From 8ab4c994dbc50f6338f61358cb70c82c2de30cd5 Mon Sep 17 00:00:00 2001 From: Enderson Maia Date: Thu, 15 Jan 2026 14:40:14 -0300 Subject: [PATCH 1/3] chore(sdk): use PostgreSQL's Docker Hardened Image Using trivy to scan vulnerabilities in Docker images, we found that: BEFORE : Total: 139 (UNKNOWN: 4, LOW: 99, MEDIUM: 31, HIGH: 5, CRITICAL: 0) AFTER : Total: 78 (UNKNOWN: 5, LOW: 69, MEDIUM: 3, HIGH: 1, CRITICAL: 0) --- .github/workflows/sdk.yaml | 7 +++++++ packages/sdk/Dockerfile | 13 +++++++++---- packages/sdk/docker-bake.hcl | 4 +++- 3 files changed, 19 insertions(+), 5 deletions(-) diff --git a/.github/workflows/sdk.yaml b/.github/workflows/sdk.yaml index 3d50630f..f0722553 100644 --- a/.github/workflows/sdk.yaml +++ b/.github/workflows/sdk.yaml @@ -83,6 +83,13 @@ jobs: username: ${{ secrets.DOCKERHUB_USERNAME }} password: ${{ secrets.DOCKERHUB_TOKEN }} + - name: Login to Docker Hardened Registry + uses: docker/login-action@74a5d142397b4f367a81961eba4e8cd7edddf772 # v3.4.0 + with: + registry: dhi.io + username: ${{ secrets.DOCKERHUB_USERNAME }} + password: ${{ secrets.DOCKERHUB_TOKEN }} + - name: Build and push uses: docker/bake-action@3acf805d94d93a86cce4ca44798a76464a75b88c # v6.9.0 if: ${{ !startsWith(github.ref, 'refs/tags/sdk@') }} diff --git a/packages/sdk/Dockerfile b/packages/sdk/Dockerfile index d153e7e8..2bc089de 100644 --- a/packages/sdk/Dockerfile +++ b/packages/sdk/Dockerfile @@ -1,6 +1,7 @@ # syntax=docker.io/docker/dockerfile:1 ARG CARTESI_BASE_IMAGE -ARG POSTGRES_BASE_IMAGE +ARG POSTGRES_BASE_BUILD_IMAGE +ARG POSTGRES_BASE_RUNTIME_IMAGE ARG NODE_VERSION ################################################################################ @@ -169,7 +170,7 @@ USER cartesi ################################################################################ # postgresql initdb -FROM ${POSTGRES_BASE_IMAGE} AS postgresql-initdb +FROM ${POSTGRES_BASE_BUILD_IMAGE} AS postgresql-initdb ARG DEBIAN_FRONTEND=noninteractive RUN < Date: Thu, 15 Jan 2026 15:34:54 -0300 Subject: [PATCH 2/3] chore(sdk): use Debian's Docker Hardened Image Using trivy to scan vulnerabilities in Docker images, we found that: BEFORE: Total: 97 (UNKNOWN: 2, LOW: 82, MEDIUM: 13, HIGH: 0, CRITICAL: 0) AFTER : Total: 88 (UNKNOWN: 2, LOW: 76, MEDIUM: 10, HIGH: 0, CRITICAL: 0) --- packages/sdk/Dockerfile | 13 ++++++------- packages/sdk/docker-bake.hcl | 2 +- 2 files changed, 7 insertions(+), 8 deletions(-) diff --git a/packages/sdk/Dockerfile b/packages/sdk/Dockerfile index 2bc089de..2d9fe79e 100644 --- a/packages/sdk/Dockerfile +++ b/packages/sdk/Dockerfile @@ -108,12 +108,10 @@ RUN < Date: Thu, 15 Jan 2026 16:35:17 -0300 Subject: [PATCH 3/3] refactor(sdk): reuse previous foundry download --- packages/sdk/Dockerfile | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/packages/sdk/Dockerfile b/packages/sdk/Dockerfile index 2d9fe79e..2ea3e757 100644 --- a/packages/sdk/Dockerfile +++ b/packages/sdk/Dockerfile @@ -66,6 +66,7 @@ ARG FOUNDRY_VERSION ARG TARGETARCH ARG TARGETOS RUN <