Compare commits

..

12 Commits
debian ... main

Author SHA1 Message Date
0c758df2c2
trivy multiarch
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing
Vulnerability Scan / Daily Vulnerability Scan (push) Successful in 14s
2025-01-17 07:41:09 +01:00
1ed8bcbc31
fix trivy
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing
2025-01-17 00:04:19 +01:00
01de5baae1
temporary fix because of upstream
Some checks failed
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing
Vulnerability Scan / Daily Vulnerability Scan (push) Failing after 9m31s
2024-12-16 15:17:43 +01:00
fda5aff7ef
cached trivy db
Some checks failed
continuous-integration/drone/push Build is failing
Vulnerability Scan / Daily Vulnerability Scan (push) Successful in 23s
2024-12-02 16:21:41 +01:00
9d35570379
added git
Some checks are pending
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing
Vulnerability Scan / Daily Vulnerability Scan (push) Waiting to run
2024-08-06 14:09:02 +02:00
4894e1419c
get rid of lastversion github ratelimit problem
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing
Vulnerability Scan / Daily Vulnerability Scan (push) Successful in 17s
2024-06-12 08:38:32 +02:00
016f8e64f4
publish on cron
Some checks failed
continuous-integration/drone/push Build is passing
Vulnerability Scan / Daily Vulnerability Scan (push) Failing after 18s
continuous-integration/drone/tag Build is failing
2024-05-25 19:42:04 +02:00
1ac07c5704
force package update
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing
2024-05-25 19:35:03 +02:00
26a777f4df
fix missing lib
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing
Vulnerability Scan / Daily Vulnerability Scan (push) Successful in 24s
2024-05-08 22:16:38 +02:00
9fc98a1fd4
display download URL for debug purposes
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing
2024-05-08 22:03:50 +02:00
14a03309d3
updated readme
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing
2024-05-02 10:23:39 +02:00
d11a2a1666
moved from debian to alpine
All checks were successful
continuous-integration/drone/push Build is passing
continuous-integration/drone/tag Build is passing
2024-05-02 10:21:57 +02:00
4 changed files with 31 additions and 20 deletions

View File

@ -39,6 +39,7 @@ steps:
when: when:
event: event:
- tag - tag
- cron
--- ---
kind: pipeline kind: pipeline
@ -81,6 +82,7 @@ steps:
when: when:
event: event:
- tag - tag
- cron
--- ---
kind: pipeline kind: pipeline
@ -104,6 +106,7 @@ steps:
trigger: trigger:
event: event:
- tag - tag
- cron
depends_on: depends_on:
- linux-amd64 - linux-amd64

View File

@ -1,3 +1,4 @@
---
name: Vulnerability Scan name: Vulnerability Scan
on: on:
@ -14,15 +15,24 @@ jobs:
steps: steps:
- name: Pull docker image - name: Pull docker image
run: docker pull docker.asperti.com/${{ github.repository_owner }}/hugo:latest run: docker pull docker.asperti.com/paspo/hugo:latest
- name: Setup trivy
run: |
echo "Installing Trivy for arch: $(uname -m)"
case $(uname -m) in
x86_64)
wget -O /tmp/trivy.deb https://github.com/aquasecurity/trivy/releases/download/v0.58.2/trivy_0.58.2_Linux-64bit.deb ;;
aarch64)
wget -O /tmp/trivy.deb https://github.com/aquasecurity/trivy/releases/download/v0.58.2/trivy_0.58.2_Linux-ARM64.deb ;;
*) exit 1 ;;
esac
dpkg -i /tmp/trivy.deb
- name: Run Trivy vulnerability scanner - name: Run Trivy vulnerability scanner
id: scan id: scan
uses: aquasecurity/trivy-action@master run: |
with: trivy --server ${{ secrets.TRIVY_SERVER }} --token ${{ secrets.TRIVY_TOKEN }} image --format json docker.asperti.com/paspo/hugo:latest > trivy-results.json
image-ref: "docker.asperti.com/${{ github.repository_owner }}/hugo:latest"
format: "json"
output: "trivy-results.json"
# if some vulnerability is found, we fail # if some vulnerability is found, we fail
- name: check output - name: check output

View File

@ -1,24 +1,26 @@
##### this stage will download latest deb package ##### this stage will download latest tarball
FROM alpine:latest as prep FROM alpine:latest as prep
ARG HUGO_ARCH=amd64 ARG HUGO_ARCH=amd64
RUN \ RUN \
apk -U add lastversion && \ apk --no-cache upgrade && \
wget $(lastversion --filter "hugo_extended_.*\-${HUGO_ARCH}\.deb$" --pre gohugoio/hugo --format assets ) -O /tmp/hugo.deb apk --no-cache add curl jq && \
LATEST_RELEASE=$(curl -L -s -H 'Accept: application/json' https://github.com/gohugoio/hugo/releases/latest | jq --raw-output ".tag_name" | sed 's/^v//' ) && \
LATEST_RELEASE=0.139.4 && \
URL="https://github.com/gohugoio/hugo/releases/download/v${LATEST_RELEASE}/hugo_extended_${LATEST_RELEASE}_linux-${HUGO_ARCH}.tar.gz " && \
echo "Downloading: ${URL}" && \
wget "${URL}" -O - | tar xzv -C /tmp
##### final image ##### final image
FROM debian:12-slim FROM alpine:latest
COPY --from=prep /tmp/hugo.deb /tmp/hugo.deb COPY --from=prep /tmp/hugo /usr/local/bin/hugo
RUN \ RUN \
apt update && \ apk --no-cache upgrade && \
DEBIAN_FRONTEND=noninteractive apt -y upgrade && \ apk --no-cache add git gcompat libstdc++
apt install -y /tmp/hugo.deb && \
rm -rf /var/lib/apt/lists/ /tmp/hugo.deb
ENTRYPOINT [ "/usr/local/bin/hugo" ] ENTRYPOINT [ "/usr/local/bin/hugo" ]

View File

@ -48,7 +48,3 @@ steps:
commands: commands:
- "hugo -s /drone/src --gc --minify" - "hugo -s /drone/src --gc --minify"
``` ```
## TODO
- Auto build and update based on hugo version