-
Notifications
You must be signed in to change notification settings - Fork 834
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Enable ondemand scanning role to kustomize SA #3017
Conversation
7c86ed1
to
0f4564d
Compare
/lgtm |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This won't do what you expect, because the service isn't enabled. We explicitly disabled vulnerability scanning across the board a while back (ref: #1963)
See staging_special_case_services__k8s_staging_sig_storage
for an example of enabling services specifically for a single project.
We disable anything that's not explicitly specified, so if ondemandscanning.googleapis.com
implicitly enables/requires other services, those will need to be enabled too.
Who are the results of these scans visible to?
Right, we need to enable the API (I noted that in the orignal PR) which I don't have permission to do. This PR is step 2, which enables the SA who runs the scanning check. Understood the vulnerability scanning is no longer free. IIUC, the SA ([email protected]) I enabled is specifcally for kustomize. Do we have any concerns to support paid vulnerability checks for kustomize? "Who are the results of these scans visible to?" Good question, we are preparing LTS kustomize versions for Cloud Deploy. If we can add CVE check, Cloud Deploy would have visibility and then it can show that to its customers. If paid vulnerability check is not support, we'll then have to find other approaches. |
IIUC we can create a function |
Yeah do that and we'll enable the api for this project via that. We'll keep an eye on cost, I suspect this will be low traffic enough to not matter |
Oh I see what you mean. Thanks @spiffxp and @natasha41575. PTAL. |
6d1282c
to
1c70b36
Compare
1c70b36
to
16a4130
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/approve
/lgtm
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: spiffxp, yuwenma The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
Thank you @spiffxp Aaron! |
Related to kubernetes-sigs/kustomize#4264
@natasha41575 @KnVerey @monopole