mirror of
https://github.com/actions/cache.git
synced 2026-01-14 09:33:07 +08:00
Compare commits
1 Commits
8dc05b918c
...
1353798301
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
1353798301 |
100
.github/workflows/5codeql.yml
vendored
100
.github/workflows/5codeql.yml
vendored
@ -1,100 +0,0 @@
|
|||||||
# For most projects, this workflow file will not need changing; you simply need
|
|
||||||
# to commit it to your repository.
|
|
||||||
#
|
|
||||||
# You may wish to alter this file to override the set of languages analyzed,
|
|
||||||
# or to provide custom queries or build logic.
|
|
||||||
#
|
|
||||||
# ******** NOTE ********
|
|
||||||
# We have attempted to detect the languages in your repository. Please check
|
|
||||||
# the `language` matrix defined below to confirm you have the correct set of
|
|
||||||
# supported CodeQL languages.
|
|
||||||
#
|
|
||||||
name: "CodeQL Advanced"
|
|
||||||
|
|
||||||
on:
|
|
||||||
push:
|
|
||||||
branches: [ "main", "Ihtbbs" ]
|
|
||||||
pull_request:
|
|
||||||
branches: [ "main", "Ihtbbs" ]
|
|
||||||
schedule:
|
|
||||||
- cron: '31 15 * * 1'
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
analyze:
|
|
||||||
name: Analyze (${{ matrix.language }})
|
|
||||||
# Runner size impacts CodeQL analysis time. To learn more, please see:
|
|
||||||
# - https://gh.io/recommended-hardware-resources-for-running-codeql
|
|
||||||
# - https://gh.io/supported-runners-and-hardware-resources
|
|
||||||
# - https://gh.io/using-larger-runners (GitHub.com only)
|
|
||||||
# Consider using larger runners or machines with greater resources for possible analysis time improvements.
|
|
||||||
runs-on: ${{ (matrix.language == 'swift' && 'macos-latest') || 'ubuntu-latest' }}
|
|
||||||
permissions:
|
|
||||||
# required for all workflows
|
|
||||||
security-events: write
|
|
||||||
|
|
||||||
# required to fetch internal or private CodeQL packs
|
|
||||||
packages: read
|
|
||||||
|
|
||||||
# only required for workflows in private repositories
|
|
||||||
actions: read
|
|
||||||
contents: read
|
|
||||||
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
include:
|
|
||||||
- language: actions
|
|
||||||
build-mode: none
|
|
||||||
- language: javascript-typescript
|
|
||||||
build-mode: none
|
|
||||||
# CodeQL supports the following values keywords for 'language': 'actions', 'c-cpp', 'csharp', 'go', 'java-kotlin', 'javascript-typescript', 'python', 'ruby', 'swift'
|
|
||||||
# Use `c-cpp` to analyze code written in C, C++ or both
|
|
||||||
# Use 'java-kotlin' to analyze code written in Java, Kotlin or both
|
|
||||||
# Use 'javascript-typescript' to analyze code written in JavaScript, TypeScript or both
|
|
||||||
# To learn more about changing the languages that are analyzed or customizing the build mode for your analysis,
|
|
||||||
# see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/customizing-your-advanced-setup-for-code-scanning.
|
|
||||||
# If you are analyzing a compiled language, you can modify the 'build-mode' for that language to customize how
|
|
||||||
# your codebase is analyzed, see https://docs.github.com/en/code-security/code-scanning/creating-an-advanced-setup-for-code-scanning/codeql-code-scanning-for-compiled-languages
|
|
||||||
steps:
|
|
||||||
- name: Checkout repository
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
|
|
||||||
# Add any setup steps before running the `github/codeql-action/init` action.
|
|
||||||
# This includes steps like installing compilers or runtimes (`actions/setup-node`
|
|
||||||
# or others). This is typically only required for manual builds.
|
|
||||||
# - name: Setup runtime (example)
|
|
||||||
# uses: actions/setup-example@v1
|
|
||||||
|
|
||||||
# Initializes the CodeQL tools for scanning.
|
|
||||||
- name: Initialize CodeQL
|
|
||||||
uses: github/codeql-action/init@v3
|
|
||||||
with:
|
|
||||||
languages: ${{ matrix.language }}
|
|
||||||
build-mode: ${{ matrix.build-mode }}
|
|
||||||
# If you wish to specify custom queries, you can do so here or in a config file.
|
|
||||||
# By default, queries listed here will override any specified in a config file.
|
|
||||||
# Prefix the list here with "+" to use these queries and those in the config file.
|
|
||||||
|
|
||||||
# For more details on CodeQL's query packs, refer to: https://docs.github.com/en/code-security/code-scanning/automatically-scanning-your-code-for-vulnerabilities-and-errors/configuring-code-scanning#using-queries-in-ql-packs
|
|
||||||
# queries: security-extended,security-and-quality
|
|
||||||
|
|
||||||
# If the analyze step fails for one of the languages you are analyzing with
|
|
||||||
# "We were unable to automatically build your code", modify the matrix above
|
|
||||||
# to set the build mode to "manual" for that language. Then modify this step
|
|
||||||
# to build your code.
|
|
||||||
# ℹ️ Command-line programs to run using the OS shell.
|
|
||||||
# 📚 See https://docs.github.com/en/actions/using-workflows/workflow-syntax-for-github-actions#jobsjob_idstepsrun
|
|
||||||
- if: matrix.build-mode == 'manual'
|
|
||||||
shell: bash
|
|
||||||
run: |
|
|
||||||
echo 'If you are using a "manual" build mode for one or more of the' \
|
|
||||||
'languages you are analyzing, replace this with the commands to build' \
|
|
||||||
'your code, for example:'
|
|
||||||
echo ' make bootstrap'
|
|
||||||
echo ' make release'
|
|
||||||
exit 1
|
|
||||||
|
|
||||||
- name: Perform CodeQL Analysis
|
|
||||||
uses: github/codeql-action/analyze@v3
|
|
||||||
with:
|
|
||||||
category: "/language:${{matrix.language}}"
|
|
||||||
39
.github/workflows/dependency-review.yml
vendored
39
.github/workflows/dependency-review.yml
vendored
@ -1,39 +0,0 @@
|
|||||||
# Dependency Review Action
|
|
||||||
#
|
|
||||||
# This Action will scan dependency manifest files that change as part of a Pull Request,
|
|
||||||
# surfacing known-vulnerable versions of the packages declared or updated in the PR.
|
|
||||||
# Once installed, if the workflow run is marked as required, PRs introducing known-vulnerable
|
|
||||||
# packages will be blocked from merging.
|
|
||||||
#
|
|
||||||
# Source repository: https://github.com/actions/dependency-review-action
|
|
||||||
# Public documentation: https://docs.github.com/en/code-security/supply-chain-security/understanding-your-software-supply-chain/about-dependency-review#dependency-review-enforcement
|
|
||||||
name: 'Dependency review'
|
|
||||||
on:
|
|
||||||
pull_request:
|
|
||||||
branches: [ "main", "Ihtbbs" ]
|
|
||||||
|
|
||||||
# If using a dependency submission action in this workflow this permission will need to be set to:
|
|
||||||
#
|
|
||||||
# permissions:
|
|
||||||
# contents: write
|
|
||||||
#
|
|
||||||
# https://docs.github.com/en/enterprise-cloud@latest/code-security/supply-chain-security/understanding-your-software-supply-chain/using-the-dependency-submission-api
|
|
||||||
permissions:
|
|
||||||
contents: read
|
|
||||||
# Write permissions for pull-requests are required for using the `comment-summary-in-pr` option, comment out if you aren't using this option
|
|
||||||
pull-requests: write
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
dependency-review:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- name: 'Checkout repository'
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
- name: 'Dependency Review'
|
|
||||||
uses: actions/dependency-review-action@v4
|
|
||||||
# Commonly enabled options, see https://github.com/actions/dependency-review-action#configuration-options for all available options.
