Skip to content

feat(ci): add Harbor docker image publish workflow for centreon fork#14

Closed
Tpo76 wants to merge 4 commits intomainfrom
MON-195572-adapt-centreon-quickwit-quickwit-fork-ci-to-run-publish-docker-images-to-docker-centreon-com
Closed

feat(ci): add Harbor docker image publish workflow for centreon fork#14
Tpo76 wants to merge 4 commits intomainfrom
MON-195572-adapt-centreon-quickwit-quickwit-fork-ci-to-run-publish-docker-images-to-docker-centreon-com

Conversation

@Tpo76
Copy link
Copy Markdown

@Tpo76 Tpo76 commented Apr 14, 2026

Summary

  • Add centreon-publish-docker-images.yml workflow to publish multi-arch images (amd64 + arm64) to Centreon's internal Harbor registry
  • Disable upstream DockerHub publish workflows when DOCKERHUB_USERNAME is not configured in the fork

Trigger

Manual only (workflow_dispatch) with two inputs:

  • upstream_ref: branch, tag, or commit SHA to build (default: main)
  • image_tags: comma-separated Docker tags to apply (e.g. qual, 1.2.3, latest)

Orchestrated from centreon/centreon-pulse via gh workflow run.

Image destination

docker.centreon.com/pulse/quickwit (requires repo variable DOCKER_HARBOR_HOST = docker.centreon.com)

Related

@Tpo76 Tpo76 requested a review from a team as a code owner April 14, 2026 16:53
@Tpo76 Tpo76 requested review from kduret and mushroomempires and removed request for a team April 14, 2026 16:53
@Tpo76 Tpo76 changed the title MON-195572 Adapt centreon/quickwit (quickwit fork) CI to run publish … feat(ci): add Harbor docker image publish workflow for centreon fork Apr 14, 2026
Tpo76 and others added 3 commits April 14, 2026 16:27
Replace gh-ubuntu-arm64 (upstream Quickwit label) with
centreon-ubuntu-24.04-arm (Centreon self-hosted runner).

Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
Comment on lines +123 to +128
run: |
TAGS=""
IFS=',' read -ra TAG_LIST <<< "${{ inputs.image_tags }}"
for tag in "${TAG_LIST[@]}"; do
tag=$(echo "$tag" | xargs)
TAGS+="type=raw,value=${tag}"$'\n'
Copy link
Copy Markdown

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Template Injection in GitHub Workflows Action - critical severity
A GitHub Actions workflow step contains a template expression referencing potentially untrusted GitHub context fields. This may allow malicious input to be injected into shell commands, leading to a potential supply chain attack as tokens of the CI/CD pipeline could be exfiltrated.

Show fix
Suggested change
run: |
TAGS=""
IFS=',' read -ra TAG_LIST <<< "${{ inputs.image_tags }}"
for tag in "${TAG_LIST[@]}"; do
tag=$(echo "$tag" | xargs)
TAGS+="type=raw,value=${tag}"$'\n'
env:
IMAGE_TAGS: ${{ inputs.image_tags }}
run: |
TAGS=""
IFS=',' read -ra TAG_LIST <<< "$IMAGE_TAGS"
for tag in "${TAG_LIST[@]}"; do
tag=$(echo "$tag" | xargs)
TAGS+="type=raw,value=${tag}"$'\n'

More info

@Tpo76 Tpo76 marked this pull request as draft April 27, 2026 09:48
@Tpo76
Copy link
Copy Markdown
Author

Tpo76 commented Apr 27, 2026

Closing: suite aux inputs dev, aucune modification CI dans le fork quickwit. Le build est entièrement géré depuis centreon-pulse (MON-195572).

@Tpo76 Tpo76 closed this Apr 27, 2026
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant