-
Notifications
You must be signed in to change notification settings - Fork 55
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Setup security workflow that tests CVEs in the docker image on change #234
Comments
Thanks for opening the issue. Would you be willing to open a pull request that bumps the versions of dependencies? |
Seems like the latest 2.3 is doing better, however the alpine image beneath needs an
|
We have trivy configured on https://github.com/openzipkin/docker-alpine, so I wonder if these HIGH CVEs came up since the last release of that 2 weeks ago. I'm not sure there's anything to do in this repo anymore since the Java deps are all patched now. /cc @reta @codefromthecrypt Users that want to resolve these without us needing to release everything in the chain can build a container image FROM zipkin-gcp and run |
yep before cutting 2.3.0 I made sure our policy for trivy passed. new cves will always occur later, but at the moment all good. https://github.com/openzipkin/zipkin-gcp/releases/tag/2.3.0 |
basically we have a a trivy workflow on our docker images and we resolve them as we can. as this is an unpaid bunch of volunteers we can't give a higher level of service than this. Here's the workflow on the base image At any point, we can re-kick the docker build on a version such as here to rebuild the image. One of the maintainers needs to make a tag |
So, right now we are green here https://github.com/openzipkin/zipkin-gcp/actions/runs/13382840730 So, what could be a way forward might be to have this run after building the docker image, as maybe it isn't able to detect what would be built given the dockerfile. If someone has time to implement that, it could reduce the amount of CVEs. Here's a way out make a new workflow called security-docker based on the security one.
I've updated the description and re-opened this |
@hydrapolic apologies I jumped to conclusions. I think you are right on this and put a plan together. Help wanted as I'm way over budget timewise over the last several days. |
Currently, our trivy job runs but might not be able to detect CVEs in our docker image prior to publishing it.
For example, while our security workflow passes,
trivy image openzipkin/zipkin-gcp:2.3
fails with a high severity issue on alpine packages.To solve this, let's make a new workflow called security-docker based on the security one.
This workflow should fail similar to running ad-hoc. Assuming it does, lets do something similar in the docker-java and docker-alpine repos so that they also run trivy only after building the image.
The text was updated successfully, but these errors were encountered: