-
Notifications
You must be signed in to change notification settings - Fork 22
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add vulnerability detection Github Action to scan built docker images #168
Comments
Initial thought I can integrate it with the Gradle plugin so that it can be run both locally and with github actions. Reference for Github actions. https://github.com/marketplace/actions/anchore-container-scan |
@nigelgbanks Anything I can do here to help move this along? |
#183 should cover it. It generates reports that one can download on the build page, for example https://github.com/Islandora-Devops/isle-buildkit/actions/runs/2030133280; The link to grype reports. https://github.com/Islandora-Devops/isle-buildkit/suites/5774283956/artifacts/192302600 They are markdown files like the following:
|
Though there isn't a weekly setup or notification system at this point. The pull request was just the first pass in generating the reports on every push so that a pull request reviewer could use that information to see if some new vulnerability has been added. Further automation can be handled post release. |
Pull request is merged, any further improvements can be raised as new tickets. |
@g7morris used Syft and Grype to scan the images for vulnerabilities in response to the log4j issue. Look into how to integrate these tools so checks are performed:
The text was updated successfully, but these errors were encountered: