-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable Platform-Security GitHub Workflow #1101
Enable Platform-Security GitHub Workflow #1101
Conversation
Commits missing Jira IDs: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@casey-williams-rh this security scan is not ideal. First of all, it uses ubi-8 repos while the image built for stage/prod is build with rhel-8 repos, which means that different packages could be installed. Shouldn't this job run on ci.int.devshift.net on a rhsm registered host?
Anchore-Grype-Vulnerability-San job reports that setuptool
is in old version which is not true
setuptools 39.2.0 65.5.1 python GHSA-r9hx-vwmv-q579 High
this is the version used by platform-python which cannot be updated and it also cannot be removed because dnf
depends on it. In fact our application uses python3.11 with setuptools>=69
Are there any plans to improve those jobs? It will always fail and when something always fails it will be ignored by people which I think is not what we want.
@psegedy , I'm not sure that I follow on the "This workflow uses ubi-8 repos while the image built for stage/prod is build with rhel-8 repos". The images in quay have Also we are working on a False Positive tracking integration, so when packages like I do not think it will take too much time or effort to get the False Positive tracking integration up and running. I just need the cycles to do it, and there is a ticket currently in my queue to work on it. Shouldn't this job run on ci.int.devshift.net on a rhsm registered host?
|
@psegedy, Upon further review of the Dockerfile, I understand what you mean regarding "This workflow uses ubi-8 repos while the image built for stage/prod is build with rhel-8 repos". Because the job is not running on a registered RHEL system, alternative packages are being pulled in.
|
@psegedy , I'm closing this PR for now so my team and I can better evaluate how we can scan the VMAAS Container Image. |
Overview
Enabling the
Platform Security GitHub Workflow
- This workflow provides Red Hat ConsoleDot Teams with a way to scan the containers they create in a convenient, automated, and reliable manner within their GitHub repository. The Platform Security Github Workflow lets teams get security feedback as they open Pull Requests.REF: https://github.com/RedHatInsights/platform-security-gh-workflow
Secure Coding Practices Checklist GitHub Link
Secure Coding Checklist