Merge pull request #83 from davidjameshowell/djh-upgrade_build_and_dockerfiles

GitHub Action Refactor feat. multi-platform images
This commit is contained in:
Gabisonfire
2024-02-11 07:46:13 -05:00
committed by GitHub
8 changed files with 152 additions and 32 deletions

View File

@@ -1,43 +1,131 @@
name: Build
name: Build and Push Docker Images
on:
push:
branches:
- 'master'
paths:
- src/**
jobs:
build-and-push:
build-and-push-images:
runs-on: ubuntu-latest
permissions:
contents: read # for actions/checkout to fetch code
security-events: write # for github/codeql-action/upload-sarif to upload SARIF results
services:
registry:
image: registry:2
ports:
- 5000:5000
strategy:
matrix:
include:
- context: ./src/node/addon/
tag: gabisonfire/knightcrawler-addon:latest
image_name: knightcrawler-addon
platforms: linux/amd64,linux/arm64
- context: ./src/node/addon-jackett/
tag: gabisonfire/knightcrawler-addon-jackett:latest
image_name: knightcrawler-addon-jackett
platforms: linux/amd64,linux/arm64
- context: ./src/node/consumer/
tag: gabisonfire/knightcrawler-consumer:latest
image_name: knightcrawler-consumer
platforms: linux/amd64,linux/arm64
- context: ./src/producer/
tag: gabisonfire/knightcrawler-producer:latest
image_name: knightcrawler-producer
platforms: linux/amd64,linux/arm64
name: Build - ${{ matrix.image_name }}
steps:
-
name: Checkout repository
- name: Checkout repository
uses: actions/checkout@v4
-
name: Set up Docker Buildx
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
-
name: Login to Docker Hub
with:
driver-opts: network=host
- name: Set up QEMU
uses: docker/setup-qemu-action@v3
- name: Login to Docker Hub
uses: docker/login-action@v3
with:
username: ${{ vars.DOCKERHUB_USERNAME }}
password: ${{ secrets.DOCKERHUB_TOKEN }}
-
name: Build and push ${{ matrix.tag }}
- name: Build Docker Metadata
id: docker-metadata
uses: docker/metadata-action@v5
with:
images: |
${{ vars.DOCKERHUB_USERNAME }}/${{ matrix.image_name }}
flavor: |
latest=auto
tags: |
type=edge,branch=main,commit=${{ github.sha }}
type=sha,commit=${{ github.sha }}
- name: Build image for scanning ${{ matrix.image_name }}
uses: docker/build-push-action@v5
with:
context: ${{ matrix.context }}
push: true
tags: ${{ matrix.tag }}
provenance: false
tags: localhost:5000/dockle-examine-image:test
platforms: ${{ matrix.platforms }}
cache-from: type=gha,scope=${{ github.workflow }}
cache-to: type=gha,mode=max,scope=${{ github.workflow }}
- name: Pull Built Image for Scanning
run: |
docker pull localhost:5000/dockle-examine-image:test
- name: Dockle - Examine Best Practices
uses: davidjameshowell/dockle-action@ad7164c945d12d55ac5e639f91f0a5c708a4cdce
with:
image: localhost:5000/dockle-examine-image:test
dockle-ignores: CIS-DI-0005 # Ignore `Enable Content trust for Docker`
- name: Run Trivy vulnerability scanner - human readable output
uses: aquasecurity/trivy-action@master
with:
image-ref: localhost:5000/dockle-examine-image:test
scan-type: 'image'
format: 'table'
exit-code: '0'
ignore-unfixed: true
vuln-type: 'os,library'
severity: 'CRITICAL,HIGH'
scanners: 'vuln,secret,config'
env:
TRIVY_NON_SSL: true
- name: Run Trivy vulnerability scanner (sarif report)
uses: aquasecurity/trivy-action@master
with:
image-ref: localhost:5000/dockle-examine-image:test
scan-type: 'image'
format: 'sarif'
exit-code: '0'
ignore-unfixed: true
vuln-type: 'os,library'
severity: 'CRITICAL,HIGH'
scanners: 'vuln,secret,config'
output: 'trivy-results-os.sarif'
env:
TRIVY_NON_SSL: true
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results-os.sarif'
- name: Push ${{ matrix.image_name }} to repo
if: github.ref == 'refs/heads/main' || github.ref == 'refs/heads/master'
uses: docker/build-push-action@v5
with:
context: ${{ matrix.context }}
push: true
provenance: false
tags: ${{ steps.docker-metadata.outputs.tags }}
labels: ${{ steps.docker-metadata.outputs.labels }}
platforms: ${{ matrix.platforms }}
cache-from: type=gha,scope=${{ github.workflow }}
cache-to: type=gha,mode=max,scope=${{ github.workflow }}

View File

@@ -1,3 +1,6 @@
**/node_modules
**/npm-debug.log
**/.env
**/.env
.eslint*
README.md
Dockerfile

View File

@@ -24,6 +24,12 @@ ENV NODE_ENV production
COPY --from=builder /app ./
RUN npm prune --omit=dev
# CIS-DI-0001
RUN addgroup -S addon-jackett && adduser -S -G addon-jackett addon-jackett
USER addon-jackett
EXPOSE 7001
ENTRYPOINT [ "pm2-runtime", "start", "ecosystem.config.cjs"]
ENTRYPOINT [ "pm2-runtime", "start", "ecosystem.config.cjs"]
HEALTHCHECK --interval=30s --timeout=30s --start-period=5s --retries=3 \
CMD pm2 ping || exit 1

View File

@@ -1,3 +1,5 @@
**/node_modules
**/npm-debug.log
**/.env
**/.env
.eslint*
Dockerfile

View File

@@ -24,6 +24,12 @@ ENV NODE_ENV production
COPY --from=builder /app ./
RUN npm prune --omit=dev
# CIS-DI-0001
RUN addgroup -S addon && adduser -S -G addon addon
USER addon
EXPOSE 7000
ENTRYPOINT [ "pm2-runtime", "start", "ecosystem.config.cjs"]
ENTRYPOINT [ "pm2-runtime", "start", "ecosystem.config.cjs"]
HEALTHCHECK --interval=30s --timeout=30s --start-period=5s --retries=3 \
CMD pm2 ping || exit 1

View File

@@ -12,4 +12,5 @@ helm-charts
.env
.editorconfig
.idea
coverage*
coverage*
.eslint*

View File

@@ -21,6 +21,13 @@ ENV NODE_ENV production
COPY --from=builder /app ./
RUN npm prune --omit=dev
EXPOSE 7001
# CIS-DI-0001
RUN useradd -d /home/consumer -m -s /bin/bash consumer
# CIS-DI-0008
RUN chmod u-s /usr/bin/wall /usr/bin/expiry /usr/bin/chage /usr/bin/passwd /usr/bin/gpasswd /usr/bin/chsh /usr/bin/newgrp /usr/bin/chfn /sbin/unix_chkpwd /bin/su /bin/mount /bin/umount /usr/bin/chage /usr/bin/expiry /usr/bin/wall
USER consumer
ENTRYPOINT [ "node", "dist/index.cjs" ]
EXPOSE 7001
ENTRYPOINT [ "node", "dist/index.cjs" ]
HEALTHCHECK --interval=30s --timeout=30s --start-period=5s --retries=3 \
CMD pgrep -x node > /dev/null || exit 1

View File

@@ -1,10 +1,17 @@
FROM mcr.microsoft.com/dotnet/sdk:8.0 AS build-env
FROM --platform=$BUILDPLATFORM mcr.microsoft.com/dotnet/sdk:8.0 AS build
ARG TARGETARCH
WORKDIR /App
COPY . ./
RUN dotnet restore
RUN dotnet publish -c Release -o out
RUN dotnet restore -a $TARGETARCH
RUN dotnet publish -c Release --no-restore -o out -a $TARGETARCH
FROM mcr.microsoft.com/dotnet/aspnet:8.0-alpine
FROM mcr.microsoft.com/dotnet/aspnet:8.0
WORKDIR /App
COPY --from=build-env /App/out .
ENTRYPOINT ["dotnet", "Producer.dll"]
COPY --from=build /App/out .
RUN addgroup -S producer && adduser -S -G producer producer
USER producer
HEALTHCHECK --interval=30s --timeout=30s --start-period=5s --retries=3 \
CMD pgrep -f dotnet || exit 1
ENTRYPOINT ["dotnet", "Producer.dll"]