feat: add cve summary in vulnerability tab #206
Workflow file for this run
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
on: | |
push: | |
branches: | |
- main | |
pull_request: | |
branches: | |
- main | |
release: | |
types: | |
- published | |
name: end-to-end-test | |
permissions: | |
contents: read | |
jobs: | |
build-and-test: | |
name: Test zui/zot integration | |
env: | |
CI: "" | |
REGISTRY_HOST: "localhost" | |
REGISTRY_PORT: "8080" | |
runs-on: ubuntu-latest | |
steps: | |
- name: Cleanup disk space | |
run: | | |
# To free up ~15 GB of disk space | |
sudo rm -rf /opt/ghc | |
sudo rm -rf /usr/local/share/boost | |
sudo rm -rf /usr/local/lib/android | |
sudo rm -rf /usr/share/dotnet | |
- name: Checkout zui repository | |
uses: actions/checkout@v3 | |
with: | |
fetch-depth: 2 | |
- name: Set up Node.js 16.x | |
uses: actions/setup-node@v3 | |
with: | |
node-version: 16.x | |
cache: 'npm' | |
- name: Build zui | |
run: | | |
cd $GITHUB_WORKSPACE | |
make install | |
make build | |
- name: Install container image tooling | |
run: | | |
cd $GITHUB_WORKSPACE | |
sudo apt-get update | |
sudo apt-get install libgpgme-dev libassuan-dev libbtrfs-dev libdevmapper-dev pkg-config rpm snapd jq | |
git clone https://github.com/containers/skopeo -b v1.9.0 $GITHUB_WORKSPACE/src/github.com/containers/skopeo | |
cd $GITHUB_WORKSPACE/src/github.com/containers/skopeo && make bin/skopeo | |
chmod +x bin/skopeo | |
sudo mv bin/skopeo /usr/local/bin/skopeo | |
which skopeo | |
skopeo -v | |
curl -L https://github.com/regclient/regclient/releases/download/v0.4.7/regctl-linux-amd64 -o regctl | |
chmod +x regctl | |
sudo mv regctl /usr/local/bin/regctl | |
which regctl | |
regctl version | |
curl -L https://github.com/sigstore/cosign/releases/download/v1.13.0/cosign-linux-amd64 -o cosign | |
chmod +x cosign | |
sudo mv cosign /usr/local/bin/cosign | |
which cosign | |
cosign version | |
pushd $(mktemp -d) | |
curl -L https://github.com/aquasecurity/trivy/releases/download/v0.38.3/trivy_0.38.3_Linux-64bit.tar.gz -o trivy.tar.gz | |
tar -xzvf trivy.tar.gz | |
sudo mv trivy /usr/local/bin/trivy | |
popd | |
which trivy | |
trivy version | |
cd $GITHUB_WORKSPACE | |
- name: Install go | |
uses: actions/setup-go@v3 | |
with: | |
go-version: 1.20.x | |
- name: Checkout zot repo | |
uses: actions/checkout@v3 | |
with: | |
fetch-depth: 2 | |
repository: project-zot/zot | |
ref: main | |
path: zot | |
- name: Build zot | |
run: | | |
cd $GITHUB_WORKSPACE/zot | |
make binary ZUI_BUILD_PATH=$GITHUB_WORKSPACE/build | |
ls -l bin/ | |
- name: Bringup zot server | |
run: | | |
cd $GITHUB_WORKSPACE/zot | |
mkdir /tmp/zot | |
./bin/zot-linux-amd64 serve examples/config-ui.json & | |
while true; do x=0; curl -f http://$REGISTRY_HOST:$REGISTRY_PORT/v2/ || x=1; if [ $x -eq 0 ]; then break; fi; sleep 1; done | |
- name: Load image test data from cache into a local folder | |
id: restore-cache | |
uses: actions/cache@v3 | |
with: | |
path: tests/data/images | |
key: image-config-${{ hashFiles('**/tests/data/config.yaml') }} | |
restore-keys: | | |
image-config- | |
- name: Load image test data into zot server | |
run: | | |
cd $GITHUB_WORKSPACE | |
regctl registry set --tls disabled $REGISTRY_HOST:$REGISTRY_PORT | |
make test-data REGISTRY_HOST=$REGISTRY_HOST REGISTRY_PORT=$REGISTRY_PORT | |
- name: Install playwright dependencies | |
run: | | |
cd $GITHUB_WORKSPACE | |
make playwright-browsers | |
- name: Trigger CVE scanning | |
run: | | |
# trigger CVE scanning for all images before running the tests | |
curl -X POST -H "Content-Type: application/json" -m 600 --data '{ "query": "{ ImageListForCVE (id:\"CVE-2021-43616\") { Results { RepoName Tag } } }" }' http://$REGISTRY_HOST:$REGISTRY_PORT/v2/_zot/ext/search | |
- name: Run integration tests | |
run: | | |
cd $GITHUB_WORKSPACE | |
make integration-tests REGISTRY_HOST=$REGISTRY_HOST REGISTRY_PORT=$REGISTRY_PORT | |
- name: Upload playwright report | |
uses: actions/upload-artifact@v3 | |
with: | |
name: playwright-report | |
path: playwright-report/ | |
retention-days: 30 |