Skip to content

Commit

Permalink
Revert "Support of devops#76"
Browse files Browse the repository at this point in the history
This reverts commit 124afa4.
  • Loading branch information
jordanpadams committed Oct 14, 2024
1 parent 1953567 commit ddffcc4
Show file tree
Hide file tree
Showing 3 changed files with 4 additions and 48 deletions.
22 changes: 2 additions & 20 deletions .github/workflows/stable-cicd.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@
# A *private* key with which we can sign artifacts.
# ``OSSRH_USERNAME``
# Username for the Central Repository.
# ``OSSRH_PASSWORD``
# ``OSSRH_USERNAME``
# Password for the Central Repository.
#

Expand Down Expand Up @@ -102,25 +102,7 @@ jobs:
name: 🚢 Docker Buildx
uses: docker/setup-buildx-action@v3
-
name: 🧱 Image Construction and Local Publication
uses: docker/build-push-action@v6
with:
context: ./
file: ./docker/Dockerfile
build-args: tar_file=${{steps.gettartag.outputs.tar_file}}
platforms: linux/amd64,linux/arm64
push: false
load: true
tags: ${{secrets.DOCKERHUB_USERNAME}}/validate:${{steps.gettartag.outputs.image_tag}}
-
name: 🕵️‍♂️ Image Vulnerability Scanning
uses: anchore/scan-action@v5
with:
fail-build: true
severity-cutoff: critical
image: ${{secrets.DOCKERHUB_USERNAME}}/validate:${{steps.gettartag.outputs.image_tag}}
-
name: 🧱 Image Construction and Remote Publication
name: 🧱 Image Construction and Publication
uses: docker/build-push-action@v6
with:
context: ./
Expand Down
22 changes: 2 additions & 20 deletions .github/workflows/unstable-cicd.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -14,7 +14,7 @@
# A *private* key with which we can sign artifacts.
# ``OSSRH_USERNAME``
# Username for the Central Repository.
# ``OSSRH_PASSWORD``
# ``OSSRH_USERNAME``
# Password for the Central Repository.


Expand Down Expand Up @@ -109,26 +109,8 @@ jobs:
file: ./docker/Dockerfile
build-args: tar_file=${{steps.gettar.outputs.tar_file}}
platforms: linux/amd64,linux/arm64
push: false
load: true
tags: ${{secrets.DOCKERHUB_USERNAME}}/validate:latest
-
name: 🕵️‍♂️ Image Vulnerability Scanning
uses: anchore/scan-action@v5
with:
fail-build: true
severity-cutoff: critical
image: ${{secrets.DOCKERHUB_USERNAME}}/validate:${{steps.gettartag.outputs.image_tag}}
-
name: 🧱 Image Construction and Remote Publication
uses: docker/build-push-action@v6
with:
context: ./
file: ./docker/Dockerfile
build-args: tar_file=${{steps.gettartag.outputs.tar_file}}
platforms: linux/amd64,linux/arm64
push: true
tags: ${{secrets.DOCKERHUB_USERNAME}}/validate:${{steps.gettartag.outputs.image_tag}}
tags: ${{secrets.DOCKERHUB_USERNAME}}/validate:latest

...

Expand Down
8 changes: 0 additions & 8 deletions .pre-commit-config.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -17,11 +17,3 @@ repos:
- --exclude-files '\.git.*'
- --exclude-files '\.pre-commit-config\.yaml'
- --exclude-files 'target'
- repo: local
hooks:
- id: grype-cve-scan
name: Grype Vulnerability Scan
description: Scans for dependency vulnerabilities. Fails if CRITICAL vulnerabilities detected.
entry: python3 -c "import os; import subprocess; import sys; os.environ['GRYPE_DB_AUTO_UPDATE'] = 'false'; result=subprocess.run(['grype', 'dir:.', '--fail-on', 'critical'], capture_output=True); print(result.stdout.decode()); print('CRITICAL level vulnerabilities found. To address issues, run scan via `grype dir:.`, then `git add` followed by `git commit` your fix or ignore via `git commit --no-verify`') if result.returncode != 0 else print('No CRITICAL level vulnerabilities found.'); sys.exit(result.returncode)"
language: system
verbose: true

0 comments on commit ddffcc4

Please sign in to comment.