Merge pull request #2665 from onaio/use-per-role-cache-key-for-organi… #116
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
--- | |
name: AWS ECR Build Image with ARM Runner | |
on: # yamllint disable-line rule:truthy | |
release: | |
types: | |
- "released" | |
push: | |
branches: | |
- "main" | |
- "*-rc" | |
tags: | |
- "v*" | |
jobs: | |
build: | |
strategy: | |
fail-fast: false | |
matrix: | |
platforms: | |
- [linux/amd64, ubuntu-latest] | |
- [linux/arm64, ubuntu-arm64-runner] | |
runs-on: ${{ matrix.platforms[1] }} | |
steps: | |
- name: Prepare | |
run: | | |
platform=${{ matrix.platforms[0] }} | |
echo "PLATFORM_PAIR=${platform//\//-}" >> $GITHUB_ENV | |
- name: Checkout | |
uses: actions/checkout@v4 | |
- name: Set up Docker Buildx | |
uses: docker/setup-buildx-action@v3 | |
- name: Configure AWS credentials | |
uses: aws-actions/configure-aws-credentials@v4 | |
with: | |
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
aws-region: eu-central-1 | |
- name: Login to Amazon ECR | |
id: login-ecr | |
uses: aws-actions/amazon-ecr-login@v2 | |
- name: Docker meta | |
id: meta | |
uses: docker/metadata-action@v5 | |
with: | |
images: ${{ steps.login-ecr.outputs.registry }}/onaio/onadata | |
tags: | | |
type=ref,event=branch | |
type=ref,event=tag | |
- name: Setup SSH Agent and add Github to known hosts | |
env: | |
SSH_AUTH_SOCK: /tmp/ssh-agent.sock | |
run: | | |
ssh-agent -a $SSH_AUTH_SOCK >> /dev/null | |
ssh-add - <<< "${{ secrets.SSH_PRIVATE_KEY }}" | |
mkdir -p ~/.ssh | |
ssh-keyscan github.com > ~/.ssh/known_hosts | |
- name: Get the version | |
id: get-version | |
if: github.event_name != 'push' | |
run: echo "version=${GITHUB_REF#refs/tags/}" >> $GITHUB_ENV | |
- name: Get the branch name | |
id: get-branch-name | |
if: > | |
github.event_name == 'push' | |
|| github.event_name == 'workflow_dispatch' | |
run: echo "version=${GITHUB_REF#refs/heads/}" >> $GITHUB_ENV | |
- name: Get docker repository URL | |
id: get-repo-url | |
run: | | |
echo "docker_repo=${{ steps.login-ecr.outputs.registry }}\ | |
/onaio/onadata:${{ env.version || github.ref_name }}"\ | |
| sed 's/ //g' >> $GITHUB_ENV | |
- name: (Ubuntu) Build and push | |
id: docker-build-ubuntu | |
uses: docker/build-push-action@v5 | |
with: | |
context: . | |
file: ./docker/onadata-uwsgi/Dockerfile.ubuntu | |
platforms: ${{ matrix.platforms[0] }} | |
cache-from: type=registry,ref=${{ env.docker_repo }} | |
cache-to: type=inline | |
ssh: | | |
default=/tmp/ssh-agent.sock | |
build-args: > | |
optional_packages=PyYAML | |
django-redis | |
${{ secrets.ECR_OPTIONAL_PACKAGES }} | |
push: true | |
labels: ${{ steps.meta.outputs.labels }} | |
provenance: false | |
outputs: > | |
type=image, | |
name=${{ steps.login-ecr.outputs.registry }}/onaio/onadata, | |
push-by-digest=true, | |
name-canonical=true, | |
push=true | |
- name: Export digest | |
run: | | |
mkdir -p /tmp/digests | |
digest="${{ steps.docker-build-ubuntu.outputs.digest }}" | |
touch "/tmp/digests/${digest#sha256:}" | |
- name: Upload digest | |
uses: actions/upload-artifact@v4 | |
with: | |
name: digests-${{ env.PLATFORM_PAIR }} | |
path: /tmp/digests/* | |
if-no-files-found: error | |
retention-days: 1 | |
merge: | |
runs-on: ubuntu-latest | |
needs: | |
- build | |
steps: | |
- name: Download digests | |
uses: actions/download-artifact@v4 | |
with: | |
path: /tmp/digests | |
pattern: digests-* | |
merge-multiple: true | |
- name: Set up Docker Buildx | |
uses: docker/setup-buildx-action@v3 | |
- name: Configure AWS credentials | |
uses: aws-actions/configure-aws-credentials@v4 | |
with: | |
aws-access-key-id: ${{ secrets.AWS_ACCESS_KEY_ID }} | |
aws-secret-access-key: ${{ secrets.AWS_SECRET_ACCESS_KEY }} | |
aws-region: eu-central-1 | |
- name: Login to Amazon ECR | |
id: login-ecr | |
uses: aws-actions/amazon-ecr-login@v2 | |
- name: Docker meta | |
id: meta | |
uses: docker/metadata-action@v5 | |
with: | |
images: ${{ steps.login-ecr.outputs.registry }}/onaio/onadata | |
tags: | | |
type=ref,event=branch | |
type=ref,event=tag | |
- name: Get docker repository URL | |
id: get-repo-url | |
run: | | |
echo "docker_repo=${{ steps.login-ecr.outputs.registry }}\ | |
/onaio/onadata:${{ steps.meta.outputs.version }}"\ | |
| sed 's/ //g' >> $GITHUB_ENV | |
- name: Create manifest list and push | |
working-directory: /tmp/digests | |
run: | | |
docker buildx imagetools create $(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") $(printf '${{ steps.login-ecr.outputs.registry }}/onaio/onadata@sha256:%s ' *) | |
- name: Inspect image | |
run: | | |
docker buildx imagetools inspect ${{ env.docker_repo }} | |
- name: Run Trivy vulnerability scanner | |
uses: aquasecurity/trivy-action@master | |
with: | |
image-ref: | | |
${{ env.docker_repo }} | |
format: 'sarif' | |
output: 'trivy-results.sarif' | |
- name: Upload Trivy scan result to Github security lab | |
uses: github/codeql-action/upload-sarif@v3 | |
with: | |
sarif_file: 'trivy-results.sarif' | |
continue-on-error: true | |
- name: Run Trivy vulnerability scanner for Slack | |
uses: aquasecurity/trivy-action@master | |
with: | |
image-ref: | | |
${{ env.docker_repo }} | |
format: json | |
output: 'trivy-results.json' | |
- name: Create summary of trivy issues | |
run: | | |
summary=$(jq -r '.Results[] | select(.Vulnerabilities) | .Vulnerabilities | group_by(.Severity) | map({Severity: .[0].Severity, Count: length}) | .[] | [.Severity, .Count] | join(": ")' trivy-results.json | awk 'NR > 1 { printf(" | ") } {printf "%s",$0}') | |
if [ -z $summary ] | |
then | |
summary="0 Issues" | |
fi | |
echo "SUMMARY=$summary" >> $GITHUB_ENV | |
- name: Send Slack Notification | |
uses: slackapi/slack-github-action@v1.26.0 | |
with: | |
payload: | | |
{ | |
"text": | |
"Trivy scan results for ${{ steps.meta.outputs.version }}", | |
"blocks": [ | |
{ | |
"type": "section", | |
"text": { | |
"type": "mrkdwn", | |
"text": "[Ona Data] Trivy scan results: ${{ env.SUMMARY }}" | |
} | |
}, | |
{ | |
"type": "section", | |
"text": { | |
"type": "mrkdwn", | |
"text": "View scan results: https://github.com/${{ github.repository }}/security/code-scanning?query=branch:${{ env.version || github.ref_name }}+is:open++" | |
} | |
} | |
] | |
} | |
env: | |
SLACK_WEBHOOK_URL: ${{ secrets.SLACK_WEBHOOK_URL }} | |
SLACK_WEBHOOK_TYPE: INCOMING_WEBHOOK |