phishing-filter/.gitlab-ci.yml

48 lines
1.1 KiB
YAML
Raw Normal View History

image: alpine:latest
2020-07-05 10:46:19 +00:00
include:
- template: Security/Secret-Detection.gitlab-ci.yml
build_job:
stage: build
2020-07-05 10:46:19 +00:00
before_script:
2022-01-08 03:20:44 +00:00
- apk update && apk add brotli curl grep xmlstarlet
2020-07-05 10:46:19 +00:00
script:
- sh src/script.sh
- find public -type f -regex '.*\.\(txt\|conf\|tpl\|rules\)$' -exec gzip -f -k -9 {} \;
- find public -type f -regex '.*\.\(txt\|conf\|tpl\|rules\)$' -exec brotli -f -k -9 {} \;
2020-07-05 10:46:19 +00:00
artifacts:
paths:
- tmp
- public
2020-07-05 10:46:19 +00:00
pages:
stage: deploy
2020-07-05 10:46:19 +00:00
script:
- echo
2020-07-05 10:46:19 +00:00
artifacts:
paths:
- public
2020-07-05 10:46:19 +00:00
rules:
- if: $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH
2022-01-09 02:54:19 +00:00
deploy_job:
stage: deploy
before_script:
- apk update && apk add curl
script:
- curl -X POST -d '{}' https://api.netlify.com/build_hooks/$NETLIFY_BUILD_HOOK
- curl -X POST "https://api.cloudflare.com/client/v4/pages/webhooks/deploy_hooks/$CLOUDFLARE_BUILD_HOOK"
rules:
# Only trigger through schedule job and "Run pipeline" in the main branch
- if: '$CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH && ($CI_PIPELINE_SOURCE == "schedule" || $CI_PIPELINE_SOURCE == "web")'