|
|
||||||
with:
|
|
||||||
comment-summary-in-pr: always
|
|
||||||
# fail-on-severity: moderate
|
|
||||||
# deny-licenses: GPL-1.0-or-later, LGPL-2.0-or-later
|
|
||||||
# retry-on-snapshot-warnings: true
|
|
||||||
116
.github/workflows/google.yml
vendored
116
.github/workflows/google.yml
vendored
@ -1,116 +0,0 @@
|
|||||||
# This workflow will build a docker container, publish it to Google Container
|
|
||||||
# Registry, and deploy it to GKE when there is a push to the "main"
|
|
||||||
# branch.
|
|
||||||
#
|
|
||||||
# To configure this workflow:
|
|
||||||
#
|
|
||||||
# 1. Enable the following Google Cloud APIs:
|
|
||||||
#
|
|
||||||
# - Artifact Registry (artifactregistry.googleapis.com)
|
|
||||||
# - Google Kubernetes Engine (container.googleapis.com)
|
|
||||||
# - IAM Credentials API (iamcredentials.googleapis.com)
|
|
||||||
#
|
|
||||||
# You can learn more about enabling APIs at
|
|
||||||
# https://support.google.com/googleapi/answer/6158841.
|
|
||||||
#
|
|
||||||
# 2. Ensure that your repository contains the necessary configuration for your
|
|
||||||
# Google Kubernetes Engine cluster, including deployment.yml,
|
|
||||||
# kustomization.yml, service.yml, etc.
|
|
||||||
#
|
|
||||||
# 3. Create and configure a Workload Identity Provider for GitHub:
|
|
||||||
# https://github.com/google-github-actions/auth#preferred-direct-workload-identity-federation.
|
|
||||||
#
|
|
||||||
# Depending on how you authenticate, you will need to grant an IAM principal
|
|
||||||
# permissions on Google Cloud:
|
|
||||||
#
|
|
||||||
# - Artifact Registry Administrator (roles/artifactregistry.admin)
|
|
||||||
# - Kubernetes Engine Developer (roles/container.developer)
|
|
||||||
#
|
|
||||||
# You can learn more about setting IAM permissions at
|
|
||||||
# https://cloud.google.com/iam/docs/manage-access-other-resources
|
|
||||||
#
|
|
||||||
# 5. Change the values in the "env" block to match your values.
|
|
||||||
|
|
||||||
name: 'Build and Deploy to GKE'
|
|
||||||
|
|
||||||
on:
|
|
||||||
push:
|
|
||||||
branches:
|
|
||||||
- '"main"'
|
|
||||||
|
|
||||||
env:
|
|
||||||
PROJECT_ID: 'my-project' # TODO: update to your Google Cloud project ID
|
|
||||||
GAR_LOCATION: 'us-central1' # TODO: update to your region
|
|
||||||
GKE_CLUSTER: 'cluster-1' # TODO: update to your cluster name
|
|
||||||
GKE_ZONE: 'us-central1-c' # TODO: update to your cluster zone
|
|
||||||
DEPLOYMENT_NAME: 'gke-test' # TODO: update to your deployment name
|
|
||||||
REPOSITORY: 'samples' # TODO: update to your Artifact Registry docker repository name
|
|
||||||
IMAGE: 'static-site'
|
|
||||||
WORKLOAD_IDENTITY_PROVIDER: 'projects/123456789/locations/global/workloadIdentityPools/my-pool/providers/my-provider' # TODO: update to your workload identity provider
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
setup-build-publish-deploy:
|
|
||||||
name: 'Setup, Build, Publish, and Deploy'
|
|
||||||
runs-on: 'ubuntu-latest'
|
|
||||||
environment: 'production'
|
|
||||||
|
|
||||||
permissions:
|
|
||||||
contents: 'read'
|
|
||||||
id-token: 'write'
|
|
||||||
|
|
||||||
steps:
|
|
||||||
- name: 'Checkout'
|
|
||||||
uses: 'actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332' # actions/checkout@v4
|
|
||||||
|
|
||||||
# Configure Workload Identity Federation and generate an access token.
|
|
||||||
#
|
|
||||||
# See https://github.com/google-github-actions/auth for more options,
|
|
||||||
# including authenticating via a JSON credentials file.
|
|
||||||
- id: 'auth'
|
|
||||||
name: 'Authenticate to Google Cloud'
|
|
||||||
uses: 'google-github-actions/auth@f112390a2df9932162083945e46d439060d66ec2' # google-github-actions/auth@v2
|
|
||||||
with:
|
|
||||||
workload_identity_provider: '${{ env.WORKLOAD_IDENTITY_PROVIDER }}'
|
|
||||||
|
|
||||||
# Authenticate Docker to Google Cloud Artifact Registry
|
|
||||||
- name: 'Docker Auth'
|
|
||||||
uses: 'docker/login-action@9780b0c442fbb1117ed29e0efdff1e18412f7567' # docker/login-action@v3
|
|
||||||
with:
|
|
||||||
username: 'oauth2accesstoken'
|
|
||||||
password: '${{ steps.auth.outputs.auth_token }}'
|
|
||||||
registry: '${{ env.GAR_LOCATION }}-docker.pkg.dev'
|
|
||||||
|
|
||||||
# Get the GKE credentials so we can deploy to the cluster
|
|
||||||
- name: 'Set up GKE credentials'
|
|
||||||
uses: 'google-github-actions/get-gke-credentials@6051de21ad50fbb1767bc93c11357a49082ad116' # google-github-actions/get-gke-credentials@v2
|
|
||||||
with:
|
|
||||||
cluster_name: '${{ env.GKE_CLUSTER }}'
|
|
||||||
location: '${{ env.GKE_ZONE }}'
|
|
||||||
|
|
||||||
# Build the Docker image
|
|
||||||
- name: 'Build and push Docker container'
|
|
||||||
run: |-
|
|
||||||
DOCKER_TAG="${GAR_LOCATION}-docker.pkg.dev/${PROJECT_ID}/${REPOSITORY}/${IMAGE}:${GITHUB_SHA}"
|
|
||||||
|
|
||||||
docker build \
|
|
||||||
--tag "${DOCKER_TAG}" \
|
|
||||||
--build-arg GITHUB_SHA="${GITHUB_SHA}" \
|
|
||||||
--build-arg GITHUB_REF="${GITHUB_REF}" \
|
|
||||||
.
|
|
||||||
|
|
||||||
docker push "${DOCKER_TAG}"
|
|
||||||
|
|
||||||
# Set up kustomize
|
|
||||||
- name: 'Set up Kustomize'
|
|
||||||
run: |-
|
|
||||||
curl -sfLo kustomize https://github.com/kubernetes-sigs/kustomize/releases/download/kustomize%2Fv5.4.3/kustomize_v5.4.3_linux_amd64.tar.gz
|
|
||||||
chmod u+x ./kustomize
|
|
||||||
|
|
||||||
# Deploy the Docker image to the GKE cluster
|
|
||||||
- name: 'Deploy to GKE'
|
|
||||||
run: |-
|
|
||||||
# replacing the image name in the k8s template
|
|
||||||
./kustomize edit set image LOCATION-docker.pkg.dev/PROJECT_ID/REPOSITORY/IMAGE:TAG=$GAR_LOCATION-docker.pkg.dev/$PROJECT_ID/$REPOSITORY/$IMAGE:$GITHUB_SHA
|
|
||||||
./kustomize build . | kubectl apply -f -
|
|
||||||
kubectl rollout status deployment/$DEPLOYMENT_NAME
|
|
||||||
kubectl get services -o wide
|
|
||||||
75
.github/workflows/ibm.yml
vendored
75
.github/workflows/ibm.yml
vendored
@ -1,75 +0,0 @@
|
|||||||
# This workflow will build a docker container, publish it to IBM Container Registry, and deploy it to IKS when there is a push to the "main" branch.
