11---
22env :
33 NODEJS_VERSION : v18.18.2
4+ RUN_TRIVY_SCAN : true
45jobs :
56 ActionLint :
67 uses : ./.github/workflows/actionlint.yaml
@@ -1516,6 +1517,46 @@ jobs:
15161517 restore-keys : |
15171518 ${{ runner.os }}-yarn-${{ hashFiles('./yarn.lock') }}
15181519 - run : ./tools/ci.sh
1520+ cactus-plugin-ledger-connector-iroha :
1521+ continue-on-error : false
1522+ env :
1523+ FULL_BUILD_DISABLED : true
1524+ JEST_TEST_PATTERN : packages/cactus-plugin-ledger-connector-iroha/src/test/typescript/(unit|integration|benchmark)/.*/*.test.ts
1525+ JEST_TEST_RUNNER_DISABLED : false
1526+ TAPE_TEST_PATTERN : >-
1527+ --files={./packages/cactus-plugin-ledger-connector-iroha/src/test/typescript/integration/iroha-iroha-transfer-example.test.ts,./packages/cactus-plugin-ledger-connector-iroha/src/test/typescript/integration/openapi/openapi-validation.test.ts,./packages/cactus-plugin-ledger-connector-iroha/src/test/typescript/integration/run-transaction-endpoint-v1.test.ts,./packages/cactus-plugin-ledger-connector-iroha/src/test/typescript/unit/iroha-test-ledger-parameters.test.ts,./packages/cactus-plugin-ledger-connector-iroha/src/test/typescript/unit/postgres-test-container-parameters.test.ts}
1528+ TAPE_TEST_RUNNER_DISABLED : false
1529+ needs : build-dev
1530+ runs-on : ubuntu-22.04
1531+ steps :
1532+ - name : Use Node.js ${{ env.NODEJS_VERSION }}
1533+ uses : actions/setup-node@v4.0.2
1534+ with :
1535+ node-version : ${{ env.NODEJS_VERSION }}
1536+ - uses : actions/checkout@v4.1.1
1537+
1538+ - id : yarn-cache
1539+ name : Restore Yarn Cache
1540+ uses : actions/cache@v4.0.1
1541+ with :
1542+ key : ${{ runner.os }}-yarn-${{ hashFiles('./yarn.lock') }}
1543+ path : ./.yarn/
1544+ restore-keys : |
1545+ ${{ runner.os }}-yarn-${{ hashFiles('./yarn.lock') }}
1546+ - run : ./tools/ci.sh
1547+
1548+ - name : Build an image from Dockerfile
1549+ run : DOCKER_BUILDKIT=1 docker build . -f ./packages/cactus-plugin-ledger-connector-iroha/Dockerfile -t plugin-ledger-connector-iroha
1550+ - if : ${{ env.RUN_TRIVY_SCAN == 'true' }}
1551+ name : Run Trivy vulnerability scan for plugin-ledger-connector-iroha
1552+ uses : aquasecurity/trivy-action@0.19.0
1553+ with :
1554+ image-ref : ' plugin-ledger-connector-iroha'
1555+ format : ' table'
1556+ exit-code : ' 1'
1557+ ignore-unfixed : false
1558+ vuln-type : ' os,library'
1559+ severity : ' CRITICAL,HIGH'
15191560 cactus-plugin-ledger-connector-iroha2 :
15201561 continue-on-error : false
15211562 needs :
@@ -1591,7 +1632,7 @@ jobs:
15911632 with :
15921633 node-version : ${{ env.NODEJS_VERSION }}
15931634 - uses : actions/checkout@v4.1.1
1594-
1635+
15951636 - id : yarn-cache
15961637 name : Restore Yarn Cache
15971638 uses : actions/cache@v4.0.1
@@ -1601,6 +1642,19 @@ jobs:
16011642 restore-keys : |
16021643 ${{ runner.os }}-yarn-${{ hashFiles('./yarn.lock') }}
16031644 - run : ./tools/ci.sh
1645+
1646+ - name : Build an image from Dockerfile
1647+ run : DOCKER_BUILDKIT=1 docker build . -f ./packages/cactus-plugin-ledger-connector-quorum/Dockerfile -t plugin-ledger-connector-quorum
1648+ - if : ${{ env.RUN_TRIVY_SCAN == 'true' }}
1649+ name : Run Trivy vulnerability scan for plugin-ledger-connector-quorum
1650+ uses : aquasecurity/trivy-action@0.19.0
1651+ with :
1652+ image-ref : ' plugin-ledger-connector-quorum'
1653+ format : ' table'
1654+ exit-code : ' 1'
1655+ ignore-unfixed : false
1656+ vuln-type : ' os,library'
1657+ severity : ' CRITICAL,HIGH'
16041658 cactus-plugin-ledger-connector-sawtooth :
16051659 continue-on-error : false
16061660 env :
@@ -1943,7 +1997,7 @@ jobs:
19431997 with :
19441998 node-version : ${{ env.NODEJS_VERSION }}
19451999 - uses : actions/checkout@v4.1.1
1946-
2000+
19472001 - id : yarn-cache
19482002 name : Restore Yarn Cache
19492003 uses : actions/cache@v4.0.1
@@ -2068,16 +2122,7 @@ jobs:
20682122 steps :
20692123 - uses : actions/checkout@v4.1.1
20702124 - name : ghcr.io/hyperledger/cactus-besu-all-in-one
2071- run : DOCKER_BUILDKIT=1 docker build ./tools/docker/besu-all-in-one/ -f ./tools/docker/besu-all-in-one/Dockerfile -t cactus-besu-all-in-one
2072- - name : Run Trivy vulnerability scan for cactus-besu-all-in-one
2073- uses : aquasecurity/trivy-action@0.11.2
2074- with :
2075- image-ref : ' cactus-besu-all-in-one'
2076- format : ' table'
2077- exit-code : ' 1'
2078- ignore-unfixed : true
2079- vuln-type : ' os,library'
2080- severity : ' CRITICAL,HIGH'
2125+ run : DOCKER_BUILDKIT=1 docker build ./tools/docker/besu-all-in-one/ -f ./tools/docker/besu-all-in-one/Dockerfile
20812126 ghcr-cmd-api-server :
20822127 runs-on : ubuntu-22.04
20832128 needs :
@@ -2087,13 +2132,14 @@ jobs:
20872132 - uses : actions/checkout@v4.1.1
20882133 - name : ghcr.io/hyperledger/cactus-cmd-api-server
20892134 run : DOCKER_BUILDKIT=1 docker build . -f ./packages/cactus-cmd-api-server/Dockerfile -t cactus-cmd-api-server
2090- - name : Run Trivy vulnerability scan for cactus-cmd-api-server
2091- uses : aquasecurity/trivy-action@0.11.2
2135+ - if : ${{ env.RUN_TRIVY_SCAN == 'true' }}
2136+ name : Run Trivy vulnerability scan for cactus-cmd-api-server
2137+ uses : aquasecurity/trivy-action@0.19.0
20922138 with :
20932139 image-ref : ' cactus-cmd-api-server'
20942140 format : ' table'
20952141 exit-code : ' 1'
2096- ignore-unfixed : true
2142+ ignore-unfixed : false
20972143 vuln-type : ' os,library'
20982144 severity : ' CRITICAL,HIGH'
20992145 ghcr-connector-besu :
@@ -2105,13 +2151,14 @@ jobs:
21052151 - uses : actions/checkout@v4.1.1
21062152 - name : ghcr.io/hyperledger/cactus-connector-besu
21072153 run : DOCKER_BUILDKIT=1 docker build ./packages/cactus-plugin-ledger-connector-besu/ -f ./packages/cactus-plugin-ledger-connector-besu/Dockerfile -t cactus-connector-besu
2108- - name : Run Trivy vulnerability scan for cactus-connector-besu
2109- uses : aquasecurity/trivy-action@0.11.2
2154+ - if : ${{ env.RUN_TRIVY_SCAN == 'true' }}
2155+ name : Run Trivy vulnerability scan for cactus-connector-besu
2156+ uses : aquasecurity/trivy-action@0.19.0
21102157 with :
21112158 image-ref : ' cactus-connector-besu'
21122159 format : ' table'
21132160 exit-code : ' 1'
2114- ignore-unfixed : true
2161+ ignore-unfixed : false
21152162 vuln-type : ' os,library'
21162163 severity : ' CRITICAL,HIGH'
21172164 ghcr-connector-corda-server :
@@ -2124,13 +2171,14 @@ jobs:
21242171 - uses : actions/checkout@v4.1.1
21252172 - name : ghcr.io/hyperledger/cactus-connector-corda-server
21262173 run : DOCKER_BUILDKIT=1 docker build ./packages/cactus-plugin-ledger-connector-corda/src/main-server/ -f ./packages/cactus-plugin-ledger-connector-corda/src/main-server/Dockerfile -t cactus-connector-corda-server
2127- - name : Run Trivy vulnerability scan for cactus-connector-corda-server
2128- uses : aquasecurity/trivy-action@0.11.2
2174+ - if : ${{ env.RUN_TRIVY_SCAN == 'true' }}
2175+ name : Run Trivy vulnerability scan for cactus-connector-corda-server
2176+ uses : aquasecurity/trivy-action@0.19.0
21292177 with :
21302178 image-ref : ' cactus-connector-corda-server'
21312179 format : ' table'
21322180 exit-code : ' 1'
2133- ignore-unfixed : true
2181+ ignore-unfixed : false
21342182 vuln-type : ' os,library'
21352183 severity : ' CRITICAL,HIGH'
21362184 ghcr-connector-fabric :
@@ -2143,13 +2191,14 @@ jobs:
21432191 - uses : actions/checkout@v4.1.1
21442192 - name : ghcr.io/hyperledger/cactus-connector-fabric
21452193 run : DOCKER_BUILDKIT=1 docker build ./packages/cactus-plugin-ledger-connector-fabric/ -f ./packages/cactus-plugin-ledger-connector-fabric/Dockerfile -t cactus-connector-fabric
2146- - name : Run Trivy vulnerability scan for cactus-connector-fabric
2147- uses : aquasecurity/trivy-action@0.11.2
2194+ - if : ${{ env.RUN_TRIVY_SCAN == 'true' }}
2195+ name : Run Trivy vulnerability scan for cactus-connector-fabric
2196+ uses : aquasecurity/trivy-action@0.19.0
21482197 with :
21492198 image-ref : ' cactus-connector-fabric'
21502199 format : ' table'
21512200 exit-code : ' 1'
2152- ignore-unfixed : true
2201+ ignore-unfixed : false
21532202 vuln-type : ' os,library'
21542203 severity : ' CRITICAL,HIGH'
21552204 ghcr-corda-all-in-one :
@@ -2160,16 +2209,8 @@ jobs:
21602209 steps :
21612210 - uses : actions/checkout@v4.1.1
21622211 - name : ghcr.io/hyperledger/cactus-corda-all-in-one
2163- run : DOCKER_BUILDKIT=1 docker build ./tools/docker/corda-all-in-one/ -f ./tools/docker/corda-all-in-one/Dockerfile -t cactus-corda-all-in-one
2164- - name : Run Trivy vulnerability scan for cactus-corda-all-in-one
2165- uses : aquasecurity/trivy-action@0.11.2
2166- with :
2167- image-ref : ' cactus-corda-all-in-one'
2168- format : ' table'
2169- exit-code : ' 1'
2170- ignore-unfixed : true
2171- vuln-type : ' os,library'
2172- severity : ' CRITICAL,HIGH'
2212+ run : DOCKER_BUILDKIT=1 docker build ./tools/docker/corda-all-in-one/ -f ./tools/docker/corda-all-in-one/Dockerfile
2213+
21732214 ghcr-corda-all-in-one-flowdb :
21742215 runs-on : ubuntu-22.04
21752216 steps :
@@ -2185,15 +2226,7 @@ jobs:
21852226 - uses : actions/checkout@v4.1.1
21862227 - name : ghcr.io/hyperledger/cactus-corda-all-in-one-obligation
21872228 run : DOCKER_BUILDKIT=1 docker build ./tools/docker/corda-all-in-one/ -f ./tools/docker/corda-all-in-one/corda-v4_8/Dockerfile -t cactus-corda-all-in-one-obligation
2188- - name : Run Trivy vulnerability scan for cactus-corda-all-in-one-obligation
2189- uses : aquasecurity/trivy-action@0.11.2
2190- with :
