-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cache trivy #2496
Comments
github-project-automation
bot
moved this to Icebox
in Simpler.Grants.gov Product Backlog
Oct 16, 2024
coilysiren
added a commit
that referenced
this issue
Nov 12, 2024
## Summary Solves 50% of #2496 ### Time to review: __2.5 mins__ ## Changes proposed - Sets up vuln scans on a cron job - Posts it to slack ## Context for reviewers I setup a highlight word on "CI Vulnerability Scans" so this bothers me specifically ## Testing see `#internal-alerts-infra` --------- Co-authored-by: Michael Chouinard <[email protected]>
coilysiren
added a commit
that referenced
this issue
Nov 13, 2024
## Summary Very nearly fixes #2496 ### Time to review: __1 mins__ ## Context for reviewers I'm not committing to this 100% solving #2496 because the daily cronjob can fail (on trivy rate limits) which would just mean we are back in the same situation we have always been in. So I want to add tries on this stuff because I can call the issue fully solved. 90% of the meat is this PR is pulled from Trivy's docs, I don't know anything about the `oras` stuff
github-project-automation
bot
moved this from Todo
to Done
in Simpler.Grants.gov Product Backlog
Nov 13, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Summary
action/cache
for trivy databases aquasecurity/trivy-action#397needs to happen with a cronjob in main, for every application
Acceptance criteria
trivy cached, with 5 ~ 10 retries in case of failures (to pull the DB)
The text was updated successfully, but these errors were encountered: