139 Commits
next ... master

Author SHA1 Message Date
GitHub Actions
044ea2b034 Bump version to v3.21.2 2025-07-23 00:21:43 +00:00
GitHub Actions
b643ecf9b6 Bump version to v3.21.1 2025-06-19 00:20:36 +00:00
GitHub Actions
e788a0098e Bump version to v3.20.0 2025-05-16 00:20:00 +00:00
Simon Ungar Felding
4c7b9b9a8c fix version 2025-04-25 09:47:00 +02:00
Simon Ungar Felding
6b4a3e23a8 fix based on https://stackoverflow.com/questions/75521775/buildx-docker-image-claims-to-be-a-manifest-list 2025-04-25 00:20:40 +02:00
Simon Ungar Felding
e67c6cb97a fix push by digest 2025-04-24 23:36:08 +02:00
Simon Ungar Felding
84b7a76320 fix tags 2025-04-24 23:29:50 +02:00
Simon Ungar Felding
7e1b2d7104 fix build tags 2025-04-24 23:26:11 +02:00
Simon Ungar Felding
89d488b2fb fix build password 2025-04-24 23:11:47 +02:00
simonfelding
4ccd39856a improve build readability and speed (by parallelization) (#117) 2025-04-24 23:03:50 +02:00
GitHub Actions
540ba69528 Bump deb version to 3.19.0-1 2025-04-02 00:18:53 +00:00
GitHub Actions
546f813ea4 Bump build version to 3.19.0 2025-03-19 00:18:37 +00:00
GitHub Actions
794e58400a Bump deb version to 3.18.0-1 2025-03-07 00:17:55 +00:00
GitHub Actions
2bd42d97ca Bump build version to 3.18.0 2025-02-28 00:17:35 +00:00
GitHub Actions
c87479ac51 Bump deb version to 3.17.0-1 2025-02-20 00:17:27 +00:00
schklom
8ffef34853 Build when deb/* changes (#97)
The build calls to Protonmail's repo and builds from it. When that repo
changes (i.e. when deb/* changes), the image should be built again.

---------

Co-authored-by: Simon Ungar Felding <45149055+simonfelding@users.noreply.github.com>
2025-02-17 13:03:56 +01:00
simonfelding
2745c6eb57 deb build: make sure it has the necessary tools (#116) 2025-02-17 10:15:22 +01:00
simonfelding
d00645ffcc add vaulteditor and fix build on arm (#114)
first working build for a long time
2025-02-15 19:38:15 +01:00
simonfelding
a19458f703 fix builds by switching base layer to debian:sid-slim
tested locally, works fine.
debian has supported riscv64 in the sid image for some time.

this is the same thing the carlosedp/golang image did.

this also fixes the bug with the wrong glibc version, as the build
container now uses the same glibc version as the final container.
2025-02-15 17:07:15 +01:00
GitHub Actions
d2828adae6 Bump build version to 3.17.0 2025-02-14 00:17:18 +00:00
GitHub Actions
3d628a35e3 Bump deb version to 3.16.0-1 2025-02-14 00:17:17 +00:00
GitHub Actions
718ccfacc2 Bump build version to 3.20.12 2025-02-13 00:17:18 +00:00
GitHub Actions
6d4c8eee6c Bump deb version to 3.17.0-1 2025-02-11 00:17:05 +00:00
GitHub Actions
1cd0a1e01a Bump build version to 3.17.0 2025-01-30 00:16:31 +00:00
GitHub Actions
a92c7d34d6 Bump deb version to 3.16.0-1 2025-01-15 00:16:57 +00:00
GitHub Actions
c7cef79482 Bump build version to 3.16.0 2024-12-18 00:18:00 +00:00
GitHub Actions
7090760703 Bump deb version to 3.15.1-1 2024-12-12 00:18:23 +00:00
GitHub Actions
11cf98c1f4 Bump build version to 3.15.1 2024-12-06 00:18:35 +00:00
GitHub Actions
69fd67721a Bump deb version to 3.15.0-1 2024-11-26 00:18:12 +00:00
GitHub Actions
abf6dd9055 Bump build version to 3.15.0 2024-11-14 00:16:51 +00:00
GitHub Actions
363cef56c2 Bump deb version to 3.14.0-1 2024-10-23 00:16:59 +00:00
GitHub Actions
63e7e3098e Bump build version to 3.14.0 2024-10-01 00:18:58 +00:00
GitHub Actions
64b50d7e24 Bump build version to 3.13.0 2024-09-11 00:15:41 +00:00
GitHub Actions
f3da872c45 Bump deb version to 3.12.0-1 2024-07-03 00:14:31 +00:00
GitHub Actions
48717095db Bump build version to 3.12.0 2024-06-20 00:13:45 +00:00
GitHub Actions
8d820748ee Bump deb version to 3.11.1-1 2024-05-24 00:14:19 +00:00
GitHub Actions
471a00b96b Bump build version to 3.11.1 2024-05-22 00:13:26 +00:00
GitHub Actions
9b21cf69f1 Bump deb version to 3.11.0-1 2024-05-14 00:13:49 +00:00
GitHub Actions
3aee9f2e4a Bump build version to 3.11.0 2024-04-30 00:12:59 +00:00
GitHub Actions
3be7e930d9 Bump deb version to 3.10.0-1 2024-03-22 00:12:48 +00:00
GitHub Actions
47e204b047 Bump build version to 3.10.0 2024-03-13 00:12:46 +00:00
GitHub Actions
5b52d7c9aa Bump deb version to 3.9.1-1 2024-02-22 00:12:28 +00:00
GitHub Actions
bc9f21fa87 Bump build version to 3.9.1 2024-02-13 00:13:22 +00:00
Mark Monteiro
9d2bf07c78 Improve Docker Compose documentation and example (#95)
- Clean up the example `docker-compose.yml` file by removing unnecessary
configuration/comments and add missing volume declaration
- Update the project README.md with instructions on how to use the
project with Docker Compose
2024-02-08 11:06:43 +08:00
GitHub Actions
2ac707c0c3 Bump deb version to 3.8.2-1 2024-02-03 00:12:59 +00:00
GitHub Actions
64495cd318 Bump build version to 3.9.0 2024-02-01 00:13:28 +00:00
GitHub Actions
1a8b879f90 Bump deb version to 3.8.1-1 2024-01-13 00:13:25 +00:00
GitHub Actions
ca1fd017f0 Bump build version to 3.8.1 2023-12-13 00:13:09 +00:00
GitHub Actions
a1afacb63a Bump build version to 3.8.0 2023-12-12 00:13:22 +00:00
GitHub Actions
47e04a9690 Bump deb version to 3.7.1-1 2023-12-07 00:13:08 +00:00
GitHub Actions
5d94313662 Bump build version to 3.7.1 2023-11-23 00:13:20 +00:00
GitHub Actions
5fd66d65ef Bump build version to 3.7.0 2023-11-15 00:13:09 +00:00
GitHub Actions
43f5b98e9d Bump deb version to 3.6.1-2 2023-11-02 00:12:21 +00:00
GitHub Actions
0d0808a6cd Bump build version to 3.6.1 2023-10-21 00:12:01 +00:00
GitHub Actions
ad930ab89f Bump deb version to 3.5.4-1 2023-10-20 00:12:26 +00:00
GitHub Actions
1fe6a19bd5 Bump build version to 3.6.0 2023-10-18 00:12:28 +00:00
GitHub Actions
fc7540d86f Bump build version to 3.5.3 2023-10-13 00:12:40 +00:00
GitHub Actions
9fb8bc7aae Bump deb version to 3.5.3-1 2023-10-13 00:12:39 +00:00
GitHub Actions
e782f3fca6 Bump build version to 3.5.2 2023-10-11 00:12:13 +00:00
GitHub Actions
28068b7451 Bump deb version to 3.4.2-1 2023-10-07 00:12:24 +00:00
GitHub Actions
a262d3381a Bump deb version to 3.5.1-1 2023-10-05 00:12:20 +00:00
GitHub Actions
33196176b6 Bump build version to 3.5.1 2023-09-29 00:12:21 +00:00
GitHub Actions
7358ead1c0 Bump deb version to 3.4.2-1 2023-09-26 00:12:28 +00:00
GitHub Actions
b764f02f7a Bump build version to 3.5.0 2023-09-15 00:12:17 +00:00
GitHub Actions
3b069e5899 Bump build version to 3.4.2 2023-09-05 00:11:36 +00:00
GitHub Actions
1423a659e1 Bump build version to 3.4.1 2023-08-15 00:11:45 +00:00
GitHub Actions
932bc92e2a Bump build version to 3.4.0 2023-08-05 00:13:04 +00:00
GitHub Actions
0ed338435d Bump build version to 3.3.2 2023-07-14 00:15:56 +00:00
GitHub Actions
1b9e896e30 Bump deb version to 3.3.2-1 2023-07-14 00:15:56 +00:00
GitHub Actions
d9fec14796 Bump build version to 3.3.1 2023-07-08 00:16:29 +00:00
GitHub Actions
b6a470849e Bump deb version to 3.3.0-1 2023-06-22 00:14:57 +00:00
GitHub Actions
ddb3df2c7c Bump build version to 3.3.0 2023-06-09 00:17:58 +00:00
GitHub Actions
58cd2eee1d Bump deb version to 3.2.0-1 2023-05-27 00:13:19 +00:00
GitHub Actions
3cbc54a93b Bump build version to 3.2.0 2023-05-16 00:12:45 +00:00
GitHub Actions
868b1a48c6 Bump build version to 3.1.3 2023-05-11 00:12:36 +00:00
GitHub Actions
0419d36658 Bump deb version to 3.1.3-1 2023-05-11 00:12:35 +00:00
Daniel Nathan Gray
67415bd261 Add a docker compose file (#70)
It's quite the norm to include a docker-compose file, generally in the
README or the root for people to copy and modify. For example as
https://github.com/wfg/docker-openvpn-client has done so.

If there are [Environmental
variables](https://github.com/wfg/docker-openvpn-client#environment-variables),
they should also be documented - in this case there isn't.
2023-05-02 14:26:43 +08:00
GitHub Actions
d0e4bcd866 Bump build version to 3.1.2 2023-04-28 00:13:24 +00:00
GitHub Actions
5a0238e8f4 Bump deb version to 3.1.2-1 2023-04-28 00:13:23 +00:00
GitHub Actions
1dff35b541 Bump build version to 3.1.1 2023-04-12 00:12:15 +00:00
GitHub Actions
7790563b9f Bump build version to 3.1.0 2023-04-06 00:12:09 +00:00
GitHub Actions
7c0d8737dc Bump build version to 3.0.21 2023-03-24 00:13:03 +00:00
GitHub Actions
50ac4c2e44 Bump deb version to 3.0.21-1 2023-03-24 00:13:02 +00:00
Aziz Hasanain
b1b6706030 Update Ubuntu tag for deb to fix GLIBC dependency (#80)
GLIBC dependency issue highlighted in
https://github.com/shenxn/protonmail-bridge-docker/issues/79 is caused
by v3 of the bridge not supporting bionic. This PR simply updates the
"deb" version to match the "build" version which is already on
ubuntu:jammy.
2023-03-23 09:13:58 +08:00
GitHub Actions
b0eeddd83d Bump build version to 3.0.20 2023-03-11 00:12:48 +00:00
GitHub Actions
a264602469 Bump deb version to 3.0.20-1 2023-03-11 00:12:47 +00:00
GitHub Actions
6a492a15e7 Bump build version to 3.0.19 2023-03-02 00:15:24 +00:00
GitHub Actions
bb34034cbb Bump deb version to 3.0.19-1 2023-03-02 00:15:23 +00:00
GitHub Actions
109da843e7 Bump build version to 3.0.18 2023-02-25 00:14:35 +00:00
GitHub Actions
b5938721aa Bump deb version to 3.0.17-1 2023-02-23 00:15:10 +00:00
GitHub Actions
dc8590849b Bump build version to 3.0.16 2023-02-18 00:14:05 +00:00
GitHub Actions
8c80cf2d03 Bump build version to 3.0.15 2023-02-15 00:14:54 +00:00
GitHub Actions
e6319a0dda Bump build version to 3.0.14 2023-02-10 00:14:30 +00:00
GitHub Actions
da1b515c2f Bump build version to 3.0.12 2023-02-02 00:13:53 +00:00
GitHub Actions
18626db87f Bump build version to 3.0.10 2023-01-18 00:13:48 +00:00
Daniel Nathan Gray
89b3ef69f4 Rebase on Jammy (#71)
If you're going to build v3 you need to have Jammy, or you will get
glibc errors
2023-01-14 14:56:03 +08:00
GitHub Actions
04a2fae963 Bump build version to 3.0.9 2022-12-21 00:12:33 +00:00
GitHub Actions
bd9addf4f4 Bump build version to 3.0.7 2022-12-17 00:12:20 +00:00
GitHub Actions
c3140a3fa0 Bump build version to 3.0.6 2022-12-08 00:13:17 +00:00
GitHub Actions
51015361c5 Bump build version to 3.0.5 2022-12-06 00:12:45 +00:00
GitHub Actions
0e92386a93 Bump build version to 3.0.4 2022-12-03 00:12:21 +00:00
GitHub Actions
2e3bcdef1f Bump build version to 3.0.2 2022-11-30 00:15:14 +00:00
GitHub Actions
cf1e025209 Bump deb version to 2.3.0-1 2022-11-26 00:13:33 +00:00
GitHub Actions
4dbf2f806e Bump deb version to 2.4.8-1 2022-11-23 00:14:33 +00:00
Xiaonan Shen
712de23988 Add riscv64 support to CI docker builds (#54) 2022-11-21 00:14:03 +08:00
Olof Nord
0541f29d98 Add riscv64 support to docker builds
* Adjust GitHub CI to also build for riscv64
* Update base Ubuntu base for build from 18.04 LTS to 20.04 LTS as to support riscv64
* Minor: Exclude idea IDE files from git
2022-11-20 23:32:58 +08:00
Xiaonan Shen
252397a86d Switch to carlosedp/golang for riscv64 support 2022-11-20 23:12:46 +08:00
GitHub Actions
6a2a413d0a Bump build version to 2.4.8 2022-11-17 00:15:47 +00:00
GitHub Actions
60c8a9ecc4 Bump build version to 2.4.5 2022-11-09 00:16:36 +00:00
Xiaonan Shen
535c80379d Copy bridge executable to the image (fixes #66) 2022-11-05 14:30:33 +08:00
GitHub Actions
acefed1b95 Bump build version to 2.4.3 2022-10-26 00:16:54 +00:00
Xiaonan Shen
6decf657c2 Bump golang to 1.18 2022-10-16 15:04:58 +08:00
Xiaonan Shen
0fa5f9fc13 Fix entrypoint init fail issue 2022-10-16 14:49:38 +08:00
Xiaonan Shen
e0b0ce653c Add .vscode to .gitignore 2022-10-16 14:47:32 +08:00
GitHub Actions
fa4ddf7126 Bump build version to 2.4.0 2022-09-29 00:23:38 +00:00
GitHub Actions
07d3779fc6 Bump deb version to 2.3.0-1 2022-09-09 00:17:44 +00:00
GitHub Actions
2e9d95d90b Bump build version to 2.3.0 2022-09-02 00:15:28 +00:00
GitHub Actions
a8f5c0a096 Bump build version to 2.2.2 2022-07-28 00:15:49 +00:00
GitHub Actions
14cac1052d Bump deb version to 2.2.2-1 2022-07-28 00:15:47 +00:00
GitHub Actions
92b0c5bd5f Bump build version to 2.2.1 2022-07-22 00:16:20 +00:00
Xiaonan Shen
812646acb9 Fix entrypoint so it works correctly on init #57 2022-05-28 12:40:24 +08:00
GitHub Actions
664b5e924d Bump build version to 2.2.0 2022-05-26 00:14:14 +00:00
Nilesh
680e82076e Fix entrypoint so it works correctly on init
Ran into this issue when trying to use in kubernetes via k8s-at-home/protonmail-bridge. Took a bit of figuring out before I realized I had to manually kill the other instance. The only output from the failed load is a dbus issue, and an immediate exit.
2022-05-12 11:31:03 -07:00
GitHub Actions
86e10823e0 Bump deb version to 2.1.3-1 2022-04-28 00:15:49 +00:00
GitHub Actions
22b04d941d Bump build version to 2.1.3 2022-04-12 00:12:24 +00:00
GitHub Actions
4e11382bdb Bump build version to 2.1.2 2022-03-31 00:11:19 +00:00
Rafael Blumberg
ba5d5297dc Add linux/arm/v7 to automate builds
After working around 32bits issues, this PR automate arm/v7 builds
2022-02-26 11:30:47 +08:00
GitHub Actions
758406337f Bump build version to 2.1.1 2022-02-10 00:08:25 +00:00
GitHub Actions
db7f0eb889 Bump deb version to 2.1.1-1 2022-02-10 00:08:25 +00:00
GitHub Actions
d73f3f4a63 Bump deb version to 2.1.0-1 2022-02-04 00:07:28 +00:00
GitHub Actions
683dd16a80 Bump build version to 2.1.0 2022-01-19 00:08:03 +00:00
Rafael Blumberg
75bee435f5 Workaround to compile for 32bit (#40)
* Workaround to compile for 32bit

