|
|
name: AnythingLLM Development Docker image (amd64) |
|
|
|
|
|
concurrency: |
|
|
group: build-${{ github.ref }} |
|
|
cancel-in-progress: true |
|
|
|
|
|
on: |
|
|
push: |
|
|
branches: ['3999-chromium-flags'] |
|
|
paths-ignore: |
|
|
- '**.md' |
|
|
- 'cloud-deployments/*' |
|
|
- 'images/**/*' |
|
|
- '.vscode/**/*' |
|
|
- '**/.env.example' |
|
|
- '.github/ISSUE_TEMPLATE/**/*' |
|
|
- '.devcontainer/**/*' |
|
|
- 'embed/**/*' |
|
|
- 'browser-extension/**/*' |
|
|
- 'server/utils/agents/aibitat/example/**/*' |
|
|
- 'extras/**/*' |
|
|
|
|
|
jobs: |
|
|
push_multi_platform_to_registries: |
|
|
name: Push Docker multi-platform image to multiple registries |
|
|
runs-on: ubuntu-latest |
|
|
permissions: |
|
|
packages: write |
|
|
contents: read |
|
|
steps: |
|
|
- name: Check out the repo |
|
|
uses: actions/checkout@v4 |
|
|
|
|
|
- name: Check if DockerHub build needed |
|
|
shell: bash |
|
|
run: | |
|
|
# Check if the secret for USERNAME is set (don't even check for the password) |
|
|
if [[ -z "${{ secrets.DOCKER_USERNAME }}" ]]; then |
|
|
echo "DockerHub build not needed" |
|
|
echo "enabled=false" >> $GITHUB_OUTPUT |
|
|
else |
|
|
echo "DockerHub build needed" |
|
|
echo "enabled=true" >> $GITHUB_OUTPUT |
|
|
fi |
|
|
id: dockerhub |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- name: Set up Docker Buildx |
|
|
uses: docker/setup-buildx-action@v3 |
|
|
with: |
|
|
version: v0.22.0 |
|
|
|
|
|
- name: Log in to Docker Hub |
|
|
uses: docker/login-action@f4ef78c080cd8ba55a85445d5b36e214a81df20a |
|
|
|
|
|
if: steps.dockerhub.outputs.enabled == 'true' |
|
|
with: |
|
|
username: ${{ secrets.DOCKER_USERNAME }} |
|
|
password: ${{ secrets.DOCKER_PASSWORD }} |
|
|
|
|
|
- name: Extract metadata (tags, labels) for Docker |
|
|
id: meta |
|
|
uses: docker/metadata-action@9ec57ed1fcdbf14dcef7dfbe97b2010124a938b7 |
|
|
with: |
|
|
images: | |
|
|
${{ steps.dockerhub.outputs.enabled == 'true' && 'mintplexlabs/anythingllm' || '' }} |
|
|
tags: | |
|
|
type=raw,value=dev |
|
|
|
|
|
- name: Build and push multi-platform Docker image |
|
|
uses: docker/build-push-action@v6 |
|
|
with: |
|
|
context: . |
|
|
file: ./docker/Dockerfile |
|
|
push: true |
|
|
sbom: true |
|
|
provenance: mode=max |
|
|
platforms: linux/amd64 |
|
|
|
|
|
tags: ${{ steps.meta.outputs.tags }} |
|
|
labels: ${{ steps.meta.outputs.labels }} |
|
|
cache-from: type=gha |
|
|
cache-to: type=gha,mode=max |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- name: Collect known and verified CVE exceptions |
|
|
id: cve-list |
|
|
run: | |
|
|
# Collect CVEs from filenames in vex folder |
|
|
CVE_NAMES="" |
|
|
for file in ./docker/vex/*.vex.json; do |
|
|
[ -e "$file" ] || continue |
|
|
filename=$(basename "$file") |
|
|
stripped_filename=${filename%.vex.json} |
|
|
CVE_NAMES+=" $stripped_filename" |
|
|
done |
|
|
echo "CVE_EXCEPTIONS=$CVE_NAMES" >> $GITHUB_OUTPUT |
|
|
shell: bash |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
- name: Add VEX attestations |
|
|
env: |
|
|
CVE_EXCEPTIONS: ${{ steps.cve-list.outputs.CVE_EXCEPTIONS }} |
|
|
run: | |
|
|
echo $CVE_EXCEPTIONS |
|
|
curl -sSfL https://raw.githubusercontent.com/docker/scout-cli/main/install.sh | sh -s -- |
|
|
for cve in $CVE_EXCEPTIONS; do |
|
|
for tag in "${{ join(fromJSON(steps.meta.outputs.json).tags, ' ') }}"; do |
|
|
echo "Attaching VEX exception $cve to $tag" |
|
|
docker scout attestation add \ |
|
|
--file "./docker/vex/$cve.vex.json" \ |
|
|
--predicate-type https://openvex.dev/ns/v0.2.0 \ |
|
|
$tag |
|
|
done |
|
|
done |
|
|
shell: bash |