Skip to content

feat: add data integrity signature types (#1825) #91

feat: add data integrity signature types (#1825)

feat: add data integrity signature types (#1825) #91

#
# Copyright SecureKey Technologies Inc. All Rights Reserved.
#
# SPDX-License-Identifier: Apache-2.0
#
name: mocks
on:
push:
branches:
- main
jobs:
mock-webhook:
runs-on: ubuntu-latest
timeout-minutes: 45
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
fetch-tags: true
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Set ENV vars
run: |
TAG=$(git describe --tags --always `git rev-list --tags --max-count=1`)
COMMIT_HASH=$(git rev-parse --short "$GITHUB_SHA")
echo "IMAGE_TAG"=$TAG >> $GITHUB_ENV
echo "COMMIT_HASH"=$COMMIT_HASH >> $GITHUB_ENV
- name: Login to Github Container Registry
uses: docker/login-action@v3
with:
registry: ghcr.io
username: ${{ secrets.CR_USER }}
password: ${{ secrets.CR_PAT }}
- name: Setup Go 1.22
uses: actions/setup-go@v5
with:
go-version: '1.22'
- run: make sample-webhook
- name: Build and Push
uses: docker/build-push-action@v5
with:
context: .
file: ./images/mocks/webhook/Dockerfile
platforms: linux/amd64
build-args: |
GO_IMAGE=golang
ALPINE_VER=3.18
GO_VER=1.22
ALPINE_IMAGE=alpine
push: true
tags: |
ghcr.io/trustbloc/mock-webhook:latest
ghcr.io/trustbloc/mock-webhook:${{ env.IMAGE_TAG }}-latest
ghcr.io/trustbloc/mock-webhook:${{ env.IMAGE_TAG }}-${{ env.COMMIT_HASH }}
mock-login-consent:
runs-on: ubuntu-latest
timeout-minutes: 45
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
fetch-tags: true
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Set ENV vars
run: |
TAG=$(git describe --tags --always `git rev-list --tags --max-count=1`)
COMMIT_HASH=$(git rev-parse --short "$GITHUB_SHA")
echo "IMAGE_TAG"=$TAG >> $GITHUB_ENV
echo "COMMIT_HASH"=$COMMIT_HASH >> $GITHUB_ENV
- name: Login to Github Container Registry
uses: docker/login-action@v3
with:
registry: ghcr.io
username: ${{ secrets.CR_USER }}
password: ${{ secrets.CR_PAT }}
- name: Build and Push
uses: docker/build-push-action@v5
with:
context: test/bdd/loginconsent
file: ./images/mocks/loginconsent/Dockerfile
platforms: linux/amd64
build-args: |
GO_IMAGE=golang
ALPINE_VER=3.18
GO_VER=1.22
ALPINE_IMAGE=alpine
push: true
tags: |
ghcr.io/trustbloc/mock-login-consent:latest
ghcr.io/trustbloc/mock-login-consent:${{ env.IMAGE_TAG }}-latest
ghcr.io/trustbloc/mock-login-consent:${{ env.IMAGE_TAG }}-${{ env.COMMIT_HASH }}
mock-trustregistry:
runs-on: ubuntu-latest
timeout-minutes: 45
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
fetch-tags: true
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Set ENV vars
run: |
TAG=$(git describe --tags --always `git rev-list --tags --max-count=1`)
COMMIT_HASH=$(git rev-parse --short "$GITHUB_SHA")
echo "IMAGE_TAG"=$TAG >> $GITHUB_ENV
echo "COMMIT_HASH"=$COMMIT_HASH >> $GITHUB_ENV
- name: Login to Github Container Registry
uses: docker/login-action@v3
with:
registry: ghcr.io
username: ${{ secrets.CR_USER }}
password: ${{ secrets.CR_PAT }}
- name: Build and Push
uses: docker/build-push-action@v5
with:
context: test/bdd/trustregistry
file: ./images/mocks/trustregistry/Dockerfile
platforms: linux/amd64
build-args: |
GO_IMAGE=golang
ALPINE_VER=3.18
GO_VER=1.22
ALPINE_IMAGE=alpine
push: true
tags: |
ghcr.io/trustbloc/mock-trustregistry:latest
ghcr.io/trustbloc/mock-trustregistry:${{ env.IMAGE_TAG }}-latest
ghcr.io/trustbloc/mock-trustregistry:${{ env.IMAGE_TAG }}-${{ env.COMMIT_HASH }}
mock-attestation:
runs-on: ubuntu-latest
timeout-minutes: 45
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
fetch-tags: true
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Set ENV vars
run: |
TAG=$(git describe --tags --always `git rev-list --tags --max-count=1`)
COMMIT_HASH=$(git rev-parse --short "$GITHUB_SHA")
echo "IMAGE_TAG"=$TAG >> $GITHUB_ENV
echo "COMMIT_HASH"=$COMMIT_HASH >> $GITHUB_ENV
- name: Login to Github Container Registry
uses: docker/login-action@v3
with:
registry: ghcr.io
username: ${{ secrets.CR_USER }}
password: ${{ secrets.CR_PAT }}
- name: Build and Push
uses: docker/build-push-action@v5
with:
context: test/bdd/attestation
file: ./images/mocks/attestation/Dockerfile
platforms: linux/amd64
build-args: |
GO_IMAGE=golang
ALPINE_VER=3.18
GO_VER=1.22
ALPINE_IMAGE=alpine
push: true
tags: |
ghcr.io/trustbloc/mock-attestation:latest
ghcr.io/trustbloc/mock-attestation:${{ env.IMAGE_TAG }}-latest
ghcr.io/trustbloc/mock-attestation:${{ env.IMAGE_TAG }}-${{ env.COMMIT_HASH }}
mock-cognito-auth:
runs-on: ubuntu-latest
timeout-minutes: 45
steps:
- uses: actions/checkout@v4
with:
fetch-depth: 0
fetch-tags: true
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Set ENV vars
run: |
TAG=$(git describe --tags --always `git rev-list --tags --max-count=1`)
COMMIT_HASH=$(git rev-parse --short "$GITHUB_SHA")
echo "IMAGE_TAG"=$TAG >> $GITHUB_ENV
echo "COMMIT_HASH"=$COMMIT_HASH >> $GITHUB_ENV
- name: Setup Go 1.22
uses: actions/setup-go@v5
with:
go-version: '1.22'
- run: make sample-cognito-auth
- name: Login to Github Container Registry
uses: docker/login-action@v3
with:
registry: ghcr.io
username: ${{ secrets.CR_USER }}
password: ${{ secrets.CR_PAT }}
- name: Build and Push
uses: docker/build-push-action@v5
with:
context: .
file: ./images/mocks/cognito-auth/Dockerfile
platforms: linux/amd64
build-args: |
GO_IMAGE=golang
ALPINE_VER=3.18
GO_VER=1.22
ALPINE_IMAGE=alpine
push: true
tags: |
ghcr.io/trustbloc/mock-cognito-auth:latest
ghcr.io/trustbloc/mock-cognito-auth:${{ env.IMAGE_TAG }}-latest
ghcr.io/trustbloc/mock-cognito-auth:${{ env.IMAGE_TAG }}-${{ env.COMMIT_HASH }}