|
|
||||||
#
|
|
||||||
# To configure this workflow:
|
|
||||||
#
|
|
||||||
# 1. Ensure that your repository contains a Dockerfile
|
|
||||||
# 2. Setup secrets in your repository by going to settings: Create ICR_NAMESPACE and IBM_CLOUD_API_KEY
|
|
||||||
# 3. Change the values for the IBM_CLOUD_REGION, REGISTRY_HOSTNAME, IMAGE_NAME, IKS_CLUSTER, DEPLOYMENT_NAME, and PORT
|
|
||||||
|
|
||||||
name: Build and Deploy to IKS
|
|
||||||
|
|
||||||
on:
|
|
||||||
push:
|
|
||||||
branches: [ "main" ]
|
|
||||||
|
|
||||||
# Environment variables available to all jobs and steps in this workflow
|
|
||||||
env:
|
|
||||||
GITHUB_SHA: ${{ github.sha }}
|
|
||||||
IBM_CLOUD_API_KEY: ${{ secrets.IBM_CLOUD_API_KEY }}
|
|
||||||
IBM_CLOUD_REGION: us-south
|
|
||||||
ICR_NAMESPACE: ${{ secrets.ICR_NAMESPACE }}
|
|
||||||
REGISTRY_HOSTNAME: us.icr.io
|
|
||||||
IMAGE_NAME: iks-test
|
|
||||||
IKS_CLUSTER: example-iks-cluster-name-or-id
|
|
||||||
DEPLOYMENT_NAME: iks-test
|
|
||||||
PORT: 5001
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
setup-build-publish-deploy:
|
|
||||||
name: Setup, Build, Publish, and Deploy
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
environment: production
|
|
||||||
steps:
|
|
||||||
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
|
|
||||||
# Download and Install IBM Cloud CLI
|
|
||||||
- name: Install IBM Cloud CLI
|
|
||||||
run: |
|
|
||||||
curl -fsSL https://clis.cloud.ibm.com/install/linux | sh
|
|
||||||
ibmcloud --version
|
|
||||||
ibmcloud config --check-version=false
|
|
||||||
ibmcloud plugin install -f kubernetes-service
|
|
||||||
ibmcloud plugin install -f container-registry
|
|
||||||
|
|
||||||
# Authenticate with IBM Cloud CLI
|
|
||||||
- name: Authenticate with IBM Cloud CLI
|
|
||||||
run: |
|
|
||||||
ibmcloud login --apikey "${IBM_CLOUD_API_KEY}" -r "${IBM_CLOUD_REGION}" -g default
|
|
||||||
ibmcloud cr region-set "${IBM_CLOUD_REGION}"
|
|
||||||
ibmcloud cr login
|
|
||||||
|
|
||||||
# Build the Docker image
|
|
||||||
- name: Build with Docker
|
|
||||||
run: |
|
|
||||||
docker build -t "$REGISTRY_HOSTNAME"/"$ICR_NAMESPACE"/"$IMAGE_NAME":"$GITHUB_SHA" \
|
|
||||||
--build-arg GITHUB_SHA="$GITHUB_SHA" \
|
|
||||||
--build-arg GITHUB_REF="$GITHUB_REF" .
|
|
||||||
|
|
||||||
# Push the image to IBM Container Registry
|
|
||||||
- name: Push the image to ICR
|
|
||||||
run: |
|
|
||||||
docker push $REGISTRY_HOSTNAME/$ICR_NAMESPACE/$IMAGE_NAME:$GITHUB_SHA
|
|
||||||
|
|
||||||
# Deploy the Docker image to the IKS cluster
|
|
||||||
- name: Deploy to IKS
|
|
||||||
run: |
|
|
||||||
ibmcloud ks cluster config --cluster $IKS_CLUSTER
|
|
||||||
kubectl config current-context
|
|
||||||
kubectl create deployment $DEPLOYMENT_NAME --image=$REGISTRY_HOSTNAME/$ICR_NAMESPACE/$IMAGE_NAME:$GITHUB_SHA --dry-run -o yaml > deployment.yaml
|
|
||||||
kubectl apply -f deployment.yaml
|
|
||||||
kubectl rollout status deployment/$DEPLOYMENT_NAME
|
|
||||||
kubectl create service loadbalancer $DEPLOYMENT_NAME --tcp=80:$PORT --dry-run -o yaml > service.yaml
|
|
||||||
kubectl apply -f service.yaml
|
|
||||||
kubectl get services -o wide
|
|
||||||
32
.github/workflows/manual.yml
vendored
32
.github/workflows/manual.yml
vendored
@ -1,32 +0,0 @@
|
|||||||
# This is a basic workflow that is manually triggered
|
|
||||||
|
|
||||||
name: Manual workflow
|
|
||||||
|
|
||||||
# Controls when the action will run. Workflow runs when manually triggered using the UI
|
|
||||||
# or API.
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
# Inputs the workflow accepts.
|
|
||||||
inputs:
|
|
||||||
name:
|
|
||||||
# Friendly description to be shown in the UI instead of 'name'
|
|
||||||
description: 'Person to greet'
|
|
||||||
# Default value if no value is explicitly provided
|
|
||||||
default: 'World'
|
|
||||||
# Input has to be provided for the workflow to run
|
|
||||||
required: true
|
|
||||||
# The data type of the input
|
|
||||||
type: string
|
|
||||||
|
|
||||||
# A workflow run is made up of one or more jobs that can run sequentially or in parallel
|
|
||||||
jobs:
|
|
||||||
# This workflow contains a single job called "greet"
|
|
||||||
greet:
|
|
||||||
# The type of runner that the job will run on
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
|
|
||||||
# Steps represent a sequence of tasks that will be executed as part of the job
|
|
||||||
steps:
|
|
||||||
# Runs a single command using the runners shell
|
|
||||||
- name: Send greeting
|
|
||||||
run: echo "Hello ${{ inputs.name }}"
|
|
||||||
@ -1,36 +0,0 @@
|
|||||||
# This workflow will run tests using node and then publish a package to GitHub Packages when a release is created
|
|
||||||
# For more information see: https://docs.github.com/en/actions/publishing-packages/publishing-nodejs-packages
|
|
||||||
|
|
||||||
name: Node.js Package
|
|
||||||
|
|
||||||
on:
|
|
||||||
release:
|
|
||||||
types: [created]
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
build:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- uses: actions/setup-node@v4
|
|
||||||
with:
|
|
||||||
node-version: 20
|
|
||||||
- run: npm ci
|
|
||||||
- run: npm test
|
|
||||||
|
|
||||||
publish-gpr:
|
|
||||||
needs: build
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
permissions:
|
|
||||||
contents: read
|
|
||||||
packages: write
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- uses: actions/setup-node@v4
|
|
||||||
with:
|
|
||||||
node-version: 20
|
|
||||||
registry-url: https://npm.pkg.github.com/
|
|
||||||
- run: npm ci
|
|
||||||
- run: npm publish
|
|
||||||
env:
|
|
||||||
NODE_AUTH_TOKEN: ${{secrets.GITHUB_TOKEN}}
|
|
||||||
33
.github/workflows/npm-publish.yml
vendored
33
.github/workflows/npm-publish.yml
vendored
@ -1,33 +0,0 @@
|
|||||||
# This workflow will run tests using node and then publish a package to GitHub Packages when a release is created
|
|
||||||
# For more information see: https://docs.github.com/en/actions/publishing-packages/publishing-nodejs-packages
|
|
||||||
|
|
||||||
name: Node.js Package
|
|
||||||
|
|
||||||
on:
|
|
||||||
release:
|
|
||||||
types: [created]
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
build:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- uses: actions/setup-node@v4
|
|
||||||
with:
|
|
||||||
node-version: 20
|
|
||||||
- run: npm ci
|
|
||||||
- run: npm test
|
|
||||||
|
|
||||||
publish-npm:
|
|
||||||
needs: build
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- uses: actions/checkout@v4
|
|
||||||
- uses: actions/setup-node@v4
|
|
||||||
with:
