mirror of
https://github.com/shenxn/protonmail-bridge-docker.git
synced 2026-03-26 21:35:58 +00:00
Dockerfile: - Keep build stage on debian:sid-slim (required for riscv64 Go support) - Switch runtime stage to debian:bookworm-slim for stable, predictable package names — eliminates the libcbor0 class of breakage for users update-check.py: - Create a branch and open a PR instead of pushing directly to master - PR body links to upstream release notes and prompts review of new dependencies before merge - Remove dead deb/PACKAGE code build.yaml: - Drop linux/arm/v7 — upstream go-libfido2 is incompatible with 32-bit ARM address space as of v3.22.0; not fixable without upstream changes - Add VERSION to pull_request trigger paths so the test job builds and validates every version bump PR before it can be merged update-check.yaml: - Pass GITHUB_TOKEN and GITHUB_REPOSITORY to script for PR creation README.md: - Document arm/v7 as unsupported with reason
213 lines
6.0 KiB
YAML
213 lines
6.0 KiB
YAML
name: build from source
|
|
|
|
on:
|
|
push:
|
|
paths:
|
|
- .github/workflows/build.yaml
|
|
- build/*
|
|
- VERSION
|
|
pull_request:
|
|
paths:
|
|
- .github/workflows/build.yaml
|
|
- build/*
|
|
- VERSION
|
|
workflow_dispatch:
|
|
|
|
env:
|
|
DOCKERHUB_REPO: dancwilliams/protonmail-bridge
|
|
GHCR_REPO: ghcr.io/dancwilliams/protonmail-bridge-docker
|
|
DOCKER_REPO_DEV: ghcr.io/dancwilliams/protonmail-bridge
|
|
PLATFORMS: linux/amd64,linux/arm64/v8,linux/riscv64
|
|
|
|
jobs:
|
|
test:
|
|
runs-on: ubuntu-latest
|
|
if: github.ref != 'refs/heads/master'
|
|
steps:
|
|
- name: Checkout
|
|
uses: actions/checkout@v4
|
|
|
|
- name: Set version
|
|
run: echo "version=$(cat VERSION)" >> $GITHUB_ENV
|
|
|
|
- name: Docker meta
|
|
id: meta
|
|
uses: docker/metadata-action@v5
|
|
with:
|
|
images: |
|
|
${{ env.DOCKER_REPO_DEV }}
|
|
|
|
- name: Login to GHCR
|
|
uses: docker/login-action@v3
|
|
with:
|
|
registry: ghcr.io
|
|
username: ${{ github.repository_owner }}
|
|
password: ${{ secrets.GITHUB_TOKEN }}
|
|
|
|
- name: Set up Docker Buildx
|
|
uses: docker/setup-buildx-action@v3
|
|
|
|
- name: Build and push
|
|
id: build
|
|
uses: docker/build-push-action@v6
|
|
with:
|
|
labels: ${{ steps.meta.outputs.labels }}
|
|
context: ./build
|
|
file: ./build/Dockerfile
|
|
tags: "${{ env.DOCKER_REPO_DEV }}:dev-${{ github.ref_name }}"
|
|
push: true
|
|
build-args: |
|
|
version=${{ env.version }}
|
|
|
|
- name: Run Trivy vulnerability scan
|
|
uses: aquasecurity/trivy-action@0.30.0
|
|
with:
|
|
image-ref: "${{ env.DOCKER_REPO_DEV }}:dev-${{ github.ref_name }}"
|
|
format: 'sarif'
|
|
exit-code: 0
|
|
severity: 'CRITICAL,HIGH'
|
|
output: 'trivy-results.sarif'
|
|
|
|
- name: Upload Trivy scan SARIF report
|
|
uses: github/codeql-action/upload-sarif@v3
|
|
with:
|
|
sarif_file: 'trivy-results.sarif'
|
|
|
|
build:
|
|
runs-on: ubuntu-latest
|
|
if: (github.event_name == 'push' || github.event_name == 'workflow_dispatch') && github.ref == 'refs/heads/master'
|
|
strategy:
|
|
fail-fast: false
|
|
matrix:
|
|
platform:
|
|
- linux/amd64
|
|
- linux/arm64/v8
|
|
- linux/riscv64
|
|
steps:
|
|
- name: Checkout
|
|
uses: actions/checkout@v4
|
|
|
|
- name: Prepare
|
|
run: |
|
|
platform=${{ matrix.platform }}
|
|
echo "PLATFORM_PAIR=${platform//\//-}" >> $GITHUB_ENV
|
|
|
|
- name: Set version
|
|
run: echo "version=$(cat VERSION)" >> $GITHUB_ENV
|
|
|
|
- name: Login to Docker Hub
|
|
uses: docker/login-action@v3
|
|
with:
|
|
username: ${{ secrets.REGISTRY_USERNAME }}
|
|
password: ${{ secrets.REGISTRY_PASSWORD }}
|
|
|
|
- name: Login to GHCR
|
|
uses: docker/login-action@v3
|
|
with:
|
|
registry: ghcr.io
|
|
username: ${{ github.repository_owner }}
|
|
password: ${{ secrets.GITHUB_TOKEN }}
|
|
|
|
- name: Set up QEMU
|
|
uses: docker/setup-qemu-action@v3
|
|
|
|
- name: Set up Docker Buildx
|
|
uses: docker/setup-buildx-action@v3
|
|
|
|
- name: Build and push by digest
|
|
id: build
|
|
uses: docker/build-push-action@v6
|
|
with:
|
|
platforms: ${{ matrix.platform }}
|
|
outputs: type=image,name=${{ env.DOCKERHUB_REPO }},push-by-digest=true,name-canonical=true,push=true
|
|
context: ./build
|
|
file: ./build/Dockerfile
|
|
provenance: false
|
|
sbom: false
|
|
build-args: |
|
|
version=${{ env.version }}
|
|
|
|
- name: Export digest
|
|
run: |
|
|
mkdir -p ${{ runner.temp }}/digests
|
|
digest="${{ steps.build.outputs.digest }}"
|
|
touch "${{ runner.temp }}/digests/${digest#sha256:}"
|
|
|
|
- name: Upload digest
|
|
uses: actions/upload-artifact@v4
|
|
with:
|
|
name: digests-${{ env.PLATFORM_PAIR }}
|
|
path: ${{ runner.temp }}/digests/*
|
|
if-no-files-found: error
|
|
retention-days: 1
|
|
|
|
merge:
|
|
runs-on: ubuntu-latest
|
|
needs:
|
|
- build
|
|
steps:
|
|
- name: Checkout
|
|
uses: actions/checkout@v4
|
|
|
|
- name: Download digests
|
|
uses: actions/download-artifact@v4
|
|
with:
|
|
path: ${{ runner.temp }}/digests
|
|
pattern: digests-*
|
|
merge-multiple: true
|
|
|
|
- name: Set version
|
|
run: echo "version=$(cat VERSION)" >> $GITHUB_ENV
|
|
|
|
- name: Login to Docker Hub
|
|
uses: docker/login-action@v3
|
|
with:
|
|
username: ${{ secrets.REGISTRY_USERNAME }}
|
|
password: ${{ secrets.REGISTRY_PASSWORD }}
|
|
|
|
- name: Login to GHCR
|
|
uses: docker/login-action@v3
|
|
with:
|
|
registry: ghcr.io
|
|
username: ${{ github.repository_owner }}
|
|
password: ${{ secrets.GITHUB_TOKEN }}
|
|
|
|
- name: Set up Docker Buildx
|
|
uses: docker/setup-buildx-action@v3
|
|
|
|
- name: Docker meta
|
|
id: meta
|
|
uses: docker/metadata-action@v5
|
|
with:
|
|
images: |
|
|
${{ env.DOCKERHUB_REPO }}
|
|
${{ env.GHCR_REPO }}
|
|
tags: |
|
|
type=raw,value=${{ env.version }}
|
|
type=raw,value=latest
|
|
|
|
- name: Create manifest list and push
|
|
working-directory: ${{ runner.temp }}/digests
|
|
run: |
|
|
docker buildx imagetools create $(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") \
|
|
$(printf '${{ env.DOCKERHUB_REPO }}@sha256:%s ' *)
|
|
|
|
- name: Run Trivy vulnerability scan
|
|
uses: aquasecurity/trivy-action@0.30.0
|
|
with:
|
|
image-ref: "${{ env.DOCKERHUB_REPO }}:${{ env.version }}"
|
|
format: 'sarif'
|
|
exit-code: 0
|
|
severity: 'CRITICAL,HIGH'
|
|
output: 'trivy-results.sarif'
|
|
|
|
- name: Upload Trivy scan SARIF report
|
|
uses: github/codeql-action/upload-sarif@v3
|
|
with:
|
|
sarif_file: 'trivy-results.sarif'
|
|
|
|
- name: Inspect image
|
|
run: |
|
|
docker buildx imagetools inspect ${{ env.DOCKERHUB_REPO }}:${{ env.version }}
|
|
docker buildx imagetools inspect ${{ env.GHCR_REPO }}:${{ env.version }}
|