Skip to content

CASMPET-7130 pull container images for k8s 1.24 (#622) #2

CASMPET-7130 pull container images for k8s 1.24 (#622)

CASMPET-7130 pull container images for k8s 1.24 (#622) #2

#
# MIT License
#
# (C) Copyright [2024] Hewlett Packard Enterprise Development LP
#
# Permission is hereby granted, free of charge, to any person obtaining a
# copy of this software and associated documentation files (the "Software"),
# to deal in the Software without restriction, including without limitation
# the rights to use, copy, modify, merge, publish, distribute, sublicense,
# and/or sell copies of the Software, and to permit persons to whom the
# Software is furnished to do so, subject to the following conditions:
#
# The above copyright notice and this permission notice shall be included
# in all copies or substantial portions of the Software.
#
# THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
# IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
# FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL
# THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR
# OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE,
# ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR
# OTHER DEALINGS IN THE SOFTWARE.
#
# Generated with: make add IMAGE=kube-apiserver:v1.24.17 REGISTRY=registry.k8s.io PACKAGE_MANAGER=
# DO NOT EDIT THIS FILE DIRECTLY
---
name: registry.k8s.io/kube-apiserver:v1.24.17
on:
push:
paths:
- .github/workflows/registry.k8s.io.kube-apiserver.v1.24.17.yaml
- registry.k8s.io/kube-apiserver/v1.24.17/**
workflow_dispatch:
jobs:
build:
runs-on: ubuntu-latest
permissions:
contents: read
id-token: write
env:
CONTEXT_PATH: registry.k8s.io/kube-apiserver/v1.24.17
DOCKER_REPO: artifactory.algol60.net/csm-docker/${{ github.ref == 'refs/heads/main' && 'stable' || 'unstable' }}/registry.k8s.io/kube-apiserver
DOCKER_TAG: v1.24.17
steps:
- name: build-sign-scan
uses: Cray-HPE/github-actions/build-sign-scan@build-sign-scan/v2
with:
context_path: ${{ env.CONTEXT_PATH }}
docker_repo: ${{ env.DOCKER_REPO }}
docker_tag: ${{ env.DOCKER_TAG }}
docker_username: ${{ secrets.ARTIFACTORY_ALGOL60_USERNAME }}
docker_password: ${{ secrets.ARTIFACTORY_ALGOL60_TOKEN }}
sign: ${{ github.ref == 'refs/heads/main' }}
cosign_gcp_workload_identity_provider: ${{ secrets.COSIGN_GCP_WORKLOAD_IDENTITY_PROVIDER_RSA }}
cosign_gcp_service_account: ${{ secrets.COSIGN_GCP_SERVICE_ACCOUNT_RSA }}
cosign_key: ${{ secrets.COSIGN_KEY_RSA }}
snyk_token: ${{ secrets.SNYK_TOKEN }}
fail_on_snyk_errors: true