Skip to content

Commit 261fc42

Browse files
committed
refactor: remove build of images for release
1 parent 81748f5 commit 261fc42

File tree

2 files changed

+1
-170
lines changed

2 files changed

+1
-170
lines changed

.github/workflows/reusable-release.yaml

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -61,13 +61,6 @@ jobs:
6161
username: ${{ env.GH_USER }}
6262
password: ${{ secrets.GITHUB_TOKEN }}
6363

64-
- name: Login to ECR
65-
uses: docker/login-action@v3
66-
with:
67-
registry: public.ecr.aws
68-
username: ${{ secrets.ECR_ACCESS_KEY_ID }}
69-
password: ${{ secrets.ECR_SECRET_ACCESS_KEY }}
70-
7164
- name: Checkout code
7265
uses: actions/[email protected]
7366
with:

goreleaser.yml

Lines changed: 1 addition & 163 deletions
Original file line numberDiff line numberDiff line change
@@ -130,157 +130,6 @@ archives:
130130
- goos: windows
131131
format: zip
132132

133-
134-
brews:
135-
-
136-
repository:
137-
owner: aquasecurity
138-
name: homebrew-trivy
139-
homepage: "https://github.com/aquasecurity/trivy"
140-
description: "Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues"
141-
test: |
142-
system "#{bin}/trivy", "--version"
143-
144-
dockers:
145-
- image_templates:
146-
- "docker.io/aquasec/trivy:{{ .Version }}-amd64"
147-
- "docker.io/aquasec/trivy:latest-amd64"
148-
- "ghcr.io/aquasecurity/trivy:{{ .Version }}-amd64"
149-
- "ghcr.io/aquasecurity/trivy:latest-amd64"
150-
- "public.ecr.aws/aquasecurity/trivy:latest-amd64"
151-
- "public.ecr.aws/aquasecurity/trivy:{{ .Version }}-amd64"
152-
use: buildx
153-
goos: linux
154-
goarch: amd64
155-
ids:
156-
- build-linux
157-
build_flag_templates:
158-
- "--label=org.opencontainers.image.title={{ .ProjectName }}"
159-
- "--label=org.opencontainers.image.description=A Fast Vulnerability Scanner for Containers"
160-
- "--label=org.opencontainers.image.vendor=Aqua Security"
161-
- "--label=org.opencontainers.image.version={{ .Version }}"
162-
- "--label=org.opencontainers.image.created={{ .Date }}"
163-
- "--label=org.opencontainers.image.source=https://github.com/aquasecurity/trivy"
164-
- "--label=org.opencontainers.image.revision={{ .FullCommit }}"
165-
- "--label=org.opencontainers.image.url=https://www.aquasec.com/products/trivy/"
166-
- "--label=org.opencontainers.image.documentation=https://aquasecurity.github.io/trivy/v{{ .Version }}/"
167-
- "--platform=linux/amd64"
168-
extra_files:
169-
- contrib/
170-
- image_templates:
171-
- "docker.io/aquasec/trivy:{{ .Version }}-arm64"
172-
- "docker.io/aquasec/trivy:latest-arm64"
173-
- "ghcr.io/aquasecurity/trivy:{{ .Version }}-arm64"
174-
- "ghcr.io/aquasecurity/trivy:latest-arm64"
175-
- "public.ecr.aws/aquasecurity/trivy:latest-arm64"
176-
- "public.ecr.aws/aquasecurity/trivy:{{ .Version }}-arm64"
177-
use: buildx
178-
goos: linux
179-
goarch: arm64
180-
ids:
181-
- build-linux
182-
build_flag_templates:
183-
- "--label=org.opencontainers.image.title={{ .ProjectName }}"
184-
- "--label=org.opencontainers.image.description=A Fast Vulnerability Scanner for Containers"
185-
- "--label=org.opencontainers.image.vendor=Aqua Security"
186-
- "--label=org.opencontainers.image.version={{ .Version }}"
187-
- "--label=org.opencontainers.image.created={{ .Date }}"
188-
- "--label=org.opencontainers.image.source=https://github.com/aquasecurity/trivy"
189-
- "--label=org.opencontainers.image.revision={{ .FullCommit }}"
190-
- "--label=org.opencontainers.image.url=https://www.aquasec.com/products/trivy/"
191-
- "--label=org.opencontainers.image.documentation=https://aquasecurity.github.io/trivy/v{{ .Version }}/"
192-
- "--platform=linux/arm64"
193-
extra_files:
194-
- contrib/
195-
- image_templates:
196-
- "docker.io/aquasec/trivy:{{ .Version }}-s390x"
197-
- "docker.io/aquasec/trivy:latest-s390x"
198-
- "ghcr.io/aquasecurity/trivy:{{ .Version }}-s390x"
199-
- "ghcr.io/aquasecurity/trivy:latest-s390x"
200-
- "public.ecr.aws/aquasecurity/trivy:latest-s390x"
201-
- "public.ecr.aws/aquasecurity/trivy:{{ .Version }}-s390x"
202-
use: buildx
203-
goos: linux
204-
goarch: s390x
205-
ids:
206-
- build-linux
207-
build_flag_templates:
208-
- "--label=org.opencontainers.image.title={{ .ProjectName }}"
209-
