Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Image scanning annotations #4206

Closed
wants to merge 3 commits into from
Closed

Conversation

aweiteka
Copy link

No description provided.

ahardin-rh and others added 2 commits April 20, 2017 12:25
Signed-off-by: Aaron Weitekamp <aweiteka@redhat.com>
@aweiteka aweiteka changed the title Scanning annotations Image scanning annotations Apr 20, 2017
@aweiteka
Copy link
Author

@aweiteka
Copy link
Author

@simon3z
Copy link

simon3z commented May 10, 2017

@enoodle @pweil- can you review?

@xenserverarmy
Copy link

A few thoughts....

  1. You probably want to have a required field for the scanner version. Providers could have different versions with different capabilities. Free form string feels good there.
  2. I'm not clear on the timestamp format and would suggest both human readable and machine readable
  3. It might also be worthwhile to have an update timestamp unless the expectation is the timestamp is updated with each "rescan" or update in provider evaluation. If the latter, I'd be prescriptive about it
  4. I would like to see a qualityType of policy. Providers with richer policy engines could then use their policy concepts to go beyond simple vulns or license issues.
  5. I would probably make the reference attribute a required item. Without it there's no way to validate the data.
  6. Suggest changing the description of summary to summary of issues found. Maps better to the non-vuln options
  7. Suggest changing score to something like items or count. To me score has implications which aren't covered in this spec.

@goern
Copy link

goern commented May 10, 2017

re 1. good Idea
re 2. What is the standard with other openshift object? looks like most of then us creationTimestamp: 2016-09-08T05:04:46Z
re 5. is true, is should be required. @aweiteka do you know if all scan engines provide a human readable summary? if not we should recommend it

@aweiteka should we have something like:

Scanning Roles and Responsibilities
Scanning Engine: OSCAP, Blackduck, Twistlock, image-inspector
  Vulnerability database and/or feeds
  Analysis and reporting
  Schedules scans
Policy Engine: CloudForms, Twistlock, Blackduck
  External to platform
  Interprets analysis into policy
  Policy configured by administrator defining what actions to take based on analysis.
  Key integration point between analyzer(s) and platform.
Runtime Platform: OpenShift
  Enforces policy based on binary rules
  Does not interpret analysis

somewhere to give a context why we are just talking about the image metadata?

@xenserverarmy
Copy link

For the summary, my thinking is a link to the scanner UI for that specific report. That way scanners can be as rich as possible without artificially limiting the spec

@aweiteka
Copy link
Author

For the summary, my thinking is a link to the scanner UI for that specific report. That way scanners can be as rich as possible without artificially limiting the spec

Reference URL, compliance boolean and summary are all optional and may be used in any combination. Possible examples:

  • compliance boolean with reference URL, no summary (e.g. maybe the data is too complex to summarize)
  • summary only, no reference URL or compliance (e.g. OpenSCAP report with no parsing or report)
  • all data (summary, reference URL, compliance) populated for best UX, IMHO.

@aweiteka
Copy link
Author

cc @andreasn

Copy link

@enoodle enoodle left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good to me

@aweiteka
Copy link
Author

This was merged in #4432. See #4461 for follow-up edits to address comments

You probably want to have a required field for the scanner version. Providers could have different versions with different capabilities. Free form string feels good there.

done #4461

I'm not clear on the timestamp format and would suggest both human readable and machine readable

done #4461

It might also be worthwhile to have an update timestamp unless the expectation is the timestamp is updated with each "rescan" or update in provider evaluation. If the latter, I'd be prescriptive about it

Valid point. Keeping this simple for now.

I would like to see a qualityType of policy. Providers with richer policy engines could then use their policy concepts to go beyond simple vulns or license issues.

done #4461

I would probably make the reference attribute a required item. Without it there's no way to validate the data.

done #4461

Suggest changing the description of summary to summary of issues found. Maps better to the non-vuln options

done #4461

Suggest changing score to something like items or count. To me score has implications which aren't covered in this spec.

done #4461. I went with "data" as type "string" since we have a use case for non-integer scoring data.

@aweiteka aweiteka closed this May 23, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants