Skip to content

Add image publish action#16

Merged
bleggett merged 1 commit into
mainfrom
bleggett/image-publish
Nov 18, 2025
Merged

Add image publish action#16
bleggett merged 1 commit into
mainfrom
bleggett/image-publish

Conversation

@bleggett
Copy link
Copy Markdown
Collaborator

Build plugin in OCI image, and publish + cosign image on (manual) release event.

@bleggett bleggett merged commit 292f4e0 into main Nov 18, 2025
4 checks passed
@bleggett bleggett deleted the bleggett/image-publish branch November 18, 2025 17:45
id: meta
working-directory: ${{ env.CONTAINERFILE_DIR }}
run: |
REPO_NAME=${{ github.event.repository.name }}

Check failure

Code scanning / zizmor

code injection via template expansion Error

code injection via template expansion
run: |
IFS=',' read -ra TAGS <<< '${{ steps.meta.outputs.tags }}'
for tag in "${TAGS[@]}"; do
pullstring="${tag}@${{ steps.push.outputs.digest }}"

Check notice

Code scanning / zizmor

code injection via template expansion Note

code injection via template expansion
if: github.event_name != 'pull_request'
shell: bash
run: |
IFS=',' read -ra TAGS <<< '${{ steps.meta.outputs.tags }}'

Check notice

Code scanning / zizmor

code injection via template expansion Note

code injection via template expansion
if [[ "${{ github.event_name }}" == "pull_request" ]]; then
TAGS="${FULL_IMAGE_NAME,,}:pr-${{ github.event.number }}"
else
TAGS="${FULL_IMAGE_NAME,,}:${{ github.sha }},${FULL_IMAGE_NAME,,}:latest"

Check notice

Code scanning / zizmor

code injection via template expansion Note

code injection via template expansion
echo "full-image-name=${FULL_IMAGE_NAME,,}" >> $GITHUB_OUTPUT

if [[ "${{ github.event_name }}" == "pull_request" ]]; then
TAGS="${FULL_IMAGE_NAME,,}:pr-${{ github.event.number }}"

Check notice

Code scanning / zizmor

code injection via template expansion Note

code injection via template expansion
uses: sigstore/cosign-installer@4959ce089c160fddf62f7b42464195ba1a56d382 # v3.6.0

- name: checkout repository
uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4

Check warning

Code scanning / zizmor

detects commit SHAs that don't match their version comment tags Warning

detects commit SHAs that don't match their version comment tags

steps:
- name: harden runner
uses: step-security/harden-runner@0080882f6c36860b6ba35c610c98ce87d4e2f26f # v2.10.2

Check warning

Code scanning / zizmor

action has a known vulnerability Warning

action has a known vulnerability
runs-on: ubuntu-latest
permissions:
contents: read
packages: write

Check warning

Code scanning / zizmor

permissions without explanatory comments Warning

permissions without explanatory comments
if: github.event_name != 'pull_request'
shell: bash
run: |
IFS=',' read -ra TAGS <<< '${{ steps.meta.outputs.tags }}'

Check notice

Code scanning / zizmor

code injection via template expansion Note

code injection via template expansion
run: |
IFS=',' read -ra TAGS <<< '${{ steps.meta.outputs.tags }}'
for tag in "${TAGS[@]}"; do
pullstring="${tag}@${{ steps.push.outputs.digest }}"

Check notice

Code scanning / zizmor

code injection via template expansion Note

code injection via template expansion
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants