-
Notifications
You must be signed in to change notification settings - Fork 283
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ci: add container scanning to default checks #1981
ci: add container scanning to default checks #1981
Conversation
6e1e545
to
2d14f4b
Compare
50ab694
to
32f3bbf
Compare
This comment was marked as outdated.
This comment was marked as outdated.
32f3bbf
to
d0c7321
Compare
This comment was marked as resolved.
This comment was marked as resolved.
767d989
to
a3da3cc
Compare
This comment was marked as resolved.
This comment was marked as resolved.
@zondervancalvez Thank you! Let's not create 100+ issues separately, instead maybe create an issue for each image's security problems so 1 issue per image. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@zondervancalvez The besu container build and some of the checks are broken.
- Please fix the ones that do not have dependencies on other PRs (e.g. the ones that are fixing the sec. vulnerabilities)
1d57b5f
to
9a61d17
Compare
All images build and azure container scanned successfully. |
9a61d17
to
859d77d
Compare
632c5d5
to
9d4c991
Compare
9d4c991
to
2cd44aa
Compare
Hi @petermetz, Requested for re-review. Already integrated the container scan in ci.yaml and removed the old yaml file that I created so that the images are not build twice. Also created a PR description above. Thank you. |
2cd44aa
to
34d5c9d
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@zondervancalvez Thank you very much! LGTM
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@zondervancalvez Please sync the commit message and the PR description so that all the information is present in both places.
@petermetz All the actions in which Trivy is enabled are failing after listing critical vulnerabilities. I suspect this is because the fork is out-of-date. One of the vulnerability report links I clicked on wasn't even valid anymore (404). Should we update this branch and re-run the tests before merging? The code changes LGTM otherwise. |
@VRamakrishna Hmm. That is a bit troubling indeed because I took a look at how old the branch was and it is 9 commits behind the upstream main branch (so probably around a week old). Two things:
|
@petermetz Here is the 404 I found: https://github.com/hyperledger/cacti/actions/runs/5948364958/job/16132017903?pr=1981#step:5:42. I agree with points (2) and (3). |
Head branch was pushed to by a user without write access
cbc55b2
to
305755c
Compare
This PR/issue depends on:
|
@VRamakrishna Thank you for the info! I've done a deep dive based on that and here are the findings:
|
LGTM (not approving as Peter has already approved and we need only 1 approval per org) |
305755c
to
d8555a8
Compare
LGTM. |
Trivy is a cutting-edge security tool designed to enhance the safety of containerized applications by conducting thorough vulnerability assessments. Specifically developed for scanning container images, ranging from low-severity issues to critical threats. It employs an intelligent rating system to categorize vulnerabilities based on their severity levels, ensuring that high to critical vulnerabilities are given special attention. Upon detecting vulnerabilities that fall within this elevated range, Trivy will throw an error. By integrating Trivy into our deployment pipeline, we can proactively mitigate security risks and enhance the resilience of our repository. Fixes hyperledger-cacti#1876 Depends On: hyperledger-cacti#2121 Depends On: hyperledger-cacti#2135 Signed-off-by: zondervancalvez <zondervan.v.calvez@accenture.com>
d8555a8
to
6d60b62
Compare
Jagpreet also approved in the meantime so the old review is out of date now.
Trivy is a cutting-edge security tool designed to enhance the safety of containerized applications by conducting thorough vulnerability assessments. Specifically developed for scanning container images, ranging from low-severity issues to critical threats. It employs an intelligent rating system to categorize vulnerabilities based on their severity levels, ensuring that high to critical vulnerabilities are given special attention. Upon detecting vulnerabilities that fall within this elevated range, Trivy will throw an error.
By integrating Trivy into our deployment pipeline, we can proactively mitigate security risks and enhance the resilience of our repository.
Fixes https://github.com/hyperledger/cacti/issues/1876
Depends On https://github.com/hyperledger/cacti/pull/2121
Depends On https://github.com/hyperledger/cacti/pull/2135