zabbix-docker/.github/workflows/images_build_rhel.yml

386 lines
14 KiB
YAML
Raw Normal View History

2023-02-03 07:05:11 +01:00
name: Build images (RedHat)
on:
release:
types:
- published
2024-02-10 16:19:34 +01:00
workflow_dispatch:
2023-02-03 07:05:11 +01:00
defaults:
run:
shell: bash
env:
LATEST_BRANCH: ${{ github.event.repository.default_branch }}
2024-02-10 16:19:34 +01:00
IMAGES_PREFIX: "zabbix-"
2023-02-03 07:05:11 +01:00
BASE_BUILD_NAME: "build-base"
2024-02-10 16:19:34 +01:00
DOCKERFILES_DIRECTORY: "Dockerfiles"
OIDC_ISSUER: "https://token.actions.githubusercontent.com"
IDENITY_REGEX: "https://github.com/zabbix/zabbix-docker/.github/"
2023-02-03 07:05:11 +01:00
REGISTRY: "quay.io"
REGISTRY_NAMESPACE: "redhat-isv-containers"
PFLT_LOGLEVEL: "warn"
PFLT_ARTIFACTS: "/tmp/artifacts"
jobs:
init_build:
name: Initialize build
2024-02-10 16:19:34 +01:00
runs-on: ubuntu-latest
permissions:
contents: read
2023-02-03 07:05:11 +01:00
outputs:
components: ${{ steps.components.outputs.list }}
is_default_branch: ${{ steps.branch_info.outputs.is_default_branch }}
current_branch: ${{ steps.branch_info.outputs.current_branch }}
sha_short: ${{ steps.branch_info.outputs.sha_short }}
steps:
2024-02-10 16:19:34 +01:00
- name: Block egress traffic
uses: step-security/harden-runner@63c24ba6bd7ba022e95695ff85de572c04a18142 # v2.7.0
2023-02-03 07:05:11 +01:00
with:
2024-02-10 16:19:34 +01:00
disable-sudo: true
egress-policy: block
2024-02-10 16:29:33 +01:00
allowed-endpoints: >
github.com:443
- name: Checkout repository
uses: actions/checkout@v4
with:
fetch-depth: 1
2023-02-03 07:05:11 +01:00
- name: Get branch info
id: branch_info
2024-02-10 16:19:34 +01:00
shell: bash
env:
LATEST_BRANCH: ${{ env.LATEST_BRANCH }}
github_ref: ${{ env.TRUNK_ONLY_EVENT == 'true' && env.TRUNK_GIT_BRANCH || github.ref }}
2023-02-03 07:05:11 +01:00
run: |
result=false
2024-02-10 16:19:34 +01:00
sha_short=$(git rev-parse --short HEAD)
2023-02-03 07:05:11 +01:00
if [[ "$github_ref" == "refs/tags/"* ]]; then
github_ref=${github_ref%.*}
fi
github_ref=${github_ref##*/}
2024-02-10 16:19:34 +01:00
if [[ "$github_ref" == "$LATEST_BRANCH" ]]; then
2023-03-07 08:56:16 +01:00
result=true
fi
2024-02-10 16:19:34 +01:00
echo "::group::Branch data"
echo "is_default_branch - $result"
echo "current_branch - $github_ref"
echo "sha_short - $sha_short"
echo "::endgroup::"
2023-02-03 07:05:11 +01:00
echo "is_default_branch=$result" >> $GITHUB_OUTPUT
2023-03-07 08:56:16 +01:00
echo "current_branch=$github_ref" >> $GITHUB_OUTPUT
2024-02-10 16:19:34 +01:00
echo "sha_short=$sha_short" >> $GITHUB_OUTPUT
2023-02-03 07:05:11 +01:00
- name: Prepare Zabbix component list
id: components
env:
REDHAT_CERTIFY_CREDENTIALS: ${{ secrets.REDHAT_CERTIFY_CREDENTIALS }}
2024-02-10 16:19:34 +01:00
CURRENT_BRANCH: ${{ steps.branch_info.outputs.current_branch }}
2023-02-03 07:05:11 +01:00
run: |
2024-02-10 16:35:45 +01:00
component_list=$(jq --raw-output --argjson data "$REDHAT_CERTIFY_CREDENTIALS" -n "\$data.\"$CURRENT_BRANCH\".components | keys | @json")
2024-02-10 16:19:34 +01:00
echo "::group::Zabbix Component List"
echo "$component_list"
echo "::endgroup::"
2023-02-03 07:05:11 +01:00
echo "list=$component_list" >> $GITHUB_OUTPUT
build_base:
timeout-minutes: 30
2024-02-10 16:27:00 +01:00
name: Build ${{ matrix.build }} base on RHEL (${{ matrix.arch }})
2023-02-03 07:05:11 +01:00
needs: ["init_build"]
strategy:
fail-fast: false
matrix:
2024-02-10 16:21:26 +01:00
build: [build-base]
2024-02-10 16:27:00 +01:00
arch: [X64, ARM64]
runs-on: [self-hosted, linux, "${{ matrix.arch }}"]
2024-02-10 16:19:34 +01:00
permissions:
contents: read
id-token: write
2023-02-03 07:05:11 +01:00
steps:
2024-02-10 16:19:34 +01:00
- name: Block egress traffic
uses: step-security/harden-runner@63c24ba6bd7ba022e95695ff85de572c04a18142 # v2.7.0
with:
egress-policy: audit
2023-02-03 07:05:11 +01:00
- name: Checkout repository
2024-02-05 05:16:42 +01:00
uses: actions/checkout@v4
2023-02-03 07:05:11 +01:00
with:
fetch-depth: 1
2024-02-10 16:19:34 +01:00
- name: Install cosign
uses: sigstore/cosign-installer@e1523de7571e31dbe865fd2e80c5c7c23ae71eb4
with:
cosign-release: 'v2.2.3'
- name: Check cosign version
run: cosign version
2023-02-03 07:05:11 +01:00
- name: Generate tags
id: meta
2024-02-05 05:16:42 +01:00
uses: docker/metadata-action@v5
2023-02-03 07:05:11 +01:00
with:
2024-02-10 16:19:34 +01:00
images: ${{ env.IMAGES_PREFIX }}${{ matrix.build }}
2023-02-03 07:05:11 +01:00
tags: |
2024-02-10 16:40:09 +01:00
type=sha,suffix=-${{ matrix.arch }}
2023-02-03 07:05:11 +01:00
- name: Build Zabbix Build Base
id: build_image
uses: redhat-actions/buildah-build@v2
with:
2024-02-10 16:19:34 +01:00
context: ${{ env.DOCKERFILES_DIRECTORY }}/${{ matrix.build }}/rhel
2023-02-03 07:05:11 +01:00
layers: false
tags: ${{ steps.meta.outputs.tags }}
containerfiles: |
./Dockerfiles/${{ matrix.build }}/rhel/Dockerfile
extra-args: |
--pull
2024-02-10 16:19:34 +01:00
- name: Image digest
env:
DIGEST: ${{ steps.docker_build.outputs.digest }}
CACHE_FILE_NAME: ${{ env.BASE_BUILD_NAME }}_${{ matrix.arch }}
run: |
2024-02-10 16:50:48 +01:00
echo "${{ steps.docker_build.outputs }}"
echo "{{ steps.docker_build.outputs }}"
2024-02-10 16:19:34 +01:00
echo "::group::Image digest"
echo "$DIGEST"
echo "::endgroup::"
echo "::group::Cache file name"
echo "$CACHE_FILE_NAME"
echo "::endgroup::"
echo "$DIGEST" > "$CACHE_FILE_NAME"
- name: Cache image digest
uses: actions/cache@v4
with:
path: ${{ env.BASE_BUILD_NAME }}_${{ matrix.arch }}
key: ${{ env.BASE_BUILD_NAME }}-${{ matrix.arch }}-${{ github.run_id }}
2023-02-03 07:05:11 +01:00
build_base_database:
timeout-minutes: 180
needs: [ "build_base", "init_build"]
name: Build ${{ matrix.build }} base on RHEL
strategy:
fail-fast: false
matrix:
2024-02-10 16:21:26 +01:00
build: [mysql, sqlite3]
arch: [X64, ARM64]
2024-02-10 16:27:00 +01:00
runs-on: [self-hosted, linux, "${{ matrix.arch }}"]
2024-02-10 16:19:34 +01:00
permissions:
contents: read
id-token: write
2023-02-03 07:05:11 +01:00
steps:
2024-02-10 16:19:34 +01:00
- name: Block egress traffic
uses: step-security/harden-runner@63c24ba6bd7ba022e95695ff85de572c04a18142 # v2.7.0
with:
egress-policy: audit
2023-02-03 07:05:11 +01:00
- name: Checkout repository
2024-02-05 05:16:42 +01:00
uses: actions/checkout@v4
2023-02-03 07:05:11 +01:00
with:
fetch-depth: 1
- name: Generate tags
id: meta
2024-02-05 05:16:42 +01:00
uses: docker/metadata-action@v5
2023-02-03 07:05:11 +01:00
with:
images: zabbix-build-${{ matrix.build }}
tags: |
2024-02-10 16:40:09 +01:00
type=sha,suffix=-${{ matrix.arch }}
2024-02-10 16:19:34 +01:00
- name: Download SHA256 tag of ${{ env.BASE_BUILD_NAME }}:${{ matrix.arch }}
uses: actions/cache@v4
with:
path: ${{ env.BASE_BUILD_NAME }}_${{ matrix.arch }}
key: ${{ env.BASE_BUILD_NAME }}-${{ matrix.arch }}-${{ github.run_id }}
- name: Retrieve ${{ env.BASE_BUILD_NAME }}:${{ matrix.arch }} SHA256 tag
id: base_build
env:
MATRIX_ARCH: ${{ matrix.arch }}
BASE_IMAGE: ${{ env.BASE_BUILD_NAME }}
IMAGES_PREFIX: ${{ env.IMAGES_PREFIX }}
run: |
BASE_TAG=$(cat "${BASE_IMAGE}_${MATRIX_ARCH}")
BUILD_BASE_IMAGE="${IMAGES_PREFIX}${BASE_IMAGE}@${BASE_TAG}"
echo "::group::Base build image information"
echo "base_tag=${BASE_TAG}"
echo "base_build_image=${BUILD_BASE_IMAGE}"
echo "::endgroup::"
echo "base_tag=${BASE_TAG}" >> $GITHUB_OUTPUT
echo "base_build_image=${BUILD_BASE_IMAGE}" >> $GITHUB_OUTPUT
2023-02-03 07:05:11 +01:00
2024-02-10 16:19:34 +01:00
- name: Build Zabbix Build Base
2023-02-03 07:05:11 +01:00
id: build_image
uses: redhat-actions/buildah-build@v2
with:
2024-02-10 16:19:34 +01:00
context: ${{ env.DOCKERFILES_DIRECTORY }}/${{ matrix.build }}/rhel
2023-02-03 07:05:11 +01:00
layers: false
tags: ${{ steps.meta.outputs.tags }}
containerfiles: |
2024-02-10 16:19:34 +01:00
${{ env.DOCKERFILES_DIRECTORY }}/build-${{ matrix.build }}/rhel/Dockerfile
extra-args: BUILD_BASE_IMAGE=${{ steps.base_build.outputs.base_build_image }}
- name: Image digest
env:
DIGEST: ${{ steps.docker_build.outputs.digest }}
CACHE_FILE_NAME: ${{ matrix.build }}_${{ matrix.arch }}
run: |
echo "::group::Image digest"
echo "$DIGEST"
echo "::endgroup::"
echo "::group::Cache file name"
echo "$CACHE_FILE_NAME"
echo "::endgroup::"
echo "$DIGEST" > "$CACHE_FILE_NAME"
- name: Cache image digest
uses: actions/cache@v4
with:
path: ${{ matrix.build }}_${{ matrix.arch }}
key: ${{ matrix.build }}-${{ matrix.arch }}-${{ github.run_id }}
2023-02-03 07:05:11 +01:00
build_images:
timeout-minutes: 90
needs: [ "build_base_database", "init_build"]
2024-02-10 16:28:09 +01:00
name: Build ${{ matrix.build }} image (${{ matrix.arch }})
2023-02-03 07:05:11 +01:00
strategy:
fail-fast: false
matrix:
build: ${{ fromJson(needs.init_build.outputs.components) }}
2024-02-10 16:28:09 +01:00
arch: [X64, ARM64]
runs-on: [self-hosted, linux, "${{ matrix.arch }}"]
2023-02-03 07:05:11 +01:00
steps:
2024-02-05 05:16:42 +01:00
- uses: actions/checkout@v4
2023-02-03 07:05:11 +01:00
- name: Detect Build Base Image
id: build_base_image
env:
REDHAT_CERTIFY_CREDENTIALS: ${{ secrets.REDHAT_CERTIFY_CREDENTIALS }}
run: |
BUILD_BASE=$(jq --raw-output --argjson data "$REDHAT_CERTIFY_CREDENTIALS" -n '$data."${{ needs.init_build.outputs.current_branch }}".components."${{ matrix.build }}".build_base')
echo "build_base=$BUILD_BASE" >> $GITHUB_OUTPUT
2024-02-05 05:16:42 +01:00
- name: Generate image name
2023-02-03 07:05:11 +01:00
id: image_name
env:
REDHAT_CERTIFY_CREDENTIALS: ${{ secrets.REDHAT_CERTIFY_CREDENTIALS }}
run: |
IMAGE_NAME=$(jq --raw-output --argjson data "$REDHAT_CERTIFY_CREDENTIALS" -n '$data."${{ needs.init_build.outputs.current_branch }}".components."${{ matrix.build }}".login')
echo "::add-mask::$IMAGE_NAME"
echo "image_name=$IMAGE_NAME" >> $GITHUB_OUTPUT
- name: Generate credentials
id: login_credentials
env:
REDHAT_CERTIFY_CREDENTIALS: ${{ secrets.REDHAT_CERTIFY_CREDENTIALS }}
run: |
IMAGE_NAME=$(jq --raw-output --argjson data "$REDHAT_CERTIFY_CREDENTIALS" -n '$data."${{ needs.init_build.outputs.current_branch }}".components."${{ matrix.build }}".login')
REGISTRY_PASSWORD=$(jq --raw-output --argjson data "$REDHAT_CERTIFY_CREDENTIALS" -n '$data."${{ needs.init_build.outputs.current_branch }}".components."${{ matrix.build }}".secret')
echo "::add-mask::$IMAGE_NAME"
echo "::add-mask::redhat-isv-containers+$IMAGE_NAME-robot"
echo "::add-mask::$REGISTRY_PASSWORD"
echo "username=$IMAGE_NAME" >> $GITHUB_OUTPUT
echo "password=$REGISTRY_PASSWORD" >> $GITHUB_OUTPUT
- name: Log in to Quay.io
2024-02-05 05:16:42 +01:00
uses: redhat-actions/podman-login@v1.6
2023-02-03 07:05:11 +01:00
env:
LOGIN: ${{ steps.login_credentials.outputs.username }}
PASSWORD: ${{ steps.login_credentials.outputs.password }}
with:
username: redhat-isv-containers+${{ env.LOGIN }}-robot
password: ${{ env.PASSWORD }}
registry: ${{ env.REGISTRY }}
auth_file_path: /tmp/.docker_${{ matrix.build }}_${{ needs.init_build.outputs.sha_short }}
- name: Remove smartmontools
if: ${{ matrix.build == 'agent2' }}
run: |
sed -i '/smartmontools/d' Dockerfiles/agent2/rhel/Dockerfile
- name: Generate tags
id: meta
2024-02-05 05:16:42 +01:00
uses: docker/metadata-action@v5
2023-02-03 07:05:11 +01:00
with:
images: ${{ env.REGISTRY }}/${{ env.REGISTRY_NAMESPACE }}/${{ steps.image_name.outputs.image_name }}
tags: |
type=semver,pattern={{version}}
type=sha
flavor: |
latest=${{ ( github.event_name == 'release' ) }}
- name: Build ${{ matrix.build }} and push
id: build_image
uses: redhat-actions/buildah-build@v2
with:
context: ./Dockerfiles/${{ matrix.build }}/rhel
layers: false
tags: ${{ steps.meta.outputs.tags }}
labels: |
org.opencontainers.image.revision=${{ fromJSON(steps.meta.outputs.json).labels['org.opencontainers.image.revision'] }}
org.opencontainers.image.created=${{ fromJSON(steps.meta.outputs.json).labels['org.opencontainers.image.created'] }}
containerfiles: |
./Dockerfiles/${{ matrix.build }}/rhel/Dockerfile
build-args: BUILD_BASE_IMAGE=zabbix-${{ steps.build_base_image.outputs.build_base }}:sha-${{ needs.init_build.outputs.sha_short }}
- name: Push to RedHat certification procedure
id: push_to_registry
uses: redhat-actions/push-to-registry@v2
with:
tags: ${{ steps.meta.outputs.tags }}
- name: Preflight
env:
PFLT_DOCKERCONFIG: /tmp/.docker_${{ matrix.build }}_${{ needs.init_build.outputs.sha_short }}
PFLT_CERTIFICATION_PROJECT_ID: ${{ steps.login_credentials.outputs.username }}
PFLT_PYXIS_API_TOKEN: ${{ secrets.REDHAT_API_TOKEN }}
PFLT_ARTIFACTS: ${{ env.PFLT_ARTIFACTS }}
PFLT_LOGLEVEL: ${{ env.PFLT_LOGLEVEL }}
run: |
mkdir -p $PFLT_ARTIFACTS
podman run \
-it \
--rm \
--security-opt=label=disable \
--env PFLT_LOGLEVEL=$PFLT_LOGLEVEL \
--env PFLT_ARTIFACTS=/artifacts \
--env PFLT_LOGFILE=/artifacts/preflight.log \
--env PFLT_CERTIFICATION_PROJECT_ID=$PFLT_CERTIFICATION_PROJECT_ID \
--env PFLT_PYXIS_API_TOKEN=$PFLT_PYXIS_API_TOKEN \
--env PFLT_DOCKERCONFIG=/temp-authfile.json \
-v $PFLT_ARTIFACTS:/artifacts \
-v $PFLT_DOCKERCONFIG:/temp-authfile.json:ro \
2024-02-05 05:16:42 +01:00
quay.io/opdev/preflight:stable check container ${{ steps.build_image.outputs.image-with-tag }} --submit
2023-02-03 07:05:11 +01:00
2023-02-05 09:17:09 +01:00
- name: Push to RedHat certification procedure
id: push_to_registry_all_tags
uses: redhat-actions/push-to-registry@v2
with:
tags: ${{ steps.meta.outputs.tags }}
2023-02-03 07:05:11 +01:00
- name: Cleanup
run: |
echo "${{ steps.meta.outputs.tags }}" | while IFS= read -r image_name ; do podman rmi -i -f $image_name; done
rm -rf ${{ env.PFLT_ARTIFACTS }}