-
Notifications
You must be signed in to change notification settings - Fork 308
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
DAOS-16846 test: Add in GCP client and server images and GHA testing #15558
base: master
Are you sure you want to change the base?
Conversation
Run-GHA: true Required-githooks: true Signed-off-by: Margaret Lawson <[email protected]>
dequoted_message: ${{ steps.get-commit-message.outputs.text }} | ||
steps: | ||
- name: Checkout code | ||
uses: actions/checkout@v4 |
Check warning
Code scanning / Scorecard
Pinned-Dependencies Medium
Click Remediation section below to solve this issue
.github/workflows/gcp-builds.yml
Outdated
echo "DISTRO_VERSION=$DISTRO_VERSION" >> $GITHUB_ENV | ||
echo "STAGE_NAME=Build RPM on $DISTRO_NAME $DISTRO_VERSION" >> $GITHUB_ENV | ||
- name: Checkout code | ||
uses: actions/checkout@v4 |
Check warning
Code scanning / Scorecard
Pinned-Dependencies Medium
Click Remediation section below to solve this issue
--build-arg RAFT_HASH={RAFT_HASH} | ||
--build-arg PMDK_HASH=${PMDK_HASH} | ||
- name: Update commit status | ||
uses: ouzi-dev/commit-status-updater@v2 |
Check warning
Code scanning / Scorecard
Pinned-Dependencies Medium
Click Remediation section below to solve this issue
.github/workflows/gcp-builds.yml
Outdated
echo "DAOS_DOCKER_IMAGE=$DAOS_DOCKER_IMAGE" >> $GITHUB_ENV | ||
echo "STAGE_NAME=Build Server Images" >> $GITHUB_ENV | ||
- name: Checkout code | ||
uses: actions/checkout@v4 |
Check warning
Code scanning / Scorecard
Pinned-Dependencies Medium
Click Remediation section below to solve this issue
--build-arg DAOS_BUILD_TYPE="release" | ||
--build-arg GHA="true" | ||
- name: Update commit status | ||
uses: ouzi-dev/commit-status-updater@v2 |
Check warning
Code scanning / Scorecard
Pinned-Dependencies Medium
Click Remediation section below to solve this issue
RUN virtualenv venv && \ | ||
source venv/bin/activate && \ | ||
pip install --upgrade pip && \ | ||
{ [[ -f requirements-build.txt ]] && pip install -r requirements-build.txt || pip install -r requirements.txt; } && \ | ||
echo "Building fuse" && \ | ||
scons --jobs="$(nproc --all)" --build-deps=only \ | ||
USE_INSTALLED=spdk,pmdk,ucx,mercury,ofi,argobots,isal,isal_crypto && \ | ||
cp install/prereq/release/fuse/lib64/libfuse3.a /usr/lib64 && \ | ||
cp -r install/prereq/release/fuse/include/* /usr/include && \ | ||
echo "Building daos RPM" && \ | ||
scons --jobs="$(nproc --all)" --build-deps=yes rpms BUILD_TYPE="$DAOS_BUILD_TYPE" \ | ||
TARGET_TYPE="release" |
Check warning
Code scanning / Scorecard
Pinned-Dependencies Medium
Click Remediation section below to solve this issue
@@ -0,0 +1,26 @@ | |||
ARG BASE=rockylinux/rockylinux:8 | |||
FROM $BASE |
Check warning
Code scanning / Scorecard
Pinned-Dependencies Medium
Click Remediation section below to solve this issue
@@ -0,0 +1,13 @@ | |||
ARG BASE=rockylinux/rockylinux:8 | |||
FROM $BASE |
Check warning
Code scanning / Scorecard
Pinned-Dependencies Medium
Click Remediation section below to solve this issue
ARG BUILD_BASE=rockylinux/rockylinux:8 | ||
ARG BASE=rockylinux/rockylinux:8 | ||
|
||
FROM $BUILD_BASE as builder |
Check warning
Code scanning / Scorecard
Pinned-Dependencies Medium
Click Remediation section below to solve this issue
fi | ||
|
||
# Start a new image from the base image. | ||
FROM $BASE |
Check warning
Code scanning / Scorecard
Pinned-Dependencies Medium
Click Remediation section below to solve this issue
--hash=sha256:2857e29ff0d34db842cd7ca3230549d1a697f96ee6d3fb071cfa6c7393832597 \ | ||
--hash=sha256:6881edbebdb17b39b4eaaa821b438bf6eddffb4468cf344f09f89def34a8b1df | ||
# via requests | ||
cryptography==40.0.2 \ |
Check failure
Code scanning / Trivy
python-cryptography: SSH certificate encoding/parsing incompatibility with OpenSSH High
Installed Version: 40.0.2
Vulnerability CVE-2023-38325
Severity: HIGH
Fixed Version: 41.0.2
Link: CVE-2023-38325
--hash=sha256:2857e29ff0d34db842cd7ca3230549d1a697f96ee6d3fb071cfa6c7393832597 \ | ||
--hash=sha256:6881edbebdb17b39b4eaaa821b438bf6eddffb4468cf344f09f89def34a8b1df | ||
# via requests | ||
cryptography==40.0.2 \ |
Check failure
Code scanning / Trivy
