Skip to content

Commit 216951d

Browse files
committed
test: remove unneeded fields
1 parent 6def66e commit 216951d

File tree

3 files changed

+0
-270
lines changed

3 files changed

+0
-270
lines changed

.github/workflows/release.yaml

Lines changed: 0 additions & 71 deletions
Original file line numberDiff line numberDiff line change
@@ -55,74 +55,3 @@ jobs:
5555

5656
- name: Create deb repository
5757
run: ci/deploy-deb.sh
58-
59-
# `update-chart-version` creates a new PR for updating the helm chart
60-
update-chart-version:
61-
needs: deploy-packages
62-
runs-on: ubuntu-22.04
63-
steps:
64-
- name: Checkout
65-
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
66-
with:
67-
fetch-depth: 0
68-
69-
- name: Set up Git user
70-
run: |
71-
git config --global user.email "[email protected]"
72-
git config --global user.name "GitHub Actions"
73-
74-
- name: Set up Go
75-
uses: actions/setup-go@44694675825211faa026b3c33043df3e48a5fa00 # v6.0.0
76-
with:
77-
go-version-file: go.mod
78-
cache: false
79-
80-
- name: Install Go tools
81-
run: go install tool # GOBIN is added to the PATH by the setup-go action
82-
83-
- name: Create a PR with Trivy version
84-
run: mage helm:updateVersion
85-
env:
86-
# Use ORG_REPO_TOKEN instead of GITHUB_TOKEN
87-
# This allows the created PR to trigger tests and other workflows
88-
GITHUB_TOKEN: ${{ secrets.ORG_REPO_TOKEN }}
89-
90-
# `trigger-version-update` triggers the `update_version` workflow in the `trivy-telemetry` repository
91-
# and the trivy-downloads repository.
92-
trigger-version-update:
93-
needs: deploy-packages
94-
runs-on: ubuntu-22.04
95-
steps:
96-
- name: Trigger update_version workflow in trivy-telemetry
97-
env:
98-
# Use ORG_REPO_TOKEN instead of GITHUB_TOKEN
99-
# This allows triggering workflows in other repositories
100-
GH_TOKEN: ${{ secrets.ORG_REPO_TOKEN }}
101-
run: |
102-
gh workflow run update_version.yml \
103-
--repo ${{ github.repository_owner }}/trivy-telemetry \
104-
--ref main \
105-
--field version=${{ github.ref_name }}
106-
107-
- name: Trigger update_version workflow in trivy-downloads
108-
env:
109-
# Use ORG_REPO_TOKEN instead of GITHUB_TOKEN
110-
# This allows triggering workflows in other repositories
111-
GH_TOKEN: ${{ secrets.ORG_REPO_TOKEN }}
112-
run: |
113-
gh workflow run update_version.yml \
114-
--repo ${{ github.repository_owner }}/trivy-downloads \
115-
--ref main \
116-
--field version=${{ github.ref_name }} \
117-
--field artifact=trivy
118-
119-
- name: Trigger version update and release workflow in trivy-chocolatey
120-
env:
121-
# Use ORG_REPO_TOKEN instead of GITHUB_TOKEN
122-
# This allows triggering workflows in other repositories
123-
GH_TOKEN: ${{ secrets.ORG_REPO_TOKEN }}
124-
run: |
125-
gh workflow run release.yml \
126-
--repo ${{ github.repository_owner }}/trivy-chocolatey \
127-
--ref main \
128-
--field version=${{ github.ref_name }}

.github/workflows/reusable-release.yaml

Lines changed: 0 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -39,26 +39,6 @@ jobs:
3939
- name: Show available Docker Buildx platforms
4040
run: echo ${{ steps.buildx.outputs.platforms }}
4141

42-
- name: Login to docker.io registry
43-
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
44-
with:
45-
username: ${{ secrets.DOCKERHUB_USER }}
46-
password: ${{ secrets.DOCKERHUB_TOKEN }}
47-
48-
- name: Login to ghcr.io registry
49-
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
50-
with:
51-
registry: ghcr.io
52-
username: ${{ env.GH_USER }}
53-
password: ${{ secrets.GITHUB_TOKEN }}
54-
55-
- name: Login to ECR
56-
uses: docker/login-action@5e57cd118135c172c3672efd75eb46360885c0ef # v3.6.0
57-
with:
58-
registry: public.ecr.aws
59-
username: ${{ secrets.ECR_ACCESS_KEY_ID }}
60-
password: ${{ secrets.ECR_SECRET_ACCESS_KEY }}
61-
6242
- name: Checkout code
6343
uses: actions/checkout@08c6903cd8c0fde910a37f88322edcfb5dd907a8 # v5.0.0
6444
with:

