Skip to content

Commit acca13e

Browse files
Merge branch 'main' of https://github.com/zondervancalvez/cactus into main
2 parents 331d6b4 + b4fe5b9 commit acca13e

File tree

1 file changed

+51
-105
lines changed

1 file changed

+51
-105
lines changed

.github/workflows/ci.yaml

+51-105
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,7 @@
11
---
22
env:
33
NODEJS_VERSION: v18.18.2
4+
RUN_TRIVY_SCAN: true
45
jobs:
56
ActionLint:
67
uses: ./.github/workflows/actionlint.yaml
@@ -1591,7 +1592,7 @@ jobs:
15911592
with:
15921593
node-version: ${{ env.NODEJS_VERSION }}
15931594
- uses: actions/checkout@v4.1.1
1594-
1595+
15951596
- id: yarn-cache
15961597
name: Restore Yarn Cache
15971598
uses: actions/cache@v4.0.1
@@ -1601,6 +1602,19 @@ jobs:
16011602
restore-keys: |
16021603
${{ runner.os }}-yarn-${{ hashFiles('./yarn.lock') }}
16031604
- run: ./tools/ci.sh
1605+
1606+
- name: Build an image from Dockerfile
1607+
run: DOCKER_BUILDKIT=1 docker build . -f ./packages/cactus-plugin-ledger-connector-quorum/Dockerfile -t plugin-ledger-connector-quorum
1608+
- if: ${{ env.RUN_TRIVY_SCAN == 'true' }}
1609+
name: Run Trivy vulnerability scan for plugin-ledger-connector-quorum
1610+
uses: aquasecurity/trivy-action@0.19.0
1611+
with:
1612+
image-ref: 'plugin-ledger-connector-quorum'
1613+
format: 'table'
1614+
exit-code: '1'
1615+
ignore-unfixed: false
1616+
vuln-type: 'os,library'
1617+
severity: 'CRITICAL,HIGH'
16041618
cactus-plugin-ledger-connector-sawtooth:
16051619
continue-on-error: false
16061620
env:
@@ -1940,7 +1954,7 @@ jobs:
19401954
with:
19411955
node-version: ${{ env.NODEJS_VERSION }}
19421956
- uses: actions/checkout@v4.1.1
1943-
1957+
19441958
- id: yarn-cache
19451959
name: Restore Yarn Cache
19461960
uses: actions/cache@v4.0.1
@@ -2065,16 +2079,7 @@ jobs:
20652079
steps:
20662080
- uses: actions/checkout@v4.1.1
20672081
- name: ghcr.io/hyperledger/cactus-besu-all-in-one
2068-
run: DOCKER_BUILDKIT=1 docker build ./tools/docker/besu-all-in-one/ -f ./tools/docker/besu-all-in-one/Dockerfile -t cactus-besu-all-in-one
2069-
- name: Run Trivy vulnerability scan for cactus-besu-all-in-one
2070-
uses: aquasecurity/trivy-action@0.11.2
2071-
with:
2072-
image-ref: 'cactus-besu-all-in-one'
2073-
format: 'table'
2074-
exit-code: '1'
2075-
ignore-unfixed: true
2076-
vuln-type: 'os,library'
2077-
severity: 'CRITICAL,HIGH'
2082+
run: DOCKER_BUILDKIT=1 docker build ./tools/docker/besu-all-in-one/ -f ./tools/docker/besu-all-in-one/Dockerfile
20782083
ghcr-cmd-api-server:
20792084
runs-on: ubuntu-22.04
20802085
needs:
@@ -2084,13 +2089,14 @@ jobs:
20842089
- uses: actions/checkout@v4.1.1
20852090
- name: ghcr.io/hyperledger/cactus-cmd-api-server
20862091
run: DOCKER_BUILDKIT=1 docker build . -f ./packages/cactus-cmd-api-server/Dockerfile -t cactus-cmd-api-server
2087-
- name: Run Trivy vulnerability scan for cactus-cmd-api-server
2088-
uses: aquasecurity/trivy-action@0.11.2
2092+
- if: ${{ env.RUN_TRIVY_SCAN == 'true' }}
2093+
name: Run Trivy vulnerability scan for cactus-cmd-api-server
2094+
uses: aquasecurity/trivy-action@0.19.0
20892095
with:
20902096
image-ref: 'cactus-cmd-api-server'
20912097
format: 'table'
20922098
exit-code: '1'
2093-
ignore-unfixed: true
2099+
ignore-unfixed: false
20942100
vuln-type: 'os,library'
20952101
severity: 'CRITICAL,HIGH'
20962102
ghcr-connector-besu:
@@ -2102,13 +2108,14 @@ jobs:
21022108
- uses: actions/checkout@v4.1.1
21032109
- name: ghcr.io/hyperledger/cactus-connector-besu
21042110
run: DOCKER_BUILDKIT=1 docker build ./packages/cactus-plugin-ledger-connector-besu/ -f ./packages/cactus-plugin-ledger-connector-besu/Dockerfile -t cactus-connector-besu
2105-
- name: Run Trivy vulnerability scan for cactus-connector-besu
2106-
uses: aquasecurity/trivy-action@0.11.2
2111+
- if: ${{ env.RUN_TRIVY_SCAN == 'true' }}
2112+
name: Run Trivy vulnerability scan for cactus-connector-besu
2113+
uses: aquasecurity/trivy-action@0.19.0
21072114
with:
21082115
image-ref: 'cactus-connector-besu'
21092116
format: 'table'
21102117
exit-code: '1'
2111-
ignore-unfixed: true
2118+
ignore-unfixed: false
21122119
vuln-type: 'os,library'
21132120
severity: 'CRITICAL,HIGH'
21142121
ghcr-connector-corda-server:
@@ -2121,13 +2128,14 @@ jobs:
21212128
- uses: actions/checkout@v4.1.1
21222129
- name: ghcr.io/hyperledger/cactus-connector-corda-server
21232130
run: DOCKER_BUILDKIT=1 docker build ./packages/cactus-plugin-ledger-connector-corda/src/main-server/ -f ./packages/cactus-plugin-ledger-connector-corda/src/main-server/Dockerfile -t cactus-connector-corda-server
2124-
- name: Run Trivy vulnerability scan for cactus-connector-corda-server
2125-
uses: aquasecurity/trivy-action@0.11.2
2131+
- if: ${{ env.RUN_TRIVY_SCAN == 'true' }}
2132+
name: Run Trivy vulnerability scan for cactus-connector-corda-server
2133+
uses: aquasecurity/trivy-action@0.19.0
21262134
with:
21272135
image-ref: 'cactus-connector-corda-server'
21282136
format: 'table'
21292137
exit-code: '1'
2130-
ignore-unfixed: true
2138+
ignore-unfixed: false
21312139
vuln-type: 'os,library'
21322140
severity: 'CRITICAL,HIGH'
21332141
ghcr-connector-fabric:
@@ -2140,13 +2148,14 @@ jobs:
21402148
- uses: actions/checkout@v4.1.1
21412149
- name: ghcr.io/hyperledger/cactus-connector-fabric
21422150
run: DOCKER_BUILDKIT=1 docker build ./packages/cactus-plugin-ledger-connector-fabric/ -f ./packages/cactus-plugin-ledger-connector-fabric/Dockerfile -t cactus-connector-fabric
2143-
- name: Run Trivy vulnerability scan for cactus-connector-fabric
2144-
uses: aquasecurity/trivy-action@0.11.2
2151+
- if: ${{ env.RUN_TRIVY_SCAN == 'true' }}
2152+
name: Run Trivy vulnerability scan for cactus-connector-fabric
2153+
uses: aquasecurity/trivy-action@0.19.0
21452154
with:
21462155
image-ref: 'cactus-connector-fabric'
21472156
format: 'table'
21482157
exit-code: '1'
2149-
ignore-unfixed: true
2158+
ignore-unfixed: false
21502159
vuln-type: 'os,library'
21512160
severity: 'CRITICAL,HIGH'
21522161
ghcr-corda-all-in-one:
@@ -2157,16 +2166,8 @@ jobs:
21572166
steps:
21582167
- uses: actions/checkout@v4.1.1
21592168
- name: ghcr.io/hyperledger/cactus-corda-all-in-one
2160-
run: DOCKER_BUILDKIT=1 docker build ./tools/docker/corda-all-in-one/ -f ./tools/docker/corda-all-in-one/Dockerfile -t cactus-corda-all-in-one
2161-
- name: Run Trivy vulnerability scan for cactus-corda-all-in-one
2162-
uses: aquasecurity/trivy-action@0.11.2
2163-
with:
2164-
image-ref: 'cactus-corda-all-in-one'
2165-
format: 'table'
2166-
exit-code: '1'
2167-
ignore-unfixed: true
2168-
vuln-type: 'os,library'
2169-