This is a workaround based on [this
comment](https://github.com/antlr/antlr4/issues/2433#issuecomment-774514106).
It is not a pretty solution but it worked well on my test file.

It runs once to compile, if make fails, then it apply the fix and try
again, this is done so builds that don't need workaround don't use it
and also because the workaround is done on top of downloaded files
during ethe first compilation.

* Update README to remove ARMv7 error comment
2022-01-02 02:41:44 +08:00
GitHub Actions
e7020854f2 Bump build version to 2.0.1 2021-12-16 00:48:19 +00:00
GitHub Actions
1ebd048bf8 Bump deb version to 1.8.12-1 2021-12-07 00:50:09 +00:00
GitHub Actions
a76b7f2725 Bump build version to 1.8.12 2021-12-01 00:49:54 +00:00
GitHub Actions
616e4562a9 Bump build version to 1.8.11 2021-11-19 00:46:26 +00:00
GitHub Actions
0372093a19 Bump deb version to 1.8.10-1 2021-10-14 00:44:23 +00:00
GitHub Actions
a147e41001 Bump build version to 1.8.10 2021-10-07 00:48:28 +00:00
GitHub Actions
c45548e768 Bump deb version to 1.8.9-1 2021-09-14 00:47:48 +00:00
25 changed files with 557 additions and 412 deletions

232
.github/workflows/build.yaml vendored Normal file
View File

@@ -0,0 +1,232 @@
name: build from source
on:
push:
paths:
- .github/workflows/build.yaml
- build/*
- VERSION
pull_request:
paths:
- .github/workflows/build.yaml
- build/*
workflow_dispatch:
env:
GHCR_REPO: shenxn/protonmail-bridge-docker
DOCKERHUB_REPO: shenxn/protonmail-bridge
DOCKER_REPO_DEV: ghcr.io/shenxn/protonmail-bridge
PLATFORMS: linux/amd64,linux/arm64/v8,linux/arm/v7,linux/riscv64
jobs:
test:
runs-on: ubuntu-latest
if: github.ref != 'refs/heads/master'
steps:
- name: Checkout
uses: actions/checkout@master
- name: Set version
id: version
run: echo "version=`cat VERSION`" >> $GITHUB_ENV
- name: Docker meta
id: meta
uses: docker/metadata-action@v5
with:
images: |
${{ env.DOCKER_REPO_DEV }}
- name: Login to GHCR
uses: docker/login-action@v3
with:
registry: ghcr.io
username: ${{ github.repository_owner }}
password: ${{ secrets.GITHUB_TOKEN }}
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
with:
driver-opts: network=host
- name: Build and push by digest
id: build
uses: docker/build-push-action@v6
with:
labels: ${{ steps.meta.outputs.labels }}
outputs: type=image,"name=${{ env.DOCKER_REPO_DEV }}",push-by-digest=false,name-canonical=true,push=true
context: ./build
file: ./build/Dockerfile
tags: "${{ env.DOCKER_REPO_DEV }}:dev-${{ github.ref_name }}"
build-args: |
version=${{ env.version }}
- name: Run Trivy vulnerability scan
uses: aquasecurity/trivy-action@0.30.0
with:
image-ref: "${{ env.DOCKER_REPO_DEV }}:dev-${{ github.ref_name }}"
format: 'sarif'
exit-code: 0
severity: 'CRITICAL,HIGH'
output: 'trivy-results.sarif'
- name: Upload Trivy scan SARIF report
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'
build:
runs-on: ubuntu-latest
if: github.event_name == 'push' && github.ref == 'refs/heads/master'
strategy:
fail-fast: false
matrix:
platform:
- linux/amd64
- linux/arm64/v8
- linux/arm/v7
- linux/riscv64
steps:
- name: Checkout
uses: actions/checkout@master
- name: Prepare
run: |
platform=${{ matrix.platform }}
echo "PLATFORM_PAIR=${platform//\//-}" >> $GITHUB_ENV
- name: Set version
id: version
run: echo "version=`cat VERSION`" >> $GITHUB_ENV
- name: Docker meta
id: meta
uses: docker/metadata-action@v5
with:
images: |
${{ env.DOCKERHUB_REPO }}
${{ env.GHCR_REPO }}
- name: Login to Docker Hub
uses: docker/login-action@v3
with:
username: ${{ secrets.REGISTRY_USERNAME }}
password: ${{ secrets.REGISTRY_PASSWORD }}
- name: Login to GHCR
uses: docker/login-action@v3
with:
registry: ghcr.io
username: ${{ github.repository_owner }}
password: ${{ secrets.GITHUB_TOKEN }}
- name: Set up QEMU
uses: docker/setup-qemu-action@v3
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Build and push by digest
id: build
uses: docker/build-push-action@v6
with:
platforms: ${{ matrix.platform }}
labels: ${{ steps.meta.outputs.labels }}
outputs: type=image,"name=name=${{ env.DOCKERHUB_REPO }},${{ env.GHCR_REPO }}",push-by-digest=true,name-canonical=true,push=false
context: ./build
file: ./build/Dockerfile
tags: |
"${{ env.DOCKERHUB_REPO }}:build"
"${{ env.DOCKERHUB_REPO }}:${{ env.version }}-build"
"${{ env.GHCR_REPO }}:build"
"${{ env.GHCR_REPO }}:${{ env.version }}-build"
provenance: false
sbom: false
build-args: |
version=${{ env.version }}
- name: Export digest
run: |
mkdir -p ${{ runner.temp }}/digests
digest="${{ steps.build.outputs.digest }}"
touch "${{ runner.temp }}/digests/${digest#sha256:}"
- name: Upload digest
uses: actions/upload-artifact@v4
with:
name: digests-${{ env.PLATFORM_PAIR }}
path: ${{ runner.temp }}/digests/*
if-no-files-found: error
retention-days: 1
merge:
runs-on: ubuntu-latest
needs:
- build
steps:
- name: Download digests
uses: actions/download-artifact@v4
with:
path: ${{ runner.temp }}/digests
pattern: digests-*
merge-multiple: true
- name: Set version
id: version
run: echo "version=`cat VERSION`" >> $GITHUB_ENV
- name: Login to Docker Hub
uses: docker/login-action@v3
with:
username: ${{ secrets.REGISTRY_USERNAME }}
password: ${{ secrets.REGISTRY_PASSWORD }}
- name: Login to GHCR
uses: docker/login-action@v3
with:
registry: ghcr.io
username: ${{ github.repository_owner }}
password: ${{ secrets.GITHUB_TOKEN }}
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
with:
driver-opts: network=host
- name: Docker meta
id: meta
uses: docker/metadata-action@v5
with:
images: |
${{ env.DOCKERHUB_REPO }}
${{ env.GHCR_REPO }}
tags: |
type=raw,enable=true,value=${{ env.version }}-build
type=raw,enable=true,suffix=,value=build
- name: Create manifest list and push
working-directory: ${{ runner.temp }}/digests
run: |
docker buildx imagetools create $(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") \
$(printf '${{ env.DOCKERHUB_REPO }}@sha256:%s ' *)
docker buildx imagetools create $(jq -cr '.tags | map("-t " + .) | join(" ")' <<< "$DOCKER_METADATA_OUTPUT_JSON") \
$(printf '${{ env.GHCR_REPO }}@sha256:%s ' *)
- name: Run Trivy vulnerability scan
uses: aquasecurity/trivy-action@0.30.0
with:
image-ref: "${{ env.DOCKERHUB_REPO }}:${{ env.version }}-build"
format: 'sarif'
exit-code: 0
severity: 'CRITICAL,HIGH'
output: 'trivy-results.sarif'
- name: Upload Trivy scan SARIF report
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: 'trivy-results.sarif'
- name: Inspect image
run: |
docker buildx imagetools inspect ${{ env.DOCKERHUB_REPO }}:${{ steps.meta.outputs.version }}
docker buildx imagetools inspect ${{ env.GHCR_REPO }}:${{ steps.meta.outputs.version }}

79
.github/workflows/deb.yaml vendored Normal file
View File

@@ -0,0 +1,79 @@
name: pack from deb
on:
push:
paths:
- .github/workflows/deb.yaml
- deb/*
- VERSION
pull_request:
paths:
- .github/workflows/deb.yaml
- deb/*
workflow_dispatch:
env:
DOCKER_REPO: shenxn/protonmail-bridge
DOCKER_REPO_DEV: ghcr.io/shenxn/protonmail-bridge-dev
jobs:
deb:
runs-on: ubuntu-latest
steps:
- name: Checkout
uses: actions/checkout@master
- name: Set version
id: version
run: echo "version=`cat VERSION`" >> $GITHUB_ENV
- name: Set repo
id: repo
run: if [[ $GITHUB_REF == "refs/heads/master" ]]; then echo "::set-output name=repo::${DOCKER_REPO}"; else echo "::set-output name=repo::${DOCKER_REPO_DEV}"; fi
- name: Docker meta
id: docker_meta
uses: crazy-max/ghaction-docker-meta@v1
with:
images: ${{ steps.repo.outputs.repo }}
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v1
- name: Build image without push
uses: docker/build-push-action@v2
with:
context: ./deb
file: ./deb/Dockerfile
load: true
tags: protonmail-bridge:latest
- name: Scan image
id: scan
uses: anchore/scan-action@v2
with:
image: protonmail-bridge:latest
fail-build: true
severity-cutoff: critical
acs-report-enable: true
- name: Upload Anchore scan SARIF report
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: ${{ steps.scan.outputs.sarif }}
- name: Login to DockerHub
uses: docker/login-action@v1
if: ${{ github.event_name != 'pull_request' }}
with:
username: ${{ secrets.REGISTRY_USERNAME }}
password: ${{ secrets.REGISTRY_PASSWORD }}
- name: Login to GitHub Container Registry
uses: docker/login-action@v1
if: ${{ github.event_name != 'pull_request' }}
with:
registry: ghcr.io
username: ${{ github.repository_owner }}
password: ${{ secrets.CR_PAT }}
- name: Push image
uses: docker/build-push-action@v2
with:
context: ./deb
file: ./deb/Dockerfile
tags: |
${{ steps.repo.outputs.repo }}:latest
${{ steps.repo.outputs.repo }}:${{ env.version }}
labels: ${{ steps.docker_meta.outputs.labels }}
push: ${{ github.event_name != 'pull_request' }}

View File

@@ -1,99 +0,0 @@
name: build next
on:
push:
branches:
- next
paths:
- .github/workflows/next.yaml
- docker/*
- protonmail_version/*
- VERSION
pull_request:
paths:
- .github/workflows/next.yaml
- docker/*
- protonmail_version/*
- VERSION
env:
DOCKER_REPO: shenxn/protonmail-bridge-ng
DOCKER_REPO_DEV: ghcr.io/shenxn/protonmail-bridge-ng-dev
PLATFORMS: linux/amd64,linux/arm64/v8,linux/arm/v7
jobs:
build:
runs-on: ubuntu-latest
services:
registry:
image: registry:2
ports:
- 5000:5000
steps:
- name: Checkout
uses: actions/checkout@master
- name: Set version
id: version
run: |
echo "::set-output name=image_version::$(cat VERSION)" && \
echo "::set-output name=protonmail_bridge_version::$(cat protonmail_bridge_version/VERSION_LATEST)"
- name: Set repo
id: repo
run: if [[ $GITHUB_REF == "refs/heads/master" ]]; then echo "::set-output name=repo::${DOCKER_REPO}"; else echo "::set-output name=repo::${DOCKER_REPO_DEV}"; fi
- name: Docker meta
id: docker_meta
uses: crazy-max/ghaction-docker-meta@v1
with:
images: ${{ steps.repo.outputs.repo }}
- name: Set up QEMU
uses: docker/setup-qemu-action@v1
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v1
with:
driver-opts: network=host
- name: Build image without push to registry
uses: docker/build-push-action@v2
with:
context: ./docker
file: ./docker/Dockerfile
build-args: PROTONMAIL_BRIDGE_VERSION=${{ steps.version.outputs.protonmail_bridge_version }}
platforms: ${{ env.PLATFORMS }}
push: true
tags: localhost:5000/protonmail-bridge:latest
- name: Scan image
id: scan
uses: anchore/scan-action@v2
with:
image: localhost:5000/protonmail-bridge:latest
fail-build: true
severity-cutoff: critical
acs-report-enable: true
- name: Upload Anchore scan SARIF report
uses: github/codeql-action/upload-sarif@v1
with:
sarif_file: ${{ steps.scan.outputs.sarif }}
- name: Login to DockerHub
uses: docker/login-action@v1
if: ${{ github.event_name != 'pull_request' && github.ref == 'refs/heads/master' }}
with:
username: ${{ secrets.REGISTRY_USERNAME }}
password: ${{ secrets.REGISTRY_PASSWORD }}
- name: Login to GitHub Container Registry
uses: docker/login-action@v1
if: ${{ github.event_name != 'pull_request' && github.ref == 'refs/heads/next' }}
with:
registry: ghcr.io
username: ${{ github.repository_owner }}
password: ${{ secrets.CR_PAT }}
- name: Push image
uses: docker/build-push-action@v2
with:
context: ./docker
file: ./docker/Dockerfile
build-args: PROTONMAIL_BRIDGE_VERSION=${{ steps.version.outputs.protonmail_bridge_version }}
platforms: ${{ env.PLATFORMS }}
tags: |
${{ steps.repo.outputs.repo }}:latest
${{ steps.repo.outputs.repo }}:${{ steps.version.outputs.image_version }}-${{ steps.version.outputs.protonmail_bridge_version }}
labels: ${{ steps.docker_meta.outputs.labels }}
push: ${{ github.event_name != 'pull_request' }}

View File

@@ -2,9 +2,6 @@ name: update check
on:
push:
branches:
- master
- dev
paths:
- .github/workflows/update-check.yaml
- update-check.py

