-
-
Notifications
You must be signed in to change notification settings - Fork 669
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Automated Build for All Formats #1638
Comments
Just in case mention, that it should work (and tested) with all translations. |
Hey @tghosth! That's what I found too -- I ended up pushing the image to docker hub and adjusting the run commands so it pulls before running. The action only takes ~2 mins with that change. I am running into quite a few little problems, mostly related to the 4.0 docx files changing every time their built due to an internal time stamp. I really like how you split things into multiple actions for 5.0/4.0 -- This solves quite a few odd behaviors I was experiencing. I think we should create an ASVS repo on docker hub and publish the image there. Feel free to borrow from any of this stuff in my branch: https://github.com/ike/asvs/tree/github-actions |
at this point I am less worried about the outputs being committed back into the repository itself. The current action just creates them as artefacts which can be downloaded from the repo: |
Okay, I created PR #1680 that uses GHCR for the image repository. We will need to create a package and associated secrets for the ASVS repo before merging. |
ok so would it make sense to create one action that creates and pushes the container and another action that generates the outputs? At that point, I don't see how the container is being created/published. |
@tghosth as it stands, the image is created and pushed manually. The action that builds the image could also push it to the repository. We would need to set up the correct access secrets for that. |
so can you update the PR to split it so one action creates and pushes the container and another action runs the output generation? |
@tghosth yep can do! |
Fixed with #1680 |
Hi @ike, Can you check the logs, it looks like the image publish didn't succeed, maybe because it is going into ike instead of OWASP? Can you PR suggested changes to make it work? |
@tghosth yes, it looks like we'll need a couple of variables too. Create a personal access token, and add two variables to the settings of the OWASP/ASVS project:
I am pretty sure that is all the settings changes this will need. When that's done I will change the code to push to the ASVS repo for the package registry. I think that'll work just fine. |
Thanks @ike I have now created those. I will merge the updated PR and see if it works. |
OK, the run failed: Do I need an admin of the OWASP organization to create the package entity? |
@tghosth ugh -- I don't think so. Let me do a little more research on why this is failing. |
Okay, looks like one permission needs to be amended on the ASVS repo:
|
Also, if this merge works, we can remove the token from the repository variables. |
@ike sorry for the delay I have been on holiday. Please can you see whether the updated version now works? |
hi @ike how are we doing with this? |
@tghosth I have a new PR up with necessary changes to make this work. For now, it is manual only, since I don't want to create too much noise until we have tested it more thoroughly. |
Hi @ike, Thanks for the new PR, I merged it but it seems to error on creating the container although the outputs seemed to create ok... |
There is a problem with Re-running the job built the image successfully: https://github.com/OWASP/ASVS/actions/runs/7626724616 |
Created a #1830 new issue for the |
We should have an automated build of all formats, using the new Docker build system. Can we use GitHub actions for this?
c/f: #1294 (comment)
The text was updated successfully, but these errors were encountered: