Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
32 commits
Select commit Hold shift + click to select a range
8fc6272
adding ubuntu deployment scripts
Feb 2, 2026
52e82e3
Update Habana Container Runtime version requirement
HarikaDev296 Feb 3, 2026
7c77d85
Update Habana Container Runtime version in user guide
HarikaDev296 Feb 3, 2026
9706768
Apply suggestion from @alexsin368
HarikaDev296 Feb 3, 2026
8ef0a4e
Revise user guide for Intel AI setup instructions
HarikaDev296 Feb 4, 2026
8885b20
update readme & apisix user-gude
Feb 4, 2026
1458272
update deploy-enterpise-inference script
Feb 5, 2026
46b040f
Enhance README with ISO mounting and Terraform details
HarikaDev296 Feb 5, 2026
b9dc808
Update README with script permission and usage instructions
HarikaDev296 Feb 5, 2026
b76a822
add sample_solutions folder
alexsin368 Feb 3, 2026
8e32ae8
update keycloack values
Feb 5, 2026
751be66
update cluster url
Feb 5, 2026
bdf308e
update readme
Feb 5, 2026
81f9c6e
update readme
Feb 5, 2026
478f825
update readme
Feb 5, 2026
391b63e
update apisix for token generation step
Feb 5, 2026
cff58e1
update apisix for token generation step
Feb 5, 2026
0a4ed82
update apisix for token generation step
Feb 5, 2026
e6c73cd
update apisix for token generation step
Feb 5, 2026
a221074
update script link
Feb 5, 2026
9039dc5
update script link
Feb 6, 2026
902d10e
update deployment script
Feb 9, 2026
188471c
update deployment script
Feb 9, 2026
ea090b1
Adding model-deployment guide
Feb 11, 2026
d7f5ec9
Adding model-deployment guide
Feb 11, 2026
cea6705
adding custom iso scripts and model deployment guides
Feb 13, 2026
0d52237
Update README with clearer usage instructions
HarikaDev296 Feb 13, 2026
07c7389
Replace example values with placeholders in README
HarikaDev296 Feb 13, 2026
97e44d2
update iso readme
Feb 13, 2026
6e981c1
update keycloak values with defaults
Feb 17, 2026
4055aeb
adding code scan file
Feb 17, 2026
84f96b6
Merge branch 'opea-project:main' into cld2labs/ubuntu22.04-deployment…
HarikaDev296 Feb 17, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
167 changes: 167 additions & 0 deletions .github/workflows/code-scans.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,167 @@
name: SDLE Scans

on:
workflow_dispatch:
inputs:
PR_number:
description: 'Pull request number'
required: true
push:
branches: [ main ]
pull_request:
types: [opened, synchronize, reopened, ready_for_review]

concurrency:
group: sdle-${{ github.event.inputs.PR_number || github.event.pull_request.number || github.ref }}
cancel-in-progress: true

permissions:
contents: read
actions: read

jobs:

# -----------------------------
# 1) Trivy Scan
# -----------------------------
trivy_scan:
name: Trivy Vulnerability Scan
runs-on: self-hosted
steps:
- uses: actions/checkout@v4
with:
ref: ${{ github.event.inputs.PR_number && format('refs/pull/{0}/merge', github.event.inputs.PR_number) || '' }}

- name: Create report directory
run: mkdir -p trivy-reports

- name: Run Trivy FS Scan
uses: aquasecurity/trivy-action@0.28.0
continue-on-error: true
with:
scan-type: 'fs'
scan-ref: '.'
scanners: 'vuln,misconfig,secret'
severity: 'CRITICAL,HIGH'
format: 'table'
output: 'trivy-reports/trivy_scan_report.txt'

- name: Run Trivy Image Scan - vllm-cpu
uses: aquasecurity/trivy-action@0.28.0
continue-on-error: true
with:
scan-type: 'image'
image-ref: 'public.ecr.aws/q9t5s3a7/vllm-cpu-release-repo:v0.10.2'
severity: 'HIGH,CRITICAL'
format: 'table'
output: 'trivy-reports/trivy-vllm-cpu.txt'