3
.gitignore vendored
View File

@@ -0,0 +1,3 @@
# Ignoring IDE-specific files
.idea/*
.vscode

View File

@@ -12,10 +12,6 @@ Docker Hub: [https://hub.docker.com/r/shenxn/protonmail-bridge](https://hub.dock
GitHub: [https://github.com/shenxn/protonmail-bridge-docker](https://github.com/shenxn/protonmail-bridge-docker)
## ARMv7 Builds
Currently there is a problem building the new parser targeting 32-bit architectures (i.e. `arm/v7`). The latest working build is `1.4.5-build`. Therefore, if you are using an `arm/v7` device like Raspberry Pi, do not upgrade to newer version. More information about the problem can be found [here](https://www.reddit.com/r/ProtonMail/comments/jvzm12/issue_building_bridge_150/). If you have any idea on how to fix this, a PR is welcome.
## ARM Support
We now support ARM devices (`arm64` and `arm/v7`)! Use the images tagged with `build`. See next section for details.
@@ -24,42 +20,43 @@ We now support ARM devices (`arm64` and `arm/v7`)! Use the images tagged with `b
There are two types of images.
- `deb`: Images based on the official [.deb release](https://protonmail.com/bridge/install). It only supports the `amd64` architecture.
- `build`: Images based on the [source code](https://github.com/ProtonMail/proton-bridge). It supports `amd64`, `arm64`, and `arm/v7`. Supporting to more architectures is possible. PRs are welcome.
- `build`: Images based on the [source code](https://github.com/ProtonMail/proton-bridge). It supports `amd64`, `arm64`, `arm/v7` and `riscv64`. Supporting to more architectures is possible. PRs are welcome.
| tag | description |
| ----------------- | -------------------- |
| `latest` | latest `deb` image |
| `[version]` | `deb` images |
| `build` | latest `build` image |
| `[version]-build` | `build` images |
## Environment Variables for images with `build` in tag
| Name | Description | Default Value |
| --------------------- | --------------------------------------------------------------------------------- | ------------- |
| `PROTONMAIL_USERNAME` | your protonmail account username | (not set) |
| `PROTONMAIL_PASSWORD` | the password for your protonmail account | (not set) |
| `KEY_ID` | the pgp-id for the internal password manager required by protonmail-bridge | `pass-key` |
| `GNUPGHOME` | change the defulat `/root/.gnupg` to this directory as a workaround for gpg error | `/tmp/gnupg` |
tag | description
-- | --
`latest` | latest `deb` image
`[version]` | `deb` images
`build` | latest `build` image
`[version]-build` | `build` images
## Initialization
To initialize and add account to the bridge, run the following command.
```bash
docker run --rm -it -v protonmail:/home/protonmail shenxn/protonmail-bridge init
```
docker run --rm -it -v protonmail:/root shenxn/protonmail-bridge init
```
Wait for the bridge to startup, use `login` command and follow the instructions to add your account into the bridge. Then use `info` to see the configuration information (username and password). After that, use `exit` to exit the bridge. You may need `CTRL+C` to exit the docker entirely.
If you want to use Docker Compose instead, you can create a copy of the provided example [docker-compose.yml](docker-compose.yml) file, modify it to suit your needs, and then run the following command:
__NOTE:__ If you have `PROTONMAIL_USERNAME` and `PROTONMAIL_PASSWORD` set for `docker run` with `-e`, the login process will finish automatically.
```
docker compose run protonmail-bridge init
```
Wait for the bridge to startup, then you will see a prompt appear for [Proton Mail Bridge interactive shell](https://proton.me/support/bridge-cli-guide). Use the `login` command and follow the instructions to add your account into the bridge. Then use `info` to see the configuration information (username and password). After that, use `exit` to exit the bridge. You may need `CTRL+C` to exit the docker entirely.
## Run
To run the container, use the following command.
```bash
docker run -d --name=protonmail-bridge -v protonmail:/home/protonmail -p 1025:25/tcp -p 1143:143/tcp --restart=unless-stopped shenxn/protonmail-bridge
```
docker run -d --name=protonmail-bridge -v protonmail:/root -p 1025:25/tcp -p 1143:143/tcp --restart=unless-stopped shenxn/protonmail-bridge
```
Or, if using Docker Compose, use the following command.
```
docker compose up -d
```
## Kubernetes
@@ -72,8 +69,8 @@ If you don't want to use Helm, you can also reference to the guide ([#6](https:/
Please be aware that running the command above will expose your bridge to the network. Remember to use firewall if you are going to run this in an untrusted network or on a machine that has public IP address. You can also use the following command to publish the port to only localhost, which is the same behavior as the official bridge package.
```bash
docker run -d --name=protonmail-bridge -v protonmail:/home/protonmail -p 127.0.0.1:1025:25/tcp -p 127.0.0.1:1143:143/tcp --restart=unless-stopped shenxn/protonmail-bridge
```
docker run -d --name=protonmail-bridge -v protonmail:/root -p 127.0.0.1:1025:25/tcp -p 127.0.0.1:1143:143/tcp --restart=unless-stopped shenxn/protonmail-bridge
```
Besides, you can publish only port 25 (SMTP) if you don't need to receive any email (e.g. as a email notification service).

View File

@@ -1 +1 @@
0.1
v3.21.2

33
build/Dockerfile Normal file
View File

@@ -0,0 +1,33 @@
# The build image could be golang, but it currently does not support riscv64. Only debian:sid does, at the time of writing.
FROM debian:sid-slim AS build
ARG version
# Install dependencies
RUN apt-get update && apt-get install -y golang build-essential libsecret-1-dev
# Build
ADD https://github.com/ProtonMail/proton-bridge.git#${version} /build/
WORKDIR /build/
RUN make build-nogui vault-editor
FROM debian:sid-slim