goreleaser.yml

Lines changed: 0 additions & 179 deletions
Original file line numberDiff line numberDiff line change
@@ -136,182 +136,3 @@ archives:
136136
format_overrides:
137137
- goos: windows
138138
format: zip
139-
140-
141-
brews:
142-
-
143-
repository:
144-
owner: aquasecurity
145-
name: homebrew-trivy
146-
homepage: "https://github.com/aquasecurity/trivy"
147-
description: "Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues"
148-
url_template: "https://get.trivy.dev/trivy?version={{ .Version }}&os={{ tolower .Os }}&arch={{ tolower .Arch }}"
149-
test: |
150-
system "#{bin}/trivy", "--version"
151-
152-
dockers:
153-
- image_templates:
154-
- "docker.io/aquasec/trivy:{{ .Version }}-amd64"
155-
- "docker.io/aquasec/trivy:latest-amd64"
156-
- "ghcr.io/aquasecurity/trivy:{{ .Version }}-amd64"
157-
- "ghcr.io/aquasecurity/trivy:latest-amd64"
158-
- "public.ecr.aws/aquasecurity/trivy:latest-amd64"
159-
- "public.ecr.aws/aquasecurity/trivy:{{ .Version }}-amd64"
160-
use: buildx
161-
goos: linux
162-
goarch: amd64
163-
ids:
164-
- build-linux
165-
build_flag_templates:
166-
- "--label=org.opencontainers.image.title={{ .ProjectName }}"
167-
- "--label=org.opencontainers.image.description=A Fast Vulnerability Scanner for Containers"
168-
- "--label=org.opencontainers.image.vendor=Aqua Security"
169-
- "--label=org.opencontainers.image.version={{ .Version }}"
170-
- "--label=org.opencontainers.image.created={{ .Date }}"
171-
- "--label=org.opencontainers.image.source=https://github.com/aquasecurity/trivy"
172-
- "--label=org.opencontainers.image.revision={{ .FullCommit }}"
173-
- "--label=org.opencontainers.image.url=https://www.aquasec.com/products/trivy/"
174-
- "--label=org.opencontainers.image.documentation=https://trivy.dev/v{{ .Version }}/"
175-
- "--platform=linux/amd64"
176-
extra_files:
177-
- contrib/
178-
- image_templates:
179-
- "docker.io/aquasec/trivy:{{ .Version }}-arm64"
180-
- "docker.io/aquasec/trivy:latest-arm64"
181-
- "ghcr.io/aquasecurity/trivy:{{ .Version }}-arm64"
182-
- "ghcr.io/aquasecurity/trivy:latest-arm64"
183-
- "public.ecr.aws/aquasecurity/trivy:latest-arm64"
184-
- "public.ecr.aws/aquasecurity/trivy:{{ .Version }}-arm64"
185-
use: buildx
186-
goos: linux
187-
goarch: arm64
188-
ids:
189-
- build-linux
190-
build_flag_templates:
191-
- "--label=org.opencontainers.image.title={{ .ProjectName }}"
192-
- "--label=org.opencontainers.image.description=A Fast Vulnerability Scanner for Containers"
193-
- "--label=org.opencontainers.image.vendor=Aqua Security"
194-
- "--label=org.opencontainers.image.version={{ .Version }}"
195-
- "--label=org.opencontainers.image.created={{ .Date }}"
196-
- "--label=org.opencontainers.image.source=https://github.com/aquasecurity/trivy"
197-
- "--label=org.opencontainers.image.revision={{ .FullCommit }}"
198-
- "--label=org.opencontainers.image.url=https://www.aquasec.com/products/trivy/"
199-
- "--label=org.opencontainers.image.documentation=https://trivy.dev/v{{ .Version }}/"
200-
- "--platform=linux/arm64"
201-
extra_files:
202-
- contrib/
203-
- image_templates:
204-
- "docker.io/aquasec/trivy:{{ .Version }}-s390x"
205-
- "docker.io/aquasec/trivy:latest-s390x"
206-
- "ghcr.io/aquasecurity/trivy:{{ .Version }}-s390x"
207-
- "ghcr.io/aquasecurity/trivy:latest-s390x"
208-
- "public.ecr.aws/aquasecurity/trivy:latest-s390x"
209-
- "public.ecr.aws/aquasecurity/trivy:{{ .Version }}-s390x"
210-
use: buildx
211-
goos: linux
212-
goarch: s390x
213-
ids:
214-
- build-linux
215-
build_flag_templates:
216-
- "--label=org.opencontainers.image.title={{ .ProjectName }}"
217-
- "--label=org.opencontainers.image.description=A Fast Vulnerability Scanner for Containers"
218-
- "--label=org.opencontainers.image.vendor=Aqua Security"
219-
- "--label=org.opencontainers.image.version={{ .Version }}"
220-
- "--label=org.opencontainers.image.created={{ .Date }}"
221-
- "--label=org.opencontainers.image.source=https://github.com/aquasecurity/trivy"
222-
- "--label=org.opencontainers.image.revision={{ .FullCommit }}"
223-
- "--label=org.opencontainers.image.url=https://www.aquasec.com/products/trivy/"
224-
- "--label=org.opencontainers.image.documentation=https://trivy.dev/v{{ .Version }}/"
225-
- "--platform=linux/s390x"
226-
extra_files:
227-
- contrib/
228-
- image_templates:
229-
- "docker.io/aquasec/trivy:{{ .Version }}-ppc64le"
230-
- "docker.io/aquasec/trivy:latest-ppc64le"
231-
- "ghcr.io/aquasecurity/trivy:{{ .Version }}-ppc64le"
232-
- "ghcr.io/aquasecurity/trivy:latest-ppc64le"
233-
- "public.ecr.aws/aquasecurity/trivy:latest-ppc64le"
234-
- "public.ecr.aws/aquasecurity/trivy:{{ .Version }}-ppc64le"
235-
use: buildx
236-
goos: linux
237-
goarch: ppc64le
238-
ids:
239-
- build-linux
240-
build_flag_templates:
241-
- "--label=org.opencontainers.image.title={{ .ProjectName }}"
242-
- "--label=org.opencontainers.image.description=A Fast Vulnerability Scanner for Containers"
243-
- "--label=org.opencontainers.image.vendor=Aqua Security"
244-
- "--label=org.opencontainers.image.version={{ .Version }}"
245-
- "--label=org.opencontainers.image.created={{ .Date }}"
246-
- "--label=org.opencontainers.image.source=https://github.com/aquasecurity/trivy"
247-
- "--label=org.opencontainers.image.revision={{ .FullCommit }}"
248-
- "--label=org.opencontainers.image.url=https://www.aquasec.com/products/trivy/"
249-
- "--label=org.opencontainers.image.documentation=https://trivy.dev/v{{ .Version }}/"
250-
- "--platform=linux/ppc64le"
251-
extra_files:
252-
- contrib/
253-
254-
docker_manifests:
255-
- name_template: 'aquasec/trivy:{{ .Version }}'
256-
image_templates:
257-
- 'aquasec/trivy:{{ .Version }}-amd64'
258-
- 'aquasec/trivy:{{ .Version }}-arm64'
259-
- 'aquasec/trivy:{{ .Version }}-s390x'
260-
- 'aquasec/trivy:{{ .Version }}-ppc64le'
261-
- name_template: 'ghcr.io/aquasecurity/trivy:{{ .Version }}'
262-
image_templates:
263-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-amd64'
264-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-arm64'
265-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-s390x'
266-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-ppc64le'
267-
- name_template: 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}'
268-
image_templates:
269-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-amd64'
270-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-arm64'
271-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-s390x'
272-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-ppc64le'
273-
- name_template: 'aquasec/trivy:latest'
274-
image_templates:
275-
- 'aquasec/trivy:{{ .Version }}-amd64'
276-
- 'aquasec/trivy:{{ .Version }}-arm64'
277-
- 'aquasec/trivy:{{ .Version }}-s390x'
278-
- 'aquasec/trivy:{{ .Version }}-ppc64le'
279-
- name_template: 'ghcr.io/aquasecurity/trivy:latest'
280-
image_templates:
281-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-amd64'
282-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-arm64'
283-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-s390x'
284-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-ppc64le'
285-
- name_template: 'public.ecr.aws/aquasecurity/trivy:latest'
286-
image_templates:
287-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-amd64'
288-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-arm64'
289-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-s390x'
290-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-ppc64le'
291-
292-
signs:
293-
- cmd: cosign
294-
env:
295-
- COSIGN_EXPERIMENTAL=1
296-
signature: "${artifact}.sig"
297-
certificate: "${artifact}.pem"
298-
args:
299-
- "sign-blob"
300-
- "--oidc-issuer=https://token.actions.githubusercontent.com"
301-
- "--output-certificate=${certificate}"
302-
- "--output-signature=${signature}"
303-
- "${artifact}"
304-
- "--yes"
305-
artifacts: all
306-
output: true
307-
308-
docker_signs:
309-
- cmd: cosign
310-
env:
311-
- COSIGN_EXPERIMENTAL=1
312-
artifacts: manifests
313-
output: true
314-
args:
315-
- 'sign'
316-
- '${artifact}'
317-
- '--yes'

0 commit comments

Comments
 (0)