severity: 'CRITICAL,HIGH'
2169+
run: DOCKER_BUILDKIT=1 docker build ./tools/docker/corda-all-in-one/ -f ./tools/docker/corda-all-in-one/Dockerfile
2170+
21702171
ghcr-corda-all-in-one-flowdb:
21712172
runs-on: ubuntu-22.04
21722173
steps:
@@ -2182,15 +2183,7 @@ jobs:
21822183
- uses: actions/checkout@v4.1.1
21832184
- name: ghcr.io/hyperledger/cactus-corda-all-in-one-obligation
21842185
run: DOCKER_BUILDKIT=1 docker build ./tools/docker/corda-all-in-one/ -f ./tools/docker/corda-all-in-one/corda-v4_8/Dockerfile -t cactus-corda-all-in-one-obligation
2185-
- name: Run Trivy vulnerability scan for cactus-corda-all-in-one-obligation
2186-
uses: aquasecurity/trivy-action@0.11.2
2187-
with:
2188-
image-ref: 'cactus-corda-all-in-one-obligation'
2189-
format: 'table'
2190-
exit-code: '1'
2191-
ignore-unfixed: true
2192-
vuln-type: 'os,library'
2193-
severity: 'CRITICAL,HIGH'
2186+
21942187
ghcr-dev-container-vscode:
21952188
runs-on: ubuntu-22.04
21962189
needs:
@@ -2213,106 +2206,59 @@ jobs:
22132206
steps:
22142207
- uses: actions/checkout@v4.1.1
22152208
- name: ghcr.io/hyperledger/cactus-example-carbon-accounting
2216-
run: DOCKER_BUILDKIT=1 docker build . -f ./examples/carbon-accounting/Dockerfile -t cactus-example-carbon-accounting
2217-
- name: Run Trivy vulnerability scan for cactus-example-carbon-accounting
2218-
uses: aquasecurity/trivy-action@0.11.2
2219-
with:
2220-
image-ref: 'cactus-example-carbon-accounting'
2221-
format: 'table'
2222-
exit-code: '1'
2223-
ignore-unfixed: true
2224-
vuln-type: 'os,library'
2225-
severity: 'CRITICAL,HIGH'
2209+
run: DOCKER_BUILDKIT=1 docker build . -f ./examples/carbon-accounting/Dockerfile
2210+
22262211
ghcr-example-supply-chain-app:
22272212
runs-on: ubuntu-22.04
22282213
steps:
22292214
- uses: actions/checkout@v4.1.1
22302215
- name: ghcr.io/hyperledger/cactus-example-supply-chain-app
22312216
run: DOCKER_BUILDKIT=1 docker build . -f ./examples/cactus-example-supply-chain-backend/Dockerfile -t cactus-example-supply-chain-app
2232-
- name: Run Trivy vulnerability scan for cactus-example-supply-chain-app
2233-
uses: aquasecurity/trivy-action@0.11.2
2234-
with:
2235-
image-ref: 'cactus-example-supply-chain-app'
2236-
format: 'table'
2237-
exit-code: '1'
2238-
ignore-unfixed: true
2239-
vuln-type: 'os,library'
2240-
severity: 'CRITICAL,HIGH'
2217+
22412218
ghcr-fabric-all-in-one:
22422219
runs-on: ubuntu-22.04
22432220
steps:
22442221
- uses: actions/checkout@v4.1.1
22452222
- name: ghcr.io/hyperledger/cactus-fabric-all-in-one
2246-
run: DOCKER_BUILDKIT=1 docker build ./tools/docker/fabric-all-in-one/ -f ./tools/docker/fabric-all-in-one/Dockerfile_v1.4.x -t cactus-fabric-all-in-one
2247-
- name: Run Trivy vulnerability scan for cactus-fabric-all-in-one
2248-
uses: aquasecurity/trivy-action@0.11.2
2249-
with:
2250-
image-ref: 'cactus-fabric-all-in-one'
2251-
format: 'table'
2252-
exit-code: '1'
2253-
ignore-unfixed: true
2254-
vuln-type: 'os,library'
2255-
severity: 'CRITICAL,HIGH'
2223+
run: DOCKER_BUILDKIT=1 docker build ./tools/docker/fabric-all-in-one/ -f ./tools/docker/fabric-all-in-one/Dockerfile_v1.4.x
2224+
22562225
ghcr-fabric2-all-in-one:
22572226
runs-on: ubuntu-22.04
22582227
steps:
22592228
- uses: actions/checkout@v4.1.1
22602229
- name: ghcr.io/hyperledger/cactus-fabric2-all-in-one
2261-
run: DOCKER_BUILDKIT=1 docker build ./tools/docker/fabric-all-in-one/ -f ./tools/docker/fabric-all-in-one/Dockerfile_v2.x -t cactus-fabric2-all-in-one
2262-
- name: Run Trivy vulnerability scan for cactus-fabric2-all-in-one
2263-
uses: aquasecurity/trivy-action@0.11.2
2264-
with:
2265-
image-ref: 'cactus-fabric2-all-in-one'
2266-
format: 'table'
2267-
exit-code: '1'
2268-
ignore-unfixed: true
2269-
vuln-type: 'os,library'
2270-
severity: 'CRITICAL,HIGH'
2230+
run: DOCKER_BUILDKIT=1 docker build ./tools/docker/fabric-all-in-one/ -f ./tools/docker/fabric-all-in-one/Dockerfile_v2.x
2231+
22712232
ghcr-keychain-vault-server:
22722233
runs-on: ubuntu-22.04
22732234
steps:
22742235
- uses: actions/checkout@v4.1.1
22752236
- name: ghcr.io/hyperledger/cactus-keychain-vault-server
22762237
run: DOCKER_BUILDKIT=1 docker build ./packages/cactus-plugin-keychain-vault/src/cactus-keychain-vault-server/ -f ./packages/cactus-plugin-keychain-vault/src/cactus-keychain-vault-server/Dockerfile -t cactus-keychain-vault-server
2277-
- name: Run Trivy vulnerability scan for cactus-keychain-vault-server
2278-
uses: aquasecurity/trivy-action@0.11.2
2238+
- if: ${{ env.RUN_TRIVY_SCAN == 'true' }}
2239+
name: Run Trivy vulnerability scan for cactus-keychain-vault-server
2240+
uses: aquasecurity/trivy-action@0.19.0
22792241
with:
22802242
image-ref: 'cactus-keychain-vault-server'
22812243
format: 'table'
22822244
exit-code: '1'
2283-
ignore-unfixed: true
2245+
ignore-unfixed: false
22842246
vuln-type: 'os,library'
22852247
severity: 'CRITICAL,HIGH'
22862248
ghcr-quorum-all-in-one:
22872249
runs-on: ubuntu-22.04
22882250
steps:
22892251
- uses: actions/checkout@v4.1.1
22902252
- name: ghcr.io/hyperledger/cactus-quorum-all-in-one
2291-
run: DOCKER_BUILDKIT=1 docker build ./tools/docker/quorum-all-in-one/ -f ./tools/docker/quorum-all-in-one/Dockerfile -t cactus-quorum-all-in-one
2292-
- name: Run Trivy vulnerability scan for cactus-quorum-all-in-one
2293-
uses: aquasecurity/trivy-action@0.11.2
2294-
with:
2295-
image-ref: 'cactus-quorum-all-in-one'
2296-
format: 'table'
2297-
exit-code: '1'
2298-
ignore-unfixed: true
2299-
vuln-type: 'os,library'
2300-
severity: 'CRITICAL,HIGH'
2253+
run: DOCKER_BUILDKIT=1 docker build ./tools/docker/quorum-all-in-one/ -f ./tools/docker/quorum-all-in-one/Dockerfile
2254+
23012255
ghcr-quorum-multi-party-all-in-one:
23022256
runs-on: ubuntu-22.04
23032257
steps:
23042258
- uses: actions/checkout@v4.1.1
23052259
- name: ghcr.io/hyperledger/cactus-quorum-multi-party-all-in-one
23062260
run: DOCKER_BUILDKIT=1 docker build ./tools/docker/quorum-multi-party-all-in-one/ -f ./tools/docker/quorum-multi-party-all-in-one/Dockerfile -t cactus-quorum-multi-party-all-in-one
2307-
- name: Run Trivy vulnerability scan for cactus-quorum-multi-party-all-in-one
2308-
uses: aquasecurity/trivy-action@0.11.2
2309-
with:
2310-
image-ref: 'cactus-quorum-multi-party-all-in-one'
2311-
format: 'table'
2312-
exit-code: '1'
2313-
ignore-unfixed: true
2314-
vuln-type: 'os,library'
2315-
severity: 'CRITICAL,HIGH'
2261+
23162262
name: Cactus_CI
23172263
'on':
23182264
pull_request:
@@ -2323,4 +2269,4 @@ name: Cactus_CI
23232269
push:
23242270
branches:
23252271
- main
2326-
- dev
2272+
- dev

0 commit comments

Comments
 (0)