-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add image scanning #6
Conversation
86322ab
to
4d1b790
Compare
Also update dependencies. Signed-off-by: Eric Searcy <eric@linuxfoundation.org>
4d1b790
to
a35d8a0
Compare
Signed-off-by: Eric Searcy <eric@linuxfoundation.org>
Signed-off-by: Eric Searcy <eric@linuxfoundation.org>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You probably also want to block the publish job on the results of the scan, as we definitely don't want to upload if you found a secret.
I created this as PR job, rather than a merge job, so I assume this would be covered by required checks and branch restrictions? |
Pass failure exit code on found secrets, and also ignore the update check. Signed-off-by: Eric Searcy <eric@linuxfoundation.org>
235d540
to
2eda209
Compare
Signed-off-by: Eric Searcy <eric@linuxfoundation.org>
On the other hand, perhaps it's overkill to do this on every update to a PR, and a sanity check pre-publish on merge would be sufficient... |
Yes as long as it has That does rely on no one changing the repo settings and pushing directly (a manual build & push is what caused issues with one container image recently..) bypassing the PR check though. |
Also update dependencies.