4646
4747 env :
4848 REGISTRY : docker.io
49- CONTAINER_REPO : ${{ secrets.REG_USER }}/${{ secrets.CONTAINER_REPOSITORY_NAME }}
49+ DOCKER_USER : ${{ secrets.REG_USER }}
50+ DOCKER_REPO : ${{ secrets.CONTAINER_REPOSITORY_NAME }}
5051 IMAGE_TAG : llm_research_agent-${{ github.run_number }}
5152
5253 steps :
@@ -73,29 +74,29 @@ jobs:
7374 with :
7475 context : ./agents/research_agent
7576 push : false
76- tags : ${{ env.REGISTRY }}/${{ env.CONTAINER_REPO }}:${{ env.IMAGE_TAG }}
77+ tags : ${{ env.REGISTRY }}/${{ env.DOCKER_USER }}/${{ env.DOCKER_REPO }}:${{ env.IMAGE_TAG }}
7778 load : true
7879
7980 - name : Run vulnerability scan (Trivy)
8081 uses : aquasecurity/trivy-action@0.30.0
8182 with :
82- image-ref : ${{ env.REGISTRY }}/${{ env.CONTAINER_REPO }}:${{ env.IMAGE_TAG }}
83+ image-ref : ${{ env.REGISTRY }}/${{ env.DOCKER_USER }}/${{ env.DOCKER_REPO }}:${{ env.IMAGE_TAG }}
8384 format : ' table'
8485 # exit-code: '1'
8586 ignore-unfixed : true
8687 vuln-type : ' os,library'
8788 severity : ' CRITICAL'
8889
8990 - name : Push images to DHCR
90- run : docker push ${{ env.REGISTRY }}/${{ env.CONTAINER_REPO }}:${{ env.IMAGE_TAG }}
91+ run : docker push ${{ env.REGISTRY }}/${{ env.DOCKER_USER }}/${{ env.DOCKER_REPO }}:${{ env.IMAGE_TAG }}
9192
9293 - name : Output Image name
9394 run : echo "image_tag=$(echo ${{ github.run_number }})" >> $GITHUB_OUTPUT
9495
9596 - name : Deploy to Azure Container Apps
9697 uses : Azure/container-apps-deploy-action@v2
9798 with :
98- imageToDeploy : ${{ env.REGISTRY }}/${{ env.CONTAINER_REPO }}:${{ env.IMAGE_TAG }}
99+ imageToDeploy : ${{ env.REGISTRY }}/${{ env.DOCKER_USER }}/${{ env.DOCKER_REPO }}:${{ env.IMAGE_TAG }}
99100 containerAppName : ${{ secrets.AZURE_APP_NAME }}
100101 resourceGroup : ${{ secrets.AZURE_RG_NAME }}
101102 containerAppEnvironment : ${{ secrets.AZURE_ENV_NAME }}
0 commit comments