Skip to content

Fix possible SQL injection #5

Fix possible SQL injection

Fix possible SQL injection #5

Workflow file for this run

name: Publish to Registry
on:
schedule:
- cron: '0 17 * * 1' # Monday at 10am PDT
release:
types: [published]
push:
branches:
- master
jobs:
update:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v2
- name: Get version from package.json
run: |
PATCH_VERSION=$(cat package.json | grep version | head -1 | awk -F: '{ print $2 }' | sed 's/[\",]//g' | tr -d '[[:space:]]')
MINOR_VERSION=${PATCH_VERSION%.*}
MAJOR_VERSION=${MINOR_VERSION%.*}
echo PATCH_VERSION=$PATCH_VERSION >> $GITHUB_ENV
echo MINOR_VERSION=$MINOR_VERSION >> $GITHUB_ENV
echo MAJOR_VERSION=$MAJOR_VERSION >> $GITHUB_ENV
- name: Publish to Registry
uses: elgohr/Publish-Docker-Github-Action@master
env:
EXTRA_PIP_INSTALLS: extra.txt
with:
name: querybook/querybook
username: ${{ secrets.DOCKER_USERNAME }}
password: ${{ secrets.DOCKER_PASSWORD }}
tags: 'latest,${{ env.PATCH_VERSION }},${{ env.MINOR_VERSION }},${{ env.MAJOR_VERSION }}'
cache: ${{ github.event_name != 'schedule' }}
buildargs: EXTRA_PIP_INSTALLS