Skip to content

chore(deps): update dependency geopf-extensions-openlayers to v1.0.0-beta.7 #3535

chore(deps): update dependency geopf-extensions-openlayers to v1.0.0-beta.7

chore(deps): update dependency geopf-extensions-openlayers to v1.0.0-beta.7 #3535

name: Docker build & publish
on:
push:
branches: ["*"]
# Publish semver tags as releases.
tags: ["v*"]
pull_request:
branches: ["*"]
env:
# Use docker.io for Docker Hub if empty
REGISTRY: ghcr.io
# github.repository as <account>/<repo>
IMAGE_NAME: ${{ github.repository }}
BRANCH_NAME: ${{ github.head_ref || github.ref_name }}
jobs:
build:
runs-on: ubuntu-latest
permissions:
contents: read
packages: write
security-events: write
steps:
- name: Checkout repository
uses: actions/checkout@v6
with:
fetch-depth: 0
# Workaround: https://github.com/docker/build-push-action/issues/461
- name: Setup Docker buildx
uses: docker/setup-buildx-action@v3
# Extract metadata (tags, labels) for Docker
# https://github.com/docker/metadata-action?tab=readme-ov-file#semver
- name: Extract Docker metadata
id: meta
uses: docker/metadata-action@v5
with:
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}
tags: |
type=ref,event=branch
type=ref,event=pr
type=semver,pattern={{version}}
# - name: Extract tag for trivy scan
# id: trivy_tag
# run: |
# first_tag=$(echo '${{ steps.meta.outputs.tags }}' | tr ',' '\n' | grep -v ':latest' | head -n1)
# echo "tag<<EOF" >> $GITHUB_OUTPUT
# echo "${first_tag}" >> $GITHUB_OUTPUT
# echo "EOF" >> $GITHUB_OUTPUT
# https://github.com/docker/build-push-action
- name: Build Docker image
id: build
uses: docker/build-push-action@v6
with:
context: .
file: .docker/Dockerfile
pull: true
push: false
load: true
target: prod
tags: ${{ steps.meta.outputs.tags }}
labels: ${{ steps.meta.outputs.labels }}
cache-from: type=gha
cache-to: type=gha,mode=max
# - name: Run Trivy vulnerability scanner
# uses: aquasecurity/trivy-action@v0.35.0
# with:
# image-ref: ${{ steps.trivy_tag.outputs.tag }}
# format: "sarif"
# output: "trivy-results.sarif"
# - name: Upload Trivy scan results to GitHub Security tab
# uses: github/codeql-action/upload-sarif@v4
# with:
# sarif_file: "trivy-results.sarif"
push:
if: startsWith(github.event.ref, 'refs/tags/v')
runs-on: ubuntu-latest
permissions:
contents: read
packages: write
steps:
- name: Checkout repository
uses: actions/checkout@v6
# Workaround: https://github.com/docker/build-push-action/issues/461
- name: Setup Docker buildx
uses: docker/setup-buildx-action@v3
# Login against a Docker registry (only if semver tag)
# https://github.com/docker/login-action
- name: Log into registry ${{ env.REGISTRY }}
uses: docker/login-action@v3
with:
registry: ${{ env.REGISTRY }}
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}
# Extract metadata (tags, labels) for Docker
# https://github.com/docker/metadata-action?tab=readme-ov-file#semver
- name: Extract Docker metadata
id: meta
uses: docker/metadata-action@v5
with:
images: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}
tags: |
type=ref,event=branch
type=ref,event=pr
type=sha
type=semver,pattern={{version}}
type=semver,pattern={{major}}.{{minor}}
- name: Build & Push image to github registry and generate SBOM
uses: docker/build-push-action@v6
with:
context: .
file: .docker/Dockerfile
pull: true
push: true
load: false
sbom: true
provenance: mode=max
target: prod
tags: ${{ steps.meta.outputs.tags }}
labels: ${{ steps.meta.outputs.labels }}
cache-from: type=gha
cache-to: type=gha,mode=max