LABEL maintainer="Simon Felding <sife@adm.ku.dk>"
EXPOSE 25/tcp
EXPOSE 143/tcp
# Install dependencies and protonmail bridge
RUN apt-get update \
&& apt-get install -y --no-install-recommends socat pass libsecret-1-0 ca-certificates \
&& rm -rf /var/lib/apt/lists/*
# Copy bash scripts
COPY gpgparams entrypoint.sh /protonmail/
# Copy protonmail
COPY --from=build /build/bridge /protonmail/
COPY --from=build /build/proton-bridge /protonmail/
COPY --from=build /build/vault-editor /protonmail/
ENTRYPOINT ["bash", "/protonmail/entrypoint.sh"]

35
build/entrypoint.sh Normal file
View File

@@ -0,0 +1,35 @@
#!/bin/bash
set -ex
# Initialize
if [[ $1 == init ]]; then
# Initialize pass
gpg --generate-key --batch /protonmail/gpgparams
pass init pass-key
# Kill the other instance as only one can be running at a time.
# This allows users to run entrypoint init inside a running conainter
# which is useful in a k8s environment.
# || true to make sure this would not fail in case there is no running instance.
pkill protonmail-bridge || true
# Login
/protonmail/proton-bridge --cli $@
else
# socat will make the conn appear to come from 127.0.0.1
# ProtonMail Bridge currently expects that.
# It also allows us to bind to the real ports :)
socat TCP-LISTEN:25,fork TCP:127.0.0.1:1025 &
socat TCP-LISTEN:143,fork TCP:127.0.0.1:1143 &
# Start protonmail
# Fake a terminal, so it does not quit because of EOF...
rm -f faketty
mkfifo faketty
cat faketty | /protonmail/proton-bridge --cli $@
fi

28
deb/Dockerfile Normal file
View File

@@ -0,0 +1,28 @@
### The Deb install is just a repack of the official ProtonMail Bridge deb package with less dependencies.
### I recommend you don't use this. It's here for legacy reasons.
FROM debian:sid-slim AS build
COPY install.sh PACKAGE /
RUN apt-get update && apt-get install -y wget binutils
# Repack deb (removes unnecessary dependencies and produces /protonmail.deb)
RUN bash /install.sh
FROM debian:sid-slim
LABEL maintainer="Simon Felding <sife@adm.ku.dk>"
EXPOSE 25/tcp
EXPOSE 143/tcp
WORKDIR /protonmail
# Copy bash scripts
COPY gpgparams entrypoint.sh PACKAGE /protonmail/
COPY --from=build /protonmail.deb /tmp/protonmail.deb
RUN apt-get update \
&& apt-get install -y --no-install-recommends /tmp/protonmail.deb socat pass libsecret-1-0 ca-certificates procps \
&& rm -rf /var/lib/apt/lists/*
CMD ["bash", "/protonmail/entrypoint.sh"]

1
deb/PACKAGE Normal file
View File

@@ -0,0 +1 @@
https://github.com/ProtonMail/proton-bridge/releases/download/v3.21.2/protonmail-bridge_3.21.2-1_amd64.deb

49
deb/entrypoint.sh Normal file
View File

@@ -0,0 +1,49 @@
#!/bin/bash
set -ex
# Initialize
if [[ $1 == init ]]; then
# # Parse parameters
# TFP="" # Default empty two factor passcode
# shift # skip `init`
# while [[ $# -gt 0 ]]; do
# key="$1"
# case $key in
# -u|--username)
# USERNAME="$2"
# ;;
# -p|--password)
# PASSWORD="$2"
# ;;
# -t|--twofactor)
# TWOFACTOR="$2"
# ;;
# esac
# shift
# shift
# done
# Initialize pass
gpg --generate-key --batch /protonmail/gpgparams
pass init pass-key
# Login
protonmail-bridge --cli
else
# socat will make the conn appear to come from 127.0.0.1
# ProtonMail Bridge currently expects that.
# It also allows us to bind to the real ports :)
socat TCP-LISTEN:25,fork TCP:127.0.0.1:1025 &
socat TCP-LISTEN:143,fork TCP:127.0.0.1:1143 &
# Start protonmail
# Fake a terminal, so it does not quit because of EOF...
rm -f faketty
mkfifo faketty
cat faketty | protonmail-bridge --cli
fi

8
deb/gpgparams Normal file
View File

@@ -0,0 +1,8 @@
%no-protection
%echo Generating a basic OpenPGP key
Key-Type: RSA
Key-Length: 2048
Name-Real: pass-key
Expire-Date: 0
%commit
%echo done

16
deb/install.sh Normal file
View File

@@ -0,0 +1,16 @@
#!/bin/bash
set -ex
# Repack deb (remove unnecessary dependencies)
mkdir deb
wget -i /PACKAGE -O /deb/protonmail.deb
cd deb
ar x -v protonmail.deb
mkdir control
tar zxvf control.tar.gz -C control
sed -i "s/^Depends: .*$/Depends: libgl1, libc6, libsecret-1-0, libstdc++6, libgcc1/" control/control
cd control
tar zcvf ../control.tar.gz .
cd ../
ar rcs -v /protonmail.deb debian-binary control.tar.gz data.tar.gz

14
docker-compose.yml Normal file
View File

@@ -0,0 +1,14 @@
version: '2.1'
services:
protonmail-bridge:
image: shenxn/protonmail-bridge
ports:
- 1025:25/tcp
- 1143:143/tcp
restart: unless-stopped
volumes:
- protonmail:/root
volumes:
protonmail:
name: protonmail

View File

@@ -1,42 +0,0 @@
FROM golang:1.16 AS build
# Install dependencies
RUN apt-get update && apt-get install -y libsecret-1-dev
ARG PROTONMAIL_BRIDGE_VERSION
# Build
WORKDIR /build/
RUN curl -L https://github.com/ProtonMail/proton-bridge/archive/refs/tags/${PROTONMAIL_BRIDGE_VERSION}.tar.gz \
| tar zx --strip-component 1
RUN make build-nogui
FROM ubuntu:bionic
LABEL maintainer="Xiaonan Shen <s@sxn.dev>"
EXPOSE 25/tcp
EXPOSE 143/tcp
# Install dependencies
RUN apt-get update \
&& apt-get install -y --no-install-recommends \
expect socat pass libsecret-1-0 ca-certificates \
&& rm -rf /var/lib/apt/lists/*
ENV PATH="/srv/protonmail:$PATH"
# Copy protonmail
COPY --from=build /build/proton-bridge /srv/protonmail/
# Copy bash scripts
COPY gpgparams entrypoint.sh auto-login.exp login.sh /srv/protonmail/
# Create use and group for protonmail
RUN groupadd --gid 8535 protonmail \
&& useradd --uid 8535 --gid 8535 --home-dir /protonmail protonmail \
&& mkdir /protonmail \
&& chown protonmail:protonmail /protonmail
USER protonmail
WORKDIR /protonmail
ENTRYPOINT ["bash", "/srv/protonmail/entrypoint.sh"]

View File

@@ -1 +0,0 @@
v1.8.9

View File

@@ -1,98 +0,0 @@
#!/usr/bin/expect -f
set timeout 15;
spawn proton-bridge -cli {*}$argv ;
# wait for inital prompt
expect {
">>> " {
# protonmail-bridge started without error, do nothing
}
timeout {
puts "Timed out"
exit 2
}
}
send "login\n"
expect {
"Username: " {
