Skip to content
This repository has been archived by the owner on Aug 2, 2023. It is now read-only.

Configuring "Ignoring vulnerabilities" in workflow #108

Open
kvmw opened this issue Oct 11, 2021 · 11 comments · May be fixed by #118
Open

Configuring "Ignoring vulnerabilities" in workflow #108

kvmw opened this issue Oct 11, 2021 · 11 comments · May be fixed by #118
Labels
enhancement New feature or request idle Inactive for 14 days

Comments

@kvmw
Copy link

kvmw commented Oct 11, 2021

It would be a nice option to let user configure the list of vulnerabilities to ignore as action input. this can be either inline or the path to a file that contains the list.

either:

- uses: azure/container-scan@v0
  with:
    image-name:  http://myimage:latest
    username: changeit
    password: changit
    allowedlist:   # pass the list inline
     - CVE-2003-1307
     - CVE-2007-0086
     - CVE-2019-3462
     - CVE-2011-3374

or:

- uses: azure/container-scan@v0
  with:
    image-name:  http://myimage:latest
    username: changeit
    password: changit
    allowedlist: /path/to/allowedlist.yaml. # the file that contains the list of vulnerabilities to ignore. 

Scenario 1: Using the same workflow against multiple versions of the same image, one might want to ignore some vulnerabilities in older versions but not in the latest one for example.

Scenario 2: Using the action multiple times for different images in a single repo/workflow, one might one to ignore some vulnerabilities for one image not the other ones.

@kvmw kvmw added the need-to-triage Requires investigation label Oct 11, 2021
@github-actions
Copy link

This issue is idle because it has been open for 14 days with no activity.

@github-actions github-actions bot added the idle Inactive for 14 days label Oct 25, 2021
@kvmw
Copy link
Author

kvmw commented Oct 25, 2021

any update on this?

@github-actions github-actions bot removed the idle Inactive for 14 days label Oct 25, 2021
@ajinkya599
Copy link
Contributor

We currently support an ignore file in the path .github/containerscan/allowedlist.yaml.
In the v1 proposal, we have image specific allowedlisting. I think that can address the ask. What do you think?
cc: @pulkitaggarwl

@ajinkya599 ajinkya599 added enhancement New feature or request and removed need-to-triage Requires investigation labels Nov 1, 2021
@kvmw
Copy link
Author

kvmw commented Nov 1, 2021

@ajinkya599 , v1-proposal addresses the second scenario in my request but not the the first one, unless we include the image tag/version in the allowedlist.yaml too. for example:

general:
   vulnerabilities:
   - CVE-2003-1307
image-name-1@latest:
   vulnerabilities:
   - CVE-2003-2207 
image-name-1@v1:
   vulnerabilities:
   - CVE-2003-3232
image-name-1@v2:
  - ...  

To explain our situation:
we have some versions of the images out there used by customers. we keep scanning them to find potential new CVEs but we can only fix those CVEs be shipping the new version of our images.
We have single workflow scanning latest version of the image (e.g. image:latest) as well as some old versions (e.g. image:v1 and image:v2).
Imagine a new CVE is impacting image:latest (under development) and image:v1 (used by customer). we will fix the issue in latest image but we need to ignore it in v1. (same image, different versions, different ignore list).

Separating the older images workflow from the latest one that is under development can be a workaround for this issue but it seems too much work compare to just being able to set a path (or inline list) for the action.

@github-actions
Copy link

This issue is idle because it has been open for 14 days with no activity.

@github-actions github-actions bot added the idle Inactive for 14 days label Nov 15, 2021
@patrick-stephens
Copy link

A per image option would be useful but even better to include in the inputs. Having a single file currently is not really flexible enough.

@github-actions github-actions bot removed the idle Inactive for 14 days label Dec 7, 2021
@github-actions
Copy link

This issue is idle because it has been open for 14 days with no activity.

@github-actions github-actions bot added the idle Inactive for 14 days label Dec 21, 2021
@patrick-stephens
Copy link

Trivy also supports ignoring unfixed vulnerabilities which would be useful

@github-actions github-actions bot removed the idle Inactive for 14 days label Dec 21, 2021
@github-actions
Copy link

github-actions bot commented Jan 4, 2022

This issue is idle because it has been open for 14 days with no activity.

@github-actions github-actions bot added the idle Inactive for 14 days label Jan 4, 2022
@abelsromero
Copy link

I wonder if there's any change for this? These are fair scenarios.

@github-actions github-actions bot removed the idle Inactive for 14 days label Jan 5, 2022
@kvmw kvmw linked a pull request Jan 5, 2022 that will close this issue
@github-actions
Copy link

This issue is idle because it has been open for 14 days with no activity.

@github-actions github-actions bot added the idle Inactive for 14 days label Jan 19, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement New feature or request idle Inactive for 14 days
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants