Skip to content
Merged
Show file tree
Hide file tree
Changes from 34 commits
Commits
Show all changes
35 commits
Select commit Hold shift + click to select a range
519c9e1
adding ubuntu deployment scripts
Feb 2, 2026
6210fe4
Update Habana Container Runtime version requirement
HarikaDev296 Feb 3, 2026
3dac425
Update Habana Container Runtime version in user guide
HarikaDev296 Feb 3, 2026
d417201
Apply suggestion from @alexsin368
HarikaDev296 Feb 3, 2026
1adc8a2
Revise user guide for Intel AI setup instructions
HarikaDev296 Feb 4, 2026
1d50ef6
update readme & apisix user-gude
Feb 4, 2026
4c4a07e
update deploy-enterpise-inference script
Feb 5, 2026
3af744a
Enhance README with ISO mounting and Terraform details
HarikaDev296 Feb 5, 2026
df43c14
Update README with script permission and usage instructions
HarikaDev296 Feb 5, 2026
6f4e1d9
add sample_solutions folder
alexsin368 Feb 3, 2026
d4c43f9
update keycloack values
Feb 5, 2026
4622e9d
update cluster url
Feb 5, 2026
a6421bd
update readme
Feb 5, 2026
2155268
update readme
Feb 5, 2026
79187cc
update readme
Feb 5, 2026
134f5e8
update apisix for token generation step
Feb 5, 2026
3a71cf4
update apisix for token generation step
Feb 5, 2026
9f3e1c6
update apisix for token generation step
Feb 5, 2026
e9ace97
update apisix for token generation step
Feb 5, 2026
c673d08
update script link
Feb 5, 2026
793a2c9
update script link
Feb 6, 2026
3c7f5e0
update deployment script
Feb 9, 2026
bb6dbd7
update deployment script
Feb 9, 2026
e7dcb8c
Adding model-deployment guide
Feb 11, 2026
40584c5
Adding model-deployment guide
Feb 11, 2026
9cff6bf
adding custom iso scripts and model deployment guides
Feb 13, 2026
55da4eb
Update README with clearer usage instructions
HarikaDev296 Feb 13, 2026
3f478ce
Replace example values with placeholders in README
HarikaDev296 Feb 13, 2026
410ad02
update iso readme
Feb 13, 2026
4e5fe22
update keycloak values with defaults
Feb 17, 2026
e481c1f
adding code scan file
Feb 17, 2026
ce2f374
Release v1.5.0 (#62)
AhmedSeemalK Feb 13, 2026
e7b84b8
update custom iso readme
Feb 18, 2026
296ad49
update custom iso readme
Feb 18, 2026
efcdff4
delete code-scan.yaml files
Feb 19, 2026
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
167 changes: 167 additions & 0 deletions .github/workflows/code-scans.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,167 @@
name: SDLE Scans

on:
workflow_dispatch:
inputs:
PR_number:
description: 'Pull request number'
required: true
push:
branches: [ main ]
pull_request:
types: [opened, synchronize, reopened, ready_for_review]

concurrency:
group: sdle-${{ github.event.inputs.PR_number || github.event.pull_request.number || github.ref }}
cancel-in-progress: true

permissions:
contents: read
actions: read

jobs:

# -----------------------------
# 1) Trivy Scan
# -----------------------------
trivy_scan:
name: Trivy Vulnerability Scan
runs-on: self-hosted
steps:
- uses: actions/checkout@v4
with:
ref: ${{ github.event.inputs.PR_number && format('refs/pull/{0}/merge', github.event.inputs.PR_number) || '' }}

- name: Create report directory
run: mkdir -p trivy-reports

- name: Run Trivy FS Scan
uses: aquasecurity/[email protected]
continue-on-error: true
with:
scan-type: 'fs'
scan-ref: '.'
scanners: 'vuln,misconfig,secret'
severity: 'CRITICAL,HIGH'
format: 'table'
output: 'trivy-reports/trivy_scan_report.txt'

- name: Run Trivy Image Scan - vllm-cpu
uses: aquasecurity/[email protected]
continue-on-error: true
with:
scan-type: 'image'
image-ref: 'public.ecr.aws/q9t5s3a7/vllm-cpu-release-repo:v0.10.2'
severity: 'HIGH,CRITICAL'
format: 'table'
output: 'trivy-reports/trivy-vllm-cpu.txt'

- name: Upload Trivy Reports
if: always()
uses: actions/upload-artifact@v4
with:
name: trivy-reports
path: trivy-reports/

- name: Show Trivy FS Report in Logs
if: always()
run: |
echo "========= TRIVY FS SCAN FINDINGS ========="
cat trivy-reports/trivy_scan_report.txt || echo "No FS scan report found"
echo "=========================================="

# -----------------------------
# 2) Bandit Scan
# -----------------------------
bandit_scan:
name: Bandit security scan
runs-on: self-hosted
steps:
- name: Checkout
uses: actions/checkout@v4
with:
ref: ${{ github.event.inputs.PR_number && format('refs/pull/{0}/merge', github.event.inputs.PR_number) || '' }}
submodules: 'recursive'
fetch-depth: 0
- uses: actions/setup-python@v5
with:
python-version: "3.x"
- name: Install Bandit
run: pip install bandit
- name: Create Bandit configuration
run: |
cat > .bandit << 'EOF'
[bandit]
exclude_dirs = tests,test,venv,.venv,node_modules
skips = B101
EOF
shell: bash
- name: Run Bandit scan
run: |
bandit -r . -ll -iii -f screen
bandit -r . -ll -iii -f html -o bandit-report.html
- name: Upload Bandit Report
uses: actions/upload-artifact@v4
with:
name: bandit-report
path: bandit-report.html
retention-days: 30
# -----------------------------
# 3) ShellCheck Scan
# -----------------------------
shellcheck_scan:
name: ShellCheck script analysis
runs-on: self-hosted
steps:
- uses: actions/checkout@v4
with:
ref: ${{ github.event.inputs.PR_number && format('refs/pull/{0}/merge', github.event.inputs.PR_number) || '' }}

- name: Create report directory
run: mkdir -p shellcheck-reports

- name: Install ShellCheck
run: |
# Check if shellcheck is already installed
if ! command -v shellcheck &> /dev/null; then
wget -qO- "https://github.com/koalaman/shellcheck/releases/download/stable/shellcheck-stable.linux.x86_64.tar.xz" | tar -xJv
sudo cp shellcheck-stable/shellcheck /usr/local/bin/
rm -rf shellcheck-stable
fi
shellcheck --version

- name: Find shell scripts
id: find_scripts
run: |
SCRIPT_COUNT=$(find . -type f -name "*.sh" ! -path "./.git/*" | wc -l)
echo "Shell scripts found: $SCRIPT_COUNT"
echo "script_count=$SCRIPT_COUNT" >> $GITHUB_OUTPUT

- name: Run ShellCheck
if: steps.find_scripts.outputs.script_count > 0
continue-on-error: true
run: |
echo "ShellCheck Analysis Report" > shellcheck-reports/shellcheck-report.txt
echo "==========================" >> shellcheck-reports/shellcheck-report.txt
echo "" >> shellcheck-reports/shellcheck-report.txt

find . -type f -name "*.sh" ! -path "./.git/*" | while read -r script; do
echo "Checking: $script" >> shellcheck-reports/shellcheck-report.txt
shellcheck -f gcc "$script" >> shellcheck-reports/shellcheck-report.txt 2>&1 || true
echo "" >> shellcheck-reports/shellcheck-report.txt
done

cat shellcheck-reports/shellcheck-report.txt

- name: Create empty report if no scripts
if: steps.find_scripts.outputs.script_count == 0
run: |
echo "ShellCheck Analysis Report" > shellcheck-reports/shellcheck-report.txt
echo "No shell scripts found to analyze." >> shellcheck-reports/shellcheck-report.txt