python-cryptography: Bleichenbacher timing oracle attack against RSA decryption - incomplete fix for CVE-2020-25659 High
Installed Version: 40.0.2
Vulnerability CVE-2023-50782
Severity: HIGH
Fixed Version: 42.0.0
Link: CVE-2023-50782
--hash=sha256:2857e29ff0d34db842cd7ca3230549d1a697f96ee6d3fb071cfa6c7393832597 \ | ||
--hash=sha256:6881edbebdb17b39b4eaaa821b438bf6eddffb4468cf344f09f89def34a8b1df | ||
# via requests | ||
cryptography==40.0.2 \ |
Check failure
Code scanning / Trivy
python-cryptography: NULL pointer dereference with pkcs12.serialize_key_and_certificates when called with a non-matching certificate and private key and an hmac_hash override High
Installed Version: 40.0.2
Vulnerability CVE-2024-26130
Severity: HIGH
Fixed Version: 42.0.4
Link: CVE-2024-26130
--hash=sha256:2857e29ff0d34db842cd7ca3230549d1a697f96ee6d3fb071cfa6c7393832597 \ | ||
--hash=sha256:6881edbebdb17b39b4eaaa821b438bf6eddffb4468cf344f09f89def34a8b1df | ||
# via requests | ||
cryptography==40.0.2 \ |
Check warning
Code scanning / Trivy
python-cryptography: NULL-dereference when loading PKCS7 certificates Medium
Installed Version: 40.0.2
Vulnerability CVE-2023-49083
Severity: MEDIUM
Fixed Version: 41.0.6
Link: CVE-2023-49083
--hash=sha256:2857e29ff0d34db842cd7ca3230549d1a697f96ee6d3fb071cfa6c7393832597 \ | ||
--hash=sha256:6881edbebdb17b39b4eaaa821b438bf6eddffb4468cf344f09f89def34a8b1df | ||
# via requests | ||
cryptography==40.0.2 \ |
Check warning
Code scanning / Trivy
openssl: denial of service via null dereference Medium
Installed Version: 40.0.2
Vulnerability CVE-2024-0727
Severity: MEDIUM
Fixed Version: 42.0.2
Link: CVE-2024-0727
--hash=sha256:fd1592b3fdf65fff2ad0004b5e363300ef59ced41c2e6b3a99d4089fa8c5435d \ | ||
--hash=sha256:fd66fc5d0da6d9815ba2cebeb4205f95818ff4b79c3ebe268e75d961704af52f | ||
# via -r requirements.in | ||
requests==2.27.1 \ |
Check warning
Code scanning / Trivy
python-requests: Unintended leak of Proxy-Authorization header Medium
Installed Version: 2.27.1
Vulnerability CVE-2023-32681
Severity: MEDIUM
Fixed Version: 2.31.0
Link: CVE-2023-32681
--hash=sha256:fd1592b3fdf65fff2ad0004b5e363300ef59ced41c2e6b3a99d4089fa8c5435d \ | ||
--hash=sha256:fd66fc5d0da6d9815ba2cebeb4205f95818ff4b79c3ebe268e75d961704af52f | ||
# via -r requirements.in | ||
requests==2.27.1 \ |
Check warning
Code scanning / Trivy
requests: subsequent requests to the same host ignore cert verification Medium
Installed Version: 2.27.1
Vulnerability CVE-2024-35195
Severity: MEDIUM
Fixed Version: 2.32.0
Link: CVE-2024-35195
# via | ||
# importlib-metadata | ||
# jira | ||
urllib3==1.26.18 \ |
Check warning
Code scanning / Trivy
urllib3: proxy-authorization request header is not stripped during cross-origin redirects Medium
Installed Version: 1.26.18
Vulnerability CVE-2024-37891
Severity: MEDIUM
Fixed Version: 1.26.19, 2.2.2
Link: CVE-2024-37891
--hash=sha256:34b97092d7e0a3a8cf7cd10e386f401b3737364026c45e622aa02903dffe0f07 \ | ||
--hash=sha256:f8ecc1bba5667413457c529ab955bf8c67b45db799d159066261719e328580a0 | ||
# via requests | ||
wheel==0.37.1 \ |
Check failure
Code scanning / Trivy
python-wheel: remote attackers can cause denial of service via attacker controlled input to wheel cli High
Installed Version: 0.37.1
Vulnerability CVE-2022-40898
Severity: HIGH
Fixed Version: 0.38.1
Link: CVE-2022-40898
--hash=sha256:4bdcd7d840138086126cd09254dc6195fb4fc6f01c050a1d7236f2630db1d22a \ | ||
--hash=sha256:e9a504e793efbca1b8e0e9cb979a249cf4a0a7b5b8c9e8b65a5e39d49529c1c4 | ||
# via -r requirements.in | ||
zipp==3.6.0 \ |
Check warning
Code scanning / Trivy
github.com/jaraco/zipp: Denial of Service (infinite loop) via crafted zip file in jaraco/zipp Medium
Installed Version: 3.6.0
Vulnerability CVE-2024-5569
Severity: MEDIUM
Fixed Version: 3.19.1
Link: CVE-2024-5569
Ticket title is 'Add GHA testing for GCP' |
032e89f
to
7764ff9
Compare
Run-GHA: true Required-githooks: true Signed-off-by: Margaret Lawson <[email protected]>
7764ff9
to
3cd28c7
Compare
Run-GHA: true
Required-githooks: true
Before requesting gatekeeper:
Features:
(orTest-tag*
) commit pragma was used or there is a reason documented that there are no appropriate tags for this PR.Gatekeeper: