From f73e3807a042e83d57206be12cacce72e165d2fb Mon Sep 17 00:00:00 2001 From: Andreas Beuge Date: Thu, 23 Jan 2025 19:28:25 +0100 Subject: [PATCH 1/9] fix: correct cache-from for ECR builds --- .github/workflows/build-image.yaml | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/.github/workflows/build-image.yaml b/.github/workflows/build-image.yaml index 6eefa62..676a737 100644 --- a/.github/workflows/build-image.yaml +++ b/.github/workflows/build-image.yaml @@ -166,7 +166,7 @@ jobs: APP_NAME=${{ github.event.deployment.payload.name }} ENVIRONMENT=${{ github.event.deployment.payload.env }} NPM_GITHUB_TOKEN=${{ secrets.npmGithubReadToken }} - cache-from: type=registry,ref=${{ inputs.registryHostname }}/${{ inputs.registryOrg }}/${{ github.event.deployment.payload.name }} + cache-from: type=registry,ref=${{ inputs.registryHostname }}/${{ github.event.deployment.payload.name }} cache-to: type=inline context: ${{ github.event.deployment.payload.container.context }} load: true @@ -306,7 +306,7 @@ jobs: APP_NAME=${{ github.event.deployment.payload.name }} ENVIRONMENT=${{ github.event.deployment.payload.env }} NPM_GITHUB_TOKEN=${{ secrets.npmGithubReadToken }} - cache-from: type=registry,ref=${{ inputs.registryHostname }}/${{ inputs.registryOrg }}/${{ github.event.deployment.payload.name }} + cache-from: type=registry,ref=${{ inputs.registryHostname }}/${{ github.event.deployment.payload.name }} cache-to: type=inline context: ${{ github.event.deployment.payload.container.context }} load: true From 3e38eb7a2e5d3165d93ead1ab0423b8488915a52 Mon Sep 17 00:00:00 2001 From: Andreas Beuge Date: Thu, 23 Jan 2025 19:39:17 +0100 Subject: [PATCH 2/9] fix: correct cache-from for ECR builds --- .github/workflows/kubernetes.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/kubernetes.yaml b/.github/workflows/kubernetes.yaml index ef29ef4..f774200 100644 --- a/.github/workflows/kubernetes.yaml +++ b/.github/workflows/kubernetes.yaml @@ -173,7 +173,7 @@ jobs: build: needs: [initialize] - uses: parcelLab/ci/.github/workflows/build-image.yaml@main + uses: parcelLab/ci/.github/workflows/build-image.yaml@f73e3807a042e83d57206be12cacce72e165d2fb with: artifactName: ${{ inputs.artifactName }} artifactPath: ${{ inputs.artifactPath }} From 862c3b32ff98b596c9142311b84093c23ee90443 Mon Sep 17 00:00:00 2001 From: Andreas Beuge Date: Thu, 23 Jan 2025 19:42:55 +0100 Subject: [PATCH 3/9] fix: disable containerscan temporary for ecr-single --- .github/workflows/build-image.yaml | 22 +++++++++++----------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/.github/workflows/build-image.yaml b/.github/workflows/build-image.yaml index 676a737..9086ba3 100644 --- a/.github/workflows/build-image.yaml +++ b/.github/workflows/build-image.yaml @@ -176,17 +176,17 @@ jobs: ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:latest ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:${{ inputs.version }} ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:${{ github.sha }} - - name: Scan for vulnerabilities - if: inputs.repository_kind == 'ecr' - uses: crazy-max/ghaction-container-scan@v3 - with: - image: ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:latest - dockerfile: Containerfile - severity: ${{ env.IMAGE_SCAN_SEVERITY }} - severity_threshold: ${{ env.IMAGE_SCAN_SEVERITY_THRESHOLD }} - annotations: ${{ env.IMAGE_SCAN_ANNOTATIONS }} - env: - TRIVY_TIMEOUT: ${{ env.IMAGE_SCAN_TRIVY_TIMEOUT }} +# - name: Scan for vulnerabilities +# if: inputs.repository_kind == 'ecr' +# uses: crazy-max/ghaction-container-scan@v3 +# with: +# image: ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:latest +# dockerfile: Containerfile +# severity: ${{ env.IMAGE_SCAN_SEVERITY }} +# severity_threshold: ${{ env.IMAGE_SCAN_SEVERITY_THRESHOLD }} +# annotations: ${{ env.IMAGE_SCAN_ANNOTATIONS }} +# env: +# TRIVY_TIMEOUT: ${{ env.IMAGE_SCAN_TRIVY_TIMEOUT }} - name: Push image to ECR if: inputs.repository_kind == 'ecr' run: | From dfc3384ab4bfb0dd7e81e65cf72dbeb48f909207 Mon Sep 17 00:00:00 2001 From: Andreas Beuge Date: Thu, 23 Jan 2025 19:51:45 +0100 Subject: [PATCH 4/9] fix: disable containerscan temporary for ecr-single --- .github/workflows/kubernetes.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/kubernetes.yaml b/.github/workflows/kubernetes.yaml index f774200..4078f82 100644 --- a/.github/workflows/kubernetes.yaml +++ b/.github/workflows/kubernetes.yaml @@ -173,7 +173,7 @@ jobs: build: needs: [initialize] - uses: parcelLab/ci/.github/workflows/build-image.yaml@f73e3807a042e83d57206be12cacce72e165d2fb + uses: parcelLab/ci/.github/workflows/build-image.yaml@862c3b32ff98b596c9142311b84093c23ee90443 with: artifactName: ${{ inputs.artifactName }} artifactPath: ${{ inputs.artifactPath }} From 7f6c2bfc318d372c190effa066a4e0cc81397880 Mon Sep 17 00:00:00 2001 From: Andreas Beuge Date: Fri, 24 Jan 2025 16:02:20 +0100 Subject: [PATCH 5/9] fix: linted, updated packages --- .github/workflows/build-image.yaml | 22 +++++----- package-lock.json | 65 ++++++++++++++++-------------- 2 files changed, 45 insertions(+), 42 deletions(-) diff --git a/.github/workflows/build-image.yaml b/.github/workflows/build-image.yaml index 9086ba3..c421c67 100644 --- a/.github/workflows/build-image.yaml +++ b/.github/workflows/build-image.yaml @@ -176,17 +176,17 @@ jobs: ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:latest ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:${{ inputs.version }} ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:${{ github.sha }} -# - name: Scan for vulnerabilities -# if: inputs.repository_kind == 'ecr' -# uses: crazy-max/ghaction-container-scan@v3 -# with: -# image: ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:latest -# dockerfile: Containerfile -# severity: ${{ env.IMAGE_SCAN_SEVERITY }} -# severity_threshold: ${{ env.IMAGE_SCAN_SEVERITY_THRESHOLD }} -# annotations: ${{ env.IMAGE_SCAN_ANNOTATIONS }} -# env: -# TRIVY_TIMEOUT: ${{ env.IMAGE_SCAN_TRIVY_TIMEOUT }} + # - name: Scan for vulnerabilities + # if: inputs.repository_kind == 'ecr' + # uses: crazy-max/ghaction-container-scan@v3 + # with: + # image: ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:latest + # dockerfile: Containerfile + # severity: ${{ env.IMAGE_SCAN_SEVERITY }} + # severity_threshold: ${{ env.IMAGE_SCAN_SEVERITY_THRESHOLD }} + # annotations: ${{ env.IMAGE_SCAN_ANNOTATIONS }} + # env: + # TRIVY_TIMEOUT: ${{ env.IMAGE_SCAN_TRIVY_TIMEOUT }} - name: Push image to ECR if: inputs.repository_kind == 'ecr' run: | diff --git a/package-lock.json b/package-lock.json index 6b92e4d..1672af9 100644 --- a/package-lock.json +++ b/package-lock.json @@ -206,13 +206,13 @@ } }, "node_modules/@commitlint/is-ignored": { - "version": "17.4.2", - "resolved": "https://registry.npmjs.org/@commitlint/is-ignored/-/is-ignored-17.4.2.tgz", - "integrity": "sha512-1b2Y2qJ6n7bHG9K6h8S4lBGUl6kc7mMhJN9gy1SQfUZqe92ToDjUTtgNWb6LbzR1X8Cq4SEus4VU8Z/riEa94Q==", + "version": "17.8.1", + "resolved": "https://registry.npmjs.org/@commitlint/is-ignored/-/is-ignored-17.8.1.tgz", + "integrity": "sha512-UshMi4Ltb4ZlNn4F7WtSEugFDZmctzFpmbqvpyxD3la510J+PLcnyhf9chs7EryaRFJMdAKwsEKfNK0jL/QM4g==", "dev": true, "dependencies": { - "@commitlint/types": "^17.4.0", - "semver": "7.3.8" + "@commitlint/types": "^17.8.1", + "semver": "7.5.4" }, "engines": { "node": ">=v14" @@ -352,9 +352,9 @@ } }, "node_modules/@commitlint/types": { - "version": "17.4.0", - "resolved": "https://registry.npmjs.org/@commitlint/types/-/types-17.4.0.tgz", - "integrity": "sha512-2NjAnq5IcxY9kXtUeO2Ac0aPpvkuOmwbH/BxIm36XXK5LtWFObWJWjXOA+kcaABMrthjWu6la+FUpyYFMHRvbA==", + "version": "17.8.1", + "resolved": "https://registry.npmjs.org/@commitlint/types/-/types-17.8.1.tgz", + "integrity": "sha512-PXDQXkAmiMEG162Bqdh9ChML/GJZo6vU+7F03ALKDK8zYc6SuAr47LjG7hGYRqUOz+WK0dU7bQ0xzuqFMdxzeQ==", "dev": true, "dependencies": { "chalk": "^4.1.0" @@ -580,12 +580,12 @@ } }, "node_modules/braces": { - "version": "3.0.2", - "resolved": "https://registry.npmjs.org/braces/-/braces-3.0.2.tgz", - "integrity": "sha512-b8um+L1RzM3WDSzvhm6gIz1yfTbBt6YTlcEKAvsmqCZZFw46z626lVj9j1yEPW33H5H+lBQpZMP1k8l+78Ha0A==", + "version": "3.0.3", + "resolved": "https://registry.npmjs.org/braces/-/braces-3.0.3.tgz", + "integrity": "sha512-yQbXgO/OSZVD2IsiLlro+7Hf6Q18EJrKSEsdoMzKePKXct3gvD8oLcOQdIzGupr5Fj+EDe8gO/lxc1BzfMpxvA==", "dev": true, "dependencies": { - "fill-range": "^7.0.1" + "fill-range": "^7.1.1" }, "engines": { "node": ">=8" @@ -886,9 +886,9 @@ "dev": true }, "node_modules/cross-spawn": { - "version": "7.0.3", - "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-7.0.3.tgz", - "integrity": "sha512-iRDPJKUPVEND7dHPO8rkbOnPpyDygcDFtWjpeWNCgy8WP2rXcxXL8TskReQl6OrB2G7+UJrags1q15Fudc7G6w==", + "version": "7.0.6", + "resolved": "https://registry.npmjs.org/cross-spawn/-/cross-spawn-7.0.6.tgz", + "integrity": "sha512-uV2QOWP2nWzsy2aMp8aRibhi9dlzF5Hgh5SHaB9OiTGEyDTiJJyx0uy51QXdyWbtAHNua4XJzUKca3OzKUd3vA==", "dev": true, "dependencies": { "path-key": "^3.1.0", @@ -1049,9 +1049,9 @@ "dev": true }, "node_modules/fill-range": { - "version": "7.0.1", - "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.0.1.tgz", - "integrity": "sha512-qOo9F+dMUmC2Lcb4BbVvnKJxTPjCm+RRpe4gDuGrzkL7mEVl/djYSu2OdQ2Pa302N4oqkSg9ir6jaLWJ2USVpQ==", + "version": "7.1.1", + "resolved": "https://registry.npmjs.org/fill-range/-/fill-range-7.1.1.tgz", + "integrity": "sha512-YsGpe3WHLK8ZYi4tWDg2Jy3ebRz2rXowDxnld4bkQB00cc/1Zw9AWnC0i9ztDJitivtQvaI9KaLyKrc+hBW0yg==", "dev": true, "dependencies": { "to-regex-range": "^5.0.1" @@ -1957,12 +1957,12 @@ "dev": true }, "node_modules/micromatch": { - "version": "4.0.5", - "resolved": "https://registry.npmjs.org/micromatch/-/micromatch-4.0.5.tgz", - "integrity": "sha512-DMy+ERcEW2q8Z2Po+WNXuw3c5YaUSFjAO5GsJqfEl7UjvtIuFKO6ZrKvcItdy98dwFI2N1tg3zNIdKaQT+aNdA==", + "version": "4.0.8", + "resolved": "https://registry.npmjs.org/micromatch/-/micromatch-4.0.8.tgz", + "integrity": "sha512-PXwfBhYu0hBCPw8Dn0E+WDYb7af3dSLVWKi3HGv84IdF4TyFoC0ysxFd0Goxw7nSv4T/PzEJQxsYsEiFCKo2BA==", "dev": true, "dependencies": { - "braces": "^3.0.2", + "braces": "^3.0.3", "picomatch": "^2.3.1" }, "engines": { @@ -2372,9 +2372,9 @@ } }, "node_modules/read-pkg/node_modules/semver": { - "version": "5.7.1", - "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.1.tgz", - "integrity": "sha512-sauaDf/PZdVgrLTNYHRtpXa1iRiKcaebiKQ1BJdpQlWH2lCvexQdX55snPFyK7QzpudqbCI0qXFfOasHdyNDGQ==", + "version": "5.7.2", + "resolved": "https://registry.npmjs.org/semver/-/semver-5.7.2.tgz", + "integrity": "sha512-cBznnQ9KjJqU67B52RMC65CMarK2600WFnbkcaiwWq3xy/5haFJlshgnpjovMVJ+Hff49d8GEn0b87C5pDQ10g==", "dev": true, "bin": { "semver": "bin/semver" @@ -2521,9 +2521,9 @@ ] }, "node_modules/semver": { - "version": "7.3.8", - "resolved": "https://registry.npmjs.org/semver/-/semver-7.3.8.tgz", - "integrity": "sha512-NB1ctGL5rlHrPJtFDVIVzTyQylMLu9N9VICA6HSFJo8MCGVTMW6gfpicwKmmK/dAjTOrqu5l63JJOpDSrAis3A==", + "version": "7.5.4", + "resolved": "https://registry.npmjs.org/semver/-/semver-7.5.4.tgz", + "integrity": "sha512-1bCSESV6Pv+i21Hvpxp3Dx+pSD8lIPt8uVjRrxAUt/nbswYc+tK6Y2btiULjd4+fnq15PX+nqQDC7Oft7WkwcA==", "dev": true, "dependencies": { "lru-cache": "^6.0.0" @@ -2983,10 +2983,13 @@ "dev": true }, "node_modules/yaml": { - "version": "2.2.1", - "resolved": "https://registry.npmjs.org/yaml/-/yaml-2.2.1.tgz", - "integrity": "sha512-e0WHiYql7+9wr4cWMx3TVQrNwejKaEe7/rHNmQmqRjazfOP5W8PB6Jpebb5o6fIapbz9o9+2ipcaTM2ZwDI6lw==", + "version": "2.7.0", + "resolved": "https://registry.npmjs.org/yaml/-/yaml-2.7.0.tgz", + "integrity": "sha512-+hSoy/QHluxmC9kCIJyL/uyFmLmc+e5CFR5Wa+bpIhIj85LVb9ZH2nVnqrHoSvKogwODv0ClqZkmiSSaIH5LTA==", "dev": true, + "bin": { + "yaml": "bin.mjs" + }, "engines": { "node": ">= 14" } From d89ec24645a63d6b0662e61fd10d5b6e0b7156d8 Mon Sep 17 00:00:00 2001 From: Andreas Beuge Date: Mon, 27 Jan 2025 09:58:37 +0100 Subject: [PATCH 6/9] fix: make container scan toggable --- .github/workflows/build-image.yaml | 30 +++++++++++++++++++----------- .github/workflows/kubernetes.yaml | 6 ++++++ 2 files changed, 25 insertions(+), 11 deletions(-) diff --git a/.github/workflows/build-image.yaml b/.github/workflows/build-image.yaml