Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[FEATURE] Periodic maintenance of existing releases artifacts #1358

Open
1 task done
qu1queee opened this issue Aug 14, 2023 · 5 comments
Open
1 task done

[FEATURE] Periodic maintenance of existing releases artifacts #1358

qu1queee opened this issue Aug 14, 2023 · 5 comments
Assignees
Labels
kind/feature Categorizes issue or PR as related to a new feature.
Milestone

Comments

@qu1queee
Copy link
Contributor

Is there an existing feature request for this?

  • I have searched the existing feature requests

Is your feature request related to a problem or use-case? Please describe.

To a use case. We should ensure that existing releases of Shipwright/Build are not subject to vulnerabilities. More specifically, the container images they produce. In order to ensure this, we need a regular update of existing releases images and manifests.

Describe the solution that you would like.

There is an automation that regularly validates existing Shipwright/Build releases images, and up-date them if needed.

Describe alternatives you have considered.

None

Anything else?

No

@qu1queee qu1queee added the kind/feature Categorizes issue or PR as related to a new feature. label Aug 14, 2023
@qu1queee
Copy link
Contributor Author

@SaschaSchwarze0 please complement the above if needed.

@SaschaSchwarze0
Copy link
Member

SaschaSchwarze0 commented Aug 14, 2023

Thanks @qu1queee, I think that we should aim to have this for our latest release. Implementation-wise, my proposal would be a GitHub action that ...

  • downloads the release artifacts from the latest release
  • extracts the image references
  • pulls each image
  • runs trivy image --ignore-unfixed --scanners vuln --timeout 30m --vuln-type os to scan for OS vulnerabilities
  • runs govulncheck -mode=binary ENTRYPOINT to scan for Go vulnerabilities
  • opens an issue for vulnerabilities that were found, if the issue exists, its description is updates with the latest scan findings

Sounds like a cool exercise.

@qu1queee
Copy link
Contributor Author

From refinement, we are looking for more ideas on this.

@SaschaSchwarze0
Copy link
Member

@adambkaplan I think that's what you're covering anyway through SHIP-0038.

@adambkaplan
Copy link
Member

SHIP-0038 covers the process for backporting bug fixes and security patches. It doesn't cover active scanning.

@adambkaplan adambkaplan added this to the Backlog milestone Jun 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/feature Categorizes issue or PR as related to a new feature.
Projects
Status: Todo
Development

No branches or pull requests

4 participants