Update workflow action versions #24
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
name: Commit Stage | |
on: push | |
env: | |
OWNER: flawmop | |
REGISTRY: ghcr.io | |
IMAGE_NAME: flawmop/welcome-svc | |
APP_REPO: welcome-svc | |
DEPLOY_REPO: portal-deploy | |
VERSION: ${{ github.sha }} | |
jobs: | |
build: | |
name: Build and Test | |
runs-on: ubuntu-22.04 | |
permissions: | |
contents: read | |
security-events: write | |
steps: | |
- name: Checkout source code | |
uses: actions/[email protected] | |
- name: Set up JDK | |
uses: actions/[email protected] | |
with: | |
distribution: temurin | |
java-version: 17 | |
cache: gradle | |
- name: Build, unit tests and integration tests | |
run: | | |
chmod +x gradlew | |
./gradlew build | |
- name: Code vulnerability scanning | |
uses: anchore/scan-action@v3 | |
id: scan | |
with: | |
path: "${{ github.workspace }}" | |
fail-build: false | |
severity-cutoff: high | |
- name: Prepare Validate Kubernetes manifests | |
uses: alexellis/arkade-get@master | |
with: | |
kubectl: v1.28.2 | |
kubeval: v0.16.1 | |
- name: Validate Kubernetes manifests | |
# Different schema required because of https://github.com/instrumenta/kubeval/issues/301 | |
run: | | |
kustomize build k8s | kubeval --strict --schema-location https://raw.githubusercontent.com/yannh/kubernetes-json-schema/master - | |
package: | |
name: Package and Publish | |
if: ${{ github.ref == 'refs/heads/main' }} | |
needs: [ build ] | |
runs-on: ubuntu-22.04 | |
permissions: | |
contents: read | |
packages: write | |
security-events: write | |
steps: | |
- name: Checkout source code | |
uses: actions/[email protected] | |
- name: Set up JDK | |
uses: actions/[email protected] | |
with: | |
distribution: temurin | |
java-version: 17 | |
cache: gradle | |
- name: Build container image | |
run: | | |
chmod +x gradlew | |
./gradlew bootBuildImage \ | |
--imageName ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ env.VERSION }} | |
- name: OCI image vulnerability scanning | |
uses: anchore/scan-action@v3 | |
id: scan | |
with: | |
image: ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ env.VERSION }} | |
fail-build: false | |
severity-cutoff: high | |
- name: Log into container registry | |
uses: docker/[email protected] | |
with: | |
registry: ${{ env.REGISTRY }} | |
username: ${{ github.actor }} | |
password: ${{ secrets.GITHUB_TOKEN }} | |
- name: Publish container image | |
run: docker push ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ env.VERSION }} | |
- name: Publish container image (latest) | |
run: | | |
docker tag ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:${{ env.VERSION }} ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:latest | |
docker push ${{ env.REGISTRY }}/${{ env.IMAGE_NAME }}:latest | |
deliver: | |
name: Deliver dev candidate | |
needs: [ build, package ] | |
runs-on: ubuntu-22.04 | |
steps: | |
- name: Deliver dev candidate | |
uses: peter-evans/[email protected] | |
with: | |
token: ${{ secrets.DISPATCH_TOKEN }} | |
repository: ${{ env.OWNER }}/${{ env.DEPLOY_REPO }} | |
event-type: app_commit_delivery | |
client-payload: '{ | |
"app_image": "${{ env.REGISTRY }}/${{ env.OWNER }}/${{ env.APP_REPO }}", | |
"app_name": "${{ env.APP_REPO }}", | |
"app_version": "${{ env.VERSION }}" | |
}' |