Skip to content

Add GH action to build and push images #1

Add GH action to build and push images

Add GH action to build and push images #1

Workflow file for this run

on:
push:
branches:
- master
pull_request:
name: Build
jobs:
build-amd64:
runs-on: ubuntu-latest
env:
TAG: ${GITHUB_REF_NAME}
REPOSITORY_OWNER: ${{ github.repository_owner }}
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Build container image
uses: docker/build-push-action@v5
with:
context: .
push: false
tags: ${{env.REPOSITORY_OWNER}}/hardened-build-base:${{env.TAG}}-amd64
file: Dockerfile
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@0.18.0
with:
image-ref: ${{env.REPOSITORY_OWNER}}/hardened-build-base:${{ env.TAG }}-amd64
format: 'table'
exit-code: '1'
ignore-unfixed: true
vuln-type: 'os,library'
severity: 'CRITICAL,HIGH'
build-arm64:
runs-on: ubuntu-latest
env:
TAG: ${GITHUB_REF_NAME}
REPOSITORY_OWNER: ${{ github.repository_owner }}
steps:
- name: Check out code
uses: actions/checkout@v4
- name: Set up QEMU
uses: docker/setup-qemu-action@v3
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Build container image
uses: docker/build-push-action@v5
with:
context: .
push: false
tags: ${{env.REPOSITORY_OWNER}}/hardened-build-base:${{env.TAG}}-arm64
file: Dockerfile
outputs: type=docker
platforms: linux/arm64
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@0.18.0
with:
image-ref: ${{env.REPOSITORY_OWNER}}/hardened-build-base:${{env.TAG}}-arm64
format: 'table'
exit-code: '1'
ignore-unfixed: true
vuln-type: 'os,library'
severity: 'CRITICAL,HIGH'