2191- image-ref : ' cactus-corda-all-in-one-obligation'
2192- format : ' table'
2193- exit-code : ' 1'
2194- ignore-unfixed : true
2195- vuln-type : ' os,library'
2196- severity : ' CRITICAL,HIGH'
2229+
21972230 ghcr-dev-container-vscode :
21982231 runs-on : ubuntu-22.04
21992232 needs :
@@ -2216,106 +2249,66 @@ jobs:
22162249 steps :
22172250 - uses : actions/checkout@v4.1.1
22182251 - name : ghcr.io/hyperledger/cactus-example-carbon-accounting
2219- run : DOCKER_BUILDKIT=1 docker build . -f ./examples/carbon-accounting/Dockerfile -t cactus-example-carbon-accounting
2220- - name : Run Trivy vulnerability scan for cactus-example-carbon-accounting
2221- uses : aquasecurity/trivy-action@0.11.2
2222- with :
2223- image-ref : ' cactus-example-carbon-accounting'
2224- format : ' table'
2225- exit-code : ' 1'
2226- ignore-unfixed : true
2227- vuln-type : ' os,library'
2228- severity : ' CRITICAL,HIGH'
2252+ run : DOCKER_BUILDKIT=1 docker build . -f ./examples/carbon-accounting/Dockerfile
2253+
22292254 ghcr-example-supply-chain-app :
22302255 runs-on : ubuntu-22.04
22312256 steps :
22322257 - uses : actions/checkout@v4.1.1
22332258 - name : ghcr.io/hyperledger/cactus-example-supply-chain-app
22342259 run : DOCKER_BUILDKIT=1 docker build . -f ./examples/cactus-example-supply-chain-backend/Dockerfile -t cactus-example-supply-chain-app
2235- - name : Run Trivy vulnerability scan for cactus-example-supply-chain-app
2236- uses : aquasecurity/trivy-action@0.11.2
2237- with :
2238- image-ref : ' cactus-example-supply-chain-app'
2239- format : ' table'
2240- exit-code : ' 1'
2241- ignore-unfixed : true
2242- vuln-type : ' os,library'
2243- severity : ' CRITICAL,HIGH'
2260+
22442261 ghcr-fabric-all-in-one :
22452262 runs-on : ubuntu-22.04
22462263 steps :
22472264 - uses : actions/checkout@v4.1.1
22482265 - name : ghcr.io/hyperledger/cactus-fabric-all-in-one
2249- run : DOCKER_BUILDKIT=1 docker build ./tools/docker/fabric-all-in-one/ -f ./tools/docker/fabric-all-in-one/Dockerfile_v1.4.x -t cactus-fabric-all-in-one
2250- - name : Run Trivy vulnerability scan for cactus-fabric-all-in-one
2251- uses : aquasecurity/trivy-action@0.11.2
2252- with :
2253- image-ref : ' cactus-fabric-all-in-one'
2254- format : ' table'
2255- exit-code : ' 1'
2256- ignore-unfixed : true
2257- vuln-type : ' os,library'
2258- severity : ' CRITICAL,HIGH'
2266+ run : DOCKER_BUILDKIT=1 docker build ./tools/docker/fabric-all-in-one/ -f ./tools/docker/fabric-all-in-one/Dockerfile_v1.4.x
2267+
22592268 ghcr-fabric2-all-in-one :
22602269 runs-on : ubuntu-22.04
22612270 steps :
22622271 - uses : actions/checkout@v4.1.1
22632272 - name : ghcr.io/hyperledger/cactus-fabric2-all-in-one
2264- run : DOCKER_BUILDKIT=1 docker build ./tools/docker/fabric-all-in-one/ -f ./tools/docker/fabric-all-in-one/Dockerfile_v2.x -t cactus-fabric2-all-in-one
2265- - name : Run Trivy vulnerability scan for cactus-fabric2-all-in-one
2266- uses : aquasecurity/trivy-action@0.11.2
2267- with :
2268- image-ref : ' cactus-fabric2-all-in-one'
2269- format : ' table'
2270- exit-code : ' 1'
2271- ignore-unfixed : true
2272- vuln-type : ' os,library'
2273- severity : ' CRITICAL,HIGH'
2273+ run : DOCKER_BUILDKIT=1 docker build ./tools/docker/fabric-all-in-one/ -f ./tools/docker/fabric-all-in-one/Dockerfile_v2.x
2274+
2275+ ghcr-iroha-all-in-one :
2276+ runs-on : ubuntu-22.04
2277+ steps :
2278+ - uses : actions/checkout@v4.1.1
2279+ - name : ghcr.io/hyperledger/cactus-iroha-all-in-one
2280+ run : DOCKER_BUILDKIT=1 docker build ./tools/docker/iroha-all-in-one/ -f ./tools/docker/iroha-all-in-one/Dockerfile
2281+
22742282 ghcr-keychain-vault-server :
22752283 runs-on : ubuntu-22.04
22762284 steps :
22772285 - uses : actions/checkout@v4.1.1
22782286 - name : ghcr.io/hyperledger/cactus-keychain-vault-server
22792287 run : DOCKER_BUILDKIT=1 docker build ./packages/cactus-plugin-keychain-vault/src/cactus-keychain-vault-server/ -f ./packages/cactus-plugin-keychain-vault/src/cactus-keychain-vault-server/Dockerfile -t cactus-keychain-vault-server
2280- - name : Run Trivy vulnerability scan for cactus-keychain-vault-server
2281- uses : aquasecurity/trivy-action@0.11.2
2288+ - if : ${{ env.RUN_TRIVY_SCAN == 'true' }}
2289+ name : Run Trivy vulnerability scan for cactus-keychain-vault-server
2290+ uses : aquasecurity/trivy-action@0.19.0
22822291 with :
22832292 image-ref : ' cactus-keychain-vault-server'
22842293 format : ' table'
22852294 exit-code : ' 1'
2286- ignore-unfixed : true
2295+ ignore-unfixed : false
22872296 vuln-type : ' os,library'
22882297 severity : ' CRITICAL,HIGH'
22892298 ghcr-quorum-all-in-one :
22902299 runs-on : ubuntu-22.04
22912300 steps :
22922301 - uses : actions/checkout@v4.1.1
22932302 - name : ghcr.io/hyperledger/cactus-quorum-all-in-one
2294- run : DOCKER_BUILDKIT=1 docker build ./tools/docker/quorum-all-in-one/ -f ./tools/docker/quorum-all-in-one/Dockerfile -t cactus-quorum-all-in-one
2295- - name : Run Trivy vulnerability scan for cactus-quorum-all-in-one
2296- uses : aquasecurity/trivy-action@0.11.2
2297- with :
2298- image-ref : ' cactus-quorum-all-in-one'
2299- format : ' table'
2300- exit-code : ' 1'
2301- ignore-unfixed : true
2302- vuln-type : ' os,library'
2303- severity : ' CRITICAL,HIGH'
2303+ run : DOCKER_BUILDKIT=1 docker build ./tools/docker/quorum-all-in-one/ -f ./tools/docker/quorum-all-in-one/Dockerfile
2304+
23042305 ghcr-quorum-multi-party-all-in-one :
23052306 runs-on : ubuntu-22.04
23062307 steps :
23072308 - uses : actions/checkout@v4.1.1
23082309 - name : ghcr.io/hyperledger/cactus-quorum-multi-party-all-in-one
23092310 run : DOCKER_BUILDKIT=1 docker build ./tools/docker/quorum-multi-party-all-in-one/ -f ./tools/docker/quorum-multi-party-all-in-one/Dockerfile -t cactus-quorum-multi-party-all-in-one
2310- - name : Run Trivy vulnerability scan for cactus-quorum-multi-party-all-in-one
2311- uses : aquasecurity/trivy-action@0.11.2
2312- with :
2313- image-ref : ' cactus-quorum-multi-party-all-in-one'
2314- format : ' table'
2315- exit-code : ' 1'
2316- ignore-unfixed : true
2317- vuln-type : ' os,library'
2318- severity : ' CRITICAL,HIGH'
2311+
23192312name : Cactus_CI
23202313' on ' :
23212314 pull_request :
@@ -2326,4 +2319,4 @@ name: Cactus_CI
23262319 push :
23272320 branches :
23282321 - main
2329- - dev
2322+ - dev
0 commit comments