Skip to content

chore(deps): bump goreleaser/goreleaser-action from 4 to 5 (#65) #38

chore(deps): bump goreleaser/goreleaser-action from 4 to 5 (#65)

chore(deps): bump goreleaser/goreleaser-action from 4 to 5 (#65) #38

Workflow file for this run

name: Docker Image CI
on:
push:
branches:
- main
jobs:
build:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v4
- name: Login to DockerHub
uses: docker/login-action@v3
with:
username: ${{ secrets.DOCKER_USERNAME }}
password: ${{ secrets.DOCKER_PASSWORD }}
- name: Login to GHCR
uses: docker/login-action@v3
with:
registry: ghcr.io
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}
- name: Docker meta
uses: docker/metadata-action@v5
id: meta
with:
images: packagefoundation/yap*
labels: |
maintainer=Yap
org.opencontainers.image.title=yap
org.opencontainers.image.description=Package software with ease 📦
org.opencontainers.image.vendor=PackageFoundation
tags: |
type=raw,value=latest
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-amazon-1:latest
ghcr.io/packagefoundation/yap-amazon-1:latest
file: docker/amazon-1/Dockerfile
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-amazon-2:latest
ghcr.io/packagefoundation/yap-amazon-2:latest
file: docker/amazon-2/Dockerfile
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-alpine:latest
ghcr.io/packagefoundation/yap-alpine:latest
file: docker/alpine/Dockerfile
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-arch:latest
ghcr.io/packagefoundation/yap-arch:latest
file: docker/arch/Dockerfile
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-debian-buster:latest
ghcr.io/packagefoundation/yap-debian-buster:latest
file: docker/debian-buster/Dockerfile
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-debian-jessie:latest
ghcr.io/packagefoundation/yap-debian-jessie:latest
file: docker/debian-jessie/Dockerfile
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-debian-stretch:latest
ghcr.io/packagefoundation/yap-debian-stretch:latest
file: docker/debian-stretch/Dockerfile
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-fedora-35:latest
ghcr.io/packagefoundation/yap-fedora-35:latest
file: docker/fedora-35/Dockerfile
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-opensuse-tubleweed:latest
ghcr.io/packagefoundation/yap-opensuse-tubleweed:latest
file: docker/opensuse-tubleweed/Dockerfile
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-oracle-8:latest
ghcr.io/packagefoundation/yap-oracle-8:latest
file: docker/oracle-8/Dockerfile
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-rocky-8:latest
ghcr.io/packagefoundation/yap-rocky-8:latest
file: docker/rocky-8/Dockerfile
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-ubuntu-bionic:latest
ghcr.io/packagefoundation/yap-ubuntu-bionic:latest
file: docker/ubuntu-bionic/Dockerfile
- name: Build and push
uses: docker/build-push-action@v5
with:
context: .
push: true
labels: ${{ steps.meta.outputs.labels }}
tags: |
packagefoundation/yap-ubuntu-focal:latest
ghcr.io/packagefoundation/yap-ubuntu-focal:latest
file: docker/ubuntu-focal/Dockerfile
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: "packagefoundation/yap-amazon-1:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: "packagefoundation/yap-amazon-2:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: "packagefoundation/yap-arch:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: "packagefoundation/yap-debian-buster:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: "packagefoundation/yap-debian-jessie:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: "packagefoundation/yap-debian-stretch:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: "packagefoundation/yap-fedora-35:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: "packagefoundation/yap-opensuse-tubleweed:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: "packagefoundation/yap-oracle-8:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: "packagefoundation/yap-rocky-8:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: "packagefoundation/yap-ubuntu-bionic:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
with:
image-ref: "packagefoundation/yap-ubuntu-focal:latest"
format: "sarif"
output: "trivy-results.sarif"
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v2
if: always()
with:
sarif_file: "trivy-results.sarif"