|
|
||||||
node-version: 20
|
|
||||||
registry-url: https://registry.npmjs.org/
|
|
||||||
- run: npm ci
|
|
||||||
- run: npm publish
|
|
||||||
env:
|
|
||||||
NODE_AUTH_TOKEN: ${{secrets.npm_token}}
|
|
||||||
@ -4,7 +4,7 @@ on:
|
|||||||
types: [released]
|
types: [released]
|
||||||
workflow_dispatch:
|
workflow_dispatch:
|
||||||
inputs:
|
inputs:
|
||||||
TAG_NAME:'Lit2dafit'
|
TAG_NAME:
|
||||||
description: 'Tag name that the major tag will point to'
|
description: 'Tag name that the major tag will point to'
|
||||||
required: true
|
required: true
|
||||||
|
|
||||||
|
|||||||
43
.github/workflows/static.yml
vendored
43
.github/workflows/static.yml
vendored
@ -1,43 +0,0 @@
|
|||||||
# Simple workflow for deploying static content to GitHub Pages
|
|
||||||
name: Deploy static content to Pages
|
|
||||||
|
|
||||||
on:
|
|
||||||
# Runs on pushes targeting the default branch
|
|
||||||
push:
|
|
||||||
branches: ["main"]
|
|
||||||
|
|
||||||
# Allows you to run this workflow manually from the Actions tab
|
|
||||||
workflow_dispatch:
|
|
||||||
|
|
||||||
# Sets permissions of the GITHUB_TOKEN to allow deployment to GitHub Pages
|
|
||||||
permissions:
|
|
||||||
contents: read
|
|
||||||
pages: write
|
|
||||||
id-token: write
|
|
||||||
|
|
||||||
# Allow only one concurrent deployment, skipping runs queued between the run in-progress and latest queued.
|
|
||||||
# However, do NOT cancel in-progress runs as we want to allow these production deployments to complete.
|
|
||||||
concurrency:
|
|
||||||
group: "pages"
|
|
||||||
cancel-in-progress: false
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
# Single deploy job since we're just deploying
|
|
||||||
deploy:
|
|
||||||
environment:
|
|
||||||
name: github-pages
|
|
||||||
url: ${{ steps.deployment.outputs.page_url }}
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
steps:
|
|
||||||
- name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
- name: Setup Pages
|
|
||||||
uses: actions/configure-pages@v5
|
|
||||||
- name: Upload artifact
|
|
||||||
uses: actions/upload-pages-artifact@v3
|
|
||||||
with:
|
|
||||||
# Upload entire repository
|
|
||||||
path: '.'
|
|
||||||
- name: Deploy to GitHub Pages
|
|
||||||
id: deployment
|
|
||||||
uses: actions/deploy-pages@v4
|
|
||||||
@ -1,6 +1,6 @@
|
|||||||
name: 'air_40'
|
name: 'Cache'
|
||||||
description: 'Cache artifacts like dependencies and build outputs to improve workflow execution time'
|
description: 'Cache artifacts like dependencies and build outputs to improve workflow execution time'
|
||||||
author: 'Shannon Fletcher'
|
author: 'GitHub'
|
||||||
inputs:
|
inputs:
|
||||||
path:
|
path:
|
||||||
description: 'A list of files, directories, and wildcard patterns to cache and restore'
|
description: 'A list of files, directories, and wildcard patterns to cache and restore'
|
||||||
|
|||||||
@ -1,10 +0,0 @@
|
|||||||
steps:
|
|
||||||
- name: 'gcr.io/cloud-builders/docker'
|
|
||||||
args: ['build', '-t', 'gcr.io/gtm-kqqwvx2-zgi2z/tagging-server', '.']
|
|
||||||
- name: 'gcr.io/cloud-builders/docker'
|
|
||||||
args: ['push', 'gcr.io/gtm-kqqwvx2-zgi2z/tagging-server']
|
|
||||||
- name: 'gcr.io/cloud-builders/gcloud'
|
|
||||||
args: ['run', 'deploy', 'tagging-server', '--image', 'gcr.io/gtm-kqqwvx2-zgi2z/tagging-server', '--platform', 'managed', '--region', 'us-central1']
|
|
||||||
|
|
||||||
images:
|
|
||||||
- gcr.io/gtm-kqqwvx2-zgi2z/tagging-server
|
|
||||||
Loading…
x
Reference in New Issue
Block a user