index c421c67..be9bc66 100644 --- a/.github/workflows/build-image.yaml +++ b/.github/workflows/build-image.yaml @@ -47,6 +47,11 @@ on: description: Runner type default: ubuntu-latest type: string + enableContainerScan: + required: false + description: Apply the container scan + default: true + type: boolean version: required: true type: string @@ -106,6 +111,7 @@ jobs: ${{ inputs.registryHostname }}/${{ inputs.registryOrg }}/${{ github.event.deployment.payload.name }}:${{ inputs.version }} ${{ inputs.registryHostname }}/${{ inputs.registryOrg }}/${{ github.event.deployment.payload.name }}:${{ github.sha }} - name: Scan for vulnerabilities + if: inputs.enableContainerScan uses: crazy-max/ghaction-container-scan@v3 with: image: ${{ inputs.registryHostname }}/${{ inputs.registryOrg }}/${{ github.event.deployment.payload.name }}:latest @@ -176,17 +182,17 @@ jobs: ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:latest ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:${{ inputs.version }} ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:${{ github.sha }} - # - name: Scan for vulnerabilities - # if: inputs.repository_kind == 'ecr' - # uses: crazy-max/ghaction-container-scan@v3 - # with: - # image: ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:latest - # dockerfile: Containerfile - # severity: ${{ env.IMAGE_SCAN_SEVERITY }} - # severity_threshold: ${{ env.IMAGE_SCAN_SEVERITY_THRESHOLD }} - # annotations: ${{ env.IMAGE_SCAN_ANNOTATIONS }} - # env: - # TRIVY_TIMEOUT: ${{ env.IMAGE_SCAN_TRIVY_TIMEOUT }} + - name: Scan for vulnerabilities + if: inputs.enableContainerScan + uses: crazy-max/ghaction-container-scan@v3 + with: + image: ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}:latest + dockerfile: Containerfile + severity: ${{ env.IMAGE_SCAN_SEVERITY }} + severity_threshold: ${{ env.IMAGE_SCAN_SEVERITY_THRESHOLD }} + annotations: ${{ env.IMAGE_SCAN_ANNOTATIONS }} + env: + TRIVY_TIMEOUT: ${{ env.IMAGE_SCAN_TRIVY_TIMEOUT }} - name: Push image to ECR if: inputs.repository_kind == 'ecr' run: | @@ -245,6 +251,7 @@ jobs: target: ${{ matrix.containerfile_targets }} - name: Scan for vulnerabilities uses: crazy-max/ghaction-container-scan@v3 + if: inputs.enableContainerScan with: image: ${{ inputs.registryHostname }}/${{ inputs.registryOrg }}/${{ github.event.deployment.payload.name }}-${{ matrix.containerfile_targets }}:latest dockerfile: Containerfile @@ -318,6 +325,7 @@ jobs: ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}-${{ matrix.containerfile_targets }}:${{ github.sha }} target: ${{ matrix.containerfile_targets }} - name: Scan for vulnerabilities + if: inputs.enableContainerScan uses: crazy-max/ghaction-container-scan@v3 with: image: ${{ steps.login-ecr.outputs.registry }}/${{ github.event.deployment.payload.name }}-${{ matrix.containerfile_targets }}:latest diff --git a/.github/workflows/kubernetes.yaml b/.github/workflows/kubernetes.yaml index 4078f82..cfc1541 100644 --- a/.github/workflows/kubernetes.yaml +++ b/.github/workflows/kubernetes.yaml @@ -57,6 +57,11 @@ on: description: The kind of repository (github or ecr) default: "github" type: string + enableContainerScan: + required: false + description: Apply the container scan + default: true + type: boolean runner: required: false description: Runner type @@ -183,6 +188,7 @@ jobs: registryOrg: ${{ inputs.registryOrg }} registryUsername: ${{ inputs.registryUsername }} repository_kind: ${{ inputs.repository_kind }} + enableContainerScan: ${{ inputs.enableContainerScan }} runner: ${{ inputs.runner }} version: ${{ needs.initialize.outputs.version }} secrets: inherit From 2bd6043944be98a85c5f318025dfcc4f72552a0a Mon Sep 17 00:00:00 2001 From: Andreas Beuge Date: Mon, 27 Jan 2025 09:59:59 +0100 Subject: [PATCH 7/9] fix: moved variable to context --- .github/workflows/build-image.yaml | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/.github/workflows/build-image.yaml b/.github/workflows/build-image.yaml index be9bc66..08bb869 100644 --- a/.github/workflows/build-image.yaml +++ b/.github/workflows/build-image.yaml @@ -42,16 +42,16 @@ on: description: The kind of repository (github or ecr) default: "github" type: string - runner: - required: false - description: Runner type - default: ubuntu-latest - type: string enableContainerScan: required: false description: Apply the container scan default: true type: boolean + runner: + required: false + description: Runner type + default: ubuntu-latest + type: string version: required: true type: string From a72635aec866dea4fbf4a0061aafbae50beb9d8f Mon Sep 17 00:00:00 2001 From: Andreas Beuge Date: Mon, 27 Jan 2025 11:59:44 +0100 Subject: [PATCH 8/9] fix: pipeline ref updated --- .github/workflows/kubernetes.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/kubernetes.yaml b/.github/workflows/kubernetes.yaml index cfc1541..7488c31 100644 --- a/.github/workflows/kubernetes.yaml +++ b/.github/workflows/kubernetes.yaml @@ -178,7 +178,7 @@ jobs: build: needs: [initialize] - uses: parcelLab/ci/.github/workflows/build-image.yaml@862c3b32ff98b596c9142311b84093c23ee90443 + uses: parcelLab/ci/.github/workflows/build-image.yaml@2bd6043944be98a85c5f318025dfcc4f72552a0a with: artifactName: ${{ inputs.artifactName }} artifactPath: ${{ inputs.artifactPath }} From 983f437f189c691f801856ab86f1f4495ae4514f Mon Sep 17 00:00:00 2001 From: andibeuge <97287249+andibeuge@users.noreply.github.com> Date: Mon, 27 Jan 2025 14:26:36 +0100 Subject: [PATCH 9/9] Update .github/workflows/kubernetes.yaml --- .github/workflows/kubernetes.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/.github/workflows/kubernetes.yaml b/.github/workflows/kubernetes.yaml index 7488c31..b572fd2 100644 --- a/.github/workflows/kubernetes.yaml +++ b/.github/workflows/kubernetes.yaml @@ -178,7 +178,7 @@ jobs: build: needs: [initialize] - uses: parcelLab/ci/.github/workflows/build-image.yaml@2bd6043944be98a85c5f318025dfcc4f72552a0a + uses: parcelLab/ci/.github/workflows/build-image.yaml@main with: artifactName: ${{ inputs.artifactName }} artifactPath: ${{ inputs.artifactPath }}