- name: Upload Trivy Reports
if: always()
uses: actions/upload-artifact@v4
with:
name: trivy-reports
path: trivy-reports/

- name: Show Trivy FS Report in Logs
if: always()
run: |
echo "========= TRIVY FS SCAN FINDINGS ========="
cat trivy-reports/trivy_scan_report.txt || echo "No FS scan report found"
echo "=========================================="

# -----------------------------
# 2) Bandit Scan
# -----------------------------
bandit_scan:
name: Bandit security scan
runs-on: self-hosted
steps:
- name: Checkout
uses: actions/checkout@v4
with:
ref: ${{ github.event.inputs.PR_number && format('refs/pull/{0}/merge', github.event.inputs.PR_number) || '' }}
submodules: 'recursive'
fetch-depth: 0
- uses: actions/setup-python@v5
with:
python-version: "3.x"
- name: Install Bandit
run: pip install bandit
- name: Create Bandit configuration
run: |
cat > .bandit << 'EOF'
[bandit]
exclude_dirs = tests,test,venv,.venv,node_modules
skips = B101
EOF
shell: bash
- name: Run Bandit scan
run: |
bandit -r . -ll -iii -f screen
bandit -r . -ll -iii -f html -o bandit-report.html
- name: Upload Bandit Report
uses: actions/upload-artifact@v4
with:
name: bandit-report
path: bandit-report.html
retention-days: 30
# -----------------------------
# 3) ShellCheck Scan
# -----------------------------
shellcheck_scan:
name: ShellCheck script analysis
runs-on: self-hosted
steps:
- uses: actions/checkout@v4
with:
ref: ${{ github.event.inputs.PR_number && format('refs/pull/{0}/merge', github.event.inputs.PR_number) || '' }}

- name: Create report directory
run: mkdir -p shellcheck-reports

- name: Install ShellCheck
run: |
# Check if shellcheck is already installed
if ! command -v shellcheck &> /dev/null; then
wget -qO- "https://github.com/koalaman/shellcheck/releases/download/stable/shellcheck-stable.linux.x86_64.tar.xz" | tar -xJv
sudo cp shellcheck-stable/shellcheck /usr/local/bin/
rm -rf shellcheck-stable
fi
shellcheck --version

- name: Find shell scripts
id: find_scripts
run: |
SCRIPT_COUNT=$(find . -type f -name "*.sh" ! -path "./.git/*" | wc -l)
echo "Shell scripts found: $SCRIPT_COUNT"
echo "script_count=$SCRIPT_COUNT" >> $GITHUB_OUTPUT

- name: Run ShellCheck
if: steps.find_scripts.outputs.script_count > 0
continue-on-error: true
run: |
echo "ShellCheck Analysis Report" > shellcheck-reports/shellcheck-report.txt
echo "==========================" >> shellcheck-reports/shellcheck-report.txt
echo "" >> shellcheck-reports/shellcheck-report.txt

find . -type f -name "*.sh" ! -path "./.git/*" | while read -r script; do
echo "Checking: $script" >> shellcheck-reports/shellcheck-report.txt
shellcheck -f gcc "$script" >> shellcheck-reports/shellcheck-report.txt 2>&1 || true
echo "" >> shellcheck-reports/shellcheck-report.txt
done

cat shellcheck-reports/shellcheck-report.txt

- name: Create empty report if no scripts
if: steps.find_scripts.outputs.script_count == 0
run: |
echo "ShellCheck Analysis Report" > shellcheck-reports/shellcheck-report.txt
echo "No shell scripts found to analyze." >> shellcheck-reports/shellcheck-report.txt

- name: Upload ShellCheck Report
if: always()
uses: actions/upload-artifact@v4
with:
name: shellcheck-report
path: shellcheck-reports/shellcheck-report.txt
1 change: 0 additions & 1 deletion third_party/Dell/README.md

This file was deleted.

Loading