name: build from source on: push: paths: - .github/workflows/build.yaml - build/* pull_request: paths: - .github/workflows/build.yaml - build/* schedule: - cron: '0 6 * * *' workflow_dispatch: env: GHCR_REPO: ghcr.io/trent-maetzold/protonmail-bridge PLATFORMS: linux/amd64,linux/arm64/v8,linux/arm/v7,linux/riscv64 jobs: version-check: runs-on: ubuntu-latest outputs: version: ${{ steps.check.outputs.version }} build_needed: ${{ steps.check.outputs.build_needed }} steps: - name: Get latest upstream release id: check run: | latest=$(curl -s https://api.github.com/repos/ProtonMail/proton-bridge/releases/latest | jq -r '.tag_name') echo "Latest upstream: $latest" echo "version=$latest" >> $GITHUB_OUTPUT if [[ "${{ github.event_name }}" == "schedule" ]]; then # Check if we already have this version in GHCR token=$(curl -s "https://ghcr.io/token?scope=repository:trent-maetzold/protonmail-bridge:pull" | jq -r '.token') tags=$(curl -s -H "Authorization: Bearer $token" "https://ghcr.io/v2/trent-maetzold/protonmail-bridge/tags/list" | jq -r '.tags[]?' 2>/dev/null || echo "") if echo "$tags" | grep -qx "${latest}-build"; then echo "Version ${latest} already built" echo "build_needed=false" >> $GITHUB_OUTPUT else echo "New version ${latest} detected" echo "build_needed=true" >> $GITHUB_OUTPUT fi else echo "build_needed=true" >> $GITHUB_OUTPUT fi test: runs-on: ubuntu-latest needs: version-check if: github.event_name == 'pull_request' || (github.event_name == 'push' && github.ref != 'refs/heads/master') steps: - name: Checkout uses: actions/checkout@v4 - name: Docker meta id: meta uses: docker/metadata-action@v5 with: images: ${{ env.GHCR_REPO }} - name: Login to GHCR uses: docker/login-action@v3 with: registry: ghcr.io username: ${{ github.repository_owner }} password: ${{ secrets.GITHUB_TOKEN }} - name: Set up Docker Buildx uses: docker/setup-buildx-action@v3 with: driver-opts: network=host - name: Build and push uses: docker/build-push-action@v6 with: labels: ${{ steps.meta.outputs.labels }} context: ./build file: ./build/Dockerfile tags: "${{ env.GHCR_REPO }}:dev-${{ github.ref_name }}" push: true build-args: | version=${{ needs.version-check.outputs.version }} - name: Run Trivy vulnerability scan uses: aquasecurity/trivy-action@0.30.0 with: image-ref: "${{ env.GHCR_REPO }}:dev-${{ github.ref_name }}" format: 'sarif' exit-code: 0 severity: 'CRITICAL,HIGH' output: 'trivy-results.sarif' - name: Upload Trivy scan SARIF report uses: github/codeql-action/upload-sarif@v3 with: sarif_file: 'trivy-results.sarif' build: runs-on: ubuntu-latest needs: version-check if: | needs.version-check.outputs.build_needed == 'true' && (github.event_name != 'pull_request') && (github.event_name == 'schedule' || github.event_name == 'workflow_dispatch' || (github.event_name == 'push' && github.ref == 'refs/heads/master')) strategy: fail-fast: false matrix: platform: - linux/amd64 - linux/arm64/v8 - linux/arm/v7 - linux/riscv64 steps: - name: Checkout uses: actions/checkout@v4 - name: Prepare run: | platform=${{ matrix.platform }} echo "PLATFORM_PAIR=${platform//\//-}" >> $GITHUB_ENV - name: Docker meta id: meta uses: docker/metadata-action@v5 with: images: ${{ env.GHCR_REPO }} - name: Login to GHCR uses: docker/login-action@v3 with: registry: ghcr.io username: ${{ github.repository_owner }} password: ${{ secrets.GITHUB_TOKEN }} - name: Set up QEMU uses: docker/setup-qemu-action@v3 - name: Set up Docker Buildx uses: docker/setup-buildx-action@v3 - name: Build and push by digest id: build uses: docker/build-push-action@v6 with: platforms: ${{ matrix.platform }} labels: ${{ steps.meta.outputs.labels }} outputs: type=image,"name=${{ env.GHCR_REPO }}",push-by-digest=true,name-canonical=true,push=true context: ./build file: ./build/Dockerfile provenance: false sbom: false build-args: | version=${{ needs.version-check.outputs.version }} - name: Export digest run: | mkdir -p ${{ runner.temp }}/digests digest="${{ steps.build.outputs.digest }}" touch "${{ runner.temp }}/digests/${digest#sha256:}" - name: Upload digest uses: actions/upload-artifact@v4 with: name: digests-${{ env.PLATFORM_PAIR }} path: ${{ runner.temp }}/digests/* if-no-files-found: error retention-days: 1 merge: runs-on: ubuntu-latest needs: - version-check - build steps: - name: Download digests uses: actions/download-artifact@v4 with: path: ${{ runner.temp }}/digests pattern: digests-* merge-multiple: true - name: Login to GHCR uses: docker/login-action@v3 with: registry: ghcr.io username: ${{ github.repository_owner }} password: ${{ secrets.GITHUB_TOKEN }} - name: Set up Docker Buildx uses: docker/setup-buildx-action@v3 with: driver-opts: network=host - name: Docker meta id: meta uses: docker/metadata-action@v5 with: images: ${{ env.GHCR_REPO }} tags: | type=raw,enable=true,value=${{ needs.version-check.outputs.version }}-build type=raw,enable=true,value=build type=raw,enable=true,value=latest - name: Create manifest list and push working-directory: ${{ runner.temp }}/digests run: | docker buildx imagetools create $(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") \ $(printf '${{ env.GHCR_REPO }}@sha256:%s ' *) - name: Run Trivy vulnerability scan uses: aquasecurity/trivy-action@0.30.0 with: image-ref: "${{ env.GHCR_REPO }}:${{ needs.version-check.outputs.version }}-build" format: 'sarif' exit-code: 0 severity: 'CRITICAL,HIGH' output: 'trivy-results.sarif' - name: Upload Trivy scan SARIF report uses: github/codeql-action/upload-sarif@v3 with: sarif_file: 'trivy-results.sarif' - name: Inspect image run: | docker buildx imagetools inspect ${{ env.GHCR_REPO }}:${{ needs.version-check.outputs.version }}-build