# login start, enter username
}
timeout {
puts "Timed out"
exit 2
}
}
send "$::env(PROTONMAIL_USERNAME)\n"
expect {
"Password: " {
# username entered, enter password
}
timeout {
puts "Timed out"
exit 2
}
}
stty -echo
sleep 1
send "$::env(PROTONMAIL_PASSWORD)\n"
stty echo
expect {
"was added successfully." {
# login ok
}
"Two factor code: " {
# 2FA enabled, enter OTP
if ![info exists ::env(PROTONMAIL_OTP)] {
puts "\n2FA enabled but PROTONMAIL_OTP is not set. Exiting"
exit 1
}
send "$::env(PROTONMAIL_OTP)\n"
expect {
"was added successfully." {
# login ok
}
"Server error" {
# login failed
exit 1
}
timeout {
puts "Timed out"
exit 2
}
}
}
"Server error" {
# login failed
exit 1
}
timeout {
puts "Timed out"
exit 2
}
}
send "info\n"
expect {
"Configuration for " {
# successfully got info. Wait for printing
sleep 1
}
timeout {
puts "Timed out"
exit 2
}
}

View File

@@ -1,62 +0,0 @@
#!/bin/bash
set -e
# Generate gpg keys
if [ ! -f ${HOME}/.gnupg ]; then
echo "Generateing gpg keys..."
# set GNUPGHOME as a workaround for
#
# gpg-agent[106]: error binding socket to '/root/.gnupg/S.gpg-agent': File name too long
#
# when using docker volume mount
#
# ref: https://dev.gnupg.org/T2964
#
export GNUPGHOME=/tmp/gnupg
mkdir ${GNUPGHOME}
chmod 700 ${GNUPGHOME}
gpg --generate-key --batch /srv/protonmail/gpgparams
pkill gpg-agent
mv ${GNUPGHOME} ${HOME}/.gnupg
export GNUPGHOME=""
fi
# Initialize pass
if [ ! -f ${HOME}/.password-store/.gpg-id ]; then
echo "Initializing pass"
pass init pass-key
fi
# Login
if [ ! -f ${HOME}/.logged-in ]; then
if [[ -n ${PROTONMAIL_USERNAME} && -n ${PROTONMAIL_PASSWORD} ]]; then
echo "Logging in"
auto-login.exp $@
echo "" > ${HOME}/.logged-in
else
# Wait for manual login
echo "=============================================================================="
echo "PROTONMAIL_USERNAME or PROTONMAIL_PASSWORD is not set. Will not do auto login."
echo "Run docker exec -it protonmail login.sh to login manually."
echo "Waiting for manual login..."
while [ ! -f ${HOME}/.logged-in ]; do
sleep 5
done
fi
fi
echo "Logged in flag detected. Starting protonmail bridge"
# socat will make the conn appear to come from 127.0.0.1
# ProtonMail Bridge currently expects that.
# It also allows us to bind to the real ports :)
socat TCP-LISTEN:2025,fork TCP:127.0.0.1:1025 &
socat TCP-LISTEN:2143,fork TCP:127.0.0.1:1143 &
# Start protonmail
# Fake a terminal, so it does not quit because of EOF...
rm -f faketty
mkfifo faketty
cat faketty | proton-bridge --cli $@

View File

@@ -1,12 +0,0 @@
#!/bin/bash
echo "Start manual login"
echo "========================================================================"
echo "IMPORTANT: Use `exit` instead of CTRL-C when you successfully logged in."
echo "Otherwise protonmail bridge will not start."
echo "========================================================================"
proton-bridge -cli
echo "Consider logged in. Add flag."
echo "" > $HOME/.logged-in

View File

@@ -1 +0,0 @@
v1.8.7

View File

@@ -1 +0,0 @@
v1.8.9

View File

@@ -1,64 +1,37 @@
import sys
import os
import requests
import json
import re
import requests, os, sys
def git(command):
return os.system(f"git {command}")
release = requests.get("https://api.github.com/repos/protonmail/proton-bridge/releases/latest").json()
version = release['tag_name']
deb = [asset for asset in release ['assets'] if asset['name'].endswith('.deb')][0]['browser_download_url']
print(f"Latest release is: {version}")
with open("VERSION", 'w') as f:
f.write(version)
with open("deb/PACKAGE", 'w') as f:
f.write(deb)
git("config --local user.name 'GitHub Actions'")
git("config --local user.email 'actions@github.com'")
git("add -A")
if git("diff --cached --quiet") == 0: # Returns 0 if there are no changes
print("Version didn't change")
exit(0)
git(f"commit -m 'Bump version to {version}'")
is_pull_request = sys.argv[1] == "true"
print(f"is_pull_request={is_pull_request}")
if is_pull_request:
print("This is a pull request, skipping push step.")
exit(0)
def check_version(directory, new_version):
print(f"Checking version for {directory}")
if not new_version:
print("Failed to get new version. Exiting.")
exit(1)
with open(f"{directory}/VERSION", "r") as f:
old_version = f.read().rstrip()
print(f"Up-to-date version {new_version}")
print(f"Current version: {old_version}")
if old_version != new_version:
print(f"New release found: {new_version}")
# bump up to new release
with open(f"{directory}/VERSION", "w") as f:
f.write(new_version)
# commit
result = os.system(f"git config --local user.email 'actions@github.com' \
&& git config --local user.name 'GitHub Actions' \
&& git add {directory}/VERSION \
&& git commit -m 'Bump {directory} version to {new_version}'")
if result != 0:
print("Failed to commit the bump. Exiting")
exit(1)
if is_pull_request:
print("Action triggered by pull request. Do not push.")
else:
result = os.system("git push")
if result != 0:
print("Failed to push. Exiting")
exit(1)
else:
print(f"Already newest version {old_version}")
# check deb version
response = requests.get("https://protonmail.com/download/current_version_linux.json")
content = json.loads(response.content)
version = re.match(".*_([0-9.-]+)_amd64\.deb", content["DebFile"]).group(1)
check_version("deb", version)
# check build version
response = requests.get(
"https://api.github.com/repos/ProtonMail/proton-bridge/tags",
headers={"Accept": "application/vnd.github.v3+json"},
)
tags = json.loads(response.content)
version_re = re.compile("v\d+\.\d+\.\d+")
releases = [tag["name"][1:] for tag in tags if version_re.match(tag["name"])]
check_version("build", releases[0])
if git("push") != 0:
print("Git push failed!")
exit(1)

View File

@@ -1,4 +0,0 @@
image_version: 0.1
protonmail_version:
latest: v1.8.7 # Latest stable version
pre: v1.8.9 # Latest preview version