try repo level scan

This commit is contained in:
Richard Kuo 2024-11-01 21:59:23 -07:00
parent 5439c33313
commit 4fc8a35220

View File

@ -18,59 +18,19 @@ jobs:
runs-on: [runs-on,runner=2cpu-linux-x64,"run-id=${{ github.run_id }}"]
steps:
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Checkout code
uses: actions/checkout@v4
- name: Login to Docker Hub
uses: docker/login-action@v3
with:
username: ${{ secrets.DOCKER_USERNAME }}
password: ${{ secrets.DOCKER_TOKEN }}
- name: Run Trivy vulnerability scanner in repo mode
uses: aquasecurity/trivy-action@0.28.0
with:
scan-type: fs
scanners: license
format: sarif
output: trivy-results.sarif
severity: HIGH,CRITICAL
# Backend
- name: Pull backend docker image
run: docker pull danswer/danswer-backend:latest
- name: Run Trivy vulnerability scanner on backend
uses: aquasecurity/trivy-action@master
env:
TRIVY_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-db:2'
TRIVY_JAVA_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-java-db:1'
with:
image-ref: danswer/danswer-backend:latest
scanners: license
severity: HIGH,CRITICAL
vuln-type: library
exit-code: 1
# Web server
- name: Pull web server docker image
run: docker pull danswer/danswer-web-server:latest
- name: Run Trivy vulnerability scanner on web server
uses: aquasecurity/trivy-action@master
env:
TRIVY_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-db:2'
TRIVY_JAVA_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-java-db:1'
with:
image-ref: danswer/danswer-web-server:latest
scanners: license
severity: HIGH,CRITICAL
vuln-type: library
exit-code: 1
# Model server
- name: Pull model server docker image
run: docker pull danswer/danswer-model-server:latest
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@master
env:
TRIVY_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-db:2'
TRIVY_JAVA_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-java-db:1'
with:
image-ref: danswer/danswer-model-server:latest
scanners: license
severity: HIGH,CRITICAL
vuln-type: library
exit-code: 1
- name: Upload Trivy scan results to GitHub Security tab
uses: github/codeql-action/upload-sarif@v3
with:
sarif_file: trivy-results.sarif