mirror of
https://github.com/jackyzha0/quartz.git
synced 2026-03-24 15:05:42 -05:00
chore: run prettier
Signed-off-by: Aaron Pham <contact@aarnphm.xyz>
This commit is contained in:
parent
b04be86e88
commit
89e0c54def
24
.github/workflows/docker-build-push.yaml
vendored
24
.github/workflows/docker-build-push.yaml
vendored
@ -3,7 +3,7 @@ name: Docker build & push image
|
|||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
branches: [v4]
|
branches: [v4]
|
||||||
tags: ['v*']
|
tags: ["v*"]
|
||||||
pull_request:
|
pull_request:
|
||||||
branches: [v4]
|
branches: [v4]
|
||||||
paths:
|
paths:
|
||||||
@ -90,28 +90,28 @@ jobs:
|
|||||||
- name: Sign the released image
|
- name: Sign the released image
|
||||||
if: ${{ github.event_name != 'pull_request' }}
|
if: ${{ github.event_name != 'pull_request' }}
|
||||||
env:
|
env:
|
||||||
COSIGN_EXPERIMENTAL: 'true'
|
COSIGN_EXPERIMENTAL: "true"
|
||||||
run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign --yes {}@${{ steps.build-and-push.outputs.digest }}
|
run: echo "${{ steps.meta.outputs.tags }}" | xargs -I {} cosign sign --yes {}@${{ steps.build-and-push.outputs.digest }}
|
||||||
- name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph
|
- name: Run Trivy in GitHub SBOM mode and submit results to Dependency Graph
|
||||||
uses: aquasecurity/trivy-action@master
|
uses: aquasecurity/trivy-action@master
|
||||||
if: ${{ github.event_name != 'pull_request' }}
|
if: ${{ github.event_name != 'pull_request' }}
|
||||||
with:
|
with:
|
||||||
image-ref: 'ghcr.io/${{ github.repository_owner }}/quartz:sha-${{ env.GITHUB_SHA_SHORT }}'
|
image-ref: "ghcr.io/${{ github.repository_owner }}/quartz:sha-${{ env.GITHUB_SHA_SHORT }}"
|
||||||
format: 'github'
|
format: "github"
|
||||||
output: 'dependency-results.sbom.json'
|
output: "dependency-results.sbom.json"
|
||||||
github-pat: ${{ secrets.GITHUB_TOKEN }}
|
github-pat: ${{ secrets.GITHUB_TOKEN }}
|
||||||
scanners: 'vuln'
|
scanners: "vuln"
|
||||||
- name: Run Trivy vulnerability scanner
|
- name: Run Trivy vulnerability scanner
|
||||||
uses: aquasecurity/trivy-action@master
|
uses: aquasecurity/trivy-action@master
|
||||||
if: ${{ github.event_name != 'pull_request' }}
|
if: ${{ github.event_name != 'pull_request' }}
|
||||||
with:
|
with:
|
||||||
image-ref: 'ghcr.io/${{ github.repository_owner }}/quartz:sha-${{ env.GITHUB_SHA_SHORT }}'
|
image-ref: "ghcr.io/${{ github.repository_owner }}/quartz:sha-${{ env.GITHUB_SHA_SHORT }}"
|
||||||
format: 'sarif'
|
format: "sarif"
|
||||||
output: 'trivy-results.sarif'
|
output: "trivy-results.sarif"
|
||||||
severity: 'CRITICAL'
|
severity: "CRITICAL"
|
||||||
scanners: 'vuln'
|
scanners: "vuln"
|
||||||
- name: Upload Trivy scan results to GitHub Security tab
|
- name: Upload Trivy scan results to GitHub Security tab
|
||||||
uses: github/codeql-action/upload-sarif@v2
|
uses: github/codeql-action/upload-sarif@v2
|
||||||
if: ${{ github.event_name != 'pull_request' }}
|
if: ${{ github.event_name != 'pull_request' }}
|
||||||
with:
|
with:
|
||||||
sarif_file: 'trivy-results.sarif'
|
sarif_file: "trivy-results.sarif"
|
||||||
|
|||||||
Loading…
Reference in New Issue
Block a user