Skip to content

Release snapshot

Release snapshot #765

---
# Release snapshot on CRON schedule (every night) or on demand.
name: Release snapshot
on:
workflow_dispatch: {}
schedule:
- cron: "0 0 * * *"
env:
GO_VERSION: 1.22.2
# Disable permissions granted to the GITHUB_TOKEN for all the available scopes.
permissions: {}
jobs:
release-snapshot:
name: Release unversioned snapshot
runs-on: ubuntu-latest
env:
DOCKER_CLI_EXPERIMENTAL: "enabled"
permissions:
id-token: write
steps:
- name: Set up QEMU
uses: docker/setup-qemu-action@v3
- name: Set up Docker Buildx
id: buildx
uses: docker/setup-buildx-action@v3
- name: Available platforms
run: echo ${{ steps.buildx.outputs.platforms }}
- name: Checkout code
uses: actions/checkout@v4
- name: Setup Go
uses: actions/setup-go@v5
with:
go-version-file: go.mod
- name: Install cosign
uses: sigstore/cosign-installer@v3.5.0
- name: Release snapshot
uses: goreleaser/goreleaser-action@v5
with:
version: v1.7.0
args: release -f=goreleaser-e2e.yaml --snapshot --skip-publish --rm-dist
env:
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
COSIGN_EXPERIMENTAL: 1
- name: Scan Trivy Operator image for vulnerabilities
uses: aquasecurity/trivy-action@master
with:
image-ref: 'ghcr.io/aquasecurity/trivy-operator:${{ github.sha }}-amd64'
exit-code: '1'
ignore-unfixed: true
severity: 'CRITICAL,HIGH'
- name: Notify dedicated teams channel
uses: jdcargile/ms-teams-notification@v1.4
if: failure()
with:
github-token: ${{ secrets.ORG_REPO_TOKEN }}
ms-teams-webhook-uri: ${{ secrets.MS_TEAMS_WEBHOOK_URI }}
notification-summary: vulnerabilities has been found in trivy-operator image
notification-color: 17a2b8
timezone: America/Denver