-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore(ci): Revert using caddy to host frontend static files. #229
base: main
Are you sure you want to change the base?
chore(ci): Revert using caddy to host frontend static files. #229
Conversation
@@ -0,0 +1,162 @@ | |||
FROM node:14.21.3 AS frontend-build |
Check failure
Code scanning / Trivy
Image user should not be 'root' High
Type: dockerfile
Vulnerability DS002
Severity: HIGH
Message: Specify at least 1 USER command in Dockerfile with non-root user as argument
Link: DS002
@@ -0,0 +1,162 @@ | |||
FROM node:14.21.3 AS frontend-build |
Check notice
Code scanning / Trivy
No HEALTHCHECK defined Low
Type: dockerfile
Vulnerability DS026
Severity: LOW
Message: Add HEALTHCHECK instruction in your Dockerfile
Link: DS026
ENV CUSTOM_GDAL_GEOS="False" | ||
ENV DATABASE_NAME=gwells | ||
ENV DATABASE_USER="gwells" | ||
ENV DATABASE_PASSWORD="test1" |
Check failure
Code scanning / Trivy
Secrets passed via `build-args` or envs or copied secret files Critical
Type: dockerfile
Vulnerability DS031
Severity: CRITICAL
Message: Possible exposure of secret env "DATABASE_PASSWORD" in ENV
Link: DS031
ENV DATABASE_SERVICE_NAME=gwells | ||
ENV DJANGO_ADMIN_URL=admin | ||
ENV DJANGO_DEBUG="true" | ||
ENV DJANGO_SECRET_KEY=secret |
Check failure
Code scanning / Trivy
Secrets passed via `build-args` or envs or copied secret files Critical
Type: dockerfile
Vulnerability DS031
Severity: CRITICAL
Message: Possible exposure of secret env "DJANGO_SECRET_KEY" in ENV
Link: DS031
ENV ENABLE_AQUIFERS_SEARCH="true" | ||
ENV GWELLS_SERVICE_HOST="db" | ||
ENV GWELLS_SERVICE_PORT="5432" | ||
ENV MINIO_ACCESS_KEY=minio |
Check failure
Code scanning / Trivy
Secrets passed via `build-args` or envs or copied secret files Critical
Type: dockerfile
Vulnerability DS031
Severity: CRITICAL
Message: Possible exposure of secret env "MINIO_ACCESS_KEY" in ENV
Link: DS031
ENV GWELLS_SERVICE_HOST="db" | ||
ENV GWELLS_SERVICE_PORT="5432" | ||
ENV MINIO_ACCESS_KEY=minio | ||
ENV MINIO_SECRET_KEY=minio1234 |
Check failure
Code scanning / Trivy
Secrets passed via `build-args` or envs or copied secret files Critical
Type: dockerfile
Vulnerability DS031
Severity: CRITICAL
Message: Possible exposure of secret env "MINIO_SECRET_KEY" in ENV
Link: DS031
ENV SSO_CLIENT=gwells-4121 | ||
ENV SSO_TEST_AUDIENCE=gwells-api-tests-4820 | ||
ENV SSO_TEST_CLIENT=gwells-api-tests-4820 | ||
ENV SSO_AUTH_HOST=https://test.loginproxy.gov.bc.ca/auth |
Check failure
Code scanning / Trivy
Secrets passed via `build-args` or envs or copied secret files Critical
Type: dockerfile
Vulnerability DS031
Severity: CRITICAL
Message: Possible exposure of secret env "SSO_AUTH_HOST" in ENV
Link: DS031
Description
Please provide a summary of the change and the issue fixed. Please include relevant context. List dependency changes.
Fixes # (issue)
Type of change
Please delete options that are not relevant.
How Has This Been Tested?
Please describe the tests that you ran to verify your changes. Provide instructions so we can reproduce. Please also list any relevant details for your test configuration
Checklist
Further comments
Thanks for the PR!
Deployments, as required, will be available below:
Please create PRs in draft mode. Mark as ready to enable:
After merge, new images are deployed in: