Skip to content

chore: Add Docker Buildx setup and Trivy vulnerability scanning to CI… #6

chore: Add Docker Buildx setup and Trivy vulnerability scanning to CI…

chore: Add Docker Buildx setup and Trivy vulnerability scanning to CI… #6

Workflow file for this run

name: Build and Test
on:
push:
branches:
- 'main'
- 'dev'
permissions:
contents: read
packages: write
security-events: write # Required if you want to upload scan results to GitHub Security tab
jobs:
build-test:
name: Build, Test & Push Image
runs-on: ubuntu-latest
steps:
- name: Checkout code
uses: actions/checkout@v4
- name: Set up Python
uses: actions/setup-python@v5
with:
python-version: '3.10'
cache: 'pip'
- name: Install dependencies
run: |
python -m pip install --upgrade pip
if [ -f requirements.txt ]; then pip install -r requirements.txt; fi
pip install flake8 pytest
- name: Lint with flake8
run: |
flake8 . --count --select=E9,F63,F7,F82 --show-source --statistics
flake8 . --count --exit-zero --max-complexity=10 --max-line-length=127 --statistics
- name: Test with pytest
run: |
pytest
- name: SonarQube Scan
uses: SonarSource/sonarqube-scan-action@v4
env:
SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }}
GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }}
- name: Extract branch name
id: branch
run: |
BRANCH_NAME=${GITHUB_REF#refs/heads/}
echo "name=${BRANCH_NAME}" >> $GITHUB_OUTPUT
# --- NEW STEP: Required for advanced Docker caching and building ---
- name: Set up Docker Buildx
uses: docker/setup-buildx-action@v3
- name: Docker meta
id: meta
uses: docker/metadata-action@v5
with:
images: ghcr.io/${{ github.repository_owner }}/ai_service
tags: |
type=raw,value=${{ steps.branch.outputs.name }}-{{sha}},enable=true
type=raw,value=latest,enable={{is_default_branch}}
# --- NEW STEP: Build locally for scanning (Don't push yet) ---
- name: Build and export to Docker
uses: docker/build-push-action@v5
with:
context: .
load: true # This loads the image into the local Docker daemon
tags: local-image-scan:latest # A temporary tag just for scanning
# --- NEW STEP: Run the Security Scan ---
- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@0.20.0
with:
image-ref: 'local-image-scan:latest'
format: 'table'
exit-code: '1' # Fail the build if vulnerabilities are found
ignore-unfixed: true # Don't fail on bugs that have no patch yet
vuln-type: 'os,library'
severity: 'CRITICAL,HIGH' # Only fail on Critical and High issues
- name: Log in to GHCR
uses: docker/login-action@v3
with:
registry: ghcr.io
username: ${{ github.actor }}
password: ${{ secrets.GITHUB_TOKEN }}
# Actual Push Step (Uses cache from previous build step)
- name: Build and push Docker image
uses: docker/build-push-action@v5
with:
context: .
push: true
tags: ${{ steps.meta.outputs.tags }}
labels: ${{ steps.meta.outputs.labels }}
- name: Image Summary
run: |
echo "### 🐳 Docker Image Built" >> $GITHUB_STEP_SUMMARY
echo "**Tags pushed:**" >> $GITHUB_STEP_SUMMARY
echo '```' >> $GITHUB_STEP_SUMMARY
echo "${{ steps.meta.outputs.tags }}" >> $GITHUB_STEP_SUMMARY
echo '```' >> $GITHUB_STEP_SUMMARY