From 4fc8a35220999e9b3e2aeaff3b4e259dc2cbfcb0 Mon Sep 17 00:00:00 2001 From: Richard Kuo Date: Fri, 1 Nov 2024 21:59:23 -0700 Subject: [PATCH] try repo level scan --- .github/workflows/nightly-scan-licenses.yml | 68 +++++---------------- 1 file changed, 14 insertions(+), 54 deletions(-) diff --git a/.github/workflows/nightly-scan-licenses.yml b/.github/workflows/nightly-scan-licenses.yml index 4f3aee3e0..a5629ec30 100644 --- a/.github/workflows/nightly-scan-licenses.yml +++ b/.github/workflows/nightly-scan-licenses.yml @@ -18,59 +18,19 @@ jobs: runs-on: [runs-on,runner=2cpu-linux-x64,"run-id=${{ github.run_id }}"] steps: - - name: Set up Docker Buildx - uses: docker/setup-buildx-action@v3 + - name: Checkout code + uses: actions/checkout@v4 - - name: Login to Docker Hub - uses: docker/login-action@v3 - with: - username: ${{ secrets.DOCKER_USERNAME }} - password: ${{ secrets.DOCKER_TOKEN }} + - name: Run Trivy vulnerability scanner in repo mode + uses: aquasecurity/trivy-action@0.28.0 + with: + scan-type: fs + scanners: license + format: sarif + output: trivy-results.sarif + severity: HIGH,CRITICAL - # Backend - - name: Pull backend docker image - run: docker pull danswer/danswer-backend:latest - - - name: Run Trivy vulnerability scanner on backend - uses: aquasecurity/trivy-action@master - env: - TRIVY_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-db:2' - TRIVY_JAVA_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-java-db:1' - with: - image-ref: danswer/danswer-backend:latest - scanners: license - severity: HIGH,CRITICAL - vuln-type: library - exit-code: 1 - - # Web server - - name: Pull web server docker image - run: docker pull danswer/danswer-web-server:latest - - - name: Run Trivy vulnerability scanner on web server - uses: aquasecurity/trivy-action@master - env: - TRIVY_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-db:2' - TRIVY_JAVA_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-java-db:1' - with: - image-ref: danswer/danswer-web-server:latest - scanners: license - severity: HIGH,CRITICAL - vuln-type: library - exit-code: 1 - - # Model server - - name: Pull model server docker image - run: docker pull danswer/danswer-model-server:latest - - - name: Run Trivy vulnerability scanner - uses: aquasecurity/trivy-action@master - env: - TRIVY_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-db:2' - TRIVY_JAVA_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-java-db:1' - with: - image-ref: danswer/danswer-model-server:latest - scanners: license - severity: HIGH,CRITICAL - vuln-type: library - exit-code: 1 \ No newline at end of file + - name: Upload Trivy scan results to GitHub Security tab + uses: github/codeql-action/upload-sarif@v3 + with: + sarif_file: trivy-results.sarif \ No newline at end of file