feat(indexer): Add grafana and alert service to local development#7257
Conversation
|
Current dependencies on/for this PR:
This comment was auto-generated by Graphite. |
| indexer: | ||
| condition: service_healthy | ||
|
|
||
| grafana: |
There was a problem hiding this comment.
Service 'grafana' is running with a writable root filesystem. This may allow malicious applications to download and run additional payloads, or modify container files. If an application inside a container has to save something temporarily consider using a tmpfs. Add 'read_only: true' to this service to prevent this.
Ignore this finding from writable-filesystem-service.| condition: service_healthy | ||
|
|
||
| ui: | ||
| prometheus: |
There was a problem hiding this comment.
Service 'prometheus' is running with a writable root filesystem. This may allow malicious applications to download and run additional payloads, or modify container files. If an application inside a container has to save something temporarily consider using a tmpfs. Add 'read_only: true' to this service to prevent this.
Ignore this finding from writable-filesystem-service.| indexer: | ||
| condition: service_healthy | ||
|
|
||
| grafana: |
There was a problem hiding this comment.
Service 'grafana' allows for privilege escalation via setuid or setgid binaries. Add 'no-new-privileges:true' in 'security_opt' to prevent this.
Ignore this finding from no-new-privileges.| condition: service_healthy | ||
|
|
||
| ui: | ||
| prometheus: |
There was a problem hiding this comment.
Service 'prometheus' allows for privilege escalation via setuid or setgid binaries. Add 'no-new-privileges:true' in 'security_opt' to prevent this.
Ignore this finding from no-new-privileges.| indexer: | ||
| condition: service_healthy | ||
|
|
||
| alertmanager: |
There was a problem hiding this comment.
Service 'alertmanager' is running with a writable root filesystem. This may allow malicious applications to download and run additional payloads, or modify container files. If an application inside a container has to save something temporarily consider using a tmpfs. Add 'read_only: true' to this service to prevent this.
Ignore this finding from writable-filesystem-service.| indexer: | ||
| condition: service_healthy | ||
|
|
||
| alertmanager: |
There was a problem hiding this comment.
Service 'alertmanager' allows for privilege escalation via setuid or setgid binaries. Add 'no-new-privileges:true' in 'security_opt' to prevent this.
Ignore this finding from no-new-privileges.0791421 to
07e6b6e
Compare
|
Semgrep found 1
A secret is hard-coded in the application. Secrets stored in source code, such as credentials, identifiers, and other types of sensitive data, can be leaked and used by internal or external malicious actors. Use environment variables to securely provide credentials and other secrets or retrieve them from a secure vault or Hardware Security Module (HSM). View Dataflow Graphflowchart LR
classDef invis fill:white, stroke: none
classDef default fill:#e7f5ff, color:#1c7fd6, stroke: none
subgraph File0["<b>indexer/database/db.go</b>"]
direction LR
%% Source
subgraph Source
direction LR
v0("<b>[Line: 49]</b> #quot; password=%s#quot;")
end
%% Intermediate
subgraph Traces0[Traces]
direction TB
v2("<b>[Line: 49]</b> dsn")
end
%% Sink
subgraph Sink
direction LR
v1("<b>[Line: 51]</b> gorm.Open(postgres.Open(dsn), &gorm.Config{<br> // The indexer will explicitly manage the transactions<br> SkipDefaultTransaction: true,<br> Logger: logger.Default.LogMode(logger.Silent),<br> })")
end
end
%% Class Assignment
Source:::invis
Sink:::invis
Traces0:::invis
File0:::invis
%% Connections
Source --> Traces0
Traces0 --> Sink
%% Clickable
click v0 href "https://github.com/ethereum-optimism/optimism/blob/07e6b6e53a4988118488d265a5ee7f175a29d351/indexer/database/db.go#L49" "View in source" _blank
click v1 href "https://github.com/ethereum-optimism/optimism/blob/07e6b6e53a4988118488d265a5ee7f175a29d351/indexer/database/db.go#L51" "View in source" _blank
click v2 href "https://github.com/ethereum-optimism/optimism/blob/07e6b6e53a4988118488d265a5ee7f175a29d351/indexer/database/db.go#L49" "View in source" _blank
Semgrep found 1
The application uses an empty credential. This can lead to unauthorized access by either an internal or external malicious actor. Use environment variables to securely provide credentials and other secrets or retrieve them from a secure vault or Hardware Security Module (HSM). View Dataflow Graphflowchart LR
classDef invis fill:white, stroke: none
classDef default fill:#e7f5ff, color:#1c7fd6, stroke: none
subgraph File0["<b>indexer/database/db.go</b>"]
direction LR
%% Source
subgraph Source
direction LR
v0("<b>[Line: 49]</b> #quot; password=%s#quot;")
end
%% Intermediate
subgraph Traces0[Traces]
direction TB
v2("<b>[Line: 49]</b> dsn")
end
%% Sink
subgraph Sink
direction LR
v1("<b>[Line: 51]</b> gorm.Open(postgres.Open(dsn), &gorm.Config{<br> // The indexer will explicitly manage the transactions<br> SkipDefaultTransaction: true,<br> Logger: logger.Default.LogMode(logger.Silent),<br> })")
end
end
%% Class Assignment
Source:::invis
Sink:::invis
Traces0:::invis
File0:::invis
%% Connections
Source --> Traces0
Traces0 --> Sink
%% Clickable
click v0 href "https://github.com/ethereum-optimism/optimism/blob/07e6b6e53a4988118488d265a5ee7f175a29d351/indexer/database/db.go#L49" "View in source" _blank
click v1 href "https://github.com/ethereum-optimism/optimism/blob/07e6b6e53a4988118488d265a5ee7f175a29d351/indexer/database/db.go#L51" "View in source" _blank
click v2 href "https://github.com/ethereum-optimism/optimism/blob/07e6b6e53a4988118488d265a5ee7f175a29d351/indexer/database/db.go#L49" "View in source" _blank
|
2cd7f9d to
7f3d0a1
Compare
7f3d0a1 to
4c5adcc
Compare
d7cfe44 to
0809213
Compare
4c5adcc to
2d80dd3
Compare
feat: Add alert manager fix: Add chain preset id to docker compose fix: Pass in database env variables in docker compose
0809213 to
f25a591
Compare
2d80dd3 to
e961711
Compare
|
This PR is stale because it has been open 14 days with no activity. Remove stale label or comment or this will be closed in 5 days. |

Uh oh!
There was an error while loading. Please reload this page.