Skip to content
This repository was archived by the owner on Dec 29, 2025. It is now read-only.

Bump ruby/setup-ruby from 1.271.0 to 1.274.0 (#121) #122

Bump ruby/setup-ruby from 1.271.0 to 1.274.0 (#121)

Bump ruby/setup-ruby from 1.271.0 to 1.274.0 (#121) #122

Workflow file for this run

name: Docker
on:
push:
branches:
- main
workflow_dispatch: {}
schedule:
- cron: "0 21 * * 6"
permissions:
contents: read
jobs:
build:
runs-on: ubuntu-24.04
steps:
- name: Harden Runner
uses: step-security/harden-runner@20cf305ff2072d973412fa9b1e3a4f227bda3c76 # v2.14.0
with:
egress-policy: audit
- name: Docker meta
id: meta
uses: docker/metadata-action@c299e40c65443455700f0fdfc63efafe5b349051 # v5.10.0
with:
images: biow0lf/evemonk-pulse
- name: Login to Docker Hub
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
with:
username: ${{ secrets.DOCKER_HUB_USERNAME }}
password: ${{ secrets.DOCKER_HUB_ACCESS_TOKEN }}
- name: Set up Docker Buildx
id: buildx
uses: docker/setup-buildx-action@e468171a9de216ec08956ac3ada2f0791b6bd435 # v3.11.1
- name: Build and push
id: docker_build
uses: docker/build-push-action@263435318d21b8e681c14492fe198d362a7d2c83 # v6.18.0
with:
pull: true
push: true
no-cache: true
platforms: linux/amd64
tags: ${{ steps.meta.outputs.tags }}
labels: ${{ steps.meta.outputs.labels }}
- name: Image digest
run: echo ${{ steps.docker_build.outputs.digest }}
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@b6643a29fecd7f34b3597bc6acb0a98b03d33ff8 # 0.33.1
continue-on-error: true
with:
image-ref: "docker.io/biow0lf/evemonk-pulse:main"
format: "table"
exit-code: "1"
ignore-unfixed: true
vuln-type: "os,library"
severity: "CRITICAL,HIGH"