phishing-filter/.gitlab-ci.yml

66 lines
1.3 KiB
YAML

image: node:lts-alpine
include:
- template: Security/Secret-Detection.gitlab-ci.yml
# Only run pipeline when scheduled or "Run pipeline" in the main branch
workflow:
rules:
- if: '$CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH && ($CI_PIPELINE_SOURCE == "schedule" || $CI_PIPELINE_SOURCE == "web")'
build_job:
stage: build
before_script:
- apk update && apk add brotli curl grep xmlstarlet
script:
- sh src/script.sh
- find public -type f -regex '.*\.\(txt\|conf\|tpl\|rules\)$' -exec gzip -f -k -9 {} \;
- find public -type f -regex '.*\.\(txt\|conf\|tpl\|rules\)$' -exec brotli -f -k -9 {} \;
artifacts:
paths:
- tmp
- public
pages:
stage: deploy
script:
- echo
artifacts:
paths:
- public
rules:
- if: $CI_COMMIT_BRANCH == $CI_DEFAULT_BRANCH
cloudflare:
stage: deploy
before_script:
- apk update && apk add curl
script:
- curl -X POST "https://api.cloudflare.com/client/v4/pages/webhooks/deploy_hooks/$CLOUDFLARE_BUILD_HOOK"
rules:
- if: $CLOUDFLARE_BUILD_HOOK
netlify:
stage: deploy
before_script:
- npm install
- npm install netlify-cli -g
- netlify --telemetry-disable
script:
- npm run build
- netlify deploy --dir=public --prod
rules:
- if: $NETLIFY_SITE_ID