You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The current version of Zizmor finds some potential template injection
issues. We can fix these by indirecting via the `env`, or in a couple of
cases by adding ignore comments where we can't really fix the issue.
Something happened to break our config discovery. What we do is download
a default config file from this repo, write it to a temporary file, set
that file's path as `ZIZMOR_CONFIG`, and then pass this as `--config` if
it's set. Possibly as the result of a version bump, Zizmor started
handling `ZIZMOR_CONFIG` differently. An empty string here is treated as
a file to search for, which doesn't work, and so we get errors.
A fix for this last one is to use a different variable name that doesn't
collide with the one Zizmor itself is using. Rename to
`ZIZMOR_CONFIG_PATH` accordingly.
Copy file name to clipboardExpand all lines: actions/build-push-to-dockerhub/README.md
+11-4Lines changed: 11 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,10 +3,13 @@
3
3
> [!NOTE]
4
4
> If you are at Grafana Labs:
5
5
>
6
-
> - A docker mirror is available on our self-hosted runners, see [the internal documentation](https://enghub.grafana-ops.net/docs/default/component/deployment-tools/platform/continuous-integration/#docker-caching-in-github-actions) for more info.
6
+
> - A docker mirror is available on our self-hosted runners, see [the internal
This is a composite GitHub Action, used to build Docker images and push them to DockerHub.
9
-
It uses `get-vault-secrets` action to get the DockerHub username and password from Vault.
10
+
This is a composite GitHub Action, used to build Docker images and push them to
11
+
DockerHub. It uses `get-vault-secrets` action to get the DockerHub username and
12
+
password from Vault.
10
13
11
14
Example of how to use this action in a repository:
12
15
@@ -64,4 +67,8 @@ jobs:
64
67
65
68
- If you specify `platforms` then the action will use buildx to build the image.
66
69
- You must create a Dockerhub repo before you are able to push to it.
67
-
- Most projects should be using Google Artifact Registry (instead of Dockerhub) to store their images. You can see more about that in the push-to-gar-docker shared workflow.
70
+
- Most projects at Grafana Labs should be using Google Artifact Registry instead
71
+
of Dockerhub to store their images. You can see more about that in the
Copy file name to clipboardExpand all lines: actions/push-to-gar-docker/README.md
+13-4Lines changed: 13 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -3,11 +3,16 @@
3
3
> [!NOTE]
4
4
> If you are at Grafana Labs:
5
5
>
6
-
> - Follow these steps in the [internal documentation](https://enghub.grafana-ops.net/docs/default/component/deployment-tools/platform/continuous-integration/google-artifact-registry/) to set up a repository before using this action.
7
-
> - A docker mirror is available on our self-hosted runners, see [the internal documentation](https://enghub.grafana-ops.net/docs/default/component/deployment-tools/platform/continuous-integration/#docker-caching-in-github-actions) for more info.
This is a composite GitHub Action, used to push docker images to Google Artifact Registry (GAR).
10
-
It uses [OIDC authentication](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/about-security-hardening-with-openid-connect)
13
+
This is a composite GitHub Action, used to push docker images to Google Artifact
which means that only workflows which get triggered based on certain rules can
12
17
trigger these composite workflows.
13
18
@@ -80,6 +85,10 @@ input.
80
85
81
86
## Outputs
82
87
88
+
> [!IMPORTANT]
89
+
> Be careful when handling the `metadata` output. This contains user-supplied
90
+
> information, and so it can be a vector for template injection.
91
+
83
92
The following outputs are exposed from [`docker/metadata-action`](https://github.com/docker/metadata-action?tab=readme-ov-file#outputs) and [`docker/build-push-action`](https://github.com/docker/build-push-action?tab=readme-ov-file#outputs):
0 commit comments