-
Notifications
You must be signed in to change notification settings - Fork 278
🌱 Add weekly security scan using govulncheck and Trivy #2536
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
👷 Deploy Preview for kubernetes-sigs-cluster-api-openstack processing.
|
We can simplify this a lot by just using the official action: https://google.github.io/osv-scanner/github-action/ It takes care of everything for us and maintained by the team behind it, thoughts? |
Oh I wasn't aware of that one actually! I asked around a bit and it turns out we did use it before in CAPM3. Unfortunately we had issues with it around the go version and dependabot updates. I'm open to try it though, perhaps the issues are solved. Another thing I was thinking about is if we should rather copy what CAPI does. They run govulncheck directly through a workflow and some make targets. |
So, I did a bit of research on how the different projects are doing this, the common thing that I found across all of them is that they use and run Trivy & some have
|
Thanks! Then I will rework this to follow CAPI 🙂 |
b2494fc
to
6ae4671
Compare
9bacb86
to
042b352
Compare
The normal test will run govulncheck also but not trivy to scan images. |
/hold cancel |
This is all based on how CAPI does the same. Signed-off-by: Lennart Jern <[email protected]>
042b352
to
7cfdcfc
Compare
Nice! Running this locally seems to be recommending a bump to Go 1.23.8. /lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: mdbooth, mnaser The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
Thanks! Yes, this is also why I pushed #2539 yesterday 🙂 |
Hmm netlify checks seems stuck |
Ok I'm just going to merge this now. The netlify check has been stuck for 4 days |
/cherry-pick release-0.12 release-0.11 release-0.10 |
@lentzi90: new pull request created: #2543 In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
What this PR does / why we need it:
This adds a github workflow that runs the govulncheck and trivy.
It is all copied and adapted from CAPI (hence the existing licenses at the top).
We may want to think about how to notify maintainers of this.
Which issue(s) this PR fixes (optional, in
fixes #<issue number>(, fixes #<issue_number>, ...)
format, will close the issue(s) when PR gets merged):Fixes #
Special notes for your reviewer:
TODOs:
/hold