mirror of
https://github.com/danswer-ai/danswer.git
synced 2025-06-28 08:51:00 +02:00
replace trivy download endpoint due to db download flakiness on their en… (#2661)
* disable trivy for the moment due to db download flakiness on their end causing the action to fail * try hardcoding to amazon registry as others have suggested
This commit is contained in:
parent
a30de693cb
commit
a0235b7b7b
@ -46,8 +46,16 @@ jobs:
|
|||||||
build-args: |
|
build-args: |
|
||||||
DANSWER_VERSION=${{ github.ref_name }}
|
DANSWER_VERSION=${{ github.ref_name }}
|
||||||
|
|
||||||
|
# trivy has their own rate limiting issues causing this action to flake
|
||||||
|
# we worked around it by hardcoding to different db repos in env
|
||||||
|
# can re-enable when they figure it out
|
||||||
|
# https://github.com/aquasecurity/trivy/discussions/7538
|
||||||
|
# https://github.com/aquasecurity/trivy-action/issues/389
|
||||||
- name: Run Trivy vulnerability scanner
|
- name: Run Trivy vulnerability scanner
|
||||||
uses: aquasecurity/trivy-action@master
|
uses: aquasecurity/trivy-action@master
|
||||||
|
env:
|
||||||
|
TRIVY_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-db:2'
|
||||||
|
TRIVY_JAVA_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-java-db:1'
|
||||||
with:
|
with:
|
||||||
# To run locally: trivy image --severity HIGH,CRITICAL danswer/danswer-backend
|
# To run locally: trivy image --severity HIGH,CRITICAL danswer/danswer-backend
|
||||||
image-ref: docker.io/${{ env.REGISTRY_IMAGE }}:${{ github.ref_name }}
|
image-ref: docker.io/${{ env.REGISTRY_IMAGE }}:${{ github.ref_name }}
|
||||||
|
@ -40,8 +40,16 @@ jobs:
|
|||||||
build-args: |
|
build-args: |
|
||||||
DANSWER_VERSION=${{ github.ref_name }}
|
DANSWER_VERSION=${{ github.ref_name }}
|
||||||
|
|
||||||
|
# trivy has their own rate limiting issues causing this action to flake
|
||||||
|
# we worked around it by hardcoding to different db repos in env
|
||||||
|
# can re-enable when they figure it out
|
||||||
|
# https://github.com/aquasecurity/trivy/discussions/7538
|
||||||
|
# https://github.com/aquasecurity/trivy-action/issues/389
|
||||||
- name: Run Trivy vulnerability scanner
|
- name: Run Trivy vulnerability scanner
|
||||||
uses: aquasecurity/trivy-action@master
|
uses: aquasecurity/trivy-action@master
|
||||||
|
env:
|
||||||
|
TRIVY_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-db:2'
|
||||||
|
TRIVY_JAVA_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-java-db:1'
|
||||||
with:
|
with:
|
||||||
image-ref: docker.io/danswer/danswer-model-server:${{ github.ref_name }}
|
image-ref: docker.io/danswer/danswer-model-server:${{ github.ref_name }}
|
||||||
severity: 'CRITICAL,HIGH'
|
severity: 'CRITICAL,HIGH'
|
||||||
|
@ -113,8 +113,16 @@ jobs:
|
|||||||
run: |
|
run: |
|
||||||
docker buildx imagetools inspect ${{ env.REGISTRY_IMAGE }}:${{ steps.meta.outputs.version }}
|
docker buildx imagetools inspect ${{ env.REGISTRY_IMAGE }}:${{ steps.meta.outputs.version }}
|
||||||
|
|
||||||
|
# trivy has their own rate limiting issues causing this action to flake
|
||||||
|
# we worked around it by hardcoding to different db repos in env
|
||||||
|
# can re-enable when they figure it out
|
||||||
|
# https://github.com/aquasecurity/trivy/discussions/7538
|
||||||
|
# https://github.com/aquasecurity/trivy-action/issues/389
|
||||||
- name: Run Trivy vulnerability scanner
|
- name: Run Trivy vulnerability scanner
|
||||||
uses: aquasecurity/trivy-action@master
|
uses: aquasecurity/trivy-action@master
|
||||||
|
env:
|
||||||
|
TRIVY_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-db:2'
|
||||||
|
TRIVY_JAVA_DB_REPOSITORY: 'public.ecr.aws/aquasecurity/trivy-java-db:1'
|
||||||
with:
|
with:
|
||||||
image-ref: docker.io/${{ env.REGISTRY_IMAGE }}:${{ github.ref_name }}
|
image-ref: docker.io/${{ env.REGISTRY_IMAGE }}:${{ github.ref_name }}
|
||||||
severity: 'CRITICAL,HIGH'
|
severity: 'CRITICAL,HIGH'
|
||||||
|
Loading…
x
Reference in New Issue
Block a user