Skip to content

Commit 945825d

Browse files
committed
download cuda image to /mnt on gh runner
1 parent f517c6f commit 945825d

File tree

1 file changed

+7
-7
lines changed

1 file changed

+7
-7
lines changed

.github/workflows/fatimage.yml

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -85,7 +85,7 @@ jobs:
8585
- name: Download image
8686
run: |
8787
. venv/bin/activate
88-
openstack image save --file ${{ steps.manifest.outputs.image-name }}.qcow2 ${{ steps.manifest.outputs.image-name }}
88+
openstack image save --file /mnt/${{ steps.manifest.outputs.image-name }}.qcow2 ${{ steps.manifest.outputs.image-name }}
8989
9090
- name: Set up QEMU
9191
uses: docker/setup-qemu-action@v3
@@ -96,32 +96,32 @@ jobs:
9696
sudo apt -y install libguestfs-tools
9797
9898
- name: mkdir for mount
99-
run: sudo mkdir -p './${{ steps.manifest.outputs.image-name }}'
99+
run: sudo mkdir -p '/mnt/${{ steps.manifest.outputs.image-name }}'
100100

101101
- name: mount qcow2 file
102-
run: sudo guestmount -a ${{ steps.manifest.outputs.image-name }}.qcow2 -i --ro -o allow_other './${{ steps.manifest.outputs.image-name }}'
102+
run: sudo guestmount -a ${{ steps.manifest.outputs.image-name }}.qcow2 -i --ro -o allow_other '/mnt/${{ steps.manifest.outputs.image-name }}'
103103

104104
- name: Run Trivy vulnerability scanner
105105
uses: aquasecurity/[email protected]
106106
with:
107107
scan-type: fs
108-
scan-ref: "./${{ steps.manifest.outputs.image-name }}"
108+
scan-ref: "/mnt/${{ steps.manifest.outputs.image-name }}"
109109
scanners: "vuln"
110110
format: sarif
111-
output: "${{ steps.manifest.outputs.image-name }}.sarif"
111+
output: "/mnt/${{ steps.manifest.outputs.image-name }}.sarif"
112112
# turn off secret scanning to speed things up
113113

114114
- name: Upload Trivy scan results to GitHub Security tab
115115
uses: github/codeql-action/upload-sarif@v3
116116
with:
117-
sarif_file: "${{ steps.manifest.outputs.image-name }}.sarif"
117+
sarif_file: "/mnt/${{ steps.manifest.outputs.image-name }}.sarif"
118118
category: "${{ matrix.os_version }}-${{ matrix.build }}"
119119

120120
- name: Fail if scan has CRITICAL vulnerabilities
121121
uses: aquasecurity/[email protected]
122122
with:
123123
scan-type: fs
124-
scan-ref: "./${{ steps.manifest.outputs.image-name }}"
124+
scan-ref: "/mnt/${{ steps.manifest.outputs.image-name }}"
125125
scanners: "vuln"
126126
format: table
127127
exit-code: '1'

0 commit comments

Comments
 (0)