype vulnerability scanner + uses: anchore/scan-action@v4 + id: grype + with: + image: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ env.TAG }} + fail-build: false + + - name: Upload Grype scan results to GitHub Security tab + uses: github/codeql-action/upload-sarif@v3 + with: + sarif_file: ${{ steps.grype.outputs.sarif }} + category: grype