- name: Upload ShellCheck Report
if: always()
uses: actions/upload-artifact@v4
with:
name: shellcheck-report
path: shellcheck-reports/shellcheck-report.txt
2 changes: 1 addition & 1 deletion core/helm-charts/apisix-helm/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Copyright (C) 2024-2025 Intel Corporation
# Copyright (C) 2025-2026 Intel Corporation
# SPDX-License-Identifier: Apache-2.0
apiVersion: v2
name: auth-apisix
Expand Down
14 changes: 7 additions & 7 deletions core/helm-charts/apisix-helm/openshift-values.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Copyright (C) 2024-2025 Intel Corporation
# Copyright (C) 2025-2026 Intel Corporation
# SPDX-License-Identifier: Apache-2.0

# APISIX Namespace
Expand Down Expand Up @@ -33,9 +33,9 @@ apisix:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand Down Expand Up @@ -76,9 +76,9 @@ apisix:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand All @@ -105,9 +105,9 @@ apisix:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand Down
14 changes: 7 additions & 7 deletions core/helm-charts/apisix-helm/values.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Copyright (C) 2024-2025 Intel Corporation
# Copyright (C) 2025-2026 Intel Corporation
# SPDX-License-Identifier: Apache-2.0

# APISIX Namespace
Expand Down Expand Up @@ -28,9 +28,9 @@ apisix:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand Down Expand Up @@ -64,9 +64,9 @@ apisix:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand All @@ -93,9 +93,9 @@ apisix:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand Down
2 changes: 1 addition & 1 deletion core/helm-charts/ceph/operator-values.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Copyright (C) 2024-2025 Intel Corporation
# Copyright (C) 2025-2026 Intel Corporation
# SPDX-License-Identifier: Apache-2.0
image:
repository: docker.io/rook/ceph
Expand Down
2 changes: 1 addition & 1 deletion core/helm-charts/fluentbit/fluebit-values.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Copyright (C) 2024-2025 Intel Corporation
# Copyright (C) 2025-2026 Intel Corporation
# SPDX-License-Identifier: Apache-2.0

fluent-bit:
Expand Down
2 changes: 1 addition & 1 deletion core/helm-charts/fluentbit/fluentbit-config.yml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Copyright (C) 2024-2025 Intel Corporation
# Copyright (C) 2025-2026 Intel Corporation
# SPDX-License-Identifier: Apache-2.0
apiVersion: v1
data:
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Copyright (C) 2024-2025 Intel Corporation
# Copyright (C) 2025-2026 Intel Corporation
# SPDX-License-Identifier: Apache-2.0
apiVersion: v2
name: langfuse
Expand Down
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Copyright (C) 2024-2025 Intel Corporation
# Copyright (C) 2025-2026 Intel Corporation
# SPDX-License-Identifier: Apache-2.0
# This file is used to validate the Chart and sets some values for required fields. It is not used for the deployment.
# Example usage: `helm lint . --values values.lint.yaml`
Expand Down
34 changes: 17 additions & 17 deletions core/helm-charts/genai-gateway-trace/charts/langfuse/values.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Copyright (C) 2024-2025 Intel Corporation
# Copyright (C) 2025-2026 Intel Corporation
# SPDX-License-Identifier: Apache-2.0
# Langfuse Helm Chart Configuration

Expand Down Expand Up @@ -148,9 +148,9 @@ langfuse:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand Down Expand Up @@ -509,9 +509,9 @@ postgresql:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand All @@ -536,9 +536,9 @@ postgresql:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand Down Expand Up @@ -596,9 +596,9 @@ redis:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand All @@ -625,9 +625,9 @@ redis:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand Down Expand Up @@ -660,9 +660,9 @@ clickhouse:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand Down Expand Up @@ -690,9 +690,9 @@ clickhouse:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand Down Expand Up @@ -887,9 +887,9 @@ s3:
requiredDuringSchedulingIgnoredDuringExecution:
nodeSelectorTerms:
- matchExpressions:
- key: role
- key: ei-infra-eligible
operator: In
values: ["infra"]
values: ["true"]
- matchExpressions:
- key: node-role.kubernetes.io/control-plane
operator: Exists
Expand Down
2 changes: 1 addition & 1 deletion core/helm-charts/genai-gateway/Chart.yaml
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
# Copyright (C) 2024-2025 Intel Corporation
# Copyright (C) 2025-2026 Intel Corporation
# SPDX-License-Identifier: Apache-2.0
apiVersion: v2
name: genaigateway
Expand Down
Loading