mirror of
https://github.com/Mintplex-Labs/anything-llm.git
synced 2024-11-19 12:40:09 +01:00
add VEX attestations to builds
This commit is contained in:
parent
f30e80d109
commit
0984a0a14c
@ -17,7 +17,6 @@ on:
|
|||||||
- 'render.yaml'
|
- 'render.yaml'
|
||||||
- 'embed/**/*' # Embed should be published to frontend (yarn build:publish) if any changes are introduced
|
- 'embed/**/*' # Embed should be published to frontend (yarn build:publish) if any changes are introduced
|
||||||
- 'server/utils/agents/aibitat/example/**/*' # Do not push new image for local dev testing of new aibitat images.
|
- 'server/utils/agents/aibitat/example/**/*' # Do not push new image for local dev testing of new aibitat images.
|
||||||
- 'docker/vex/*' # CVE exceptions we know are not in risk
|
|
||||||
|
|
||||||
jobs:
|
jobs:
|
||||||
push_to_registries:
|
push_to_registries:
|
||||||
@ -79,3 +78,39 @@ jobs:
|
|||||||
cache-to: type=gha,mode=max
|
cache-to: type=gha,mode=max
|
||||||
build-args: |
|
build-args: |
|
||||||
"STORAGE_DIR=/storage"
|
"STORAGE_DIR=/storage"
|
||||||
|
|
||||||
|
# For Docker scout there are some intermediary reported CVEs which exists outside
|
||||||
|
# of execution content or are unreachable by an attacker but exist in image.
|
||||||
|
# We create VEX files for these so they don't show in scout summary.
|
||||||
|
- name: Collect known and verified CVE exceptions
|
||||||
|
id: cve-list
|
||||||
|
run: |
|
||||||
|
# Collect CVEs from filenames in vex folder
|
||||||
|
CVE_NAMES=""
|
||||||
|
for file in ./docker/vex/*.vex.json; do
|
||||||
|
[ -e "$file" ] || continue
|
||||||
|
filename=$(basename "$file")
|
||||||
|
stripped_filename=${filename%.vex.json}
|
||||||
|
CVE_NAMES+=" $stripped_filename"
|
||||||
|
done
|
||||||
|
echo "CVE_EXCEPTIONS=$CVE_NAMES" >> $GITHUB_OUTPUT
|
||||||
|
shell: bash
|
||||||
|
|
||||||
|
# About VEX attestations https://docs.docker.com/scout/explore/exceptions/
|
||||||
|
# Justifications https://github.com/openvex/spec/blob/main/OPENVEX-SPEC.md#status-justifications
|
||||||
|
- name: Add VEX attestations
|
||||||
|
env:
|
||||||
|
CVE_EXCEPTIONS: ${{ steps.cve-list.outputs.CVE_EXCEPTIONS }}
|
||||||
|
run: |
|
||||||
|
echo $CVE_EXCEPTIONS
|
||||||
|
curl -sSfL https://raw.githubusercontent.com/docker/scout-cli/main/install.sh | sh -s --
|
||||||
|
for cve in $CVE_EXCEPTIONS; do
|
||||||
|
for tag in "${{ join(fromJSON(steps.meta.outputs.json).tags, ' ') }}"; do
|
||||||
|
echo "Attaching VEX exception $cve to $tag"
|
||||||
|
docker scout attestation add \
|
||||||
|
--file "./docker/vex/$cve.vex.json" \
|
||||||
|
--predicate-type https://openvex.dev/ns/v0.2.0 \
|
||||||
|
$tag
|
||||||
|
done
|
||||||
|
done
|
||||||
|
shell: bash
|
||||||
|
Loading…
Reference in New Issue
Block a user