- "--label=org.opencontainers.image.description=A Fast Vulnerability Scanner for Containers"
210-
- "--label=org.opencontainers.image.vendor=Aqua Security"
211-
- "--label=org.opencontainers.image.version={{ .Version }}"
212-
- "--label=org.opencontainers.image.created={{ .Date }}"
213-
- "--label=org.opencontainers.image.source=https://github.com/aquasecurity/trivy"
214-
- "--label=org.opencontainers.image.revision={{ .FullCommit }}"
215-
- "--label=org.opencontainers.image.url=https://www.aquasec.com/products/trivy/"
216-
- "--label=org.opencontainers.image.documentation=https://aquasecurity.github.io/trivy/v{{ .Version }}/"
217-
- "--platform=linux/s390x"
218-
extra_files:
219-
- contrib/
220-
- image_templates:
221-
- "docker.io/aquasec/trivy:{{ .Version }}-ppc64le"
222-
- "docker.io/aquasec/trivy:latest-ppc64le"
223-
- "ghcr.io/aquasecurity/trivy:{{ .Version }}-ppc64le"
224-
- "ghcr.io/aquasecurity/trivy:latest-ppc64le"
225-
- "public.ecr.aws/aquasecurity/trivy:latest-ppc64le"
226-
- "public.ecr.aws/aquasecurity/trivy:{{ .Version }}-ppc64le"
227-
use: buildx
228-
goos: linux
229-
goarch: ppc64le
230-
ids:
231-
- build-linux
232-
build_flag_templates:
233-
- "--label=org.opencontainers.image.title={{ .ProjectName }}"
234-
- "--label=org.opencontainers.image.description=A Fast Vulnerability Scanner for Containers"
235-
- "--label=org.opencontainers.image.vendor=Aqua Security"
236-
- "--label=org.opencontainers.image.version={{ .Version }}"
237-
- "--label=org.opencontainers.image.created={{ .Date }}"
238-
- "--label=org.opencontainers.image.source=https://github.com/aquasecurity/trivy"
239-
- "--label=org.opencontainers.image.revision={{ .FullCommit }}"
240-
- "--label=org.opencontainers.image.url=https://www.aquasec.com/products/trivy/"
241-
- "--label=org.opencontainers.image.documentation=https://aquasecurity.github.io/trivy/v{{ .Version }}/"
242-
- "--platform=linux/ppc64le"
243-
extra_files:
244-
- contrib/
245-
246-
docker_manifests:
247-
- name_template: 'aquasec/trivy:{{ .Version }}'
248-
image_templates:
249-
- 'aquasec/trivy:{{ .Version }}-amd64'
250-
- 'aquasec/trivy:{{ .Version }}-arm64'
251-
- 'aquasec/trivy:{{ .Version }}-s390x'
252-
- 'aquasec/trivy:{{ .Version }}-ppc64le'
253-
- name_template: 'ghcr.io/aquasecurity/trivy:{{ .Version }}'
254-
image_templates:
255-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-amd64'
256-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-arm64'
257-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-s390x'
258-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-ppc64le'
259-
- name_template: 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}'
260-
image_templates:
261-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-amd64'
262-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-arm64'
263-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-s390x'
264-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-ppc64le'
265-
- name_template: 'aquasec/trivy:latest'
266-
image_templates:
267-
- 'aquasec/trivy:{{ .Version }}-amd64'
268-
- 'aquasec/trivy:{{ .Version }}-arm64'
269-
- 'aquasec/trivy:{{ .Version }}-s390x'
270-
- 'aquasec/trivy:{{ .Version }}-ppc64le'
271-
- name_template: 'ghcr.io/aquasecurity/trivy:latest'
272-
image_templates:
273-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-amd64'
274-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-arm64'
275-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-s390x'
276-
- 'ghcr.io/aquasecurity/trivy:{{ .Version }}-ppc64le'
277-
- name_template: 'public.ecr.aws/aquasecurity/trivy:latest'
278-
image_templates:
279-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-amd64'
280-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-arm64'
281-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-s390x'
282-
- 'public.ecr.aws/aquasecurity/trivy:{{ .Version }}-ppc64le'
283-
284133
signs:
285134
- cmd: cosign
286135
env:
@@ -295,15 +144,4 @@ signs:
295144
- "${artifact}"
296145
- "--yes"
297146
artifacts: all
298-
output: true
299-
300-
docker_signs:
301-
- cmd: cosign
302-
env:
303-
- COSIGN_EXPERIMENTAL=1
304-
artifacts: manifests
305-
output: true
306-
args:
307-
- 'sign'
308-
- '${artifact}'
309-
- '--yes'
147+
output: true

0 commit comments

Comments
 (0)