Skip to content

feat(validator): add Kubeflow Trainer to robust-controller and skip inference-gateway on training clusters #1143

feat(validator): add Kubeflow Trainer to robust-controller and skip inference-gateway on training clusters

feat(validator): add Kubeflow Trainer to robust-controller and skip inference-gateway on training clusters #1143

Workflow file for this run

# Copyright (c) 2026, NVIDIA CORPORATION. All rights reserved.
#
# Licensed under the Apache License, Version 2.0 (the "License");
# you may not use this file except in compliance with the License.
# You may obtain a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS,
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
# See the License for the specific language governing permissions and
# limitations under the License.
name: Daily Vulnerability Scan
on:
schedule:
- cron: '30 7 * * *'
workflow_dispatch: {} # allow manual runs for testing
pull_request:
branches: [main]
paths-ignore:
- '**.md'
- 'docs/**'
- 'LICENSE'
push:
branches: [main] # scan main after merges
paths-ignore:
- '**.md'
- 'docs/**'
- 'LICENSE'
permissions:
contents: read
concurrency:
group: ${{ github.workflow }}-${{ github.event_name }}-${{ github.head_ref || github.ref }}
cancel-in-progress: ${{ github.event_name == 'pull_request' }}
env:
SARIF_OUTPUT: 'vulnerability-scan-results.sarif'
SEVERITY_LEVELS: 'MEDIUM,HIGH,CRITICAL'
jobs:
trivy-repo-scan:
runs-on: ubuntu-latest
timeout-minutes: 30
permissions:
actions: read # required by codeql-action to read workflow run metadata
contents: read
security-events: write # required to upload SARIF
steps:
- name: Checkout
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
with:
persist-credentials: false
- name: Scan Repo
continue-on-error: true
uses: aquasecurity/trivy-action@e368e328979b113139d6f9068e03accaed98a518 # v0.34.1
with:
scan-type: 'fs'
scan-ref: '.'
vuln-type: 'os,library'
scanners: 'vuln,secret,misconfig'
ignore-unfixed: true
format: 'sarif'
output: ${{ env.SARIF_OUTPUT }}
severity: ${{ env.SEVERITY_LEVELS }}
skip-dirs: 'vendor,node_modules,distros/kubernetes,tests,tilt'
limit-severities-for-sarif: true
- name: Check SARIF file exists
id: check_sarif
run: |
if [ -f "${{ env.SARIF_OUTPUT }}" ]; then
echo "exists=true" >> $GITHUB_OUTPUT
else
echo "exists=false" >> $GITHUB_OUTPUT
fi
- name: Upload Report
if: steps.check_sarif.outputs.exists == 'true'
uses: github/codeql-action/upload-sarif@b20883b0cd1f46c72ae0ba6d1090936928f9fa30 # v4.32.0
with:
sarif_file: ${{ env.SARIF_OUTPUT }}
malware-scan:
runs-on: ubuntu-latest
timeout-minutes: 30
permissions:
actions: read
contents: read
security-events: write
steps:
- name: Checkout
uses: actions/checkout@de0fac2e4500dabe0009e67214ff5f5447ce83dd # v6.0.2
with:
persist-credentials: false
- name: Malware Scan
uses: ./.github/actions/malware-scan
with:
scan_path: '.'
category: 'clamav'